Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\7z.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\7z.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\anim.gif
|
GIF image data, version 89a, 500 x 27
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\gam-page.html
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\gtea.vbs
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\gteb.vbs
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\gtec.vbs
|
Unicode text, UTF-8 text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\icon.ico
|
MS Windows icon resource - 7 icons, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 32 bits/pixel, 24x24
with PNG image data, 24 x 24, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\icon.png
|
PNG image data, 128 x 128, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\icons.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\img\log-game.png
|
PNG image data, 171 x 33, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\img\logo-offer.png
|
PNG image data, 171 x 211, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\img\master-logo.png
|
PNG image data, 191 x 422, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\img\screen-002-min.png
|
PNG image data, 1125 x 586, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\last-page.html
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\o9iQbd0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, MS CAB-Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\vid-31.txt
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\ya-page.html
|
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Adware.Downware.20477.12113.8703.exe"
|
||
C:\Windows\SysWOW64\mshta.exe
|
"C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\start.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe
|
"C:\Users\user\AppData\Local\Temp\RarSFX0\Xr5XVue.exe" -O o9iQbd0.exe https://download.yandex.ru/yandex-pack/downloader/downloader.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://download.yF
|
unknown
|
||
https://dr.yandex.net/strm
|
unknown
|
||
https://openbox.su/app1/K
|
unknown
|
||
https://www.openssl.org/docs/faq.html
|
unknown
|
||
https://dr2.yandex.net/strm
|
unknown
|
||
https://yandex.com0
|
unknown
|
||
https://cachev2-fra-02.cdn.yandex.net/download.yandex.ru/yandex-pack/downloader/downloader.exe?lid=299
|
5.45.200.105
|
||
http://www.gnu.org/licenses/gpl.html
|
unknown
|
||
http://netpreserve.org/warc/1.0/revisit/identical-payload-digest
|
unknown
|
||
http://www.metalinker.org/typedynamicoriginurn:ietf:params:xml:ns:metalinktagsidentityfilesfilenames
|
unknown
|
||
http://www.metalinker.org/
|
unknown
|
||
https://download.yandex.ru/yandex-pack/downloader/downloader.exe
|
5.45.205.243
|
||
http://netpreserve.org/warc/1.0/revisit/identical-payload-digestWARC-ProfilelengthWARC-Truncatedappl
|
unknown
|
||
http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf
|
unknown
|
||
https://openbox.su/app1/
|
unknown
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cdn.yandex.net
|
5.45.205.243
|
||
cachev2-fra-02.cdn.yandex.net
|
5.45.200.105
|
||
download.yandex.ru
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
5.45.200.105
|
cachev2-fra-02.cdn.yandex.net
|
Russian Federation
|
||
5.45.205.243
|
cdn.yandex.net
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\SysWOW64\mshta.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\SysWOW64\mshta.exe.ApplicationCompany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6904000
|
trusted library allocation
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
F5B000
|
heap
|
page read and write
|
||
67CE000
|
heap
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
53A8000
|
trusted library allocation
|
page read and write
|
||
687000
|
unkown
|
page write copy
|
||
67E000
|
unkown
|
page write copy
|
||
A584000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
B212000
|
trusted library allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page execute
|
||
323B000
|
heap
|
page read and write
|
||
67F1000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
A5BA000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
675B000
|
heap
|
page read and write
|
||
F0000
|
heap
|
page read and write
|
||
2144000
|
heap
|
page read and write
|
||
52E0000
|
heap
|
page read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
6914000
|
trusted library allocation
|
page read and write
|
||
6851000
|
trusted library allocation
|
page read and write
|
||
F6000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
trusted library allocation
|
page read and write
|
||
A54C000
|
trusted library allocation
|
page read and write
|
||
3318000
|
heap
|
page read and write
|
||
53F8000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
67F8000
|
heap
|
page read and write
|
||
3328000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3230000
|
heap
|
page read and write
|
||
6E2000
|
unkown
|
page readonly
|
||
759000
|
unkown
|
page write copy
|
||
6750000
|
heap
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
3FD0000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2240000
|
trusted library section
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
659E000
|
stack
|
page read and write
|
||
A555000
|
trusted library allocation
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
F2B000
|
heap
|
page read and write
|
||
2260000
|
trusted library section
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
57EB000
|
stack
|
page read and write
|
||
67E000
|
unkown
|
page read and write
|
||
3376000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
A599000
|
heap
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
BCD0000
|
trusted library allocation
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
67F1000
|
heap
|
page read and write
|
||
42A000
|
unkown
|
page readonly
|
||
67F1000
|
heap
|
page read and write
|
||
68B000
|
unkown
|
page readonly
|
||
2250000
|
trusted library section
|
page read and write
|
||
A5B1000
|
heap
|
page read and write
|
||
F2D000
|
heap
|
page read and write
|
||
BB12000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
A589000
|
heap
|
page read and write
|
||
5397000
|
heap
|
page read and write
|
||
3311000
|
heap
|
page read and write
|
||
40F000
|
unkown
|
page write copy
|
||
67BC000
|
heap
|
page read and write
|
||
3274000
|
heap
|
page read and write
|
||
A5A1000
|
heap
|
page read and write
|
||
40F000
|
unkown
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
A659000
|
heap
|
page read and write
|
||
70F0000
|
trusted library section
|
page read and write
|
||
7FE00000
|
trusted library allocation
|
page execute read
|
||
67E7000
|
heap
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
67E4000
|
heap
|
page read and write
|
||
67E5000
|
heap
|
page read and write
|
||
22D4000
|
heap
|
page read and write
|
||
36F6000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page readonly
|
||
56AB000
|
stack
|
page read and write
|
||
32AF000
|
heap
|
page read and write
|
||
F5F000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
593B000
|
stack
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
A57B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5A7B000
|
stack
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
6755000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
67EB000
|
heap
|
page read and write
|
||
2ECA000
|
stack
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
A5F5000
|
heap
|
page read and write
|
||
68B000
|
unkown
|
page readonly
|
||
A65B000
|
heap
|
page read and write
|
||
A670000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
6D4F000
|
stack
|
page read and write
|
||
5CD0000
|
heap
|
page read and write
|
||
A7C0000
|
heap
|
page read and write
|
||
BCC0000
|
trusted library allocation
|
page read and write
|
||
67DD000
|
heap
|
page read and write
|
||
A548000
|
trusted library allocation
|
page read and write
|
||
6855000
|
trusted library allocation
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
51EF000
|
heap
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
A60D000
|
heap
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
6906000
|
trusted library allocation
|
page read and write
|
||
330C000
|
heap
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
BAB0000
|
trusted library allocation
|
page read and write
|
||
4C6000
|
heap
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
32C6000
|
heap
|
page read and write
|
||
2FC7000
|
stack
|
page read and write
|
||
67FF000
|
heap
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
unkown
|
page readonly
|
||
6867000
|
trusted library allocation
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
F57000
|
heap
|
page read and write
|
||
67D8000
|
heap
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
A66B000
|
heap
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
6B9F000
|
stack
|
page read and write
|
||
5604000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
57AC000
|
stack
|
page read and write
|
||
3304000
|
heap
|
page read and write
|
||
67A7000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D20000
|
heap
|
page read and write
|
||
109C000
|
heap
|
page read and write
|
||
A5E3000
|
heap
|
page read and write
|
||
A5D9000
|
heap
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
A660000
|
heap
|
page read and write
|
||
A7D0000
|
trusted library allocation
|
page read and write
|
||
565F000
|
stack
|
page read and write
|
||
A7BF000
|
stack
|
page read and write
|
||
F5B000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
53FC000
|
trusted library allocation
|
page read and write
|
||
683000
|
heap
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
A6BE000
|
stack
|
page read and write
|
||
BAE0000
|
heap
|
page read and write
|
||
330A000
|
heap
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
75A000
|
unkown
|
page write copy
|
||
68FF000
|
stack
|
page read and write
|
||
539E000
|
heap
|
page read and write
|
||
67CB000
|
heap
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
690B000
|
trusted library allocation
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
A7C0000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
A656000
|
heap
|
page read and write
|
||
A580000
|
heap
|
page read and write
|
||
A570000
|
heap
|
page read and write
|
||
5B7D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
680000
|
unkown
|
page write copy
|
||
32B2000
|
heap
|
page read and write
|
||
751000
|
unkown
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
42A000
|
unkown
|
page readonly
|
||
68A000
|
unkown
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
6804000
|
heap
|
page read and write
|
||
3315000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
3251000
|
heap
|
page read and write
|
||
7FDF1000
|
trusted library allocation
|
page execute read
|
||
6FA000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
328F000
|
heap
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
6EDB000
|
stack
|
page read and write
|
||
94B0000
|
trusted library section
|
page readonly
|
||
3283000
|
heap
|
page read and write
|
||
189000
|
stack
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
7100000
|
trusted library section
|
page read and write
|
||
67D5000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
BAC0000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
6857000
|
trusted library allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
67C7000
|
heap
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
D1F000
|
stack
|
page read and write
|
||
5600000
|
heap
|
page read and write
|
||
BB27000
|
heap
|
page read and write
|
||
6D9000
|
heap
|
page read and write
|
||
94AC000
|
stack
|
page read and write
|
||
6787000
|
heap
|
page read and write
|
||
67B000
|
heap
|
page read and write
|
||
48DF000
|
stack
|
page read and write
|
||
F5B000
|
heap
|
page read and write
|
||
93AE000
|
stack
|
page read and write
|
||
691D000
|
trusted library allocation
|
page read and write
|
||
540C000
|
trusted library allocation
|
page read and write
|
||
32F9000
|
heap
|
page read and write
|
||
539A000
|
heap
|
page read and write
|
||
67E3000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
F1F000
|
stack
|
page read and write
|
||
7110000
|
trusted library section
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
6804000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
51E6000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
BAB0000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
A57C000
|
heap
|
page read and write
|
||
51E4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A541000
|
trusted library allocation
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
6918000
|
trusted library allocation
|
page read and write
|
||
5393000
|
heap
|
page read and write
|
||
6901000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
70DD000
|
trusted library allocation
|
page read and write
|
||
7FDE1000
|
trusted library allocation
|
page execute read
|
||
54B0000
|
heap
|
page read and write
|
||
58EF000
|
stack
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
6D9000
|
heap
|
page read and write
|
||
32FE000
|
heap
|
page read and write
|
||
36FA000
|
heap
|
page read and write
|
||
95C000
|
stack
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
40D000
|
unkown
|
page readonly
|
||
2140000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
There are 279 hidden memdumps, click here to show them.