Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
998_popxinv_Installer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\Public\Downloads\ind.jpg
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\998[1].ccp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\998_popxinv_Installer.exe
|
"C:\Users\user\Desktop\998_popxinv_Installer.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
134.122.174.169
|
|||
http://guanlix.cn:881/998.ccpS
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://guanlix.cn:881/998.ccp
|
91.208.240.157
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
guanlix.cn
|
91.208.240.157
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
134.122.174.169
|
unknown
|
United States
|
||
91.208.240.157
|
guanlix.cn
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3D51000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library section
|
page read and write
|
||
3D89000
|
trusted library allocation
|
page read and write
|
||
6020000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
1137000
|
stack
|
page read and write
|
||
13DF000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
A33000
|
unkown
|
page readonly
|
||
A2F000
|
unkown
|
page write copy
|
||
60B1000
|
trusted library allocation
|
page read and write
|
||
1407000
|
heap
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
A29000
|
unkown
|
page readonly
|
||
11A0000
|
heap
|
page read and write
|
||
38A0000
|
heap
|
page read and write
|
||
4D51000
|
trusted library allocation
|
page read and write
|
||
5EED000
|
stack
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
3B23000
|
trusted library allocation
|
page execute and read and write
|
||
3C3C000
|
stack
|
page read and write
|
||
1462000
|
heap
|
page read and write
|
||
3AF0000
|
trusted library section
|
page read and write
|
||
158D000
|
stack
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
69EC000
|
stack
|
page read and write
|
||
388F000
|
unkown
|
page read and write
|
||
3B2D000
|
trusted library allocation
|
page execute and read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
3AD0000
|
direct allocation
|
page execute and read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
6388000
|
stack
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
1310000
|
direct allocation
|
page read and write
|
||
3B70000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
unkown
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page execute and read and write
|
||
1390000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
68AC000
|
stack
|
page read and write
|
||
66EE000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
13F9000
|
heap
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
3B80000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
141C000
|
heap
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
686D000
|
stack
|
page read and write
|
||
3B00000
|
trusted library section
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
7F6E8000
|
trusted library allocation
|
page execute and read and write
|
||
3B50000
|
trusted library allocation
|
page read and write
|
||
608C000
|
stack
|
page read and write
|
||
13C7000
|
heap
|
page read and write
|
||
A29000
|
unkown
|
page readonly
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
600E000
|
stack
|
page read and write
|
||
A11000
|
unkown
|
page execute read
|
||
3BA3000
|
trusted library allocation
|
page read and write
|
||
5F6E000
|
stack
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
3B5B000
|
trusted library allocation
|
page execute and read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
3B24000
|
trusted library allocation
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
69AD000
|
stack
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
1817000
|
heap
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
3B10000
|
trusted library allocation
|
page read and write
|
||
A11000
|
unkown
|
page execute read
|
||
1405000
|
heap
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page execute and read and write
|
||
65E0000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
65CE000
|
stack
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
13C9000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
672F000
|
stack
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
3BB0000
|
heap
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
3C40000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
3BA9000
|
trusted library allocation
|
page execute and read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
3BAC000
|
trusted library allocation
|
page execute and read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
6040000
|
heap
|
page execute and read and write
|
||
1810000
|
heap
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
11EC000
|
stack
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
63C1000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
3B57000
|
trusted library allocation
|
page execute and read and write
|
||
6390000
|
heap
|
page read and write
|
||
676C000
|
stack
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
4D55000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
A33000
|
unkown
|
page readonly
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
628D000
|
stack
|
page read and write
|
||
5F70000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
3B90000
|
heap
|
page execute and read and write
|
||
1468000
|
heap
|
page read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
5F2E000
|
stack
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
7F6D0000
|
trusted library allocation
|
page execute and read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
3B60000
|
trusted library allocation
|
page execute and read and write
|
There are 167 hidden memdumps, click here to show them.