Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
b123.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\4OZ5FKFU
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\Desktop\GLFUAS2V
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\Desktop\I5PPP8YC
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\Desktop\M790ZMO8
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\b123.exe
|
"C:\Users\user\Desktop\b123.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\b123.exe" & exit
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout /t 5
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://sughicent.com/blaka.php
|
5.63.155.126
|
||
http://sughicent.com/request
|
5.63.155.126
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sughicent.com
|
5.63.155.126
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
5.63.155.126
|
sughicent.com
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2070000
|
direct allocation
|
page execute and read and write
|
||
5DA000
|
heap
|
page read and write
|
||
211E000
|
stack
|
page read and write
|
||
20A0000
|
heap
|
page read and write
|
||
20A8000
|
heap
|
page read and write
|
||
B9C6BCE000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
2A3B845F000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
F104000
|
trusted library allocation
|
page read and write
|
||
F4D3000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
B9C747E000
|
stack
|
page read and write
|
||
6097A000
|
direct allocation
|
page read and write
|
||
FB6C000
|
stack
|
page read and write
|
||
2A3B8456000
|
heap
|
page read and write
|
||
2A3B8502000
|
heap
|
page read and write
|
||
8EA0000
|
heap
|
page read and write
|
||
60900000
|
direct allocation
|
page execute and read and write
|
||
8E8F000
|
stack
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
60980000
|
direct allocation
|
page readonly
|
||
20B0000
|
direct allocation
|
page execute and read and write
|
||
919E000
|
trusted library allocation
|
page read and write
|
||
FB3A000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
F392000
|
trusted library allocation
|
page read and write
|
||
109BC000
|
stack
|
page read and write
|
||
6096F000
|
direct allocation
|
page readonly
|
||
6096E000
|
direct allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
B9C6E7E000
|
stack
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page execute and read and write
|
||
4BE000
|
stack
|
page read and write
|
||
3407000
|
heap
|
page read and write
|
||
F2C0000
|
trusted library allocation
|
page read and write
|
||
2A3B8513000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
2A3B8455000
|
heap
|
page read and write
|
||
2A3B8480000
|
heap
|
page read and write
|
||
8ACF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
F3C0000
|
trusted library allocation
|
page read and write
|
||
B9C7177000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
B9C727E000
|
stack
|
page read and write
|
||
2A3B8280000
|
heap
|
page read and write
|
||
8D8E000
|
stack
|
page read and write
|
||
F330000
|
trusted library allocation
|
page read and write
|
||
B9C737C000
|
stack
|
page read and write
|
||
8C4E000
|
stack
|
page read and write
|
||
2A3B8290000
|
heap
|
page read and write
|
||
2A3B8402000
|
heap
|
page read and write
|
||
F39B000
|
trusted library allocation
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
8C0F000
|
stack
|
page read and write
|
||
6BD000
|
heap
|
page read and write
|
||
60901000
|
direct allocation
|
page execute read
|
||
30000
|
heap
|
page read and write
|
||
2A3B8426000
|
heap
|
page read and write
|
||
2A3B8466000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8FFA000
|
stack
|
page read and write
|
||
2A3B848B000
|
heap
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
2A3B845B000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
2220000
|
unclassified section
|
page read and write
|
||
42F000
|
unkown
|
page write copy
|
||
10558000
|
trusted library allocation
|
page read and write
|
||
2A3B843C000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
8EFD000
|
stack
|
page read and write
|
||
FCB0000
|
trusted library allocation
|
page read and write
|
||
8D4F000
|
stack
|
page read and write
|
||
2A3B8413000
|
heap
|
page read and write
|
||
B9C707B000
|
stack
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
2A3B8500000
|
heap
|
page read and write
|
||
2A3B8453000
|
heap
|
page read and write
|
||
905E000
|
stack
|
page read and write
|
||
6097D000
|
direct allocation
|
page read and write
|
||
2A3B8429000
|
heap
|
page read and write
|
||
2A3B8508000
|
heap
|
page read and write
|
||
FBA0000
|
heap
|
page read and write
|
||
221F000
|
stack
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
108BE000
|
stack
|
page read and write
|
||
2A3B82F0000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
FB30000
|
heap
|
page read and write
|
||
6097B000
|
direct allocation
|
page readonly
|
||
2A3B8C02000
|
trusted library allocation
|
page read and write
|
||
4C5000
|
heap
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
2A3B83F0000
|
trusted library allocation
|
page read and write
|
||
FCAA000
|
stack
|
page read and write
|
||
2A3B8400000
|
heap
|
page read and write
|
||
F38E000
|
trusted library allocation
|
page read and write
|
||
F9F4000
|
trusted library allocation
|
page read and write
|
||
2A3B8448000
|
heap
|
page read and write
|
||
196000
|
stack
|
page read and write
|
||
433000
|
unkown
|
page readonly
|
||
9010000
|
trusted library section
|
page readonly
|
||
B9C6B4B000
|
stack
|
page read and write
|
||
8B0E000
|
stack
|
page read and write
|
||
2A3B8461000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
10540000
|
trusted library allocation
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
F4C0000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
915E000
|
stack
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
There are 111 hidden memdumps, click here to show them.