Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
G1lnGpOLK4.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ojnmq5j.r54.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ed1lrobr.tzh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mf1svetu.2wj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wqnjg344.x0n.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
Chrome Cache Entry: 51
|
ASCII text, with very long lines (3295)
|
downloaded
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\G1lnGpOLK4.exe
|
"C:\Users\user\Desktop\G1lnGpOLK4.exe"
|
||
C:\Windows\System32\cmd.exe
|
cmd /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell Set-MpPreference -DisableRealtimeMonitoring $true
|
||
C:\Windows\System32\cmd.exe
|
cmd /c sc query windefend
|
||
C:\Windows\System32\cmd.exe
|
cmd /c sc stop windefend
|
||
C:\Windows\System32\cmd.exe
|
cmd /c sc delete windefend
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=2036,i,13697505174205213952,6185066048164698462,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc query windefend
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc stop windefend
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc delete windefend
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
|||
https://www.google.com/async/newtab_promos
|
142.251.40.228
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.251.40.228
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.251.40.228
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGPufzLEGIjDTt_akc_527nJ4zoGCbAZn0AkDcVIV2VLuAM78mz4Tuc4onQdlIzVDE6yNOrZBZH0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.40.228
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGPufzLEGIjDqkokB_Yx903z9S8-TdyWhW8iPlrZBrgRiiMPzrxlLxgoQH634QKXADTY9t1vdNmMyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.40.228
|
||
https://pastebin.com/raw/s4TipmJt
|
104.20.3.235
|
||
https://pastebin.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
18.192.31.165
|
||
www.google.com
|
142.251.40.228
|
||
pastebin.com
|
104.20.3.235
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
18.192.31.165
|
0.tcp.eu.ngrok.io
|
United States
|
||
104.20.3.235
|
pastebin.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
3.124.142.205
|
unknown
|
United States
|
||
142.251.40.228
|
www.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\G1lnGpOLK4_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\f2d4732908d59805d830a49d36974ac0
|
[kl]
|
There are 7 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
130AD000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library section
|
page read and write
|
||
758F4FC000
|
stack
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
21DF9448000
|
heap
|
page read and write
|
||
18ADDB84000
|
heap
|
page read and write
|
||
962000
|
unkown
|
page readonly
|
||
964000
|
unkown
|
page readonly
|
||
2E86D960000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
2E86DC25000
|
heap
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
1F1A7270000
|
heap
|
page read and write
|
||
1F1A73F5000
|
heap
|
page read and write
|
||
CF4000
|
stack
|
page read and write
|
||
1D044550000
|
heap
|
page read and write
|
||
FD1000
|
heap
|
page read and write
|
||
21DF9520000
|
heap
|
page read and write
|
||
21DF9370000
|
heap
|
page read and write
|
||
F71000
|
heap
|
page read and write
|
||
EE6000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1B100000
|
trusted library allocation
|
page read and write
|
||
28000
|
trusted library allocation
|
page read and write
|
||
18ADDB6A000
|
heap
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
1F1A7409000
|
heap
|
page read and write
|
||
7FF466BC0000
|
trusted library allocation
|
page execute and read and write
|
||
B23D58F000
|
stack
|
page read and write
|
||
18ADDB86000
|
heap
|
page read and write
|
||
1B77C000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
F76F77E000
|
unkown
|
page readonly
|
||
960000
|
unkown
|
page readonly
|
||
F63000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
F76F7FE000
|
stack
|
page read and write
|
||
B23D8FF000
|
stack
|
page read and write
|
||
758F5FF000
|
unkown
|
page read and write
|
||
1B9B5000
|
stack
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
1AAA8ED0000
|
heap
|
page read and write
|
||
21DF942B000
|
heap
|
page read and write
|
||
1C277000
|
heap
|
page read and write
|
||
1D044630000
|
heap
|
page read and write
|
||
21F99280000
|
heap
|
page read and write
|
||
1489000
|
stack
|
page read and write
|
||
EF4207D000
|
stack
|
page read and write
|
||
78DD32C000
|
stack
|
page read and write
|
||
7FF466BD0000
|
trusted library allocation
|
page execute and read and write
|
||
21F992F0000
|
heap
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
18ADDDC0000
|
heap
|
page read and write
|
||
EF4217F000
|
stack
|
page read and write
|
||
130A1000
|
trusted library allocation
|
page read and write
|
||
21F99270000
|
heap
|
page read and write
|
||
1D044690000
|
heap
|
page read and write
|
||
1F1A7350000
|
heap
|
page read and write
|
||
18ADDB20000
|
heap
|
page read and write
|
||
21F99340000
|
heap
|
page read and write
|
||
1C299000
|
heap
|
page read and write
|
||
1F1A7370000
|
heap
|
page read and write
|
||
21DF9350000
|
heap
|
page read and write
|
||
1D044660000
|
heap
|
page read and write
|
||
2CE60FF000
|
unkown
|
page read and write
|
||
1446000
|
heap
|
page read and write
|
||
21DF9446000
|
heap
|
page read and write
|
||
7FFD9B85A000
|
trusted library allocation
|
page execute and read and write
|
||
1C260000
|
heap
|
page read and write
|
||
21DF9270000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B86D000
|
trusted library allocation
|
page execute and read and write
|
||
EF4227E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
96E000
|
unkown
|
page readonly
|
||
E10000
|
heap
|
page read and write
|
||
1C25E000
|
stack
|
page read and write
|
||
21DF9420000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
21F992A0000
|
heap
|
page read and write
|
||
1AAA8DF6000
|
heap
|
page read and write
|
||
1AAA8EF0000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9B865000
|
trusted library allocation
|
page read and write
|
||
37AACFF000
|
unkown
|
page read and write
|
||
2E86DC20000
|
heap
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
18ADDDB0000
|
heap
|
page read and write
|
||
7FFD9B852000
|
trusted library allocation
|
page execute and read and write
|
||
2E86DAA8000
|
heap
|
page read and write
|
||
2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79A000
|
trusted library allocation
|
page execute and read and write
|
||
18ADDAF0000
|
heap
|
page read and write
|
||
F76F6FE000
|
stack
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
37AA90B000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
1D044698000
|
heap
|
page read and write
|
||
7FFD9B7A2000
|
trusted library allocation
|
page execute and read and write
|
||
318B000
|
trusted library allocation
|
page read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
18ADDB60000
|
heap
|
page read and write
|
||
2CE61FF000
|
stack
|
page read and write
|
||
7FFD9B86A000
|
trusted library allocation
|
page execute and read and write
|
||
1440000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page execute and read and write
|
||
1AAA8CA0000
|
heap
|
page read and write
|
||
EEC000
|
heap
|
page read and write
|
||
21F9934A000
|
heap
|
page read and write
|
||
2E86DAA0000
|
heap
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1AAA8DB0000
|
heap
|
page read and write
|
||
1BF5E000
|
stack
|
page read and write
|
||
18ADDB87000
|
heap
|
page read and write
|
||
7FFD9B7F4000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B892000
|
trusted library allocation
|
page execute and read and write
|
||
1490000
|
trusted library section
|
page read and write
|
||
7FFD9B8D2000
|
trusted library allocation
|
page read and write
|
||
2CE5D2C000
|
stack
|
page read and write
|
||
1F1A7400000
|
heap
|
page read and write
|
||
758F6FF000
|
stack
|
page read and write
|
||
13A6000
|
trusted library section
|
page read and write
|
||
78DD6FF000
|
unkown
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page execute and read and write
|
||
21F99364000
|
heap
|
page read and write
|
||
78DD7FF000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
1C272000
|
heap
|
page read and write
|
||
B23D87E000
|
unkown
|
page readonly
|
||
1D044670000
|
heap
|
page read and write
|
||
18ADDB00000
|
heap
|
page read and write
|
||
2E86DA40000
|
heap
|
page read and write
|
||
1AAA8DF8000
|
heap
|
page read and write
|
||
1D044665000
|
heap
|
page read and write
|
||
F1B000
|
heap
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
21F99510000
|
heap
|
page read and write
|
||
18ADDDB5000
|
heap
|
page read and write
|
||
7FFD9B7C3000
|
trusted library allocation
|
page execute and read and write
|
||
1AAA8D80000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
21DF9650000
|
heap
|
page read and write
|
||
7FFD9B7BF000
|
trusted library allocation
|
page execute and read and write
|
||
1AAA8DD0000
|
heap
|
page read and write
|
||
B23D48C000
|
stack
|
page read and write
|
||
F76F3ED000
|
stack
|
page read and write
|
||
130A5000
|
trusted library allocation
|
page read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
1AAA8DDB000
|
heap
|
page read and write
|
||
37AADFF000
|
stack
|
page read and write
|
||
130A7000
|
trusted library allocation
|
page read and write
|
||
1F1A73F0000
|
heap
|
page read and write
|
||
130C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D7000
|
trusted library allocation
|
page read and write
|
||
2E86DA60000
|
heap
|
page read and write
|
There are 156 hidden memdumps, click here to show them.