Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\delays.tmp
|
ISO-8859 text, with very long lines (65536), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FCAKFCGCGIEG" & exit
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout /t 10
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://b2een.xyz/sqlite3.dll
|
49.13.32.95
|
||
https://b2een.xyz/
|
49.13.32.95
|
||
https://t.me/
|
unknown
|
||
https://web.telegram.org
|
unknown
|
||
https://t.me/fu4chmof
|
unknown
|
||
https://t.me/fu4chmor08etMozilla/5.0
|
unknown
|
||
https://steamcommunity.com/profiles/76561199802540894
|
|||
https://b2een.xyzHJJJJKEG
|
unknown
|
||
https://t.me/O
|
unknown
|
||
https://steamcommunity.com/profiles/76561199802540894r08etMozilla/5.0
|
unknown
|
||
https://b2een.xyz/bi
|
unknown
|
||
https://t.me/fu4chmo338
|
unknown
|
||
https://b2een.xyztosh;
|
unknown
|
||
https://b2een.xyz
|
unknown
|
||
https://t.me/fu4chmo
|
149.154.167.99
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
b2een.xyz
|
49.13.32.95
|
||
t.me
|
149.154.167.99
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
49.13.32.95
|
b2een.xyz
|
Germany
|
||
149.154.167.99
|
t.me
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
|
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D81000
|
unkown
|
page readonly
|
||
DF8000
|
unkown
|
page read and write
|
||
D81000
|
unkown
|
page readonly
|
||
D50000
|
unkown
|
page readonly
|
||
FA3000
|
unkown
|
page readonly
|
||
C5E000
|
stack
|
page read and write
|
||
12DCF000
|
stack
|
page read and write
|
||
365B000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
A4CE000
|
stack
|
page read and write
|
||
DF2000
|
unkown
|
page read and write
|
||
3595000
|
heap
|
page read and write
|
||
210A8000
|
heap
|
page read and write
|
||
D51000
|
unkown
|
page execute and write copy
|
||
35E1000
|
heap
|
page read and write
|
||
D8E000
|
unkown
|
page write copy
|
||
35EB000
|
heap
|
page read and write
|
||
1C3A0000
|
remote allocation
|
page read and write
|
||
211C0000
|
heap
|
page read and write
|
||
3618000
|
heap
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
34E2000
|
stack
|
page read and write
|
||
DB4000
|
unkown
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
35D7000
|
heap
|
page read and write
|
||
210B8000
|
heap
|
page read and write
|
||
7F8E000
|
stack
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
E36000
|
unkown
|
page read and write
|
||
35F7000
|
heap
|
page read and write
|
||
178CE000
|
stack
|
page read and write
|
||
19E4B000
|
stack
|
page read and write
|
||
3606000
|
heap
|
page read and write
|
||
211CA000
|
heap
|
page read and write
|
||
FA3000
|
unkown
|
page readonly
|
||
35FE000
|
heap
|
page read and write
|
||
2148B000
|
stack
|
page read and write
|
||
F91000
|
unkown
|
page read and write
|
||
3607000
|
heap
|
page read and write
|
||
35CF000
|
heap
|
page read and write
|
||
4420000
|
heap
|
page read and write
|
||
1C3A0000
|
remote allocation
|
page read and write
|
||
19E0C000
|
stack
|
page read and write
|
||
3618000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
EEA000
|
unkown
|
page read and write
|
||
1E930000
|
heap
|
page read and write
|
||
35CD000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
210A5000
|
heap
|
page read and write
|
||
21040000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
235C0000
|
heap
|
page read and write
|
||
3609000
|
heap
|
page read and write
|
||
3AC000
|
stack
|
page read and write
|
||
1E98B000
|
stack
|
page read and write
|
||
34DC000
|
stack
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
917000
|
heap
|
page read and write
|
||
3EC000
|
stack
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
1788D000
|
stack
|
page read and write
|
||
35D6000
|
heap
|
page read and write
|
||
35D8000
|
heap
|
page read and write
|
||
35D6000
|
heap
|
page read and write
|
||
35D8000
|
heap
|
page read and write
|
||
1C3A0000
|
remote allocation
|
page read and write
|
||
21140000
|
trusted library allocation
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1C3DE000
|
stack
|
page read and write
|
||
20F41000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
DDD000
|
unkown
|
page read and write
|
||
20F30000
|
heap
|
page read and write
|
||
20F41000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
21751000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
3615000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
35D6000
|
heap
|
page read and write
|
||
DEF000
|
unkown
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
3603000
|
heap
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
E34F000
|
stack
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
21040000
|
heap
|
page read and write
|
||
3666000
|
heap
|
page read and write
|
||
3595000
|
heap
|
page read and write
|
||
2BA5C000
|
stack
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
35D6000
|
heap
|
page read and write
|
||
D8E000
|
unkown
|
page write copy
|
||
3618000
|
heap
|
page read and write
|
||
1088F000
|
stack
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
3602000
|
heap
|
page read and write
|
||
687000
|
heap
|
page read and write
|
||
687000
|
heap
|
page read and write
|
||
3589000
|
heap
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
35D8000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
3602000
|
heap
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
1534E000
|
stack
|
page read and write
|
||
35FF000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
3564000
|
heap
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
369C000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
351E000
|
heap
|
page read and write
|
||
20ECA000
|
stack
|
page read and write
|
||
351A000
|
heap
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
20F40000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
3603000
|
heap
|
page read and write
|
||
35FE000
|
heap
|
page read and write
|
||
3608000
|
heap
|
page read and write
|
||
34EC000
|
stack
|
page read and write
|
||
35FA000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
35CF000
|
heap
|
page read and write
|
||
3618000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
1C38C000
|
stack
|
page read and write
|
||
35DA000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
3605000
|
heap
|
page read and write
|
||
1E91F000
|
stack
|
page read and write
|
||
1530F000
|
stack
|
page read and write
|
||
360A000
|
heap
|
page read and write
|
||
D51000
|
unkown
|
page execute and write copy
|
||
35F2000
|
heap
|
page read and write
|
||
36D8000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
There are 154 hidden memdumps, click here to show them.