Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
XShSI2OXaC.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\hale4r.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600,
atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszA331.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tonefilmsgengiveren\Contentness\Filialbestyrerens\Talkability\Platybrachycephalous\Plugin_Status.ini
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tonefilmsgengiveren\Contentness\Filialbestyrerens\Talkability\Platybrachycephalous\vfslog.c
|
C source, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tonefilmsgengiveren\Coronoid.Ano
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Tonefilmsgengiveren\Parfaits\Produktoversigts\Newcomers\Igennen\view-more-horizontal-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\XShSI2OXaC.exe
|
C:\Users\user\Desktop\XShSI2OXaC.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
There are 1 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Undeprecative
|
Reinfestation
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\One
|
Guli
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Limulus\tidliges
|
Arteriolith123
|
||
HKEY_CURRENT_USER\Software\Tg\Cocinero\Kejserdoemme
|
Ordentlig
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\jerkies
|
idiotiskes
|
||
HKEY_CURRENT_USER\Software\forlagsboghandlerne\refugium
|
Summerendes
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3220000
|
direct allocation
|
page execute and read and write
|
||
259E1650000
|
heap
|
page read and write
|
||
197F184C000
|
heap
|
page read and write
|
||
18CDDBAD000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
18C77858000
|
heap
|
page read and write
|
||
259E1667000
|
heap
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
2210000
|
trusted library allocation
|
page read and write
|
||
20E157F0000
|
remote allocation
|
page read and write
|
||
20E15829000
|
heap
|
page read and write
|
||
143357E000
|
stack
|
page read and write
|
||
259E1630000
|
heap
|
page read and write
|
||
23D35C5B000
|
heap
|
page read and write
|
||
18CDD910000
|
heap
|
page read and write
|
||
18C78200000
|
heap
|
page read and write
|
||
219FDE56000
|
heap
|
page read and write
|
||
18C7786D000
|
heap
|
page read and write
|
||
BCF937E000
|
stack
|
page read and write
|
||
6EBEDFF000
|
stack
|
page read and write
|
||
18C779B9000
|
heap
|
page read and write
|
||
20E15802000
|
heap
|
page read and write
|
||
219FDD90000
|
trusted library allocation
|
page read and write
|
||
18C781D1000
|
heap
|
page read and write
|
||
1DF25AA0000
|
heap
|
page read and write
|
||
219FDE13000
|
heap
|
page read and write
|
||
18CDD920000
|
trusted library allocation
|
page read and write
|
||
4E8DCB000
|
stack
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
7A1E77E000
|
stack
|
page read and write
|
||
1DF25C00000
|
heap
|
page read and write
|
||
18C78143000
|
heap
|
page read and write
|
||
20E15790000
|
heap
|
page read and write
|
||
23D35C3E000
|
heap
|
page read and write
|
||
18C781AD000
|
heap
|
page read and write
|
||
18C78230000
|
heap
|
page read and write
|
||
6EBEBFE000
|
stack
|
page read and write
|
||
219FDD00000
|
heap
|
page read and write
|
||
18C78213000
|
heap
|
page read and write
|
||
7A1E479000
|
stack
|
page read and write
|
||
259E14D0000
|
heap
|
page read and write
|
||
219FDE68000
|
heap
|
page read and write
|
||
1DF25C29000
|
heap
|
page read and write
|
||
D41CE8B000
|
stack
|
page read and write
|
||
219FDE64000
|
heap
|
page read and write
|
||
259E165E000
|
heap
|
page read and write
|
||
1037F7D000
|
stack
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
138157C000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
23D35C41000
|
heap
|
page read and write
|
||
259E1632000
|
heap
|
page read and write
|
||
219FDE79000
|
heap
|
page read and write
|
||
DB4D0FF000
|
stack
|
page read and write
|
||
DB4D1FF000
|
stack
|
page read and write
|
||
17FCC248000
|
heap
|
page read and write
|
||
259E164E000
|
heap
|
page read and write
|
||
259E1649000
|
heap
|
page read and write
|
||
197F32B0000
|
trusted library allocation
|
page read and write
|
||
197F3370000
|
remote allocation
|
page read and write
|
||
18CDE640000
|
trusted library allocation
|
page read and write
|
||
18C77770000
|
trusted library allocation
|
page read and write
|
||
18C78154000
|
heap
|
page read and write
|
||
259E14E0000
|
heap
|
page read and write
|
||
6CC000
|
heap
|
page read and write
|
||
197F1918000
|
heap
|
page read and write
|
||
219FDF00000
|
heap
|
page read and write
|
||
2794000
|
trusted library allocation
|
page read and write
|
||
219FDCF0000
|
heap
|
page read and write
|
||
23D35AA0000
|
heap
|
page read and write
|
||
7A1E1FA000
|
stack
|
page read and write
|
||
18C78227000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
18C77800000
|
heap
|
page read and write
|
||
6EBE8FE000
|
stack
|
page read and write
|
||
DB4CFFF000
|
stack
|
page read and write
|
||
17FCC213000
|
heap
|
page read and write
|
||
197F1902000
|
heap
|
page read and write
|
||
BCF907B000
|
stack
|
page read and write
|
||
BCF95FE000
|
stack
|
page read and write
|
||
197F1802000
|
heap
|
page read and write
|
||
197F1840000
|
heap
|
page read and write
|
||
DB4C8FC000
|
stack
|
page read and write
|
||
17FCC23C000
|
heap
|
page read and write
|
||
2220000
|
trusted library allocation
|
page read and write
|
||
259E1684000
|
heap
|
page read and write
|
||
259E1646000
|
heap
|
page read and write
|
||
20E15720000
|
heap
|
page read and write
|
||
23D35C57000
|
heap
|
page read and write
|
||
17FCC223000
|
heap
|
page read and write
|
||
20E16002000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
197F3370000
|
remote allocation
|
page read and write
|
||
197F185C000
|
heap
|
page read and write
|
||
18C78122000
|
heap
|
page read and write
|
||
17FCC130000
|
heap
|
page read and write
|
||
18CDE870000
|
heap
|
page readonly
|
||
40A000
|
unkown
|
page read and write
|
||
BCF96FD000
|
stack
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
197F32F0000
|
trusted library allocation
|
page read and write
|
||
7A1E67A000
|
stack
|
page read and write
|
||
23D35C00000
|
heap
|
page read and write
|
||
18CDDE00000
|
trusted library allocation
|
page read and write
|
||
4E917D000
|
stack
|
page read and write
|
||
18CDDBA7000
|
heap
|
page read and write
|
||
197F17F0000
|
trusted library allocation
|
page read and write
|
||
17FCC302000
|
heap
|
page read and write
|
||
1DF25A90000
|
heap
|
page read and write
|
||
197F1866000
|
heap
|
page read and write
|
||
259E1645000
|
heap
|
page read and write
|
||
18CDE880000
|
trusted library allocation
|
page read and write
|
||
18CDDBA6000
|
heap
|
page read and write
|
||
BCF92FC000
|
stack
|
page read and write
|
||
DB4CDFE000
|
stack
|
page read and write
|
||
1433679000
|
stack
|
page read and write
|
||
18C78122000
|
heap
|
page read and write
|
||
259E1642000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
18C78102000
|
heap
|
page read and write
|
||
1DF25CC6000
|
heap
|
page read and write
|
||
1DF25C8A000
|
heap
|
page read and write
|
||
259E1E02000
|
trusted library allocation
|
page read and write
|
||
20E15800000
|
heap
|
page read and write
|
||
18C7816F000
|
heap
|
page read and write
|
||
18CDDA50000
|
heap
|
page read and write
|
||
197F188D000
|
heap
|
page read and write
|
||
7A1E57F000
|
stack
|
page read and write
|
||
20E15902000
|
heap
|
page read and write
|
||
1DF25CCF000
|
heap
|
page read and write
|
||
18CDDB50000
|
trusted library allocation
|
page read and write
|
||
23D35AB0000
|
heap
|
page read and write
|
||
259E1570000
|
trusted library allocation
|
page read and write
|
||
197F3280000
|
trusted library allocation
|
page read and write
|
||
13815FB000
|
stack
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
197F17C0000
|
heap
|
page read and write
|
||
17FCC200000
|
heap
|
page read and write
|
||
197F3370000
|
remote allocation
|
page read and write
|
||
259E166D000
|
heap
|
page read and write
|
||
18C77813000
|
heap
|
page read and write
|
||
259E1641000
|
heap
|
page read and write
|
||
20E157F0000
|
remote allocation
|
page read and write
|
||
197F1849000
|
heap
|
page read and write
|
||
73790000
|
unkown
|
page readonly
|
||
18C77880000
|
heap
|
page read and write
|
||
13813FF000
|
stack
|
page read and write
|
||
259E1613000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page read and write
|
||
DB4CBFF000
|
stack
|
page read and write
|
||
470000
|
trusted library allocation
|
page read and write
|
||
259E167E000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
197F1760000
|
heap
|
page read and write
|
||
1DF26402000
|
heap
|
page read and write
|
||
197F1750000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
1380D2B000
|
stack
|
page read and write
|
||
259E165E000
|
heap
|
page read and write
|
||
259E163D000
|
heap
|
page read and write
|
||
1DF25CBE000
|
heap
|
page read and write
|
||
2792000
|
trusted library allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
17FCC22E000
|
heap
|
page read and write
|
||
259E163A000
|
heap
|
page read and write
|
||
23D35C77000
|
heap
|
page read and write
|
||
259E1662000
|
heap
|
page read and write
|
||
1037B7F000
|
stack
|
page read and write
|
||
18C78223000
|
heap
|
page read and write
|
||
259E1660000
|
heap
|
page read and write
|
||
259E1639000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
18C781C8000
|
heap
|
page read and write
|
||
10379FC000
|
stack
|
page read and write
|
||
17FCC120000
|
heap
|
page read and write
|
||
1DF26500000
|
heap
|
page read and write
|
||
17FCC23A000
|
heap
|
page read and write
|
||
219FDE28000
|
heap
|
page read and write
|
||
18C78100000
|
heap
|
page read and write
|
||
259E1677000
|
heap
|
page read and write
|
||
13812FF000
|
stack
|
page read and write
|
||
D41D6FB000
|
stack
|
page read and write
|
||
197F1900000
|
heap
|
page read and write
|
||
259E167B000
|
heap
|
page read and write
|
||
23D35D13000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
18C7788F000
|
heap
|
page read and write
|
||
18CDDE10000
|
heap
|
page read and write
|
||
17FCC1B0000
|
trusted library allocation
|
page read and write
|
||
73794000
|
unkown
|
page readonly
|
||
17FCC180000
|
heap
|
page read and write
|
||
6EBECFE000
|
stack
|
page read and write
|
||
D41D4FB000
|
stack
|
page read and write
|
||
219FDD60000
|
heap
|
page read and write
|
||
18CDDBAD000
|
heap
|
page read and write
|
||
18CDDAE0000
|
trusted library allocation
|
page read and write
|
||
7A1E87E000
|
stack
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
18C77610000
|
heap
|
page read and write
|
||
259E164F000
|
heap
|
page read and write
|
||
1DF25CE2000
|
heap
|
page read and write
|
||
20E15813000
|
heap
|
page read and write
|
||
18CDDBAE000
|
heap
|
page read and write
|
||
6EBEAFE000
|
stack
|
page read and write
|
||
1DF25C3E000
|
heap
|
page read and write
|
||
18C77843000
|
heap
|
page read and write
|
||
219FDF13000
|
heap
|
page read and write
|
||
233F000
|
stack
|
page read and write
|
||
197F185C000
|
heap
|
page read and write
|
||
1DF25B00000
|
heap
|
page read and write
|
||
23D35C13000
|
heap
|
page read and write
|
||
259E1648000
|
heap
|
page read and write
|
||
18C77829000
|
heap
|
page read and write
|
||
18CDDE19000
|
heap
|
page read and write
|
||
18CDDBC0000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
259E164B000
|
heap
|
page read and write
|
||
20E157F0000
|
remote allocation
|
page read and write
|
||
18C77860000
|
heap
|
page read and write
|
||
DB4C9FF000
|
stack
|
page read and write
|
||
259E1540000
|
heap
|
page read and write
|
||
18CDE890000
|
trusted library allocation
|
page read and write
|
||
18CDDAF0000
|
trusted library allocation
|
page read and write
|
||
18C7798E000
|
heap
|
page read and write
|
||
18C78190000
|
heap
|
page read and write
|
||
20E15730000
|
heap
|
page read and write
|
||
18CDDA70000
|
heap
|
page read and write
|
||
18C78002000
|
heap
|
page read and write
|
||
23D35B10000
|
heap
|
page read and write
|
||
13816FD000
|
stack
|
page read and write
|
||
18CDDBCD000
|
heap
|
page read and write
|
||
1DF25C67000
|
heap
|
page read and write
|
||
BCF957D000
|
stack
|
page read and write
|
||
6EBE87B000
|
stack
|
page read and write
|
||
18C78202000
|
heap
|
page read and write
|
||
1DF26260000
|
trusted library allocation
|
page read and write
|
||
4E91F9000
|
stack
|
page read and write
|
||
18C77843000
|
heap
|
page read and write
|
||
17FCC21F000
|
heap
|
page read and write
|
||
1037E7C000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
18C7783C000
|
heap
|
page read and write
|
||
138117C000
|
stack
|
page read and write
|
||
197F3402000
|
trusted library allocation
|
page read and write
|
||
D41D3FB000
|
stack
|
page read and write
|
||
259E1632000
|
heap
|
page read and write
|
||
2236000
|
heap
|
page read and write
|
||
138147C000
|
stack
|
page read and write
|
||
17FCC229000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
219FDF02000
|
heap
|
page read and write
|
||
17FCC256000
|
heap
|
page read and write
|
||
259E166B000
|
heap
|
page read and write
|
||
13818FD000
|
stack
|
page read and write
|
||
73796000
|
unkown
|
page readonly
|
||
2340000
|
heap
|
page read and write
|
||
1DF25D02000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
143387F000
|
stack
|
page read and write
|
||
259E165E000
|
heap
|
page read and write
|
||
18C7786B000
|
heap
|
page read and write
|
||
18C77889000
|
heap
|
page read and write
|
||
20E15857000
|
heap
|
page read and write
|
||
10375EC000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
DB4C3EC000
|
stack
|
page read and write
|
||
197F184C000
|
heap
|
page read and write
|
||
23D36402000
|
trusted library allocation
|
page read and write
|
||
259E1702000
|
heap
|
page read and write
|
||
18C779E5000
|
heap
|
page read and write
|
||
18CDDB60000
|
heap
|
page read and write
|
||
103817D000
|
stack
|
page read and write
|
||
1DF25C70000
|
heap
|
page read and write
|
||
23D35C02000
|
heap
|
page read and write
|
||
667000
|
heap
|
page read and write
|
||
18C77790000
|
trusted library allocation
|
page read and write
|
||
18CDDE15000
|
heap
|
page read and write
|
||
23D35C68000
|
heap
|
page read and write
|
||
197F1859000
|
heap
|
page read and write
|
||
259E162E000
|
heap
|
page read and write
|
||
20E157C0000
|
trusted library allocation
|
page read and write
|
||
18C7785B000
|
heap
|
page read and write
|
||
259E1600000
|
heap
|
page read and write
|
||
259E1640000
|
heap
|
page read and write
|
||
23D36270000
|
trusted library allocation
|
page read and write
|
||
18CDE8E0000
|
trusted library allocation
|
page read and write
|
||
259E1656000
|
heap
|
page read and write
|
||
219FE602000
|
trusted library allocation
|
page read and write
|
||
197F1824000
|
heap
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
259E1644000
|
heap
|
page read and write
|
||
4E92F9000
|
stack
|
page read and write
|
||
1DF25C69000
|
heap
|
page read and write
|
||
197F1913000
|
heap
|
page read and write
|
||
73791000
|
unkown
|
page execute read
|
||
197F1800000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
197F1813000
|
heap
|
page read and write
|
||
23D35C75000
|
heap
|
page read and write
|
||
2344000
|
heap
|
page read and write
|
||
17FCCA02000
|
trusted library allocation
|
page read and write
|
||
1037C7E000
|
stack
|
page read and write
|
||
143312C000
|
stack
|
page read and write
|
||
6EBE97E000
|
stack
|
page read and write
|
||
23D35C29000
|
heap
|
page read and write
|
||
259E166A000
|
heap
|
page read and write
|
||
259E162D000
|
heap
|
page read and write
|
||
259E1629000
|
heap
|
page read and write
|
||
18C781BC000
|
heap
|
page read and write
|
||
DB4CCFD000
|
stack
|
page read and write
|
||
219FDE40000
|
heap
|
page read and write
|
||
18C77913000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1DF25C13000
|
heap
|
page read and write
|
||
197F1871000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20E1583D000
|
heap
|
page read and write
|
||
18CDDE20000
|
trusted library allocation
|
page read and write
|
||
7A1E3FC000
|
stack
|
page read and write
|
||
D41D5FF000
|
stack
|
page read and write
|
||
7A1E7FE000
|
stack
|
page read and write
|
||
143377F000
|
stack
|
page read and write
|
||
17FCC202000
|
heap
|
page read and write
|
||
18C77600000
|
heap
|
page read and write
|
||
1DF25D13000
|
heap
|
page read and write
|
||
BCF91FE000
|
stack
|
page read and write
|
||
197F182A000
|
heap
|
page read and write
|
||
7A1E2FF000
|
stack
|
page read and write
|
||
219FDE00000
|
heap
|
page read and write
|
||
4E927E000
|
stack
|
page read and write
|
||
259E1661000
|
heap
|
page read and write
|
||
219FDE02000
|
heap
|
page read and write
|
||
4E9379000
|
stack
|
page read and write
|
||
DB4C7FB000
|
stack
|
page read and write
|
||
23D35D02000
|
heap
|
page read and write
|
||
18C77670000
|
heap
|
page read and write
|
||
7A1DDFB000
|
stack
|
page read and write
|
||
259E1647000
|
heap
|
page read and write
|
||
18C77851000
|
heap
|
page read and write
|
||
1037D7F000
|
stack
|
page read and write
|
||
13817FE000
|
stack
|
page read and write
|
||
DB4CEFE000
|
stack
|
page read and write
|
||
13819FE000
|
stack
|
page read and write
|
||
259E167A000
|
heap
|
page read and write
|
There are 336 hidden memdumps, click here to show them.