Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Downloads\DucuSign_23.24_503671.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dkzallen.vew\DucuSign_23.24_503671.PDF.url
|
Generic INItialization configuration [InternetShortcut]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Downloads\DucuSign_23.24_503671.zip.crdownload (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\f4f70771-2909-47d4-925b-9547cffaff10.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
Chrome Cache Entry: 47
|
HTML document, ASCII text, with very long lines (781), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 48
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
downloaded
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2284 --field-trial-handle=2312,i,1355773766837614093,12017507885534609916,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&description=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop"
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\DucuSign_23.24_503671.zip"
|
||
C:\Windows\SysWOW64\7za.exe
|
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\dkzallen.vew" "C:\Users\user\Downloads\DucuSign_23.24_503671.zip"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&description=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop
|
|||
https://d22xf2qtjwaix4.cloudfront.net/fcs/configureHtml/share/facebook.php?title=Check+out+this+custom+Vans+shoe&image=http://goo.gl/Felnhz&description=I+made+this+custom+Vans+Slip-On+shoe.&url=https://minbv.shop
|
52.222.236.19
|
||
http://goo.gl/Felnhz
|
unknown
|
||
http://goo.gl/Felnhz&description=I
|
unknown
|
||
https://minbv.shop/
|
3.128.24.43
|
||
https://cdn-prod.fluidconfigure.com/api/legacy/fcs/configureHtml/share/facebook.php?title=Check
|
unknown
|
||
https://minbv.shop
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
d22xf2qtjwaix4.cloudfront.net
|
52.222.236.19
|
||
www.google.com
|
142.250.186.36
|
||
minbv.shop
|
3.128.24.43
|
||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
|
84.201.210.37
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.128.24.43
|
minbv.shop
|
United States
|
||
142.250.186.36
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
52.222.236.19
|
d22xf2qtjwaix4.cloudfront.net
|
United States
|
||
192.168.2.6
|
unknown
|
unknown
|
||
192.168.2.5
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
17F0000
|
trusted library allocation
|
page execute and read and write
|
||
1360000
|
heap
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
156A000
|
trusted library allocation
|
page execute and read and write
|
||
565E000
|
stack
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
D8D000
|
stack
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
161D000
|
heap
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
4581000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
35BA000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page execute and read and write
|
||
EFE000
|
stack
|
page read and write
|
||
35E3000
|
trusted library allocation
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
157B000
|
trusted library allocation
|
page execute and read and write
|
||
15EE000
|
heap
|
page read and write
|
||
154A000
|
trusted library allocation
|
page execute and read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
17DF000
|
stack
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
154C000
|
trusted library allocation
|
page execute and read and write
|
||
E3E000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
35E6000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
35CA000
|
trusted library allocation
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
1562000
|
trusted library allocation
|
page execute and read and write
|
||
15B0000
|
heap
|
page read and write
|
||
153A000
|
trusted library allocation
|
page execute and read and write
|
||
15E0000
|
heap
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
3581000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
1542000
|
trusted library allocation
|
page execute and read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page read and write
|
||
35EC000
|
trusted library allocation
|
page read and write
|
||
7F240000
|
trusted library allocation
|
page execute and read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
1577000
|
trusted library allocation
|
page execute and read and write
|
||
1440000
|
heap
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
1532000
|
trusted library allocation
|
page execute and read and write
|
||
F05000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
35BC000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
1607000
|
heap
|
page read and write
|
||
C8C000
|
stack
|
page read and write
|
||
35DB000
|
trusted library allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
There are 71 hidden memdumps, click here to show them.