Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6culQoI97a.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Bracker\Feberkosten\Lavkonjunkturen.pro
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Bracker\Feberkosten\Pollen47\Disvoice\Grabbers145.Scu187
|
ASCII text, with very long lines (42820), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Bracker\Feberkosten\Urationelt\call-missed-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nskAE13.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6culQoI97a.exe
|
C:\Users\user\Desktop\6culQoI97a.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microoperations\benison
|
Tankegangs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Udsvedt
|
Brandying
|
||
HKEY_CURRENT_USER\Software\Vaterliniers\Svesken\unintersecting
|
Swallowpipe223
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1EAF6865000
|
heap
|
page read and write
|
||
2AFC067D000
|
heap
|
page read and write
|
||
D2CF27E000
|
stack
|
page read and write
|
||
73543000
|
unkown
|
page readonly
|
||
2AFC0667000
|
heap
|
page read and write
|
||
7A9000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2AFC0669000
|
heap
|
page read and write
|
||
26920602000
|
trusted library allocation
|
page read and write
|
||
2111A66F000
|
heap
|
page read and write
|
||
1CA2F802000
|
trusted library allocation
|
page read and write
|
||
90EA6FF000
|
stack
|
page read and write
|
||
147FD7A000
|
stack
|
page read and write
|
||
2691EC72000
|
heap
|
page read and write
|
||
D2CF37F000
|
stack
|
page read and write
|
||
2039F7F0000
|
remote allocation
|
page read and write
|
||
2AFC066A000
|
heap
|
page read and write
|
||
2AFC0642000
|
heap
|
page read and write
|
||
13A51A29000
|
heap
|
page read and write
|
||
13A517A0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2691EC24000
|
heap
|
page read and write
|
||
2AFC066C000
|
heap
|
page read and write
|
||
2AFC067A000
|
heap
|
page read and write
|
||
203A0002000
|
trusted library allocation
|
page read and write
|
||
2691EC3D000
|
heap
|
page read and write
|
||
11EB44A0000
|
heap
|
page read and write
|
||
2726C854000
|
heap
|
page read and write
|
||
2039F840000
|
heap
|
page read and write
|
||
26920840000
|
trusted library allocation
|
page read and write
|
||
2AFC0662000
|
heap
|
page read and write
|
||
2726C82E000
|
heap
|
page read and write
|
||
2111A3B0000
|
heap
|
page read and write
|
||
2AFC063D000
|
heap
|
page read and write
|
||
73540000
|
unkown
|
page readonly
|
||
13A52002000
|
heap
|
page read and write
|
||
11EB4510000
|
trusted library allocation
|
page read and write
|
||
2AFC0663000
|
heap
|
page read and write
|
||
11EB4530000
|
heap
|
page read and write
|
||
D062D8E000
|
stack
|
page read and write
|
||
1EAF7002000
|
trusted library allocation
|
page read and write
|
||
FE8EB7D000
|
stack
|
page read and write
|
||
2111A690000
|
heap
|
page read and write
|
||
2691ED13000
|
heap
|
page read and write
|
||
11EB5360000
|
trusted library allocation
|
page read and write
|
||
1EAF65F0000
|
heap
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
D5B19FC000
|
stack
|
page read and write
|
||
13A51800000
|
heap
|
page read and write
|
||
2039F720000
|
heap
|
page read and write
|
||
D5B17FF000
|
stack
|
page read and write
|
||
1EAF6864000
|
heap
|
page read and write
|
||
1CA2F028000
|
heap
|
page read and write
|
||
66C84FB000
|
stack
|
page read and write
|
||
11EB4410000
|
heap
|
page read and write
|
||
D0631FE000
|
stack
|
page read and write
|
||
33D047B000
|
stack
|
page read and write
|
||
66C85FE000
|
stack
|
page read and write
|
||
147FBF9000
|
stack
|
page read and write
|
||
11EB48F5000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2111ADB0000
|
heap
|
page read and write
|
||
2111A629000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
7C7000
|
unkown
|
page readonly
|
||
2AFC065A000
|
heap
|
page read and write
|
||
1CA2EE20000
|
heap
|
page read and write
|
||
2691EC49000
|
heap
|
page read and write
|
||
33D02FC000
|
stack
|
page read and write
|
||
73541000
|
unkown
|
page execute read
|
||
D0633FF000
|
stack
|
page read and write
|
||
2AFC0629000
|
heap
|
page read and write
|
||
26920C00000
|
remote allocation
|
page read and write
|
||
FE8EE7C000
|
stack
|
page read and write
|
||
2726C720000
|
heap
|
page read and write
|
||
2726D002000
|
trusted library allocation
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
2691ED02000
|
heap
|
page read and write
|
||
D5B127B000
|
stack
|
page read and write
|
||
D5B1BFF000
|
stack
|
page read and write
|
||
2AFC0676000
|
heap
|
page read and write
|
||
2039F813000
|
heap
|
page read and write
|
||
98E0D7C000
|
stack
|
page read and write
|
||
7C5000
|
unkown
|
page read and write
|
||
13A51A00000
|
heap
|
page read and write
|
||
2111AD08000
|
heap
|
page read and write
|
||
2111AD22000
|
heap
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
D5B18FC000
|
stack
|
page read and write
|
||
2AFC0702000
|
heap
|
page read and write
|
||
2111ADBC000
|
heap
|
page read and write
|
||
2039F829000
|
heap
|
page read and write
|
||
1CA2EE80000
|
heap
|
page read and write
|
||
33CFFFE000
|
stack
|
page read and write
|
||
90EA9FB000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2691EC02000
|
heap
|
page read and write
|
||
2111A78E000
|
heap
|
page read and write
|
||
26920C00000
|
remote allocation
|
page read and write
|
||
2111A410000
|
heap
|
page read and write
|
||
13A51A13000
|
heap
|
page read and write
|
||
33D067E000
|
stack
|
page read and write
|
||
1EAF6853000
|
heap
|
page read and write
|
||
2AFC0657000
|
heap
|
page read and write
|
||
11EB4900000
|
trusted library allocation
|
page read and write
|
||
2111A68B000
|
heap
|
page read and write
|
||
98E127F000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1CA2F057000
|
heap
|
page read and write
|
||
2111A643000
|
heap
|
page read and write
|
||
269205B0000
|
trusted library allocation
|
page read and write
|
||
2111A713000
|
heap
|
page read and write
|
||
73545000
|
unkown
|
page readonly
|
||
2111AD43000
|
heap
|
page read and write
|
||
90EA47E000
|
stack
|
page read and write
|
||
1EAF6864000
|
heap
|
page read and write
|
||
11EB5370000
|
heap
|
page readonly
|
||
FE8ECFD000
|
stack
|
page read and write
|
||
2AFC065E000
|
heap
|
page read and write
|
||
D0632FE000
|
stack
|
page read and write
|
||
11EB4575000
|
heap
|
page read and write
|
||
2726C823000
|
heap
|
page read and write
|
||
2111AD00000
|
heap
|
page read and write
|
||
2AFC0600000
|
heap
|
page read and write
|
||
2039F730000
|
heap
|
page read and write
|
||
147FA7C000
|
stack
|
page read and write
|
||
11EB5120000
|
trusted library allocation
|
page read and write
|
||
11EB48F0000
|
heap
|
page read and write
|
||
2691EC49000
|
heap
|
page read and write
|
||
2691ED00000
|
heap
|
page read and write
|
||
1EAF6875000
|
heap
|
page read and write
|
||
1CA2F000000
|
heap
|
page read and write
|
||
1EAF6902000
|
heap
|
page read and write
|
||
13A51AC7000
|
heap
|
page read and write
|
||
2AFC0641000
|
heap
|
page read and write
|
||
2AFC0625000
|
heap
|
page read and write
|
||
1EAF65E0000
|
heap
|
page read and write
|
||
2514000
|
heap
|
page read and write
|
||
FE8E8FC000
|
stack
|
page read and write
|
||
2726C902000
|
heap
|
page read and write
|
||
2111AE30000
|
heap
|
page read and write
|
||
1EAF6800000
|
heap
|
page read and write
|
||
2AFC0679000
|
heap
|
page read and write
|
||
2AFC0632000
|
heap
|
page read and write
|
||
2691EC00000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
2111AD02000
|
heap
|
page read and write
|
||
2111AE23000
|
heap
|
page read and write
|
||
98E157F000
|
stack
|
page read and write
|
||
2691ED1C000
|
heap
|
page read and write
|
||
2726C83C000
|
heap
|
page read and write
|
||
98E137F000
|
stack
|
page read and write
|
||
66C7DEC000
|
stack
|
page read and write
|
||
2726C6C0000
|
heap
|
page read and write
|
||
147FDFD000
|
stack
|
page read and write
|
||
1EAF6841000
|
heap
|
page read and write
|
||
1CA2F002000
|
heap
|
page read and write
|
||
13A51790000
|
heap
|
page read and write
|
||
33D03FD000
|
stack
|
page read and write
|
||
98E0B7B000
|
stack
|
page read and write
|
||
98E072B000
|
stack
|
page read and write
|
||
2AFC0640000
|
heap
|
page read and write
|
||
2039F851000
|
heap
|
page read and write
|
||
90E9F1B000
|
stack
|
page read and write
|
||
98E147F000
|
stack
|
page read and write
|
||
2AFC0674000
|
heap
|
page read and write
|
||
269205D0000
|
trusted library allocation
|
page read and write
|
||
D5B16FF000
|
stack
|
page read and write
|
||
1EAF686F000
|
heap
|
page read and write
|
||
13A51B13000
|
heap
|
page read and write
|
||
7A4000
|
unkown
|
page read and write
|
||
2AFC0659000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
11EB5380000
|
trusted library allocation
|
page read and write
|
||
1CA2F068000
|
heap
|
page read and write
|
||
11EB4420000
|
trusted library allocation
|
page read and write
|
||
D062D0E000
|
stack
|
page read and write
|
||
2039F902000
|
heap
|
page read and write
|
||
2691EC8A000
|
heap
|
page read and write
|
||
2111A665000
|
heap
|
page read and write
|
||
2111AE00000
|
heap
|
page read and write
|
||
33D01FC000
|
stack
|
page read and write
|
||
2691EB10000
|
heap
|
page read and write
|
||
785000
|
unkown
|
page read and write
|
||
13A52100000
|
heap
|
page read and write
|
||
2691EAA0000
|
heap
|
page read and write
|
||
2AFC0E02000
|
trusted library allocation
|
page read and write
|
||
2AFC0661000
|
heap
|
page read and write
|
||
2AFC0664000
|
heap
|
page read and write
|
||
13A51A6B000
|
heap
|
page read and write
|
||
13A51AC0000
|
heap
|
page read and write
|
||
2039F7C0000
|
trusted library allocation
|
page read and write
|
||
13A51B02000
|
heap
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
33D077C000
|
stack
|
page read and write
|
||
66C82FB000
|
stack
|
page read and write
|
||
2691EAB0000
|
heap
|
page read and write
|
||
2AFC05A0000
|
heap
|
page read and write
|
||
2111A62F000
|
heap
|
page read and write
|
||
11EB48FB000
|
heap
|
page read and write
|
||
2726C846000
|
heap
|
page read and write
|
||
2111AE02000
|
heap
|
page read and write
|
||
2726C84B000
|
heap
|
page read and write
|
||
98E117E000
|
stack
|
page read and write
|
||
2AFC0645000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
13A51A84000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1CA2F013000
|
heap
|
page read and write
|
||
11EB457D000
|
heap
|
page read and write
|
||
2039F7F0000
|
remote allocation
|
page read and write
|
||
FE8E97E000
|
stack
|
page read and write
|
||
1CA2F113000
|
heap
|
page read and write
|
||
11EB48E0000
|
trusted library allocation
|
page read and write
|
||
90EA8FE000
|
stack
|
page read and write
|
||
2111AD16000
|
heap
|
page read and write
|
||
2039F858000
|
heap
|
page read and write
|
||
D2CF179000
|
stack
|
page read and write
|
||
11EB457D000
|
heap
|
page read and write
|
||
2111A600000
|
heap
|
page read and write
|
||
2111AE13000
|
heap
|
page read and write
|
||
2691EC13000
|
heap
|
page read and write
|
||
2726C83A000
|
heap
|
page read and write
|
||
FE8EBFE000
|
stack
|
page read and write
|
||
2111A65A000
|
heap
|
page read and write
|
||
2AFC0644000
|
heap
|
page read and write
|
||
90EA57B000
|
stack
|
page read and write
|
||
E86000
|
heap
|
page read and write
|
||
7C7000
|
unkown
|
page readonly
|
||
77B000
|
unkown
|
page read and write
|
||
1EAF6750000
|
trusted library allocation
|
page read and write
|
||
D5B15FF000
|
stack
|
page read and write
|
||
2AFC065F000
|
heap
|
page read and write
|
||
1EAF6829000
|
heap
|
page read and write
|
||
11EB4538000
|
heap
|
page read and write
|
||
11EB5390000
|
trusted library allocation
|
page read and write
|
||
26920C00000
|
remote allocation
|
page read and write
|
||
26920800000
|
trusted library allocation
|
page read and write
|
||
1EAF6650000
|
heap
|
page read and write
|
||
2111A654000
|
heap
|
page read and write
|
||
2AFC063B000
|
heap
|
page read and write
|
||
2AFC0683000
|
heap
|
page read and write
|
||
13A519D0000
|
trusted library allocation
|
page read and write
|
||
FE8E67B000
|
stack
|
page read and write
|
||
2111AD22000
|
heap
|
page read and write
|
||
11EB4480000
|
heap
|
page read and write
|
||
11EB4540000
|
heap
|
page read and write
|
||
33D027F000
|
stack
|
page read and write
|
||
13A51A40000
|
heap
|
page read and write
|
||
33D087F000
|
stack
|
page read and write
|
||
2111AC02000
|
heap
|
page read and write
|
||
98E0F7F000
|
stack
|
page read and write
|
||
2111AD6D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2111A5E0000
|
trusted library allocation
|
page read and write
|
||
2039F800000
|
heap
|
page read and write
|
||
261F000
|
stack
|
page read and write
|
||
2AFC0660000
|
heap
|
page read and write
|
||
2AFC0613000
|
heap
|
page read and write
|
||
11EB53E0000
|
trusted library allocation
|
page read and write
|
||
1CA2F100000
|
heap
|
page read and write
|
||
2691EC2A000
|
heap
|
page read and write
|
||
2C40000
|
direct allocation
|
page execute and read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
2111AE27000
|
heap
|
page read and write
|
||
95D000
|
heap
|
page read and write
|
||
D062C8B000
|
stack
|
page read and write
|
||
2AFC0602000
|
heap
|
page read and write
|
||
2AFC064E000
|
heap
|
page read and write
|
||
11EB4520000
|
trusted library allocation
|
page read and write
|
||
2726CE80000
|
trusted library allocation
|
page read and write
|
||
2726C825000
|
heap
|
page read and write
|
||
13A51A65000
|
heap
|
page read and write
|
||
1CA2F03C000
|
heap
|
page read and write
|
||
2AFC0540000
|
heap
|
page read and write
|
||
1CA2F102000
|
heap
|
page read and write
|
||
2691ED18000
|
heap
|
page read and write
|
||
33D057D000
|
stack
|
page read and write
|
||
13A51AD1000
|
heap
|
page read and write
|
||
147FCFE000
|
stack
|
page read and write
|
||
2726C800000
|
heap
|
page read and write
|
||
2AFC065C000
|
heap
|
page read and write
|
||
2039F802000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2726C829000
|
heap
|
page read and write
|
||
2691EC59000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
D2CF47C000
|
stack
|
page read and write
|
||
2111AD90000
|
heap
|
page read and write
|
||
90EA2FE000
|
stack
|
page read and write
|
||
1EAF685B000
|
heap
|
page read and write
|
||
2726C802000
|
heap
|
page read and write
|
||
2111A63D000
|
heap
|
page read and write
|
||
2111A687000
|
heap
|
page read and write
|
||
66C83FB000
|
stack
|
page read and write
|
||
2111A7E5000
|
heap
|
page read and write
|
||
2AFC0530000
|
heap
|
page read and write
|
||
2111A690000
|
heap
|
page read and write
|
||
90EA7FA000
|
stack
|
page read and write
|
||
1CA2F064000
|
heap
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
2AFC0673000
|
heap
|
page read and write
|
||
1EAF6913000
|
heap
|
page read and write
|
||
2691EC58000
|
heap
|
page read and write
|
||
2726C6D0000
|
heap
|
page read and write
|
||
2AFC0648000
|
heap
|
page read and write
|
||
1CA2EF80000
|
trusted library allocation
|
page read and write
|
||
2111A3A0000
|
heap
|
page read and write
|
||
147FC79000
|
stack
|
page read and write
|
||
2111AD54000
|
heap
|
page read and write
|
||
2AFC0646000
|
heap
|
page read and write
|
||
33CFBBC000
|
stack
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
11EB45A0000
|
heap
|
page read and write
|
||
2111A613000
|
heap
|
page read and write
|
||
2691EC48000
|
heap
|
page read and write
|
||
2039F790000
|
heap
|
page read and write
|
||
1EAF6813000
|
heap
|
page read and write
|
||
11EB4598000
|
heap
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
2039F7F0000
|
remote allocation
|
page read and write
|
||
1CA2EE10000
|
heap
|
page read and write
|
||
D2CEE7C000
|
stack
|
page read and write
|
||
13A51A87000
|
heap
|
page read and write
|
||
2691EC61000
|
heap
|
page read and write
|
||
1CA2F079000
|
heap
|
page read and write
|
||
2691EC59000
|
heap
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
787000
|
unkown
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
98E107D000
|
stack
|
page read and write
|
||
2AFC0658000
|
heap
|
page read and write
|
||
90EA37F000
|
stack
|
page read and write
|
||
2AFC05D0000
|
trusted library allocation
|
page read and write
|
||
11EB457D000
|
heap
|
page read and write
|
||
90EA5F9000
|
stack
|
page read and write
|
||
2111A650000
|
heap
|
page read and write
|
||
98E0C7E000
|
stack
|
page read and write
|
||
2691EC66000
|
heap
|
page read and write
|
||
2111A671000
|
heap
|
page read and write
|
||
2726C849000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
2111A7B9000
|
heap
|
page read and write
|
||
2726C813000
|
heap
|
page read and write
|
||
1EAF6802000
|
heap
|
page read and write
|
||
2111AB90000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
There are 338 hidden memdumps, click here to show them.