Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z1quote93039-pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Lymnaeidae
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\z1quote93039-pdf.exe
|
"C:\Users\user\Desktop\z1quote93039-pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\z1quote93039-pdf.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://mail.zqamcx.com
|
unknown
|
||
http://zqamcx.com
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
http://r11.i.lencr.org/0#
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
zqamcx.com
|
78.110.166.82
|
||
mail.zqamcx.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
78.110.166.82
|
zqamcx.com
|
United Kingdom
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2CB1000
|
trusted library allocation
|
page read and write
|
||
2D28000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
46FD000
|
direct allocation
|
page read and write
|
||
3844000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
F46000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3843000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3841000
|
heap
|
page read and write
|
||
51A6000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3848000
|
heap
|
page read and write
|
||
384D000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44F6000
|
heap
|
page read and write
|
||
384D000
|
heap
|
page read and write
|
||
46F9000
|
direct allocation
|
page read and write
|
||
384C000
|
heap
|
page read and write
|
||
3841000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
44FA000
|
heap
|
page read and write
|
||
41B5000
|
heap
|
page read and write
|
||
4553000
|
direct allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2CFC000
|
trusted library allocation
|
page read and write
|
||
51D2000
|
trusted library allocation
|
page read and write
|
||
4169000
|
heap
|
page read and write
|
||
384F000
|
heap
|
page read and write
|
||
41BC000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3841000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2A9A000
|
trusted library allocation
|
page execute and read and write
|
||
44FA000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384E000
|
heap
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
4553000
|
direct allocation
|
page read and write
|
||
44F3000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page execute and read and write
|
||
EEB000
|
heap
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
44FE000
|
heap
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384D000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2A74000
|
trusted library allocation
|
page read and write
|
||
51BA000
|
trusted library allocation
|
page read and write
|
||
41AD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
6261000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
476E000
|
direct allocation
|
page read and write
|
||
384F000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
4438000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3846000
|
heap
|
page read and write
|
||
2AA2000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
41BD000
|
heap
|
page read and write
|
||
52EC000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3841000
|
heap
|
page read and write
|
||
44F8000
|
heap
|
page read and write
|
||
44F5000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
476E000
|
direct allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
3844000
|
heap
|
page read and write
|
||
384C000
|
heap
|
page read and write
|
||
3845000
|
heap
|
page read and write
|
||
51BE000
|
trusted library allocation
|
page read and write
|
||
2AA5000
|
trusted library allocation
|
page execute and read and write
|
||
52BE000
|
stack
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
525C000
|
stack
|
page read and write
|
||
44FD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
6289000
|
heap
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
384F000
|
heap
|
page read and write
|
||
51A4000
|
trusted library allocation
|
page read and write
|
||
4148000
|
heap
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
44FA000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3842000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
51AB000
|
trusted library allocation
|
page read and write
|
||
4138000
|
heap
|
page read and write
|
||
41B5000
|
heap
|
page read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
3847000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
4553000
|
direct allocation
|
page read and write
|
||
44F2000
|
heap
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384D000
|
heap
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page execute and read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
3CB1000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
476E000
|
direct allocation
|
page read and write
|
||
41B4000
|
heap
|
page read and write
|
||
384D000
|
heap
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
3840000
|
heap
|
page read and write
|
||
384D000
|
heap
|
page read and write
|
||
2A7D000
|
trusted library allocation
|
page execute and read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page execute and read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
384A000
|
heap
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
3845000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44F6000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
3845000
|
heap
|
page read and write
|
||
52F3000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3843000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384F000
|
heap
|
page read and write
|
||
51B2000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
587F000
|
stack
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
2AA7000
|
trusted library allocation
|
page execute and read and write
|
||
41BD000
|
heap
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
D89000
|
stack
|
page read and write
|
||
46F9000
|
direct allocation
|
page read and write
|
||
44F9000
|
heap
|
page read and write
|
||
4553000
|
direct allocation
|
page read and write
|
||
2D24000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
45D0000
|
direct allocation
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
41BB000
|
heap
|
page read and write
|
||
44FE000
|
heap
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
6140000
|
trusted library allocation
|
page execute and read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
44F9000
|
heap
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
stack
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
384A000
|
heap
|
page read and write
|
||
384E000
|
heap
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
41B6000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
46FD000
|
direct allocation
|
page read and write
|
||
384B000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384A000
|
heap
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
F1F000
|
heap
|
page read and write
|
||
44F3000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3847000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44F2000
|
heap
|
page read and write
|
||
44FE000
|
heap
|
page read and write
|
||
6D90000
|
heap
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
46F9000
|
direct allocation
|
page read and write
|
||
46FD000
|
direct allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page execute and read and write
|
||
44FC000
|
heap
|
page read and write
|
||
63A7000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384F000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2AAB000
|
trusted library allocation
|
page execute and read and write
|
||
41BD000
|
heap
|
page read and write
|
||
613D000
|
stack
|
page read and write
|
||
4138000
|
heap
|
page read and write
|
||
45D0000
|
direct allocation
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
44FE000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384D000
|
heap
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
||
3849000
|
heap
|
page read and write
|
||
3840000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
3848000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
4138000
|
heap
|
page read and write
|
||
44FC000
|
heap
|
page read and write
|
||
44FE000
|
heap
|
page read and write
|
||
44F8000
|
heap
|
page read and write
|
||
2B4C000
|
stack
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
51CD000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page execute and read and write
|
||
52D8000
|
trusted library allocation
|
page read and write
|
||
44F6000
|
heap
|
page read and write
|
||
3844000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
51AE000
|
trusted library allocation
|
page read and write
|
||
44FE000
|
heap
|
page read and write
|
||
46F9000
|
direct allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
384A000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3848000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
44F6000
|
heap
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
4CB8000
|
trusted library allocation
|
page read and write
|
||
3845000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
45D0000
|
direct allocation
|
page read and write
|
||
63B0000
|
trusted library allocation
|
page read and write
|
||
3848000
|
heap
|
page read and write
|
||
3D17000
|
trusted library allocation
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2A92000
|
trusted library allocation
|
page read and write
|
||
44F4000
|
heap
|
page read and write
|
||
51C1000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
3842000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
384E000
|
heap
|
page read and write
|
||
C8A000
|
stack
|
page read and write
|
||
F33000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page execute and read and write
|
||
3848000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
44F5000
|
heap
|
page read and write
|
||
7F050000
|
trusted library allocation
|
page execute and read and write
|
||
51C6000
|
trusted library allocation
|
page read and write
|
||
2D17000
|
trusted library allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
F3F000
|
heap
|
page read and write
|
||
384C000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
46FD000
|
direct allocation
|
page read and write
|
||
45D0000
|
direct allocation
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
44F4000
|
heap
|
page read and write
|
||
EE8000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
476E000
|
direct allocation
|
page read and write
|
||
44F2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
577E000
|
stack
|
page read and write
|
||
44FF000
|
heap
|
page read and write
|
||
44F6000
|
heap
|
page read and write
|
||
655D000
|
stack
|
page read and write
|
||
44F9000
|
heap
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page execute and read and write
|
||
41BD000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
2A73000
|
trusted library allocation
|
page execute and read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44F7000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384E000
|
heap
|
page read and write
|
||
681E000
|
stack
|
page read and write
|
||
384B000
|
heap
|
page read and write
|
||
44F6000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
44F8000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
44F5000
|
heap
|
page read and write
|
||
418A000
|
heap
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
41BD000
|
heap
|
page read and write
|
||
384F000
|
heap
|
page read and write
|
There are 343 hidden memdumps, click here to show them.