Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
lkOawAWJRO.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\FuLvJKHyBveQGVRTqGwm.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\lkOawAWJRO.exe
|
"C:\Users\user\Desktop\lkOawAWJRO.exe"
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
"C:\Users\user\AppData\Local\Temp\service123.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st
00:01 /du 9800:59 /sc once /ri 1 /f
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
C:\Users\user\AppData\Local\Temp\/service123.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
analforeverlovyu.top
|
|||
+sevtvr17pt.top
|
|||
sevtvr17pt.top
|
|||
http://sevtvr17pt.top/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://gcc.gnu.org/bugs/):
|
unknown
|
||
https://keruzam.com/update.php?compName
|
unknown
|
||
http://sevtvr17pt.top/v1/upload.php
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://sevtvr17pt.top:80/v1/upload.php
|
unknown
|
||
https://keruzam.com/update.php?compName=
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sevtvr17pt.top
|
80.66.81.78
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
80.66.81.78
|
sevtvr17pt.top
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4106000
|
heap
|
page read and write
|
||
6A03A000
|
direct allocation
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
6A043000
|
direct allocation
|
page read and write
|
||
6B1000
|
unkown
|
page read and write
|
||
6C1000
|
unkown
|
page execute read
|
||
74C000
|
unkown
|
page readonly
|
||
1248000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
18C8000
|
heap
|
page read and write
|
||
75F000
|
unkown
|
page read and write
|
||
1883000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
E73000
|
heap
|
page read and write
|
||
148D000
|
stack
|
page read and write
|
||
D89B000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
E32000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
187E000
|
heap
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
C28000
|
stack
|
page read and write
|
||
6A2F9000
|
direct allocation
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
69B000
|
unkown
|
page write copy
|
||
6A05B000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
6A8000
|
unkown
|
page read and write
|
||
6CE000
|
unkown
|
page write copy
|
||
DF4000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
D831000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
D85B000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page readonly
|
||
6B4000
|
unkown
|
page read and write
|
||
6D1000
|
unkown
|
page readonly
|
||
6AD000
|
unkown
|
page write copy
|
||
CC0000
|
heap
|
page read and write
|
||
E6B000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
6A375000
|
direct allocation
|
page read and write
|
||
1873000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
6C211000
|
unkown
|
page execute read
|
||
69CC0000
|
direct allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
18A4000
|
heap
|
page read and write
|
||
D8E4000
|
heap
|
page read and write
|
||
18C6000
|
heap
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page readonly
|
||
13F0000
|
heap
|
page read and write
|
||
187E000
|
heap
|
page read and write
|
||
69CF3000
|
direct allocation
|
page read and write
|
||
E3E000
|
heap
|
page read and write
|
||
D8DB000
|
heap
|
page read and write
|
||
18BB000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
6A056000
|
direct allocation
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
14B0000
|
remote allocation
|
page read and write
|
||
18B5000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
14B0000
|
remote allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
6C339000
|
unkown
|
page read and write
|
||
6A040000
|
direct allocation
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
141000
|
unkown
|
page execute read
|
||
18B7000
|
heap
|
page read and write
|
||
65C000
|
stack
|
page read and write
|
||
1F55000
|
heap
|
page read and write
|
||
186F000
|
heap
|
page read and write
|
||
18C0000
|
heap
|
page read and write
|
||
18C3000
|
heap
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
6B2000
|
unkown
|
page write copy
|
||
6CA000
|
unkown
|
page readonly
|
||
6C1000
|
unkown
|
page execute read
|
||
443F000
|
stack
|
page read and write
|
||
1873000
|
heap
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
6CA000
|
unkown
|
page readonly
|
||
187D000
|
heap
|
page read and write
|
||
69C000
|
unkown
|
page write copy
|
||
CC5000
|
heap
|
page read and write
|
||
18AA000
|
heap
|
page read and write
|
||
37DD000
|
stack
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
59A000
|
stack
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
75F000
|
unkown
|
page write copy
|
||
6CA000
|
unkown
|
page readonly
|
||
1220000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
D764000
|
heap
|
page read and write
|
||
18A9000
|
heap
|
page read and write
|
||
E6B000
|
heap
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
C57000
|
stack
|
page read and write
|
||
6A372000
|
direct allocation
|
page read and write
|
||
6CE000
|
unkown
|
page write copy
|
||
E18000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page write copy
|
||
3800000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
55D000
|
stack
|
page read and write
|
||
447B000
|
stack
|
page read and write
|
||
14C6000
|
heap
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
18D3000
|
heap
|
page read and write
|
||
6C1000
|
unkown
|
page execute read
|
||
D84A000
|
heap
|
page read and write
|
||
C42000
|
stack
|
page read and write
|
||
D830000
|
heap
|
page read and write
|
||
D555000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
6D1000
|
unkown
|
page readonly
|
||
6D1000
|
unkown
|
page readonly
|
||
A9C000
|
stack
|
page read and write
|
||
18AA000
|
heap
|
page read and write
|
||
69DF5000
|
direct allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
185E000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
6C1000
|
unkown
|
page execute read
|
||
11EA000
|
heap
|
page read and write
|
||
18AE000
|
heap
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
D831000
|
heap
|
page read and write
|
||
18BA000
|
heap
|
page read and write
|
||
D849000
|
heap
|
page read and write
|
||
164F000
|
stack
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
6CA000
|
unkown
|
page readonly
|
||
14C0000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page readonly
|
||
D89B000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
1876000
|
heap
|
page read and write
|
||
69E34000
|
direct allocation
|
page read and write
|
||
69CC1000
|
direct allocation
|
page execute read
|
||
186C000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
18A4000
|
heap
|
page read and write
|
||
D8E4000
|
heap
|
page read and write
|
||
DC45000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
6CA000
|
unkown
|
page readonly
|
||
6CE000
|
unkown
|
page write copy
|
||
380A000
|
heap
|
page read and write
|
||
69B000
|
unkown
|
page read and write
|
||
FFD000
|
stack
|
page read and write
|
||
18D3000
|
heap
|
page read and write
|
||
6B8000
|
unkown
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
D8A3000
|
heap
|
page read and write
|
||
191D000
|
heap
|
page read and write
|
||
3A6D000
|
stack
|
page read and write
|
||
97F000
|
unkown
|
page read and write
|
||
18CE000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
1879000
|
heap
|
page read and write
|
||
5CD000
|
unkown
|
page write copy
|
||
3C6D000
|
stack
|
page read and write
|
||
467C000
|
stack
|
page read and write
|
||
74C000
|
unkown
|
page readonly
|
||
6C2ED000
|
unkown
|
page read and write
|
||
5CC000
|
unkown
|
page write copy
|
||
B00000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
141000
|
unkown
|
page execute read
|
||
93E000
|
unkown
|
page read and write
|
||
6C1000
|
unkown
|
page execute read
|
||
DAB0000
|
heap
|
page read and write
|
||
6AE000
|
unkown
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
6A04A000
|
direct allocation
|
page read and write
|
||
6A048000
|
direct allocation
|
page read and write
|
||
A5B000
|
stack
|
page read and write
|
||
5D2000
|
unkown
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
1873000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
E76000
|
heap
|
page read and write
|
||
144D000
|
stack
|
page read and write
|
||
6A364000
|
direct allocation
|
page readonly
|
||
E36000
|
heap
|
page read and write
|
||
6C33C000
|
unkown
|
page readonly
|
||
6C0000
|
unkown
|
page readonly
|
||
187E000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
BF6000
|
stack
|
page read and write
|
||
6C1000
|
unkown
|
page execute read
|
||
E6D000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
6C210000
|
unkown
|
page readonly
|
||
5CC000
|
unkown
|
page read and write
|
||
762000
|
unkown
|
page readonly
|
||
D831000
|
heap
|
page read and write
|
||
187E000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
D8E4000
|
heap
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
18D3000
|
heap
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
DA31000
|
heap
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
6C338000
|
unkown
|
page readonly
|
||
18A4000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
6AF000
|
unkown
|
page write copy
|
||
E1C2000
|
heap
|
page read and write
|
||
D839000
|
heap
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
E16000
|
heap
|
page read and write
|
||
69FF9000
|
direct allocation
|
page read and write
|
||
14B0000
|
remote allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
423E000
|
stack
|
page read and write
|
||
18A4000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
6A03C000
|
direct allocation
|
page read and write
|
||
762000
|
unkown
|
page readonly
|
||
6C2EF000
|
unkown
|
page readonly
|
||
6CA000
|
unkown
|
page readonly
|
||
DCBE000
|
stack
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
141000
|
unkown
|
page execute read
|
||
1878000
|
heap
|
page read and write
|
There are 261 hidden memdumps, click here to show them.