Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
09j4wHYrHs.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\~DFAC1AC9EB40B6FD0C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Users\user\Desktop\config.xml
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\09j4wHYrHs.exe
|
"C:\Users\user\Desktop\09j4wHYrHs.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://drive-daily-4.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://payments.google.com/
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://drive-staging.corp.google.com/
|
unknown
|
||
https://drive-daily-6.corp.google.com/
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://drive-daily-0.corp.google.com/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://sandbox.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://drive-daily-3.corp.google.com/
|
unknown
|
There are 15 hidden URLs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4B3000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
474000
|
heap
|
page read and write
|
||
42C000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
2050000
|
trusted library allocation
|
page execute read
|
||
4B6000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
4A8000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
42C000
|
heap
|
page read and write
|
||
441000
|
heap
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
448000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
418000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
46E000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
442000
|
heap
|
page read and write
|
||
4B3000
|
heap
|
page read and write
|
||
43D000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
42D000
|
heap
|
page read and write
|
||
20A0000
|
heap
|
page read and write
|
||
2130000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
448000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
4A8000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
2939000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
20B0000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
482000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
410000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page readonly
|
||
454000
|
heap
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page readonly
|
||
48F000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
448000
|
heap
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
77F000
|
stack
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
466000
|
heap
|
page read and write
|
||
47F000
|
heap
|
page read and write
|
||
45A000
|
heap
|
page read and write
|
||
2080000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
44E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
438000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
425000
|
heap
|
page read and write
|
||
4A8000
|
heap
|
page read and write
|
||
87F000
|
stack
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
482000
|
heap
|
page read and write
|
||
44E000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
48F000
|
heap
|
page read and write
|
||
48F000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
4B3000
|
heap
|
page read and write
|
||
44A000
|
heap
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
49A000
|
heap
|
page read and write
|
||
46F000
|
heap
|
page read and write
|
||
451000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
There are 85 hidden memdumps, click here to show them.