Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.Evo-gen.11060.2891.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\nsaACB6.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\Obeyeo.Bib
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\Vatersotiges\Knoglemarvsundersgelsen\Armoniac\Urokkeligheden.Ord114
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\Vatersotiges\Knoglemarvsundersgelsen\Armoniac\libgiognutls.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.11060.2891.exe
|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.11060.2891.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Spaan\Pushfully
|
Trials101
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
24AF69C0000
|
remote allocation
|
page read and write
|
||
24AF6990000
|
trusted library allocation
|
page read and write
|
||
12870EB0000
|
trusted library allocation
|
page read and write
|
||
24D92479000
|
heap
|
page read and write
|
||
12871126000
|
heap
|
page read and write
|
||
32D0000
|
direct allocation
|
page execute and read and write
|
||
12871E70000
|
trusted library allocation
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
259C1E13000
|
heap
|
page read and write
|
||
1ED06C29000
|
heap
|
page read and write
|
||
1889AE58000
|
heap
|
page read and write
|
||
1287110B000
|
heap
|
page read and write
|
||
259C1D90000
|
heap
|
page read and write
|
||
1889AF13000
|
heap
|
page read and write
|
||
259C1D13000
|
heap
|
page read and write
|
||
22E6000
|
heap
|
page read and write
|
||
24D92458000
|
heap
|
page read and write
|
||
259C1D43000
|
heap
|
page read and write
|
||
259C145A000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
259C148B000
|
heap
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
583C57E000
|
stack
|
page read and write
|
||
24AF6A13000
|
heap
|
page read and write
|
||
23EF000
|
stack
|
page read and write
|
||
24D9245E000
|
heap
|
page read and write
|
||
621BAB000
|
stack
|
page read and write
|
||
28D8000
|
trusted library allocation
|
page read and write
|
||
259C1350000
|
heap
|
page read and write
|
||
1ED06CE1000
|
heap
|
page read and write
|
||
128710B0000
|
trusted library allocation
|
page read and write
|
||
1889AE62000
|
heap
|
page read and write
|
||
1ED07312000
|
heap
|
page read and write
|
||
583C4FC000
|
stack
|
page read and write
|
||
47E617F000
|
stack
|
page read and write
|
||
19B7B046000
|
heap
|
page read and write
|
||
DCB21FE000
|
stack
|
page read and write
|
||
46E000
|
unkown
|
page readonly
|
||
24EB1F9000
|
stack
|
page read and write
|
||
259C1D22000
|
heap
|
page read and write
|
||
1889AE72000
|
heap
|
page read and write
|
||
24D9246C000
|
heap
|
page read and write
|
||
2267FA02000
|
trusted library allocation
|
page read and write
|
||
19B7B03B000
|
heap
|
page read and write
|
||
1889AE3F000
|
heap
|
page read and write
|
||
B29987B000
|
stack
|
page read and write
|
||
24D92457000
|
heap
|
page read and write
|
||
19B7AFD0000
|
trusted library allocation
|
page read and write
|
||
DCB1BEC000
|
stack
|
page read and write
|
||
259C1E23000
|
heap
|
page read and write
|
||
24D92460000
|
heap
|
page read and write
|
||
23965BE0000
|
heap
|
page read and write
|
||
B299A7B000
|
stack
|
page read and write
|
||
3741B7C000
|
stack
|
page read and write
|
||
259C143D000
|
heap
|
page read and write
|
||
2267F213000
|
heap
|
page read and write
|
||
1889CA00000
|
trusted library allocation
|
page read and write
|
||
39CBAFB000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
22CE000
|
stack
|
page read and write
|
||
1ED06C40000
|
heap
|
page read and write
|
||
23965E13000
|
heap
|
page read and write
|
||
47E5D7B000
|
stack
|
page read and write
|
||
259C1513000
|
heap
|
page read and write
|
||
47E5E7F000
|
stack
|
page read and write
|
||
24D9244E000
|
heap
|
page read and write
|
||
626000
|
heap
|
page read and write
|
||
2267F020000
|
heap
|
page read and write
|
||
1889ADC0000
|
trusted library allocation
|
page read and write
|
||
2267F228000
|
heap
|
page read and write
|
||
1ED07300000
|
heap
|
page read and write
|
||
259C15E5000
|
heap
|
page read and write
|
||
583CA7E000
|
stack
|
page read and write
|
||
583C77E000
|
stack
|
page read and write
|
||
24D9243B000
|
heap
|
page read and write
|
||
46E000
|
unkown
|
page readonly
|
||
28A3000
|
trusted library allocation
|
page read and write
|
||
1ED06BE0000
|
trusted library allocation
|
page read and write
|
||
1889ADF0000
|
remote allocation
|
page read and write
|
||
19B7B013000
|
heap
|
page read and write
|
||
24AF6A00000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
12871090000
|
trusted library allocation
|
page read and write
|
||
24D92474000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page read and write
|
||
19B7ADB0000
|
heap
|
page read and write
|
||
39CBCFE000
|
stack
|
page read and write
|
||
12871139000
|
heap
|
page read and write
|
||
E2EF67B000
|
stack
|
page read and write
|
||
19B7B054000
|
heap
|
page read and write
|
||
24D92432000
|
heap
|
page read and write
|
||
12871117000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
47E595B000
|
stack
|
page read and write
|
||
1889AF00000
|
heap
|
page read and write
|
||
1ED06CBB000
|
heap
|
page read and write
|
||
259C1D6D000
|
heap
|
page read and write
|
||
19B7ADA0000
|
heap
|
page read and write
|
||
24D92441000
|
heap
|
page read and write
|
||
24AF6A59000
|
heap
|
page read and write
|
||
19B7B02F000
|
heap
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
2267F200000
|
heap
|
page read and write
|
||
24AF69C0000
|
remote allocation
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
3741A7D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
12870FE0000
|
heap
|
page read and write
|
||
1889AE49000
|
heap
|
page read and write
|
||
12870EA0000
|
heap
|
page read and write
|
||
1ED06C87000
|
heap
|
page read and write
|
||
24D9246A000
|
heap
|
page read and write
|
||
24D92476000
|
heap
|
page read and write
|
||
1287110E000
|
heap
|
page read and write
|
||
24D92502000
|
heap
|
page read and write
|
||
24D92413000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1ED069B0000
|
heap
|
page read and write
|
||
23965E00000
|
heap
|
page read and write
|
||
47E5F7B000
|
stack
|
page read and write
|
||
23965E3D000
|
heap
|
page read and write
|
||
2267F180000
|
trusted library allocation
|
page read and write
|
||
24AF6960000
|
heap
|
page read and write
|
||
128710C0000
|
heap
|
page read and write
|
||
259C148F000
|
heap
|
page read and write
|
||
47E637E000
|
stack
|
page read and write
|
||
1287138A000
|
heap
|
page read and write
|
||
19B7B000000
|
heap
|
page read and write
|
||
24D9245A000
|
heap
|
page read and write
|
||
1ED06CCC000
|
heap
|
page read and write
|
||
1889AE59000
|
heap
|
page read and write
|
||
2267F010000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1889AC40000
|
heap
|
page read and write
|
||
2267F080000
|
heap
|
page read and write
|
||
24D9247A000
|
heap
|
page read and write
|
||
24D92462000
|
heap
|
page read and write
|
||
24D92471000
|
heap
|
page read and write
|
||
19B7B029000
|
heap
|
page read and write
|
||
374177E000
|
stack
|
page read and write
|
||
DCB20FE000
|
stack
|
page read and write
|
||
4E0000
|
trusted library allocation
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
47E677F000
|
stack
|
page read and write
|
||
259C1485000
|
heap
|
page read and write
|
||
2454000
|
heap
|
page read and write
|
||
1ED06D13000
|
heap
|
page read and write
|
||
19B7B050000
|
heap
|
page read and write
|
||
39CBBFD000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
24D92448000
|
heap
|
page read and write
|
||
259C1360000
|
heap
|
page read and write
|
||
61C000
|
heap
|
page read and write
|
||
259C1C02000
|
heap
|
page read and write
|
||
24D92402000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
E2EF77F000
|
stack
|
page read and write
|
||
B299B7E000
|
stack
|
page read and write
|
||
24D92461000
|
heap
|
page read and write
|
||
39CB7FE000
|
stack
|
page read and write
|
||
1889ACA0000
|
heap
|
page read and write
|
||
259C1472000
|
heap
|
page read and write
|
||
2267F302000
|
heap
|
page read and write
|
||
12871E20000
|
trusted library allocation
|
page read and write
|
||
24D92444000
|
heap
|
page read and write
|
||
259C1E02000
|
heap
|
page read and write
|
||
24EB07C000
|
stack
|
page read and write
|
||
1889AE59000
|
heap
|
page read and write
|
||
24AF6A3C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
19B7B002000
|
heap
|
page read and write
|
||
24D92466000
|
heap
|
page read and write
|
||
DCB1EFE000
|
stack
|
page read and write
|
||
1ED06CC9000
|
heap
|
page read and write
|
||
6221FC000
|
stack
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
24D92426000
|
heap
|
page read and write
|
||
24EB479000
|
stack
|
page read and write
|
||
24AF6900000
|
heap
|
page read and write
|
||
23965D50000
|
trusted library allocation
|
page read and write
|
||
1889AE13000
|
heap
|
page read and write
|
||
47E647F000
|
stack
|
page read and write
|
||
24D9245D000
|
heap
|
page read and write
|
||
B29997E000
|
stack
|
page read and write
|
||
23965E5B000
|
heap
|
page read and write
|
||
1889AE2A000
|
heap
|
page read and write
|
||
24AF7202000
|
trusted library allocation
|
page read and write
|
||
66E000
|
heap
|
page read and write
|
||
47E657E000
|
stack
|
page read and write
|
||
23965E67000
|
heap
|
page read and write
|
||
24EB4FC000
|
stack
|
page read and write
|
||
23965E29000
|
heap
|
page read and write
|
||
E2EFC7E000
|
stack
|
page read and write
|
||
12871C00000
|
trusted library allocation
|
page read and write
|
||
1287110E000
|
heap
|
page read and write
|
||
DCB1E7E000
|
stack
|
page read and write
|
||
19B7B03E000
|
heap
|
page read and write
|
||
259C13F0000
|
trusted library allocation
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
259C1D11000
|
heap
|
page read and write
|
||
259C1E30000
|
heap
|
page read and write
|
||
B29933B000
|
stack
|
page read and write
|
||
24AF6A29000
|
heap
|
page read and write
|
||
583C8FD000
|
stack
|
page read and write
|
||
1889AF18000
|
heap
|
page read and write
|
||
37415FD000
|
stack
|
page read and write
|
||
2267F300000
|
heap
|
page read and write
|
||
259C1443000
|
heap
|
page read and write
|
||
3741D7C000
|
stack
|
page read and write
|
||
E2EF87C000
|
stack
|
page read and write
|
||
2267F313000
|
heap
|
page read and write
|
||
24D9243D000
|
heap
|
page read and write
|
||
24EB279000
|
stack
|
page read and write
|
||
24D92260000
|
heap
|
page read and write
|
||
621FFF000
|
stack
|
page read and write
|
||
259C1DB0000
|
heap
|
page read and write
|
||
24D922C0000
|
heap
|
page read and write
|
||
19B7B102000
|
heap
|
page read and write
|
||
12871385000
|
heap
|
page read and write
|
||
24D92469000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
12871106000
|
heap
|
page read and write
|
||
1ED07202000
|
heap
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
583C7FF000
|
stack
|
page read and write
|
||
2267F240000
|
heap
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
E2EFAFA000
|
stack
|
page read and write
|
||
24D92464000
|
heap
|
page read and write
|
||
1ED069A0000
|
heap
|
page read and write
|
||
23965BF0000
|
heap
|
page read and write
|
||
12871370000
|
heap
|
page readonly
|
||
1889AE00000
|
heap
|
page read and write
|
||
1889AF02000
|
heap
|
page read and write
|
||
12871080000
|
trusted library allocation
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
24AF68F0000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
23965F13000
|
heap
|
page read and write
|
||
1889ADA0000
|
trusted library allocation
|
page read and write
|
||
47E627D000
|
stack
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
24D92400000
|
heap
|
page read and write
|
||
24D92483000
|
heap
|
page read and write
|
||
259C1413000
|
heap
|
page read and write
|
||
12871117000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
259C13C0000
|
heap
|
page read and write
|
||
19B7AE00000
|
heap
|
page read and write
|
||
23966602000
|
trusted library allocation
|
page read and write
|
||
259C1D08000
|
heap
|
page read and write
|
||
24D92459000
|
heap
|
page read and write
|
||
E2EF8F9000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
2267F202000
|
heap
|
page read and write
|
||
39CBDFD000
|
stack
|
page read and write
|
||
24D9245C000
|
heap
|
page read and write
|
||
24D9246E000
|
heap
|
page read and write
|
||
39CB97C000
|
stack
|
page read and write
|
||
2267F25A000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
E2EFBFE000
|
stack
|
page read and write
|
||
259C1467000
|
heap
|
page read and write
|
||
374197F000
|
stack
|
page read and write
|
||
23965F02000
|
heap
|
page read and write
|
||
1889C7A0000
|
trusted library allocation
|
page read and write
|
||
23965E40000
|
heap
|
page read and write
|
||
1889C802000
|
trusted library allocation
|
page read and write
|
||
1ED06C6E000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
24EB2FE000
|
stack
|
page read and write
|
||
1ED06D02000
|
heap
|
page read and write
|
||
259C142F000
|
heap
|
page read and write
|
||
E2EF47B000
|
stack
|
page read and write
|
||
6223F9000
|
stack
|
page read and write
|
||
259C1D54000
|
heap
|
page read and write
|
||
37411AC000
|
stack
|
page read and write
|
||
1ED06A10000
|
heap
|
page read and write
|
||
24AF6B02000
|
heap
|
page read and write
|
||
259C1450000
|
heap
|
page read and write
|
||
39CBEFF000
|
stack
|
page read and write
|
||
24AF6A02000
|
heap
|
page read and write
|
||
19B7B037000
|
heap
|
page read and write
|
||
23965E02000
|
heap
|
page read and write
|
||
1889AE02000
|
heap
|
page read and write
|
||
12871070000
|
trusted library allocation
|
page read and write
|
||
24D92C02000
|
trusted library allocation
|
page read and write
|
||
24D9247D000
|
heap
|
page read and write
|
||
39CB67C000
|
stack
|
page read and write
|
||
24D92442000
|
heap
|
page read and write
|
||
259C1D02000
|
heap
|
page read and write
|
||
259C1429000
|
heap
|
page read and write
|
||
39CB8FF000
|
stack
|
page read and write
|
||
23965E75000
|
heap
|
page read and write
|
||
24D9245F000
|
heap
|
page read and write
|
||
259C1DBC000
|
heap
|
page read and write
|
||
128710D0000
|
heap
|
page read and write
|
||
24AF69C0000
|
remote allocation
|
page read and write
|
||
39CBA7D000
|
stack
|
page read and write
|
||
23965C50000
|
heap
|
page read and write
|
||
259C158E000
|
heap
|
page read and write
|
||
259C1491000
|
heap
|
page read and write
|
||
24D92445000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22E0000
|
heap
|
page read and write
|
||
1ED06C00000
|
heap
|
page read and write
|
||
1ED06C13000
|
heap
|
page read and write
|
||
12871E10000
|
trusted library allocation
|
page read and write
|
||
24D92446000
|
heap
|
page read and write
|
||
24D92250000
|
heap
|
page read and write
|
||
39CB47C000
|
stack
|
page read and write
|
||
128710C8000
|
heap
|
page read and write
|
||
259C1D22000
|
heap
|
page read and write
|
||
259C1E00000
|
heap
|
page read and write
|
||
374187F000
|
stack
|
page read and write
|
||
1889AE8A000
|
heap
|
page read and write
|
||
2267F27B000
|
heap
|
page read and write
|
||
1889AE48000
|
heap
|
page read and write
|
||
1287110E000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1287110E000
|
heap
|
page read and write
|
||
1889ADF0000
|
remote allocation
|
page read and write
|
||
259C1470000
|
heap
|
page read and write
|
||
259C1B40000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
6222FE000
|
stack
|
page read and write
|
||
12871390000
|
trusted library allocation
|
page read and write
|
||
1889ADF0000
|
remote allocation
|
page read and write
|
||
6220FA000
|
stack
|
page read and write
|
||
E2EF9FF000
|
stack
|
page read and write
|
||
24D923C0000
|
trusted library allocation
|
page read and write
|
||
259C1E27000
|
heap
|
page read and write
|
||
583C27B000
|
stack
|
page read and write
|
||
E2EFD7E000
|
stack
|
page read and write
|
||
19B7B602000
|
trusted library allocation
|
page read and write
|
||
259C1454000
|
heap
|
page read and write
|
||
12871000000
|
heap
|
page read and write
|
||
24EB3F9000
|
stack
|
page read and write
|
||
1889AC30000
|
heap
|
page read and write
|
||
12871380000
|
heap
|
page read and write
|
||
24D92440000
|
heap
|
page read and write
|
||
259C15B9000
|
heap
|
page read and write
|
||
1889AE49000
|
heap
|
page read and write
|
||
259C1400000
|
heap
|
page read and write
|
||
DCB22FE000
|
stack
|
page read and write
|
||
47E667F000
|
stack
|
page read and write
|
||
24D92429000
|
heap
|
page read and write
|
||
259C1D00000
|
heap
|
page read and write
|
There are 340 hidden memdumps, click here to show them.