Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
xXQ39a5f9EJP.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xXQ39a5f9EJP.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp679F.tmp.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\xXQ39a5f9EJP.exe
|
"C:\Users\user\Desktop\xXQ39a5f9EJP.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp679F.tmp.bat""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
timeout 3
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
liverpool777.duckdns.org
|
179.13.0.175
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
179.13.0.175
|
liverpool777.duckdns.org
|
Colombia
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\F723E1B88FDFE54EEC0E
|
F7A2CF016280A5E7A24A46D6E81A704BFCCD6486B35AFEFC4601A8330895F85F
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
472000
|
unkown
|
page readonly
|
||
2A44000
|
trusted library allocation
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1B202000
|
heap
|
page read and write
|
||
1A633130000
|
heap
|
page read and write
|
||
3FA0DEC000
|
stack
|
page read and write
|
||
1A634CF5000
|
heap
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
29C8000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
19A1E540000
|
heap
|
page read and write
|
||
1B054000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
2849000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
635EBFF000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
19A1E660000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page execute and read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4AC300000
|
trusted library allocation
|
page execute and read and write
|
||
1BC5A000
|
stack
|
page read and write
|
||
1B30A000
|
heap
|
page read and write
|
||
1BD5C000
|
stack
|
page read and write
|
||
1B81D000
|
stack
|
page read and write
|
||
1B61F000
|
stack
|
page read and write
|
||
19A1E653000
|
heap
|
page read and write
|
||
635EAFF000
|
unkown
|
page read and write
|
||
1BE55000
|
stack
|
page read and write
|
||
26BF000
|
stack
|
page read and write
|
||
1A750000
|
trusted library allocation
|
page read and write
|
||
2974000
|
trusted library allocation
|
page read and write
|
||
292B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1C15C000
|
stack
|
page read and write
|
||
1B120000
|
heap
|
page read and write
|
||
95D000
|
heap
|
page read and write
|
||
19A1E620000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B41E000
|
stack
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
635E73B000
|
stack
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1B91C000
|
stack
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
2954000
|
trusted library allocation
|
page read and write
|
||
19A1E7A0000
|
heap
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
1B51E000
|
stack
|
page read and write
|
||
19A1E661000
|
heap
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
19A1E661000
|
heap
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1B71F000
|
stack
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B947000
|
trusted library allocation
|
page read and write
|
||
19A1E62A000
|
heap
|
page read and write
|
||
1B036000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
29BC000
|
trusted library allocation
|
page read and write
|
||
1A6332E0000
|
heap
|
page read and write
|
||
19A1E661000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1B1FC000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1A633250000
|
heap
|
page read and write
|
||
2A73000
|
trusted library allocation
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
19A1E7B0000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
19A1E650000
|
heap
|
page read and write
|
||
1B113000
|
heap
|
page read and write
|
||
19A1E720000
|
heap
|
page read and write
|
||
1BF57000
|
stack
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
1A634CF0000
|
heap
|
page read and write
|
||
12751000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1B1C3000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1A633210000
|
heap
|
page read and write
|
||
1275E000
|
trusted library allocation
|
page read and write
|
||
19A1E661000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
2886000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
2A6C000
|
trusted library allocation
|
page read and write
|
||
1AAD5000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1C257000
|
stack
|
page read and write
|
||
1B020000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B967000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
470000
|
unkown
|
page readonly
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
2889000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
19A1E652000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
810000
|
heap
|
page read and write
|
||
3FA107E000
|
stack
|
page read and write
|
||
7FFD9B949000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
5C4000
|
stack
|
page read and write
|
||
19A1E663000
|
heap
|
page read and write
|
||
19A1E740000
|
heap
|
page read and write
|
||
933000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
BB0000
|
trusted library section
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
27AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
19A1E661000
|
heap
|
page read and write
|
||
BAF000
|
unkown
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
1A6332E8000
|
heap
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1ACDD000
|
stack
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
91B000
|
heap
|
page read and write
|
||
3FA10FE000
|
stack
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94E000
|
trusted library allocation
|
page read and write
|
||
1B04B000
|
heap
|
page read and write
|
||
1BA1D000
|
stack
|
page read and write
|
||
1A780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
12761000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
19A1E650000
|
heap
|
page read and write
|
||
47E000
|
unkown
|
page readonly
|
There are 138 hidden memdumps, click here to show them.