Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
leg#U00edvel9931-009-140.08372236.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\8pIuMUYQX9q.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\ClassicIEDLL_64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\ClassicIE_64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\FrontendCybersecurity.json
|
data
|
dropped
|
||
C:\Users\user\Microsoft.NET\netframework4.7\version\ng3DJyCjjqIdyv.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\leg#U00edvel9931-009-140.08372236.exe
|
"C:\Users\user\Desktop\leg#U00edvel9931-009-140.08372236.exe"
|
||
C:\Windows\System32\shutdown.exe
|
shutdown /r /t 30
|
||
C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\8pIuMUYQX9q.exe
|
"C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\8pIuMUYQX9q.exe"
|
||
C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\8pIuMUYQX9q.exe
|
"C:\Users\user\Microsoft.NET\netframework4.7\version\acuradas\8pIuMUYQX9q.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://panternol.com/backup/arqREQUEST_METHODpanternol.comiphlpapi.dll
|
unknown
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
https://GODEBUGhttps://panterno1.1.1.1
|
unknown
|
||
https://panternol.com/backup/arqR
|
unknown
|
||
https://panterno1.1.1.1
|
unknown
|
||
http://www.winimage.com/zLibDll1.3.1rbr
|
unknown
|
||
https://panternol.com/backup/arquivo1.zip
|
34.95.207.248
|
||
https://panternol.com/cacher/https://panternol.com/cacher/panternol.com
|
unknown
|
||
https://panternol.com/cacher/
|
34.95.207.248
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
panternol.com
|
34.95.207.248
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.95.207.248
|
panternol.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
ng3DJyCjjqIdyv
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C00007A000
|
direct allocation
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
578000
|
heap
|
page read and write
|
||
C000228000
|
direct allocation
|
page read and write
|
||
D4A000
|
unkown
|
page readonly
|
||
7FF6B40B3000
|
unkown
|
page readonly
|
||
261F000
|
stack
|
page read and write
|
||
7FF6B40B3000
|
unkown
|
page readonly
|
||
7FF6B40A1000
|
unkown
|
page execute read
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
7FF6B40A0000
|
unkown
|
page readonly
|
||
C0001E0000
|
direct allocation
|
page read and write
|
||
232E76F3000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C23000
|
unkown
|
page write copy
|
||
243D4AC0000
|
heap
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
C000104000
|
direct allocation
|
page read and write
|
||
994000
|
unkown
|
page readonly
|
||
C000198000
|
direct allocation
|
page read and write
|
||
58A000
|
heap
|
page read and write
|
||
C00019C000
|
direct allocation
|
page read and write
|
||
C000262000
|
direct allocation
|
page read and write
|
||
C0001A0000
|
direct allocation
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
21F3000
|
heap
|
page read and write
|
||
232A23B0000
|
heap
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
67B7DFE000
|
stack
|
page read and write
|
||
243D4AE4000
|
heap
|
page read and write
|
||
C000274000
|
direct allocation
|
page read and write
|
||
243D4AE1000
|
heap
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
21DD000
|
heap
|
page read and write
|
||
7FFE1A534000
|
unkown
|
page readonly
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
C00027E000
|
direct allocation
|
page read and write
|
||
7FF6B40AF000
|
unkown
|
page write copy
|
||
C5E000
|
unkown
|
page read and write
|
||
C0000FE000
|
direct allocation
|
page read and write
|
||
EEE000
|
unkown
|
page readonly
|
||
587000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
243D4E40000
|
heap
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
701F47F000
|
stack
|
page read and write
|
||
7FF6B40AB000
|
unkown
|
page readonly
|
||
C000082000
|
direct allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C4E000
|
unkown
|
page read and write
|
||
67B6FFC000
|
stack
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
2CAD000
|
stack
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
22CA000
|
heap
|
page read and write
|
||
C000241000
|
direct allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
232E76D0000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
7FF6B40A0000
|
unkown
|
page readonly
|
||
232A2407000
|
heap
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
232E7940000
|
heap
|
page read and write
|
||
180085000
|
direct allocation
|
page read and write
|
||
721000
|
unkown
|
page execute read
|
||
243D4E45000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
C00006A000
|
direct allocation
|
page read and write
|
||
211D000
|
stack
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
FAC000
|
stack
|
page read and write
|
||
CA7000
|
unkown
|
page read and write
|
||
C0000F0000
|
direct allocation
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
21F1000
|
heap
|
page read and write
|
||
C00002E000
|
direct allocation
|
page read and write
|
||
232A2405000
|
heap
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
C000236000
|
direct allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
C000222000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C80000
|
unkown
|
page read and write
|
||
67B71FE000
|
stack
|
page read and write
|
||
C000280000
|
direct allocation
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
7FFE1A510000
|
unkown
|
page readonly
|
||
C000068000
|
direct allocation
|
page read and write
|
||
18008C000
|
direct allocation
|
page readonly
|
||
C0000E4000
|
direct allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FFE1A510000
|
unkown
|
page readonly
|
||
D31000
|
unkown
|
page readonly
|
||
C000018000
|
direct allocation
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
7FF6B40A1000
|
unkown
|
page execute read
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
D31000
|
unkown
|
page readonly
|
||
C0001E6000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
21EB000
|
heap
|
page read and write
|
||
232E77B0000
|
heap
|
page read and write
|
||
7FFE1A547000
|
unkown
|
page readonly
|
||
2DAF000
|
stack
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
232A2260000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
67B73FE000
|
stack
|
page read and write
|
||
7FF6B40AF000
|
unkown
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
4B8000
|
heap
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
232E7945000
|
heap
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
C0001AC000
|
direct allocation
|
page read and write
|
||
21ED000
|
heap
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
7FF6B40B3000
|
unkown
|
page readonly
|
||
C000086000
|
direct allocation
|
page read and write
|
||
721000
|
unkown
|
page execute read
|
||
232A2350000
|
direct allocation
|
page read and write
|
||
EED000
|
unkown
|
page write copy
|
||
C000264000
|
direct allocation
|
page read and write
|
||
7FF6B40AF000
|
unkown
|
page write copy
|
||
2FA0000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
243D4AC8000
|
heap
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
7FFE1A547000
|
unkown
|
page readonly
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C4B000
|
unkown
|
page read and write
|
||
C000300000
|
direct allocation
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
C0001A4000
|
direct allocation
|
page read and write
|
||
21D9000
|
heap
|
page read and write
|
||
232A2358000
|
direct allocation
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
232A235A000
|
direct allocation
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
C00027A000
|
direct allocation
|
page read and write
|
||
C00025E000
|
direct allocation
|
page read and write
|
||
291B000
|
stack
|
page read and write
|
||
180064000
|
direct allocation
|
page readonly
|
||
67B79FC000
|
stack
|
page read and write
|
||
67B7BFF000
|
stack
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
7FF6B40A1000
|
unkown
|
page execute read
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C0001B4000
|
direct allocation
|
page read and write
|
||
C000189000
|
direct allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
C0000FC000
|
direct allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
232A23BC000
|
heap
|
page read and write
|
||
C0000F2000
|
direct allocation
|
page read and write
|
||
701F11F000
|
stack
|
page read and write
|
||
232A2354000
|
direct allocation
|
page read and write
|
||
22DC000
|
heap
|
page read and write
|
||
251F000
|
stack
|
page read and write
|
||
232E76B0000
|
direct allocation
|
page read and write
|
||
C0001E2000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
180085000
|
direct allocation
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
C0001D5000
|
direct allocation
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
C00004A000
|
direct allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
243D4AA0000
|
heap
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
271A000
|
stack
|
page read and write
|
||
C26000
|
unkown
|
page write copy
|
||
13C2000
|
heap
|
page read and write
|
||
C000266000
|
direct allocation
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
67B77FE000
|
stack
|
page read and write
|
||
C0001E8000
|
direct allocation
|
page read and write
|
||
180094000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C0001CF000
|
direct allocation
|
page read and write
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
C000302000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
CAF000
|
unkown
|
page readonly
|
||
410000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
7FFE1A511000
|
unkown
|
page execute read
|
||
21A4000
|
heap
|
page read and write
|
||
C000304000
|
direct allocation
|
page read and write
|
||
C27000
|
unkown
|
page read and write
|
||
232A23C2000
|
heap
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page readonly
|
||
232E7730000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C5C000
|
unkown
|
page write copy
|
||
7FF6B40AB000
|
unkown
|
page readonly
|
||
1785000
|
heap
|
page read and write
|
||
CAF000
|
unkown
|
page readonly
|
||
701F09C000
|
stack
|
page read and write
|
||
7FF6B40B3000
|
unkown
|
page readonly
|
||
C00019E000
|
direct allocation
|
page read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
C23000
|
unkown
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
C000252000
|
direct allocation
|
page read and write
|
||
C00026C000
|
direct allocation
|
page read and write
|
||
232E7770000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
232A23B9000
|
heap
|
page read and write
|
||
7FF6B40AB000
|
unkown
|
page readonly
|
||
180094000
|
direct allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C000278000
|
direct allocation
|
page read and write
|
||
2205000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
232A2430000
|
heap
|
page read and write
|
||
7FF6B40A0000
|
unkown
|
page readonly
|
||
573000
|
heap
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
7FFE1A534000
|
unkown
|
page readonly
|
||
7FFE1A544000
|
unkown
|
page read and write
|
||
C0000F6000
|
direct allocation
|
page read and write
|
||
243D4A80000
|
heap
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
7FF6B40A1000
|
unkown
|
page execute read
|
||
C000031000
|
direct allocation
|
page read and write
|
||
7FFE1A544000
|
unkown
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
D4A000
|
unkown
|
page readonly
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
C0001EA000
|
direct allocation
|
page read and write
|
||
C000306000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
7FF6B40AF000
|
unkown
|
page read and write
|
||
C0001A8000
|
direct allocation
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
232A2403000
|
heap
|
page read and write
|
||
2158000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
701F19F000
|
stack
|
page read and write
|
||
C4C000
|
unkown
|
page write copy
|
||
7FFE1A511000
|
unkown
|
page execute read
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
415000
|
heap
|
page read and write
|
||
C0001E4000
|
direct allocation
|
page read and write
|
||
232E7733000
|
direct allocation
|
page read and write
|
||
13C3000
|
heap
|
page read and write
|
||
C28000
|
unkown
|
page write copy
|
||
243D4A70000
|
heap
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
994000
|
unkown
|
page readonly
|
||
419000
|
heap
|
page read and write
|
||
21EF000
|
heap
|
page read and write
|
||
67B75FE000
|
stack
|
page read and write
|
||
7FF6B40A0000
|
unkown
|
page readonly
|
||
7FF6B40AB000
|
unkown
|
page readonly
|
||
1383000
|
heap
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000062000
|
direct allocation
|
page read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
18008C000
|
direct allocation
|
page readonly
|
||
C00024F000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
232E773C000
|
direct allocation
|
page read and write
|
||
EED000
|
unkown
|
page write copy
|
||
180000000
|
direct allocation
|
page read and write
|
||
180064000
|
direct allocation
|
page readonly
|
||
C000190000
|
direct allocation
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
C0001F0000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
There are 305 hidden memdumps, click here to show them.