Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Rechung-R1663322504.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\nsw3E4B.tmp\AdvSplash.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw3E4B.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Separationerne.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun
Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\Socialdirektrer\Fornices\Vingummis\Flannelled\Yndighed\Adventure_20.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, components 3
|
dropped
|
||
C:\Users\user\Socialdirektrer\Fornices\Vingummis\Flannelled\Yndighed\Dialektforskningen134.Luk
|
ASCII text, with very long lines (35012), with no line terminators
|
dropped
|
||
C:\Users\user\Socialdirektrer\Vandspildets.Shi37
|
data
|
dropped
|
||
C:\Users\user\Socialdirektrer\media-floppy-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\Socialdirektrer\mk.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Rechung-R1663322504.exe
|
C:\Users\user\Desktop\Rechung-R1663322504.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
There are 1 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\InstallDir32
|
Path
|
||
HKEY_CURRENT_USER\Software\Aminosyrefordelingen\Hyperesthete\Pyemias\hydrophidae
|
Opinionsdannendes
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
64AB000
|
direct allocation
|
page execute and read and write
|
||
1BE7EA00000
|
remote allocation
|
page read and write
|
||
24A6A04E000
|
heap
|
page read and write
|
||
1A40FFD000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
22BF130A000
|
heap
|
page read and write
|
||
20A2B913000
|
heap
|
page read and write
|
||
1A412FC000
|
stack
|
page read and write
|
||
24A6A083000
|
heap
|
page read and write
|
||
20A2B8BB000
|
heap
|
page read and write
|
||
1BE7CB13000
|
heap
|
page read and write
|
||
28B96640000
|
heap
|
page read and write
|
||
1BE7EA00000
|
remote allocation
|
page read and write
|
||
6EAB000
|
direct allocation
|
page execute and read and write
|
||
22BF136F000
|
heap
|
page read and write
|
||
25DD5202000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FE4A7C000
|
stack
|
page read and write
|
||
1BE7E640000
|
trusted library allocation
|
page read and write
|
||
1BE7CA66000
|
heap
|
page read and write
|
||
7FE4CFE000
|
stack
|
page read and write
|
||
1BE7E3B0000
|
trusted library allocation
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
22BF08F0000
|
heap
|
page read and write
|
||
1ACD45A0000
|
remote allocation
|
page read and write
|
||
4F6E07E000
|
stack
|
page read and write
|
||
20A2B6B0000
|
heap
|
page read and write
|
||
24A6A030000
|
heap
|
page read and write
|
||
28B96600000
|
heap
|
page read and write
|
||
5AAB000
|
direct allocation
|
page execute and read and write
|
||
22BF0B13000
|
heap
|
page read and write
|
||
20A2B8C5000
|
heap
|
page read and write
|
||
2286FC8D000
|
heap
|
page read and write
|
||
1A40DFF000
|
stack
|
page read and write
|
||
4F6DF7F000
|
stack
|
page read and write
|
||
85A177E000
|
stack
|
page read and write
|
||
24A6A013000
|
heap
|
page read and write
|
||
22BF1300000
|
heap
|
page read and write
|
||
1ACD463D000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1ACD4600000
|
heap
|
page read and write
|
||
24A6A049000
|
heap
|
page read and write
|
||
24A69F90000
|
heap
|
page read and write
|
||
D4A767B000
|
stack
|
page read and write
|
||
2286FCAC000
|
heap
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
24A6A04F000
|
heap
|
page read and write
|
||
20A2B829000
|
heap
|
page read and write
|
||
1BE7EA00000
|
remote allocation
|
page read and write
|
||
A407E7A000
|
stack
|
page read and write
|
||
A407D7E000
|
stack
|
page read and write
|
||
1BE6A202000
|
heap
|
page read and write
|
||
4F6D87E000
|
stack
|
page read and write
|
||
22BF1423000
|
heap
|
page read and write
|
||
22BF1202000
|
heap
|
page read and write
|
||
24A6A04B000
|
heap
|
page read and write
|
||
24A6A077000
|
heap
|
page read and write
|
||
20A2B813000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
2286FC40000
|
heap
|
page read and write
|
||
1BE6A160000
|
heap
|
page read and write
|
||
D4A7DFC000
|
stack
|
page read and write
|
||
24A6A03A000
|
heap
|
page read and write
|
||
25DD5200000
|
heap
|
page read and write
|
||
20A2B8CC000
|
heap
|
page read and write
|
||
24A69F20000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
20A2B88A000
|
heap
|
page read and write
|
||
926A47F000
|
stack
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
28B96602000
|
heap
|
page read and write
|
||
85A1C7E000
|
stack
|
page read and write
|
||
28B96656000
|
heap
|
page read and write
|
||
22BF1413000
|
heap
|
page read and write
|
||
25DD5080000
|
heap
|
page read and write
|
||
1BE7CB29000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
24A6A02D000
|
heap
|
page read and write
|
||
8D4177F000
|
stack
|
page read and write
|
||
25DD5249000
|
heap
|
page read and write
|
||
24A6A802000
|
trusted library allocation
|
page read and write
|
||
22BF0A76000
|
heap
|
page read and write
|
||
24A6A040000
|
heap
|
page read and write
|
||
22BF1302000
|
heap
|
page read and write
|
||
24A6A08A000
|
heap
|
page read and write
|
||
2286F9E0000
|
heap
|
page read and write
|
||
4F6D35B000
|
stack
|
page read and write
|
||
50AB000
|
direct allocation
|
page execute and read and write
|
||
24A6A06C000
|
heap
|
page read and write
|
||
7FE4EFE000
|
stack
|
page read and write
|
||
1BE7CA3D000
|
heap
|
page read and write
|
||
22BF0A43000
|
heap
|
page read and write
|
||
2774000
|
heap
|
page read and write
|
||
1ACD45A0000
|
remote allocation
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
28B96613000
|
heap
|
page read and write
|
||
2286FB20000
|
heap
|
page read and write
|
||
85A16FC000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
2286FE60000
|
trusted library allocation
|
page read and write
|
||
1BE7CA4B000
|
heap
|
page read and write
|
||
2286FE59000
|
heap
|
page read and write
|
||
A4073AC000
|
stack
|
page read and write
|
||
28B964E0000
|
heap
|
page read and write
|
||
4F6D97D000
|
stack
|
page read and write
|
||
24A6A102000
|
heap
|
page read and write
|
||
1BE7CB02000
|
heap
|
page read and write
|
||
2286FE40000
|
heap
|
page readonly
|
||
25DD5256000
|
heap
|
page read and write
|
||
D4A7C7D000
|
stack
|
page read and write
|
||
1BE6A1C0000
|
heap
|
page read and write
|
||
24A6A03D000
|
heap
|
page read and write
|
||
4F6DD7F000
|
stack
|
page read and write
|
||
1BE6A229000
|
heap
|
page read and write
|
||
22BF0A90000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4F6DE7F000
|
stack
|
page read and write
|
||
1BE6A150000
|
heap
|
page read and write
|
||
24A6A06A000
|
heap
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
20A2B8E2000
|
heap
|
page read and write
|
||
1BE7CA72000
|
heap
|
page read and write
|
||
28B96713000
|
heap
|
page read and write
|
||
22BF0BB9000
|
heap
|
page read and write
|
||
22BF0A6C000
|
heap
|
page read and write
|
||
A40777F000
|
stack
|
page read and write
|
||
20A2B823000
|
heap
|
page read and write
|
||
926A57E000
|
stack
|
page read and write
|
||
20A2B865000
|
heap
|
page read and write
|
||
D4A77FC000
|
stack
|
page read and write
|
||
24A6A072000
|
heap
|
page read and write
|
||
1BE7C910000
|
heap
|
page read and write
|
||
24A6A046000
|
heap
|
page read and write
|
||
24A6A075000
|
heap
|
page read and write
|
||
22BF1322000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
782000
|
unkown
|
page read and write
|
||
D4A7AFF000
|
stack
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
7FE4FFE000
|
stack
|
page read and write
|
||
25DD5229000
|
heap
|
page read and write
|
||
B7E000
|
heap
|
page read and write
|
||
24A6A041000
|
heap
|
page read and write
|
||
24A6A07D000
|
heap
|
page read and write
|
||
77C000
|
unkown
|
page read and write
|
||
22BF1430000
|
heap
|
page read and write
|
||
85A1AFD000
|
stack
|
page read and write
|
||
24A6A045000
|
heap
|
page read and write
|
||
24A6A079000
|
heap
|
page read and write
|
||
1BE7CA13000
|
heap
|
page read and write
|
||
D4A7B7C000
|
stack
|
page read and write
|
||
2286FC48000
|
heap
|
page read and write
|
||
1BE7CA48000
|
heap
|
page read and write
|
||
24A6A000000
|
heap
|
page read and write
|
||
24A6A029000
|
heap
|
page read and write
|
||
1ACD4702000
|
heap
|
page read and write
|
||
24A6A056000
|
heap
|
page read and write
|
||
1BE7CA4B000
|
heap
|
page read and write
|
||
1ACD4602000
|
heap
|
page read and write
|
||
2286FC8A000
|
heap
|
page read and write
|
||
1BE7C8B0000
|
heap
|
page read and write
|
||
1A40CFF000
|
stack
|
page read and write
|
||
24A6A039000
|
heap
|
page read and write
|
||
1BE7CA00000
|
heap
|
page read and write
|
||
20A2B867000
|
heap
|
page read and write
|
||
1BE6A257000
|
heap
|
page read and write
|
||
28B96628000
|
heap
|
page read and write
|
||
1BE6A240000
|
heap
|
page read and write
|
||
1BE7E3D0000
|
trusted library allocation
|
page read and write
|
||
325A000
|
stack
|
page read and write
|
||
22870960000
|
trusted library allocation
|
page read and write
|
||
20A2B840000
|
heap
|
page read and write
|
||
20A2BE70000
|
trusted library allocation
|
page read and write
|
||
2286FE50000
|
heap
|
page read and write
|
||
5CD917B000
|
stack
|
page read and write
|
||
A407C7A000
|
stack
|
page read and write
|
||
22BF0A6A000
|
heap
|
page read and write
|
||
A4079FB000
|
stack
|
page read and write
|
||
22BF0A90000
|
heap
|
page read and write
|
||
22BF0A87000
|
heap
|
page read and write
|
||
1BE6A276000
|
heap
|
page read and write
|
||
1ACD4629000
|
heap
|
page read and write
|
||
24A6A074000
|
heap
|
page read and write
|
||
926A37B000
|
stack
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
25DD5302000
|
heap
|
page read and write
|
||
2286FB40000
|
heap
|
page read and write
|
||
1BE7CA5B000
|
heap
|
page read and write
|
||
1BE7CA2A000
|
heap
|
page read and write
|
||
7A6000
|
unkown
|
page read and write
|
||
22BF0A3C000
|
heap
|
page read and write
|
||
24A6A002000
|
heap
|
page read and write
|
||
4F6DB7D000
|
stack
|
page read and write
|
||
25DD5239000
|
heap
|
page read and write
|
||
85A19FF000
|
stack
|
page read and write
|
||
2286FDF0000
|
trusted library allocation
|
page read and write
|
||
1ACD4657000
|
heap
|
page read and write
|
||
7FE4AFE000
|
stack
|
page read and write
|
||
2286FC50000
|
heap
|
page read and write
|
||
22BF1390000
|
heap
|
page read and write
|
||
8D41A7E000
|
stack
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
24A6A042000
|
heap
|
page read and write
|
||
8D41879000
|
stack
|
page read and write
|
||
4F6D77B000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
B8A000
|
heap
|
page read and write
|
||
2286FC85000
|
heap
|
page read and write
|
||
22BF0A73000
|
heap
|
page read and write
|
||
926A27B000
|
stack
|
page read and write
|
||
2286FD90000
|
trusted library allocation
|
page read and write
|
||
22BF0A29000
|
heap
|
page read and write
|
||
A407B7E000
|
stack
|
page read and write
|
||
85A147C000
|
stack
|
page read and write
|
||
22BF13AE000
|
heap
|
page read and write
|
||
1ACD45A0000
|
remote allocation
|
page read and write
|
||
1BE7C8A0000
|
heap
|
page read and write
|
||
46AB000
|
direct allocation
|
page execute and read and write
|
||
25EF000
|
stack
|
page read and write
|
||
22BF0A00000
|
heap
|
page read and write
|
||
28B96660000
|
heap
|
page read and write
|
||
1A410FC000
|
stack
|
page read and write
|
||
22BF1354000
|
heap
|
page read and write
|
||
1BE6A25B000
|
heap
|
page read and write
|
||
1BE6A200000
|
heap
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
1BE7CA8C000
|
heap
|
page read and write
|
||
1BE6A302000
|
heap
|
page read and write
|
||
1BE7E402000
|
trusted library allocation
|
page read and write
|
||
1BE7CA5B000
|
heap
|
page read and write
|
||
22BF1343000
|
heap
|
page read and write
|
||
25DD523E000
|
heap
|
page read and write
|
||
25DD522F000
|
heap
|
page read and write
|
||
786000
|
unkown
|
page read and write
|
||
20A2B902000
|
heap
|
page read and write
|
||
25DD5A02000
|
trusted library allocation
|
page read and write
|
||
1BE6A213000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
2770000
|
heap
|
page read and write
|
||
20A2B6A0000
|
heap
|
page read and write
|
||
5CD8FF9000
|
stack
|
page read and write
|
||
22BF0A8D000
|
heap
|
page read and write
|
||
D4A7EFE000
|
stack
|
page read and write
|
||
1BE7CA02000
|
heap
|
page read and write
|
||
7FE4DFE000
|
stack
|
page read and write
|
||
D4A80FF000
|
stack
|
page read and write
|
||
22BF0B8E000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
5CD907E000
|
stack
|
page read and write
|
||
1ACD4E02000
|
trusted library allocation
|
page read and write
|
||
2286FC8D000
|
heap
|
page read and write
|
||
789000
|
unkown
|
page read and write
|
||
28B96679000
|
heap
|
page read and write
|
||
2286FD80000
|
trusted library allocation
|
page read and write
|
||
28B96702000
|
heap
|
page read and write
|
||
4F6DC7F000
|
stack
|
page read and write
|
||
24A69F30000
|
heap
|
page read and write
|
||
22BF0BE5000
|
heap
|
page read and write
|
||
1A4073B000
|
stack
|
page read and write
|
||
25DD50E0000
|
heap
|
page read and write
|
||
228709B0000
|
trusted library allocation
|
page read and write
|
||
1A40EFF000
|
stack
|
page read and write
|
||
B58000
|
heap
|
page read and write
|
||
24A6A047000
|
heap
|
page read and write
|
||
2286FE30000
|
trusted library allocation
|
page read and write
|
||
28B96664000
|
heap
|
page read and write
|
||
24A6A065000
|
heap
|
page read and write
|
||
22870950000
|
trusted library allocation
|
page read and write
|
||
22BF0880000
|
heap
|
page read and write
|
||
A4077FE000
|
stack
|
page read and write
|
||
8D4131B000
|
stack
|
page read and write
|
||
5CD8BAB000
|
stack
|
page read and write
|
||
24A6A050000
|
heap
|
page read and write
|
||
28B96480000
|
heap
|
page read and write
|
||
1A40B7C000
|
stack
|
page read and write
|
||
2286FE55000
|
heap
|
page read and write
|
||
22BF0A13000
|
heap
|
page read and write
|
||
25DD5090000
|
heap
|
page read and write
|
||
5CD8F79000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
A407A79000
|
stack
|
page read and write
|
||
28B96E02000
|
trusted library allocation
|
page read and write
|
||
A4078FE000
|
stack
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
20A2C002000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7D3000
|
unkown
|
page readonly
|
||
20A2B710000
|
heap
|
page read and write
|
||
1ACD4623000
|
heap
|
page read and write
|
||
24A6A048000
|
heap
|
page read and write
|
||
22BF09F0000
|
trusted library allocation
|
page read and write
|
||
2286FC8D000
|
heap
|
page read and write
|
||
1BE6A1F0000
|
trusted library allocation
|
page read and write
|
||
1BE6A313000
|
heap
|
page read and write
|
||
22BF1427000
|
heap
|
page read and write
|
||
24A6A063000
|
heap
|
page read and write
|
||
22BF1322000
|
heap
|
page read and write
|
||
25DD5259000
|
heap
|
page read and write
|
||
25DD5213000
|
heap
|
page read and write
|
||
24A6A02E000
|
heap
|
page read and write
|
||
1BE7E600000
|
trusted library allocation
|
page read and write
|
||
9269D5B000
|
stack
|
page read and write
|
||
24A6A07B000
|
heap
|
page read and write
|
||
7D3000
|
unkown
|
page readonly
|
||
85A197D000
|
stack
|
page read and write
|
||
7FE4B7E000
|
stack
|
page read and write
|
||
7B3000
|
unkown
|
page read and write
|
||
7A4000
|
unkown
|
page read and write
|
||
28B96700000
|
heap
|
page read and write
|
||
24A6A060000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page read and write
|
||
D4A7CFB000
|
stack
|
page read and write
|
||
1ACD4570000
|
trusted library allocation
|
page read and write
|
||
315D000
|
stack
|
page read and write
|
||
28B96470000
|
heap
|
page read and write
|
||
20A2C100000
|
heap
|
page read and write
|
||
D4A79FE000
|
stack
|
page read and write
|
||
22BF1400000
|
heap
|
page read and write
|
||
24A6A07A000
|
heap
|
page read and write
|
||
22BF0A43000
|
heap
|
page read and write
|
||
8D4197A000
|
stack
|
page read and write
|
||
22BF1070000
|
trusted library allocation
|
page read and write
|
||
1ACD44E0000
|
heap
|
page read and write
|
||
1BE7CB00000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1ACD4613000
|
heap
|
page read and write
|
||
22BF0A58000
|
heap
|
page read and write
|
||
22BF13BC000
|
heap
|
page read and write
|
||
20A2B800000
|
heap
|
page read and write
|
||
1ACD44D0000
|
heap
|
page read and write
|
||
20A2B86E000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
25DD51E0000
|
trusted library allocation
|
page read and write
|
||
22870740000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
22BF0890000
|
heap
|
page read and write
|
||
4560000
|
direct allocation
|
page execute and read and write
|
||
24A6A044000
|
heap
|
page read and write
|
||
24A6A07E000
|
heap
|
page read and write
|
||
2286F9F0000
|
trusted library allocation
|
page read and write
|
||
22BF1402000
|
heap
|
page read and write
|
||
1ACD4540000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
D4A7FFD000
|
stack
|
page read and write
|
||
1BE6AA02000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1BE7CA58000
|
heap
|
page read and write
|
||
28B96668000
|
heap
|
page read and write
|
||
28B965E0000
|
trusted library allocation
|
page read and write
|
||
2286FC8F000
|
heap
|
page read and write
|
||
24A69FC0000
|
trusted library allocation
|
page read and write
|
There are 342 hidden memdumps, click here to show them.