Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe
|
"C:\Users\user\Desktop\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidX
|
unknown
|
||
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidY
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://aka.ms/dotnet-warnings/
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://cp8nl.hyperhost.ua
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameX
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cp8nl.hyperhost.ua
|
185.174.175.187
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.174.175.187
|
cp8nl.hyperhost.ua
|
Ukraine
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
7FF77C48D000
|
unkown
|
page readonly
|
||
7FF77C48D000
|
unkown
|
page readonly
|
||
7FF77C43D000
|
unkown
|
page read and write
|
||
328E000
|
trusted library allocation
|
page read and write
|
||
286E183A000
|
direct allocation
|
page read and write
|
||
32B9000
|
trusted library allocation
|
page read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
1704000
|
trusted library allocation
|
page read and write
|
||
1703000
|
trusted library allocation
|
page execute and read and write
|
||
286DD230000
|
heap
|
page read and write
|
||
6500000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
FB9000
|
stack
|
page read and write
|
||
7FF77C50A000
|
unkown
|
page read and write
|
||
EBA000
|
stack
|
page read and write
|
||
32A9000
|
trusted library allocation
|
page read and write
|
||
31F3000
|
heap
|
page read and write
|
||
8E611FF000
|
stack
|
page read and write
|
||
32B5000
|
trusted library allocation
|
page read and write
|
||
286E1000000
|
direct allocation
|
page read and write
|
||
8E612FE000
|
stack
|
page read and write
|
||
3186000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
286DCEA0000
|
heap
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1726000
|
trusted library allocation
|
page execute and read and write
|
||
286DCFA0000
|
heap
|
page read and write
|
||
154D000
|
heap
|
page read and write
|
||
286DD006000
|
heap
|
page read and write
|
||
2C773380000
|
heap
|
page read and write
|
||
7FF77C311000
|
unkown
|
page execute read
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
32A7000
|
trusted library allocation
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
328C000
|
trusted library allocation
|
page read and write
|
||
7FF77C311000
|
unkown
|
page execute read
|
||
173B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF77C310000
|
unkown
|
page readonly
|
||
6520000
|
trusted library allocation
|
page execute and read and write
|
||
677D000
|
stack
|
page read and write
|
||
56BC000
|
stack
|
page read and write
|
||
286DCEC0000
|
heap
|
page read and write
|
||
6680000
|
heap
|
page read and write
|
||
171D000
|
trusted library allocation
|
page execute and read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
7F820000
|
trusted library allocation
|
page execute and read and write
|
||
595C000
|
stack
|
page read and write
|
||
286E1400000
|
direct allocation
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
2C6F287F000
|
direct allocation
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
14E8000
|
heap
|
page read and write
|
||
1760000
|
trusted library allocation
|
page execute and read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
1737000
|
trusted library allocation
|
page execute and read and write
|
||
31C0000
|
trusted library allocation
|
page read and write
|
||
5760000
|
heap
|
page read and write
|
||
31AD000
|
trusted library allocation
|
page read and write
|
||
286DCFAC000
|
heap
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
31A6000
|
trusted library allocation
|
page read and write
|
||
6640000
|
heap
|
page read and write
|
||
8E610F9000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
31B2000
|
trusted library allocation
|
page read and write
|
||
7FF77C518000
|
unkown
|
page readonly
|
||
286DCDC0000
|
heap
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
286DCFA6000
|
heap
|
page read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
6516000
|
trusted library allocation
|
page read and write
|
||
317C000
|
stack
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
stack
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
286DCFBA000
|
heap
|
page read and write
|
||
319A000
|
trusted library allocation
|
page read and write
|
||
6630000
|
trusted library allocation
|
page read and write
|
||
1732000
|
trusted library allocation
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
286DCEF0000
|
direct allocation
|
page read and write
|
||
6570000
|
trusted library allocation
|
page execute and read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
1735000
|
trusted library allocation
|
page execute and read and write
|
||
660E000
|
stack
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
17C0000
|
trusted library allocation
|
page read and write
|
||
172A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF77C310000
|
unkown
|
page readonly
|
||
6510000
|
trusted library allocation
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
5748000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
7FF77C518000
|
unkown
|
page readonly
|
||
318B000
|
trusted library allocation
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
286E416B000
|
direct allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
6F10000
|
heap
|
page read and write
|
||
533D000
|
stack
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
1722000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
2C6E685A000
|
direct allocation
|
page read and write
|
||
7FF77C510000
|
unkown
|
page read and write
|
||
3192000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page execute and read and write
|
||
286DEC00000
|
direct allocation
|
page read and write
|
||
318E000
|
trusted library allocation
|
page read and write
|
||
137E000
|
unkown
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
286E4B6B000
|
direct allocation
|
page read and write
|
||
150B000
|
heap
|
page read and write
|
||
8E613FF000
|
stack
|
page read and write
|
||
319E000
|
trusted library allocation
|
page read and write
|
||
286E0C00000
|
direct allocation
|
page read and write
|
||
18DE000
|
stack
|
page read and write
|
||
286E3800000
|
direct allocation
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
2C773449000
|
heap
|
page read and write
|
||
286DCF00000
|
direct allocation
|
page read and write
|
||
697D000
|
stack
|
page read and write
|
||
6617000
|
trusted library allocation
|
page read and write
|
||
15B4000
|
heap
|
page read and write
|
||
5750000
|
heap
|
page execute and read and write
|
||
7FF77C50A000
|
unkown
|
page write copy
|
||
6ED0000
|
trusted library allocation
|
page execute and read and write
|
||
286DCFFE000
|
heap
|
page read and write
|
||
6656000
|
heap
|
page read and write
|
||
2C773470000
|
heap
|
page read and write
|
||
6610000
|
trusted library allocation
|
page read and write
|
||
170D000
|
trusted library allocation
|
page execute and read and write
|
There are 143 hidden memdumps, click here to show them.