Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2yylp1mMbi.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Esher
|
ASCII text, with very long lines (28724), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autA19A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autA1D9.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gobioid
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\2yylp1mMbi.exe
|
"C:\Users\user\Desktop\2yylp1mMbi.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\2yylp1mMbi.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://sectigo.com/CPS0
|
unknown
|
||
http://mail.worlorderbillions.top
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://worlorderbillions.top
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.worlorderbillions.top
|
unknown
|
||
worlorderbillions.top
|
185.244.151.84
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.244.151.84
|
worlorderbillions.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21E0000
|
direct allocation
|
page read and write
|
||
2FCE000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
3BA0000
|
heap
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
6230000
|
trusted library allocation
|
page execute and read and write
|
||
4013000
|
direct allocation
|
page read and write
|
||
3EF0000
|
direct allocation
|
page read and write
|
||
1026000
|
trusted library allocation
|
page execute and read and write
|
||
4013000
|
direct allocation
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
4013000
|
direct allocation
|
page read and write
|
||
6257000
|
heap
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
DDD000
|
stack
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
7FC50000
|
trusted library allocation
|
page execute and read and write
|
||
2EDD000
|
stack
|
page read and write
|
||
6AF0000
|
heap
|
page read and write
|
||
8AF000
|
unkown
|
page read and write
|
||
5340000
|
heap
|
page execute and read and write
|
||
10A0000
|
trusted library allocation
|
page execute and read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
3EF0000
|
direct allocation
|
page read and write
|
||
6247000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
6262000
|
heap
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
1452000
|
heap
|
page read and write
|
||
596C000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
unkown
|
page write copy
|
||
1460000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
41B9000
|
direct allocation
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
direct allocation
|
page execute and read and write
|
||
5986000
|
trusted library allocation
|
page read and write
|
||
422E000
|
direct allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
41B9000
|
direct allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
3FEC000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
1318000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
53E3000
|
heap
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
41B9000
|
direct allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
trusted library allocation
|
page read and write
|
||
422E000
|
direct allocation
|
page read and write
|
||
8B8000
|
unkown
|
page readonly
|
||
1497000
|
heap
|
page read and write
|
||
41BD000
|
direct allocation
|
page read and write
|
||
1022000
|
trusted library allocation
|
page read and write
|
||
100D000
|
trusted library allocation
|
page execute and read and write
|
||
155D000
|
heap
|
page read and write
|
||
41BD000
|
direct allocation
|
page read and write
|
||
AD9000
|
stack
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
103B000
|
trusted library allocation
|
page execute and read and write
|
||
3FA9000
|
trusted library allocation
|
page read and write
|
||
41B9000
|
direct allocation
|
page read and write
|
||
8B8000
|
unkown
|
page readonly
|
||
1032000
|
trusted library allocation
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
14EA000
|
heap
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page execute and read and write
|
||
422E000
|
direct allocation
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
41B9000
|
direct allocation
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
422E000
|
direct allocation
|
page read and write
|
||
101D000
|
trusted library allocation
|
page execute and read and write
|
||
2EFA000
|
trusted library allocation
|
page read and write
|
||
146F000
|
heap
|
page read and write
|
||
D9D000
|
stack
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
1004000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
unkown
|
page readonly
|
||
113A000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
102A000
|
trusted library allocation
|
page execute and read and write
|
||
4013000
|
direct allocation
|
page read and write
|
||
8A5000
|
unkown
|
page readonly
|
||
41BD000
|
direct allocation
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
55EC000
|
stack
|
page read and write
|
||
41BD000
|
direct allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
154E000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
7F1000
|
unkown
|
page execute read
|
||
2DAE000
|
stack
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page execute and read and write
|
||
2FD6000
|
trusted library allocation
|
page read and write
|
||
63D0000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
3EF0000
|
direct allocation
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
BD8000
|
stack
|
page read and write
|
||
146F000
|
heap
|
page read and write
|
||
6D90000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
2FFA000
|
trusted library allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
41B9000
|
direct allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
2F0D000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
stack
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page execute and read and write
|
||
41BD000
|
direct allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
direct allocation
|
page read and write
|
||
4013000
|
direct allocation
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
1003000
|
trusted library allocation
|
page execute and read and write
|
||
2F06000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
154E000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
unkown
|
page write copy
|
||
13EC000
|
stack
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
7F0000
|
unkown
|
page readonly
|
||
1CEE000
|
stack
|
page read and write
|
||
87F000
|
unkown
|
page readonly
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
20EE000
|
stack
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
87F000
|
unkown
|
page readonly
|
||
3EF0000
|
direct allocation
|
page read and write
|
||
2FE8000
|
trusted library allocation
|
page read and write
|
||
422E000
|
direct allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
147E000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
2EEB000
|
trusted library allocation
|
page read and write
|
||
422E000
|
direct allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
3F81000
|
trusted library allocation
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
4013000
|
direct allocation
|
page read and write
|
||
7F1000
|
unkown
|
page execute read
|
||
1035000
|
trusted library allocation
|
page execute and read and write
|
||
3BA4000
|
heap
|
page read and write
|
||
6250000
|
heap
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1037000
|
trusted library allocation
|
page execute and read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
622F000
|
stack
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
3EF0000
|
direct allocation
|
page read and write
|
||
2EFE000
|
trusted library allocation
|
page read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
1497000
|
heap
|
page read and write
|
||
3EF0000
|
direct allocation
|
page read and write
|
There are 205 hidden memdumps, click here to show them.