Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Exploit.Siggen3.10350.12632.xls
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application:
Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Feb 19 10:48:36 2021, Security: 0
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\8[1].jjkes
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
downloaded
|
||
C:\Users\user\BASE.BABAA
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0BCE0000
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue
Oct 17 10:04:00 2017, mtime=Sat Feb 20 09:16:38 2021, atime=Sat Feb 20 09:16:38 2021, length=8192, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.Siggen3.10350.12632.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Feb 20 09:16:25
2021, mtime=Sat Feb 20 09:16:38 2021, atime=Sat Feb 20 09:16:38 2021, length=168448, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\3ECE0000
|
Applesoft BASIC program data, first line number 16
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
|
||
C:\Windows\System32\rundll32.exe
|
rundll32 ..\BASE.BABAA,DllRegisterServer
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 ..\BASE.BABAA,DllRegisterServer
|
||
C:\Windows\System32\wermgr.exe
|
C:\Windows\system32\wermgr.exe
|
||
C:\Windows\System32\wermgr.exe
|
C:\Windows\system32\wermgr.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.chipmania.it/mails/open.php
|
185.81.0.78
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
https://200.52.147.93/rob60/377142_W617601.BB951803A213771AABBDF5CE6FB77EC0/5/file/=
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
https://200.52.147.93/rob60/377142_W617601.BB951803A213771AABBDF5CE6FB77EC0/5/file/
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
chipmania.it
|
185.81.0.78
|
||
www.chipmania.it
|
unknown
|
||
api.ip.sb
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
200.52.147.93
|
unknown
|
Honduras
|
unknown
|
||
185.81.0.78
|
unknown
|
Italy
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
<=5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EC439
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DefaultSheetR2L
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
UseSystemSeparators
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ThousandsSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DecimalSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EC8BC
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ECAAF
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ECDEA
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ECE86
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
l+5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F4200
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F4673
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EXCELFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SavedLegacySettings
|
There are 95 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
374000
|
unkown
|
page read and write
|
||
374000
|
unkown
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
270000
|
unkown
|
page execute and read and write
|
||
968000
|
unkown
|
page read and write
|
||
10001000
|
unkown
|
page execute and read and write
|
||
304000
|
heap default
|
page read and write
|
||
230000
|
heap default
|
page read and write
|
||
920000
|
unkown
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
32DD0000
|
unkown
|
page readonly
|
||
AAC000
|
unkown
|
page read and write
|
||
26E000
|
heap default
|
page read and write
|
||
34620000
|
unkown
|
page read and write
|
||
32C01000
|
heap private
|
page read and write
|
||
252000
|
stack
|
page read and write
|
||
1D90000
|
unkown
|
page write copy
|
||
3419B000
|
unkown
|
page read and write
|
||
2497000
|
unkown
|
page readonly
|
||
1F10000
|
heap private
|
page read and write
|
||
6E8CA000
|
unkown image
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
2A0000
|
heap private
|
page read and write
|
||
341000
|
unkown
|
page read and write
|
||
1C50000
|
heap private
|
page read and write
|
||
B00000
|
heap private
|
page read and write
|
||
1E60000
|
heap private
|
page read and write
|
||
1B70000
|
heap private
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
3A1000
|
unkown
|
page read and write
|
||
33563000
|
heap private
|
page read and write
|
||
341000
|
unkown
|
page read and write
|
||
2AA000
|
unkown
|
page read and write
|
||
36A000
|
unkown
|
page read and write
|
||
8D0000
|
heap private
|
page read and write
|
||
339C0000
|
unkown
|
page readonly
|
||
420000
|
unkown
|
page readonly
|
||
29A000
|
heap default
|
page read and write
|
||
31D000
|
heap default
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
341000
|
unkown
|
page read and write
|
||
2A4000
|
heap private
|
page read and write
|
||
35C000
|
unkown
|
page read and write
|
||
333B0000
|
heap private
|
page read and write
|
||
A52000
|
heap private
|
page read and write
|
||
36A000
|
unkown
|
page read and write
|
||
333AD000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
3A0000
|
unkown
|
page read and write
|
||
6E481000
|
unkown image
|
page execute read
|
||
341000
|
unkown
|
page read and write
|
||
1DB000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
700000
|
unkown
|
page readonly
|
||
380000
|
unkown
|
page read and write
|
||
6E480000
|
unkown image
|
page readonly
|
||
100000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page execute and read and write
|
||
320000
|
heap default
|
page read and write
|
||
3A2000
|
unkown
|
page read and write
|
||
33DFF000
|
unkown
|
page read and write
|
||
6E8A9000
|
unkown image
|
page readonly
|
||
333B5000
|
heap private
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
750000
|
unkown
|
page readonly
|
||
32DCF000
|
unkown
|
page read and write
|
||
29C000
|
unkown
|
page read and write
|
||
22B0000
|
unkown
|
page readonly
|
||
19D000
|
unkown
|
page read and write
|
||
290000
|
heap default
|
page read and write
|
||
910000
|
heap private
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
33550000
|
heap private
|
page read and write
|
||
60000
|
unkown
|
page execute and read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
1B40000
|
unkown
|
page readonly
|
||
2E7000
|
heap default
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
1D8F000
|
unkown
|
page read and write
|
||
35E000
|
heap default
|
page read and write
|
||
21B000
|
unkown
|
page read and write
|
||
6E480000
|
unkown image
|
page readonly
|
||
1E0000
|
unkown
|
page read and write
|
||
32B01000
|
heap private
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
366000
|
unkown
|
page read and write
|
||
33BA7000
|
unkown
|
page readonly
|
||
5B0000
|
unkown
|
page readonly
|
||
334FE000
|
unkown
|
page read and write
|
||
33DD6000
|
unkown
|
page read and write
|
||
A30000
|
heap private
|
page read and write
|
||
1D27000
|
unkown
|
page readonly
|
||
150000
|
unkown
|
page read and write
|
||
6E8E4000
|
unkown image
|
page readonly
|
||
33DA0000
|
unkown
|
page read and write
|
||
32C00000
|
heap private
|
page read and write
|
||
32C06000
|
heap private
|
page read and write
|
||
830000
|
heap private
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
341A0000
|
unkown
|
page readonly
|
||
33E24000
|
unkown
|
page read and write
|
||
6E8CC000
|
unkown image
|
page readonly
|
||
B67000
|
stack
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
32903000
|
heap private
|
page read and write
|
||
333EB000
|
heap private
|
page read and write
|
||
24000
|
heap private
|
page read and write
|
||
180000
|
unkown
|
page read and write
|
||
327000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
33E15000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page execute and read and write
|
||
32C3C000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
33EA0000
|
unkown
|
page read and write
|
||
33E04000
|
unkown
|
page read and write
|
||
32D0F000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
7E0000
|
unkown
|
page execute and read and write
|
||
331AE000
|
unkown
|
page read and write
|
||
237000
|
heap default
|
page read and write
|
||
335D0000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page read and write
|
||
33DF7000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
A34000
|
heap private
|
page read and write
|
||
341000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
3A2000
|
unkown
|
page read and write
|
||
2AD000
|
heap default
|
page read and write
|
||
2BF000
|
heap default
|
page read and write
|
||
33E8E000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
2020000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
331D0000
|
unkown
|
page readonly
|
||
1D6000
|
unkown
|
page read and write
|
||
34E000
|
unkown
|
page read and write
|
||
317000
|
heap default
|
page read and write
|
There are 133 hidden memdumps, click here to show them.