Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\bf045808586a24\cred64.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\853321935212
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024,
components 3
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
|
"C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe"
/F
|
||
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
|
C:\Users\user\AppData\Local\Temp\50c1695437\rovwer.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\bf045808586a24\cred64.dll, Main
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
193.56.146.194/h49vlBP/index.php
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.56.146.194
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
|
Startup
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
674000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
3F55000
|
trusted library allocation
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
213F7C3C000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
229F47A0000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3943000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
A8430FF000
|
stack
|
page read and write
|
||
4EA000
|
stack
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1FFEDC90000
|
trusted library allocation
|
page read and write
|
||
E3801FE000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2D8C000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3F5D000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
A842D7A000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
229F4B02000
|
heap
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page execute and read and write
|
||
465000
|
unkown
|
page readonly
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
AEAE07D000
|
stack
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
213F8813000
|
heap
|
page read and write
|
||
229F4940000
|
remote allocation
|
page read and write
|
||
213F7C2A000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
213F8712000
|
heap
|
page read and write
|
||
3F5D000
|
trusted library allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
213F7C91000
|
heap
|
page read and write
|
||
213F7C8B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2E10000
|
heap
|
page read and write
|
||
2EDA000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
213F7C70000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
213F7C88000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
1FFED426000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
213F876B000
|
heap
|
page read and write
|
||
213F7D13000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
3F59000
|
trusted library allocation
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
C17000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1FFED454000
|
heap
|
page read and write
|
||
2E1A000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
213F7C77000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
2C4F000
|
stack
|
page read and write
|
||
229F4940000
|
remote allocation
|
page read and write
|
||
3F5F000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
1FFED440000
|
heap
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8AE000
|
stack
|
page read and write
|
||
213F8754000
|
heap
|
page read and write
|
||
AEAE1FD000
|
stack
|
page read and write
|
||
410000
|
unkown
|
page execute read
|
||
770000
|
heap
|
page read and write
|
||
E3800FC000
|
stack
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
AEADDFC000
|
stack
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
A842FF9000
|
stack
|
page read and write
|
||
AEADE7C000
|
stack
|
page read and write
|
||
463000
|
unkown
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
1FFED402000
|
heap
|
page read and write
|
||
2E1A000
|
heap
|
page read and write
|
||
A84337E000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
213F8800000
|
heap
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
69E000
|
heap
|
page execute and read and write
|
||
3F53000
|
trusted library allocation
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
45E1000
|
heap
|
page read and write
|
||
620000
|
direct allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
221E000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5BE000
|
stack
|
page read and write
|
||
A842E7E000
|
stack
|
page read and write
|
||
213F8802000
|
heap
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
213F7C55000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page execute read
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
352A000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
45E1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A8431FA000
|
stack
|
page read and write
|
||
213F7DB9000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
213F8722000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
E3FFC7B000
|
stack
|
page read and write
|
||
3F59000
|
trusted library allocation
|
page read and write
|
||
229F4A13000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
369A000
|
heap
|
page read and write
|
||
213F878C000
|
heap
|
page read and write
|
||
213F87BB000
|
heap
|
page read and write
|
||
323A000
|
heap
|
page read and write
|
||
213F7C69000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
213F7B40000
|
heap
|
page read and write
|
||
213F87AD000
|
heap
|
page read and write
|
||
1FFED3F0000
|
heap
|
page read and write
|
||
35EA000
|
heap
|
page read and write
|
||
1FFED449000
|
heap
|
page read and write
|
||
683000
|
heap
|
page read and write
|
||
6E0000
|
direct allocation
|
page execute and read and write
|
||
3F57000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page execute read
|
||
91F000
|
stack
|
page read and write
|
||
213F8743000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
AEAE0FF000
|
stack
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
213F7B30000
|
heap
|
page read and write
|
||
229F4A00000
|
heap
|
page read and write
|
||
763000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
368A000
|
heap
|
page read and write
|
||
213F7C43000
|
heap
|
page read and write
|
||
229F4A40000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
20C0000
|
direct allocation
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
213F8700000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1FFED3A0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4420000
|
direct allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
AEAD90B000
|
stack
|
page read and write
|
||
3F5B000
|
trusted library allocation
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
A54000
|
heap
|
page read and write
|
||
2EBA000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page execute read
|
||
213F8722000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
364A000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
213F7C00000
|
heap
|
page read and write
|
||
3948000
|
trusted library allocation
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
3947000
|
trusted library allocation
|
page read and write
|
||
43E000
|
unkown
|
page execute and read and write
|
||
626000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
213F7C91000
|
heap
|
page read and write
|
||
2110000
|
direct allocation
|
page read and write
|
||
88F000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3F58000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
direct allocation
|
page execute and read and write
|
||
213F8827000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3F5C000
|
trusted library allocation
|
page read and write
|
||
3F56000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page execute read
|
||
45E1000
|
heap
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
A84290B000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
E3802FF000
|
stack
|
page read and write
|
||
213F8470000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2FEA000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
45E1000
|
heap
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
213F7C43000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
213F7D8E000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
4AC000
|
stack
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
3F5A000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6CE000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
213F8823000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
45E1000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
1FFED400000
|
heap
|
page read and write
|
||
2D8A000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E0000
|
heap
|
page read and write
|
||
229F4810000
|
heap
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
A84347E000
|
stack
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
29CF000
|
stack
|
page read and write
|
||
AEAE27F000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
739000
|
heap
|
page execute and read and write
|
||
1FFED413000
|
heap
|
page read and write
|
||
1FFED390000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
229F4A02000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1FFED429000
|
heap
|
page read and write
|
||
2E6A000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
213F7C13000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
A8432FE000
|
stack
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
213F7C59000
|
heap
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
213F7BA0000
|
heap
|
page read and write
|
||
213F8602000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
229F4A58000
|
heap
|
page read and write
|
||
229F5202000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
367A000
|
heap
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
2EBA000
|
heap
|
page read and write
|
||
3F54000
|
trusted library allocation
|
page read and write
|
||
229F4910000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1FFEDE02000
|
trusted library allocation
|
page read and write
|
||
1FFED43C000
|
heap
|
page read and write
|
||
213F7DE5000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
E3FFF7A000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
68F000
|
stack
|
page read and write
|
||
229F4A29000
|
heap
|
page read and write
|
||
213F8830000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
229F4940000
|
remote allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
213F7C75000
|
heap
|
page read and write
|
||
3F53000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
1FFED502000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
213F8702000
|
heap
|
page read and write
|
||
6BD000
|
heap
|
page read and write
|
||
229F47B0000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page execute read
|
||
98F000
|
stack
|
page read and write
|
||
629000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1FFED445000
|
heap
|
page read and write
|
||
465000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page execute and read and write
|
||
57E000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
72A000
|
heap
|
page read and write
|
||
463000
|
unkown
|
page read and write
|
||
213F7C2C000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
1FFED430000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
A842F7B000
|
stack
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
213F7BD0000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
45E1000
|
heap
|
page read and write
|
||
45E1000
|
heap
|
page read and write
|
There are 375 hidden memdumps, click here to show them.