Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\cred64[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\853321935212
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024,
components 3
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
|
"C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe"
/F
|
||
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
|
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Main
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54"
/P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&Exit
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "gntuud.exe" /P "user:N"
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "gntuud.exe" /P "user:R" /E
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "..\9c69749b54" /P "user:N"
|
||
C:\Windows\SysWOW64\cacls.exe
|
CACLS "..\9c69749b54" /P "user:R" /E
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
31.41.244.237/jg94cVd30f/index.php
|
|||
http://31.41.244.237/jg94cVd30f/index.phpM
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
31.41.244.237
|
unknown
|
Russian Federation
|
||
192.168.2.4
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
|
Startup
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5F0000
|
direct allocation
|
page execute and read and write
|
||
650000
|
direct allocation
|
page read and write
|
||
950000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2120000
|
direct allocation
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2983000
|
heap
|
page read and write
|
||
287F000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
38C0000
|
heap
|
page read and write
|
||
34D6000
|
heap
|
page read and write
|
||
18571E20000
|
heap
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
3397000
|
heap
|
page read and write
|
||
37EA000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page write copy
|
||
4361000
|
heap
|
page read and write
|
||
4037000
|
trusted library allocation
|
page read and write
|
||
18571F40000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
335A000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
27B4000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
32F0000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
36A6000
|
heap
|
page read and write
|
||
403C000
|
trusted library allocation
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
442000
|
unkown
|
page write copy
|
||
18571E65000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
22FC000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
B10000
|
heap
|
page read and write
|
||
91207A000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
273F000
|
stack
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
6A6000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
9D000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
18571CE0000
|
heap
|
page read and write
|
||
2EBA000
|
heap
|
page read and write
|
||
44C000
|
unkown
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
757000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
2994000
|
heap
|
page read and write
|
||
27C0000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4361000
|
heap
|
page read and write
|
||
33C6000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
4037000
|
trusted library allocation
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
759000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2D7D000
|
stack
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
307C000
|
stack
|
page read and write
|
||
9120F9000
|
stack
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
27B4000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8CF000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
233B000
|
stack
|
page read and write
|
||
403E000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
18571E6D000
|
heap
|
page read and write
|
||
2FBC000
|
stack
|
page read and write
|
||
18571E28000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
18571F20000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
4034000
|
trusted library allocation
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4361000
|
heap
|
page read and write
|
||
18572090000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2E7A000
|
heap
|
page read and write
|
||
18572DF0000
|
trusted library allocation
|
page read and write
|
||
403F000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
6E3000
|
heap
|
page execute and read and write
|
||
31BF000
|
stack
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page write copy
|
||
403A000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
2927000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
18572070000
|
heap
|
page readonly
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
44C000
|
unkown
|
page read and write
|
||
9121F9000
|
stack
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
354F000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
91217E000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
442000
|
unkown
|
page write copy
|
||
452000
|
unkown
|
page readonly
|
||
36A0000
|
heap
|
page read and write
|
||
76A000
|
heap
|
page read and write
|
||
4035000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
42E000
|
unkown
|
page write copy
|
||
4361000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page execute and read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
18571E6D000
|
heap
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
32FA000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
2ECA000
|
heap
|
page read and write
|
||
18571FB0000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
38CA000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
71F000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
18572020000
|
trusted library allocation
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
18572B90000
|
trusted library allocation
|
page read and write
|
||
37E0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
760000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
2D8D000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
38AA000
|
heap
|
page read and write
|
||
2DCB000
|
stack
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
32A6000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
38BA000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
4361000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
3A08000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
870000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
4036000
|
trusted library allocation
|
page read and write
|
||
61B000
|
heap
|
page execute and read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
4038000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
remote allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
3057000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4036000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
3A0D000
|
trusted library allocation
|
page read and write
|
||
42E000
|
unkown
|
page write copy
|
||
4361000
|
heap
|
page read and write
|
||
4290000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
18572099000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
296A000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
403F000
|
trusted library allocation
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
2F7D000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
185720A0000
|
trusted library allocation
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3047000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
63A000
|
heap
|
page read and write
|
||
38BA000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4032000
|
trusted library allocation
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
18572080000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
18572095000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
74C000
|
heap
|
page read and write
|
||
4036000
|
trusted library allocation
|
page read and write
|
||
403F000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
911CBB000
|
stack
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
29FE000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
18572DA0000
|
trusted library allocation
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
43E000
|
unkown
|
page execute and read and write
|
||
58A000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
403B000
|
trusted library allocation
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
3157000
|
heap
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
18571E66000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page write copy
|
||
2920000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
2ECA000
|
heap
|
page read and write
|
||
18571E6D000
|
heap
|
page read and write
|
||
18571CF0000
|
trusted library allocation
|
page read and write
|
||
18572060000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
18571FC0000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page write copy
|
||
4361000
|
heap
|
page read and write
|
||
403F000
|
trusted library allocation
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
4032000
|
trusted library allocation
|
page read and write
|
||
4361000
|
heap
|
page read and write
|
There are 366 hidden memdumps, click here to show them.