Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
c35d4e641adf21bead54611499c416c8e2de75ac96098.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\mozglue.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\nss3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\sqlite3.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\1g8B3TB8nn75
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\AppData\LocalLow\9p1l6K91w23M
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024,
frames 3
|
dropped
|
||
C:\Users\user\AppData\LocalLow\U28DVK1LkhXI
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\AppData\LocalLow\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\r93FRLGa73HG
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\AppData\LocalLow\softokn3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\t56OlInDWvo9
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\AppData\LocalLow\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\c35d4e641adf21bead54611499c416c8e2de75ac96098.exe
|
"C:\Users\user\Desktop\c35d4e641adf21bead54611499c416c8e2de75ac96098.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://89.208.103.4/a9de71948549020b4b91e4dc94a097d9
|
89.208.103.4
|
||
http://89.208.103.4/
|
89.208.103.4
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://www.mozilla.com/en-US/blocklist/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://www.opera.com0
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://mozilla.org0
|
unknown
|
||
http://www.sqlite.org/copyright.html.
|
unknown
|
||
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
There are 4 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.208.103.4
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4D1B000
|
heap
|
page read and write
|
||
4D1B000
|
heap
|
page read and write
|
||
4CFC000
|
heap
|
page read and write
|
||
4D1E000
|
heap
|
page read and write
|
||
4D1B000
|
heap
|
page read and write
|
||
4D1B000
|
heap
|
page read and write
|
||
4D1B000
|
heap
|
page read and write
|
||
4D1E000
|
heap
|
page read and write
|
||
4D3E000
|
heap
|
page read and write
|
||
22E7C870000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
21FEDE7D000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
91F4EFE000
|
stack
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
13B0000
|
unkown
|
page readonly
|
||
4D29000
|
heap
|
page read and write
|
||
4D0B000
|
heap
|
page read and write
|
||
13B1000
|
unkown
|
page execute read
|
||
4D35000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4CFC000
|
heap
|
page read and write
|
||
505D000
|
stack
|
page read and write
|
||
76CA000
|
trusted library allocation
|
page read and write
|
||
13C3000
|
unkown
|
page readonly
|
||
22E7C110000
|
heap
|
page read and write
|
||
8357000
|
trusted library allocation
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
91F4ACB000
|
stack
|
page read and write
|
||
4CF9000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4D27000
|
heap
|
page read and write
|
||
22E7C213000
|
heap
|
page read and write
|
||
4D30000
|
heap
|
page read and write
|
||
4DCB000
|
heap
|
page read and write
|
||
91F547E000
|
unkown
|
page read and write
|
||
4CFE000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
8357000
|
trusted library allocation
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
22E7C264000
|
heap
|
page read and write
|
||
4D3E000
|
heap
|
page read and write
|
||
4D29000
|
heap
|
page read and write
|
||
834A000
|
trusted library allocation
|
page read and write
|
||
836C000
|
trusted library allocation
|
page read and write
|
||
50662FB000
|
stack
|
page read and write
|
||
236824CA000
|
heap
|
page read and write
|
||
4D0C000
|
heap
|
page read and write
|
||
4CF4000
|
heap
|
page read and write
|
||
21FEDE67000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
21FEDE00000
|
heap
|
page read and write
|
||
21FEDE02000
|
heap
|
page read and write
|
||
21FEE550000
|
trusted library allocation
|
page read and write
|
||
23682444000
|
heap
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
4D8E000
|
heap
|
page read and write
|
||
23682429000
|
heap
|
page read and write
|
||
6F3F000
|
stack
|
page read and write
|
||
21FEDF08000
|
heap
|
page read and write
|
||
703F000
|
stack
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
4D29000
|
heap
|
page read and write
|
||
21FEDE13000
|
heap
|
page read and write
|
||
836C000
|
trusted library allocation
|
page read and write
|
||
836C000
|
trusted library allocation
|
page read and write
|
||
236824BD000
|
heap
|
page read and write
|
||
4D43000
|
heap
|
page read and write
|
||
C88076B000
|
stack
|
page read and write
|
||
4D32000
|
heap
|
page read and write
|
||
22E7C300000
|
heap
|
page read and write
|
||
4D27000
|
heap
|
page read and write
|
||
21FEDF13000
|
heap
|
page read and write
|
||
4CF9000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
C8807EE000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
4D2F000
|
heap
|
page read and write
|
||
7040000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
23682380000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
761C000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
unkown
|
page read and write
|
||
C880A7E000
|
stack
|
page read and write
|
||
4D3B000
|
heap
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
40C000
|
remote allocation
|
page readonly
|
||
13EC000
|
unkown
|
page readonly
|
||
23682413000
|
heap
|
page read and write
|
||
4CD8000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
506637E000
|
stack
|
page read and write
|
||
4D29000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
4D85000
|
heap
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
2368248B000
|
heap
|
page read and write
|
||
21FEDF00000
|
heap
|
page read and write
|
||
5158000
|
heap
|
page read and write
|
||
22E7C302000
|
heap
|
page read and write
|
||
4D0E000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
40E000
|
remote allocation
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
21FEDD90000
|
heap
|
page read and write
|
||
91F51FF000
|
unkown
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
4D27000
|
heap
|
page read and write
|
||
4D0A000
|
heap
|
page read and write
|
||
8357000
|
trusted library allocation
|
page read and write
|
||
4D29000
|
heap
|
page read and write
|
||
4D4B000
|
heap
|
page read and write
|
||
4D96000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
8346000
|
trusted library allocation
|
page read and write
|
||
22E7C313000
|
heap
|
page read and write
|
||
50663FE000
|
stack
|
page read and write
|
||
4CF9000
|
heap
|
page read and write
|
||
4D2C000
|
heap
|
page read and write
|
||
4D0A000
|
heap
|
page read and write
|
||
732F000
|
stack
|
page read and write
|
||
4D0A000
|
heap
|
page read and write
|
||
4D4B000
|
heap
|
page read and write
|
||
8356000
|
trusted library allocation
|
page read and write
|
||
C880E7F000
|
stack
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
4D4B000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
4D6C000
|
heap
|
page read and write
|
||
23682513000
|
heap
|
page read and write
|
||
4D29000
|
heap
|
page read and write
|
||
4D94000
|
heap
|
page read and write
|
||
21FEDDF0000
|
heap
|
page read and write
|
||
4CFA000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
50669FF000
|
stack
|
page read and write
|
||
4D84000
|
heap
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
7724000
|
trusted library allocation
|
page read and write
|
||
22E7C23C000
|
heap
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4CFC000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
4D12000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
22E7C258000
|
heap
|
page read and write
|
||
13B0000
|
unkown
|
page readonly
|
||
4CFB000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
21FEDE5C000
|
heap
|
page read and write
|
||
4D3F000
|
heap
|
page read and write
|
||
23682400000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
4CFC000
|
heap
|
page read and write
|
||
4D29000
|
heap
|
page read and write
|
||
91F52FC000
|
unkown
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
21FEDE61000
|
heap
|
page read and write
|
||
4D99000
|
heap
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
836B000
|
trusted library allocation
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
4CF9000
|
heap
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
71F4000
|
trusted library allocation
|
page read and write
|
||
8357000
|
trusted library allocation
|
page read and write
|
||
4CFB000
|
heap
|
page read and write
|
||
4D09000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
C880F7F000
|
stack
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
22E7C202000
|
heap
|
page read and write
|
||
22E7C200000
|
heap
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
4CFB000
|
heap
|
page read and write
|
||
DE0000
|
direct allocation
|
page execute and read and write
|
||
4DCE000
|
heap
|
page read and write
|
||
835E000
|
trusted library allocation
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
7D0A000
|
heap
|
page read and write
|
||
4D4E000
|
heap
|
page read and write
|
||
4D4E000
|
heap
|
page read and write
|
||
C880C7B000
|
stack
|
page read and write
|
||
23682502000
|
heap
|
page read and write
|
||
23682469000
|
heap
|
page read and write
|
||
7E0E000
|
stack
|
page read and write
|
||
4D1B000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
13DA000
|
unkown
|
page readonly
|
||
4D93000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
4DCB000
|
heap
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
22E7C279000
|
heap
|
page read and write
|
||
13DA000
|
unkown
|
page readonly
|
||
4D0A000
|
heap
|
page read and write
|
||
844A000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
4DCD000
|
heap
|
page read and write
|
||
22E7C0A0000
|
heap
|
page read and write
|
||
835E000
|
trusted library allocation
|
page read and write
|
||
91F4BCD000
|
stack
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
4CFD000
|
heap
|
page read and write
|
||
4D27000
|
heap
|
page read and write
|
||
91F507E000
|
stack
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
4CFE000
|
heap
|
page read and write
|
||
13B1000
|
unkown
|
page execute read
|
||
236824E2000
|
heap
|
page read and write
|
||
21FEDE54000
|
heap
|
page read and write
|
||
4DCC000
|
heap
|
page read and write
|
||
21FEE602000
|
trusted library allocation
|
page read and write
|
||
13D8000
|
unkown
|
page execute and read and write
|
||
4D29000
|
heap
|
page read and write
|
||
AFA000
|
stack
|
page read and write
|
||
13EC000
|
unkown
|
page readonly
|
||
4D11000
|
heap
|
page read and write
|
||
4D1D000
|
heap
|
page read and write
|
||
8366000
|
trusted library allocation
|
page read and write
|
||
23682C02000
|
trusted library allocation
|
page read and write
|
||
4D57000
|
heap
|
page read and write
|
||
4D55000
|
heap
|
page read and write
|
||
23682B30000
|
unkown
|
page write copy
|
||
4D27000
|
heap
|
page read and write
|
||
6E3F000
|
stack
|
page read and write
|
||
A7D000
|
stack
|
page read and write
|
||
21FEDF02000
|
heap
|
page read and write
|
||
8348000
|
trusted library allocation
|
page read and write
|
||
4D27000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
4CFA000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
4D12000
|
heap
|
page read and write
|
||
4CF5000
|
heap
|
page read and write
|
||
23682310000
|
heap
|
page read and write
|
||
236824CE000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
C880D77000
|
stack
|
page read and write
|
||
22E7C228000
|
heap
|
page read and write
|
||
4D27000
|
heap
|
page read and write
|
||
4D06000
|
heap
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
8354000
|
trusted library allocation
|
page read and write
|
||
4D2B000
|
heap
|
page read and write
|
||
21FEDE3C000
|
heap
|
page read and write
|
||
13C3000
|
unkown
|
page readonly
|
||
23682320000
|
heap
|
page read and write
|
||
4D44000
|
heap
|
page read and write
|
||
4D2F000
|
heap
|
page read and write
|
||
B7D000
|
stack
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
8330000
|
trusted library allocation
|
page read and write
|
||
8230000
|
trusted library allocation
|
page read and write
|
||
4D0B000
|
heap
|
page read and write
|
||
4CFC000
|
heap
|
page read and write
|
||
4D4E000
|
heap
|
page read and write
|
||
4D32000
|
heap
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
4D46000
|
heap
|
page read and write
|
||
8358000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
heap
|
page read and write
|
||
21FEDE88000
|
heap
|
page read and write
|
||
21FEDD80000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
730C000
|
trusted library allocation
|
page read and write
|
||
91F517F000
|
unkown
|
page read and write
|
||
8358000
|
trusted library allocation
|
page read and write
|
||
8358000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
heap
|
page read and write
|
||
91F557F000
|
unkown
|
page read and write
|
||
91F537B000
|
unkown
|
page read and write
|
||
4D18000
|
heap
|
page read and write
|
||
4D47000
|
heap
|
page read and write
|
||
91F4B4E000
|
stack
|
page read and write
|
||
4D12000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
4D46000
|
heap
|
page read and write
|
||
21FEDE7B000
|
heap
|
page read and write
|
||
8363000
|
trusted library allocation
|
page read and write
|
||
4D1B000
|
heap
|
page read and write
|
||
4D3E000
|
heap
|
page read and write
|
||
50667FB000
|
stack
|
page read and write
|
||
4CFC000
|
heap
|
page read and write
|
||
4D4E000
|
heap
|
page read and write
|
||
4D2D000
|
heap
|
page read and write
|
||
7C0C000
|
stack
|
page read and write
|
||
236824C4000
|
heap
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
22E7C268000
|
heap
|
page read and write
|
||
91F567E000
|
unkown
|
page read and write
|
||
4D8A000
|
heap
|
page read and write
|
||
C880B7B000
|
stack
|
page read and write
|
||
21FEDE7B000
|
heap
|
page read and write
|
||
4D3F000
|
heap
|
page read and write
|
||
23682473000
|
heap
|
page read and write
|
||
4D4B000
|
heap
|
page read and write
|
||
21FEDE29000
|
heap
|
page read and write
|
||
5066AFE000
|
stack
|
page read and write
|
||
22E7C0B0000
|
heap
|
page read and write
|
||
236823B0000
|
trusted library allocation
|
page read and write
|
||
4D3E000
|
heap
|
page read and write
|
||
4DC3000
|
heap
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
836C000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
unkown
|
page write copy
|
||
4D20000
|
heap
|
page read and write
|
||
4D8E000
|
heap
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
6D3B000
|
stack
|
page read and write
|
||
22E7CA02000
|
trusted library allocation
|
page read and write
|
||
4D02000
|
heap
|
page read and write
|
||
4D83000
|
heap
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
50668FB000
|
stack
|
page read and write
|
||
4D0A000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
4D3C000
|
heap
|
page read and write
|
||
23682D00000
|
trusted library allocation
|
page read and write
|
||
4D35000
|
heap
|
page read and write
|
||
4D11000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page execute and read and write
|
||
4D4B000
|
heap
|
page read and write
|
||
4CF9000
|
heap
|
page read and write
|
There are 335 hidden memdumps, click here to show them.