Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\spiketop
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
|
"C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://cp8nl.hyperhost.ua
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cp8nl.hyperhost.ua
|
185.174.175.187
|
||
241.42.69.40.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.174.175.187
|
cp8nl.hyperhost.ua
|
Ukraine
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C59000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
1690000
|
direct allocation
|
page read and write
|
||
2C2E000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
heap
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
516C000
|
stack
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
2C2C000
|
trusted library allocation
|
page read and write
|
||
3F32000
|
heap
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
2B7A000
|
trusted library allocation
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
100D000
|
trusted library allocation
|
page execute and read and write
|
||
2B72000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
6920000
|
heap
|
page read and write
|
||
3B1E000
|
heap
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
2B92000
|
trusted library allocation
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
2BA3000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1016000
|
trusted library allocation
|
page execute and read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
159F000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
29E0000
|
trusted library allocation
|
page execute and read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
3FFB000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
5FF7000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
61AD000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
497E000
|
direct allocation
|
page read and write
|
||
E68000
|
heap
|
page read and write
|
||
52EC000
|
stack
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
491000
|
unkown
|
page write copy
|
||
490000
|
unkown
|
page write copy
|
||
CE5000
|
heap
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
55CC000
|
trusted library allocation
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
3FFB000
|
heap
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
E97000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
1012000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
4078000
|
heap
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
1025000
|
trusted library allocation
|
page execute and read and write
|
||
3C48000
|
trusted library allocation
|
page read and write
|
||
2B4C000
|
stack
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4640000
|
direct allocation
|
page read and write
|
||
3DD0000
|
heap
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
2FC5000
|
heap
|
page read and write
|
||
5FAF000
|
stack
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
119F000
|
stack
|
page read and write
|
||
3F0E000
|
heap
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
2948000
|
trusted library allocation
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page execute and read and write
|
||
2BD0000
|
heap
|
page execute and read and write
|
||
400A000
|
heap
|
page read and write
|
||
F1D000
|
heap
|
page read and write
|
||
3FFB000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
5DC8000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
44D8000
|
heap
|
page read and write
|
||
5DD7000
|
heap
|
page read and write
|
||
3E75000
|
heap
|
page read and write
|
||
3C09000
|
trusted library allocation
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
101A000
|
trusted library allocation
|
page execute and read and write
|
||
150000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
47E0000
|
direct allocation
|
page read and write
|
||
3ECC000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3B99000
|
heap
|
page read and write
|
||
FFD000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
FF4000
|
trusted library allocation
|
page read and write
|
||
2B8D000
|
trusted library allocation
|
page read and write
|
||
3FD0000
|
heap
|
page read and write
|
||
65EF000
|
stack
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
3F57000
|
heap
|
page read and write
|
||
490D000
|
direct allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3BE1000
|
trusted library allocation
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
3EB9000
|
heap
|
page read and write
|
||
3CD0000
|
heap
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
1027000
|
trusted library allocation
|
page execute and read and write
|
||
4CDD000
|
stack
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
4640000
|
direct allocation
|
page read and write
|
||
FF3000
|
trusted library allocation
|
page execute and read and write
|
||
3EEC000
|
heap
|
page read and write
|
||
2B66000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
2B6B000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page execute and read and write
|
||
2E8D000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2C47000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8B4000
|
stack
|
page read and write
|
||
6770000
|
trusted library allocation
|
page execute and read and write
|
||
1022000
|
trusted library allocation
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
3EBF000
|
heap
|
page read and write
|
||
89A000
|
stack
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
102B000
|
trusted library allocation
|
page execute and read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
55B9000
|
trusted library allocation
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
3EA6000
|
heap
|
page read and write
|
||
5FEE000
|
stack
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
43DB000
|
heap
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
4909000
|
direct allocation
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page execute and read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
F0C000
|
heap
|
page read and write
|
||
53EF000
|
stack
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
999000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
5D92000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
7FDE0000
|
trusted library allocation
|
page execute and read and write
|
||
497E000
|
direct allocation
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
155000
|
heap
|
page read and write
|
||
492000
|
unkown
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
3B9B000
|
heap
|
page read and write
|
||
2B86000
|
trusted library allocation
|
page read and write
|
||
5DA1000
|
heap
|
page read and write
|
||
5D9F000
|
heap
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
3EC6000
|
heap
|
page read and write
|
||
407D000
|
heap
|
page read and write
|
||
4763000
|
direct allocation
|
page read and write
|
||
9DA000
|
heap
|
page read and write
|
||
400B000
|
heap
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
6760000
|
heap
|
page read and write
|
There are 206 hidden memdumps, click here to show them.