Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.AIDetect.malware2.8516.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Aftapningers.unc
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Extracontinental91.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600,
atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsiAD43.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.8516.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware2.8516.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28B0000
|
direct allocation
|
page execute and read and write
|
||
21B181C0000
|
trusted library allocation
|
page read and write
|
||
3DA847B000
|
stack
|
page read and write
|
||
5D9847E000
|
stack
|
page read and write
|
||
21B17A00000
|
heap
|
page read and write
|
||
1B1FE8EF000
|
heap
|
page read and write
|
||
1B1FE670000
|
trusted library allocation
|
page read and write
|
||
1B1FE400000
|
trusted library allocation
|
page read and write
|
||
1B1FE905000
|
heap
|
page read and write
|
||
1B1FE89E000
|
heap
|
page read and write
|
||
27EB4870000
|
heap
|
page read and write
|
||
23CD0089000
|
heap
|
page read and write
|
||
27EB488F000
|
heap
|
page read and write
|
||
1B1F9902000
|
heap
|
page read and write
|
||
1B1F90FB000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1B1FE900000
|
heap
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
1B1FE5AE000
|
trusted library allocation
|
page read and write
|
||
1A8DFA27000
|
heap
|
page read and write
|
||
1B1F9959000
|
heap
|
page read and write
|
||
1F918002000
|
trusted library allocation
|
page read and write
|
||
1B1F9075000
|
heap
|
page read and write
|
||
23CD003C000
|
heap
|
page read and write
|
||
1B1FE8DE000
|
heap
|
page read and write
|
||
27EB4829000
|
heap
|
page read and write
|
||
23CCFDC0000
|
heap
|
page read and write
|
||
1A8DFA4C000
|
heap
|
page read and write
|
||
1A8DFB00000
|
heap
|
page read and write
|
||
23CD0113000
|
heap
|
page read and write
|
||
1B1F9029000
|
heap
|
page read and write
|
||
23CD0002000
|
heap
|
page read and write
|
||
1A8DFA4F000
|
heap
|
page read and write
|
||
D4489FB000
|
stack
|
page read and write
|
||
1F917800000
|
heap
|
page read and write
|
||
1A8DFA3C000
|
heap
|
page read and write
|
||
E9FC87E000
|
stack
|
page read and write
|
||
1B1F9102000
|
heap
|
page read and write
|
||
1B1FE490000
|
trusted library allocation
|
page read and write
|
||
27EB4913000
|
heap
|
page read and write
|
||
D4486FF000
|
stack
|
page read and write
|
||
1B1FEA30000
|
trusted library allocation
|
page read and write
|
||
17071630000
|
heap
|
page read and write
|
||
1B1F906F000
|
heap
|
page read and write
|
||
1F91787C000
|
heap
|
page read and write
|
||
1B1FE5A0000
|
trusted library allocation
|
page read and write
|
||
3DA877E000
|
stack
|
page read and write
|
||
1B1FE8A1000
|
heap
|
page read and write
|
||
3DA8577000
|
stack
|
page read and write
|
||
E9FCEFE000
|
stack
|
page read and write
|
||
23CD002C000
|
heap
|
page read and write
|
||
170716D8000
|
heap
|
page read and write
|
||
123FAFA000
|
stack
|
page read and write
|
||
1B1FE5D0000
|
trusted library allocation
|
page read and write
|
||
1A8DF900000
|
heap
|
page read and write
|
||
1B1FE5D0000
|
trusted library allocation
|
page read and write
|
||
1B1F9900000
|
heap
|
page read and write
|
||
1B1FE85E000
|
heap
|
page read and write
|
||
D448CFE000
|
stack
|
page read and write
|
||
5D97FFC000
|
stack
|
page read and write
|
||
23CD0071000
|
heap
|
page read and write
|
||
123F6FB000
|
stack
|
page read and write
|
||
1F91783C000
|
heap
|
page read and write
|
||
1B1FE6D0000
|
trusted library allocation
|
page read and write
|
||
27EB488B000
|
heap
|
page read and write
|
||
1A8DFA4B000
|
heap
|
page read and write
|
||
1A8DFA53000
|
heap
|
page read and write
|
||
1A8DFA70000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
1B1FE5C0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1B1F9000000
|
heap
|
page read and write
|
||
1B1FE860000
|
heap
|
page read and write
|
||
1B1FE700000
|
trusted library allocation
|
page read and write
|
||
1B1F9013000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
170716D0000
|
heap
|
page read and write
|
||
1B1FA400000
|
trusted library allocation
|
page read and write
|
||
1B1FE700000
|
remote allocation
|
page read and write
|
||
D448BFE000
|
stack
|
page read and write
|
||
170716A0000
|
trusted library allocation
|
page read and write
|
||
D4488FF000
|
stack
|
page read and write
|
||
1B1F9913000
|
heap
|
page read and write
|
||
3DA7FAE000
|
stack
|
page read and write
|
||
27EB4884000
|
heap
|
page read and write
|
||
27EB4813000
|
heap
|
page read and write
|
||
1A8DFA7B000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
1B1F8DA0000
|
heap
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
27EB4760000
|
heap
|
page read and write
|
||
1B1FE5E4000
|
trusted library allocation
|
page read and write
|
||
170715B0000
|
trusted library allocation
|
page read and write
|
||
27EB5202000
|
trusted library allocation
|
page read and write
|
||
123F5FA000
|
stack
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
1B1FE82F000
|
heap
|
page read and write
|
||
21B17A58000
|
heap
|
page read and write
|
||
27EB4850000
|
heap
|
page read and write
|
||
1B1FE6B0000
|
trusted library allocation
|
page read and write
|
||
1F917828000
|
heap
|
page read and write
|
||
1B1FE8A8000
|
heap
|
page read and write
|
||
2EEA000
|
stack
|
page read and write
|
||
21B18202000
|
trusted library allocation
|
page read and write
|
||
1B1FE5E0000
|
trusted library allocation
|
page read and write
|
||
170716B0000
|
trusted library allocation
|
page read and write
|
||
E9FC53B000
|
stack
|
page read and write
|
||
1B1F9815000
|
heap
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
21B178B0000
|
heap
|
page read and write
|
||
8435D7F000
|
stack
|
page read and write
|
||
21E0000
|
trusted library allocation
|
page read and write
|
||
1B1FE84B000
|
heap
|
page read and write
|
||
21B17B02000
|
heap
|
page read and write
|
||
A876CFE000
|
stack
|
page read and write
|
||
21B17A6E000
|
heap
|
page read and write
|
||
23CD0054000
|
heap
|
page read and write
|
||
23CD0802000
|
trusted library allocation
|
page read and write
|
||
1B1F9FE0000
|
trusted library allocation
|
page read and write
|
||
1F917859000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
17071930000
|
heap
|
page readonly
|
||
1B1F8E00000
|
heap
|
page read and write
|
||
123ED8B000
|
stack
|
page read and write
|
||
1707171E000
|
heap
|
page read and write
|
||
1B1F9918000
|
heap
|
page read and write
|
||
27EB4908000
|
heap
|
page read and write
|
||
72EF6000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
17071950000
|
trusted library allocation
|
page read and write
|
||
123F1F7000
|
stack
|
page read and write
|
||
72EF1000
|
unkown
|
page execute read
|
||
3DA7F2E000
|
stack
|
page read and write
|
||
21B17B08000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1B1FE670000
|
trusted library allocation
|
page read and write
|
||
8435A77000
|
stack
|
page read and write
|
||
21B17A29000
|
heap
|
page read and write
|
||
1B1F9802000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1B1FE690000
|
trusted library allocation
|
page read and write
|
||
27EB483C000
|
heap
|
page read and write
|
||
A876BFB000
|
stack
|
page read and write
|
||
468000
|
unkown
|
page readonly
|
||
1B1F8D90000
|
heap
|
page read and write
|
||
1B1FE881000
|
heap
|
page read and write
|
||
1A8DFB13000
|
heap
|
page read and write
|
||
1A8DFA00000
|
heap
|
page read and write
|
||
23CD0102000
|
heap
|
page read and write
|
||
21B17A54000
|
heap
|
page read and write
|
||
27EB486A000
|
heap
|
page read and write
|
||
170715A0000
|
heap
|
page read and write
|
||
1B1FE84F000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1B1FE902000
|
heap
|
page read and write
|
||
27EB484D000
|
heap
|
page read and write
|
||
1A8DFA86000
|
heap
|
page read and write
|
||
27EB4900000
|
heap
|
page read and write
|
||
A876DFE000
|
stack
|
page read and write
|
||
1B1FE5C4000
|
trusted library allocation
|
page read and write
|
||
1B1FE5C1000
|
trusted library allocation
|
page read and write
|
||
272F000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
170716E0000
|
heap
|
page read and write
|
||
1B1F9102000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1F9176E0000
|
heap
|
page read and write
|
||
1B1FE700000
|
remote allocation
|
page read and write
|
||
27EB484C000
|
heap
|
page read and write
|
||
21B17A6E000
|
heap
|
page read and write
|
||
1B1F908B000
|
heap
|
page read and write
|
||
1B1FE8DB000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
1F917670000
|
heap
|
page read and write
|
||
1A8DFA29000
|
heap
|
page read and write
|
||
1A8DFA63000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
3DA867E000
|
stack
|
page read and write
|
||
1B1FE5A0000
|
trusted library allocation
|
page read and write
|
||
23CD007C000
|
heap
|
page read and write
|
||
5D984FB000
|
stack
|
page read and write
|
||
3DA7EAB000
|
stack
|
page read and write
|
||
1B1FE700000
|
remote allocation
|
page read and write
|
||
E9FC9FF000
|
stack
|
page read and write
|
||
1A8DFB02000
|
heap
|
page read and write
|
||
17071920000
|
trusted library allocation
|
page read and write
|
||
1A8DFA49000
|
heap
|
page read and write
|
||
1B1FE842000
|
heap
|
page read and write
|
||
72EF4000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
23CD0100000
|
heap
|
page read and write
|
||
1B1FE800000
|
heap
|
page read and write
|
||
84355DD000
|
stack
|
page read and write
|
||
1B1F9918000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
1F917813000
|
heap
|
page read and write
|
||
468000
|
unkown
|
page readonly
|
||
21B17A5C000
|
heap
|
page read and write
|
||
27EB4853000
|
heap
|
page read and write
|
||
1A8DFA8F000
|
heap
|
page read and write
|
||
3DA837F000
|
stack
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
1B1FE8F3000
|
heap
|
page read and write
|
||
1B1F9800000
|
heap
|
page read and write
|
||
1B1FE7F0000
|
trusted library allocation
|
page read and write
|
||
17071610000
|
heap
|
page read and write
|
||
1A8DF8F0000
|
heap
|
page read and write
|
||
1B1FE6C0000
|
trusted library allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
1B1F90FB000
|
heap
|
page read and write
|
||
1B1F9091000
|
heap
|
page read and write
|
||
1A8DFA48000
|
heap
|
page read and write
|
||
1F9177E0000
|
trusted library allocation
|
page read and write
|
||
27EB4800000
|
heap
|
page read and write
|
||
1B1F90A9000
|
heap
|
page read and write
|
||
27EB4849000
|
heap
|
page read and write
|
||
1A8DFA50000
|
heap
|
page read and write
|
||
1707171E000
|
heap
|
page read and write
|
||
1B1FE6F0000
|
trusted library allocation
|
page read and write
|
||
1B1F9058000
|
heap
|
page read and write
|
||
1B1F9904000
|
heap
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
1B1F90AE000
|
heap
|
page read and write
|
||
E9FCBF7000
|
stack
|
page read and write
|
||
21B178C0000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page read and write
|
||
123F2FA000
|
stack
|
page read and write
|
||
A8766CC000
|
stack
|
page read and write
|
||
21B17A61000
|
heap
|
page read and write
|
||
8435C7F000
|
stack
|
page read and write
|
||
23CD0000000
|
heap
|
page read and write
|
||
1B1F90AE000
|
heap
|
page read and write
|
||
1F917900000
|
heap
|
page read and write
|
||
D44867B000
|
stack
|
page read and write
|
||
1B1F903D000
|
heap
|
page read and write
|
||
1B1FE410000
|
trusted library allocation
|
page read and write
|
||
17072440000
|
trusted library allocation
|
page read and write
|
||
1B1FE888000
|
heap
|
page read and write
|
||
21B17A87000
|
heap
|
page read and write
|
||
1B1F90B6000
|
heap
|
page read and write
|
||
21B17A13000
|
heap
|
page read and write
|
||
8435B7D000
|
stack
|
page read and write
|
||
23CD0029000
|
heap
|
page read and write
|
||
17071945000
|
heap
|
page read and write
|
||
21F4000
|
heap
|
page read and write
|
||
1707171E000
|
heap
|
page read and write
|
||
1F917802000
|
heap
|
page read and write
|
||
E9FCDFE000
|
stack
|
page read and write
|
||
21B17B00000
|
heap
|
page read and write
|
||
1A8DFA52000
|
heap
|
page read and write
|
||
1B1F8FF3000
|
trusted library allocation
|
page read and write
|
||
1A8DFA63000
|
heap
|
page read and write
|
||
1B1FE670000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
stack
|
page read and write
|
||
1B1FE8FC000
|
heap
|
page read and write
|
||
17071716000
|
heap
|
page read and write
|
||
17071949000
|
heap
|
page read and write
|
||
27EB486A000
|
heap
|
page read and write
|
||
170716C0000
|
trusted library allocation
|
page read and write
|
||
1B1F90B5000
|
heap
|
page read and write
|
||
23CD004E000
|
heap
|
page read and write
|
||
170726B0000
|
trusted library allocation
|
page read and write
|
||
1B1F90A7000
|
heap
|
page read and write
|
||
23CD0108000
|
heap
|
page read and write
|
||
6DB000
|
heap
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
23CD0013000
|
heap
|
page read and write
|
||
1B1FE818000
|
heap
|
page read and write
|
||
1B1F9114000
|
heap
|
page read and write
|
||
27EB4902000
|
heap
|
page read and write
|
||
23CCFE30000
|
heap
|
page read and write
|
||
1A8DFB08000
|
heap
|
page read and write
|
||
21B17B13000
|
heap
|
page read and write
|
||
27EB4750000
|
heap
|
page read and write
|
||
1B1FE821000
|
heap
|
page read and write
|
||
1A8DFA4D000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
1F917680000
|
heap
|
page read and write
|
||
21B17A7B000
|
heap
|
page read and write
|
||
17072660000
|
trusted library allocation
|
page read and write
|
||
1A8DFA13000
|
heap
|
page read and write
|
||
E9FCCFF000
|
stack
|
page read and write
|
||
84354DB000
|
stack
|
page read and write
|
||
1A8E0402000
|
trusted library allocation
|
page read and write
|
||
1B1FE480000
|
trusted library allocation
|
page read and write
|
||
E9FCAFB000
|
stack
|
page read and write
|
||
21B17A60000
|
heap
|
page read and write
|
||
27EB47F0000
|
trusted library allocation
|
page read and write
|
||
1B1F9079000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
843597F000
|
stack
|
page read and write
|
||
1B1F909C000
|
heap
|
page read and write
|
||
1B1FE5A8000
|
trusted library allocation
|
page read and write
|
||
27EB47C0000
|
heap
|
page read and write
|
||
21B17920000
|
heap
|
page read and write
|
||
21B17A3C000
|
heap
|
page read and write
|
||
27EB487A000
|
heap
|
page read and write
|
||
123FCFE000
|
stack
|
page read and write
|
||
1B1F9107000
|
heap
|
page read and write
|
||
21B17A65000
|
heap
|
page read and write
|
||
1B1F9959000
|
heap
|
page read and write
|
||
6DD000
|
heap
|
page read and write
|
||
D448AF7000
|
stack
|
page read and write
|
||
21B17A2C000
|
heap
|
page read and write
|
||
1B1FE8FA000
|
heap
|
page read and write
|
||
23CCFDD0000
|
heap
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
5D983F9000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1A8DF960000
|
heap
|
page read and write
|
||
17071940000
|
heap
|
page read and write
|
||
17071717000
|
heap
|
page read and write
|
||
123F4FE000
|
stack
|
page read and write
|
||
72EF0000
|
unkown
|
page readonly
|
||
1A8DF990000
|
trusted library allocation
|
page read and write
|
||
123F3F9000
|
stack
|
page read and write
|
||
1F917902000
|
heap
|
page read and write
|
||
A876EFE000
|
stack
|
page read and write
|
||
1B1FE8FB000
|
heap
|
page read and write
|
||
E9FC5BF000
|
stack
|
page read and write
|
||
23CCFF30000
|
trusted library allocation
|
page read and write
|
||
1B1F908D000
|
heap
|
page read and write
|
||
216E000
|
stack
|
page read and write
|
||
1F917913000
|
heap
|
page read and write
|
||
5D98379000
|
stack
|
page read and write
|
||
1B1FE8D7000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
1B1FE6E0000
|
trusted library allocation
|
page read and write
|
||
1B1F8FF0000
|
trusted library allocation
|
page read and write
|
||
1B1FE899000
|
heap
|
page read and write
|
||
626000
|
heap
|
page read and write
|
||
D44877E000
|
stack
|
page read and write
|
||
843555F000
|
stack
|
page read and write
|
||
17072650000
|
trusted library allocation
|
page read and write
|
||
1B1F8F00000
|
trusted library allocation
|
page read and write
|
There are 327 hidden memdumps, click here to show them.