Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\vqyu22il.thm\Invoice-yetdr.img
|
UDF filesystem data (version 1.5) 'DOCUMENTS'
|
dropped
|
||
C:\Users\user\Downloads\Invoice-yetdr.zip (copy)
|
Zip multi-volume archive data, at least PKZIP v2.50 to extract
|
dropped
|
||
\Device\CdRom1\63534464.vbs
|
Unicode text, UTF-16, little-endian text, with very long lines (458), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ioh3rww.fya.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l1xh3w2v.gsq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ql12fcc5.1tp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmpijqgg.0no.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Downloads\Invoice-yetdr.zip.crdownload
|
Zip multi-volume archive data, at least PKZIP v2.50 to extract
|
dropped
|
||
Chrome Cache Entry: 57
|
Zip multi-volume archive data, at least PKZIP v2.50 to extract
|
downloaded
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1936,i,14102734953510180185,6557037327749919800,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.bnaminexg.com/Invoice-yetdr.zip"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /c powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\vqyu22il.thm\Invoice-yetdr.img"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ex bypass -command Mount-DiskImage -ImagePath "C:\Users\user\AppData\Local\Temp\vqyu22il.thm\Invoice-yetdr.img"
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\Invoice-yetdr.zip"
|
||
C:\Windows\SysWOW64\7za.exe
|
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\vqyu22il.thm" "C:\Users\user\Downloads\Invoice-yetdr.zip"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\notepad.exe
|
"C:\Windows\system32\NOTEPAD.EXE" D:\autorun.inf
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.bnaminexg.com/Invoice-yetdr.zip
|
|||
https://www.bnaminexg.com/Invoice-yetdr.zip
|
162.210.199.135
|
||
https://pastebin.com/raw/vHQdp1zj
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bnaminexg.com
|
162.210.199.135
|
||
www.google.com
|
142.250.184.228
|
||
www.bnaminexg.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
239.255.255.250
|
unknown
|
Reserved
|
||
162.210.199.135
|
bnaminexg.com
|
United States
|
||
142.250.184.228
|
www.google.com
|
United States
|
||
192.168.2.6
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWindowsOnlyEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fPasteOriginalEOL
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fReverse
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fWrapAround
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
|
fMatchCase
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F2B000
|
heap
|
page read and write
|
||
309C000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
FCD000
|
heap
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
stack
|
page read and write
|
||
30EE000
|
trusted library allocation
|
page read and write
|
||
F89000
|
heap
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
3145000
|
heap
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
trusted library allocation
|
page read and write
|
||
313A000
|
heap
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
3154000
|
heap
|
page read and write
|
||
FAC000
|
heap
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
1440000
|
trusted library allocation
|
page execute and read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
3076000
|
stack
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
60AE000
|
stack
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
2DC4000
|
heap
|
page read and write
|
||
6560000
|
heap
|
page read and write
|
||
30FC000
|
trusted library allocation
|
page read and write
|
||
1352000
|
trusted library allocation
|
page execute and read and write
|
||
5C9F000
|
stack
|
page read and write
|
||
1367000
|
trusted library allocation
|
page execute and read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page execute and read and write
|
||
13AE000
|
stack
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
132A000
|
trusted library allocation
|
page execute and read and write
|
||
3410000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
4DB9000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
30CC000
|
trusted library allocation
|
page read and write
|
||
3104000
|
trusted library allocation
|
page read and write
|
||
5F6E000
|
stack
|
page read and write
|
||
7F1F0000
|
trusted library allocation
|
page execute and read and write
|
||
BB9000
|
stack
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
32B5000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
30E1000
|
trusted library allocation
|
page read and write
|
||
FA3000
|
heap
|
page read and write
|
||
2A5D000
|
stack
|
page read and write
|
||
FC1000
|
heap
|
page read and write
|
||
2DAC000
|
heap
|
page read and write
|
||
576F000
|
stack
|
page read and write
|
||
30EB000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
heap
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
1332000
|
trusted library allocation
|
page execute and read and write
|
||
51FE000
|
stack
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
2DC6000
|
heap
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
53AD000
|
stack
|
page read and write
|
||
F2E000
|
heap
|
page read and write
|
||
133C000
|
trusted library allocation
|
page execute and read and write
|
||
315A000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
30DE000
|
trusted library allocation
|
page read and write
|
||
3162000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
4061000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
unkown
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
30B5000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
BB6000
|
stack
|
page read and write
|
||
30AA000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
3135000
|
heap
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
135A000
|
trusted library allocation
|
page execute and read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
313E000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
1322000
|
trusted library allocation
|
page execute and read and write
|
||
ABC000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
4F74000
|
heap
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
30E4000
|
trusted library allocation
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
4DB6000
|
heap
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
stack
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
133A000
|
trusted library allocation
|
page execute and read and write
|
||
562E000
|
stack
|
page read and write
|
||
54ED000
|
stack
|
page read and write
|
||
2CEE000
|
unkown
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
F47000
|
heap
|
page read and write
|
||
30BB000
|
stack
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
3118000
|
heap
|
page read and write
|
||
552D000
|
stack
|
page read and write
|
||
30CF000
|
trusted library allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
DCC000
|
stack
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
61AE000
|
stack
|
page read and write
|
||
136B000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
heap
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
There are 149 hidden memdumps, click here to show them.