Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SOA_9828392091.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yGbzOMp.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\aut87C6.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\schoolma
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SOA_9828392091.exe
|
"C:\Users\user\Desktop\SOA_9828392091.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\SOA_9828392091.exe"
|
||
C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
|
"C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe"
|
||
C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
|
"C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://mail.palumalimited.com
|
unknown
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
https://wixxOvts0RfcEfM.org
|
unknown
|
||
http://palumalimited.com
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
|
unknown
|
||
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
|
unknown
|
||
http://dEIFpD.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
palumalimited.com
|
174.136.29.110
|
||
mail.palumalimited.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
174.136.29.110
|
palumalimited.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
yGbzOMp
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
22C0000
|
direct allocation
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page execute and read and write
|
||
2B10000
|
heap
|
page execute and read and write
|
||
2F1A000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
D94000
|
trusted library allocation
|
page read and write
|
||
6710000
|
heap
|
page read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
3CA000
|
stack
|
page read and write
|
||
1E2D000
|
stack
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
4FDE000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
40A0000
|
direct allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
A57000
|
unkown
|
page write copy
|
||
423E000
|
direct allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
unkown
|
page readonly
|
||
3F40000
|
direct allocation
|
page read and write
|
||
40E0000
|
direct allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
5043000
|
heap
|
page read and write
|
||
B14000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
B0D000
|
trusted library allocation
|
page execute and read and write
|
||
DA5000
|
heap
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
3F00000
|
direct allocation
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
DD9000
|
stack
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
242C000
|
stack
|
page read and write
|
||
53AF000
|
stack
|
page read and write
|
||
15D4000
|
heap
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page execute and read and write
|
||
660000
|
unkown
|
page readonly
|
||
3BA2000
|
trusted library allocation
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
17DB000
|
heap
|
page read and write
|
||
ED5000
|
trusted library allocation
|
page execute and read and write
|
||
2B30000
|
heap
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4FE6000
|
trusted library allocation
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
640E000
|
stack
|
page read and write
|
||
13BC000
|
stack
|
page read and write
|
||
4B7C000
|
stack
|
page read and write
|
||
2F7E000
|
trusted library allocation
|
page read and write
|
||
B04000
|
trusted library allocation
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
9EA000
|
unkown
|
page execute and read and write
|
||
4023000
|
direct allocation
|
page read and write
|
||
4FD2000
|
trusted library allocation
|
page read and write
|
||
956000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
D44000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
A02000
|
unkown
|
page execute and write copy
|
||
FCE000
|
stack
|
page read and write
|
||
F98000
|
heap
|
page read and write
|
||
662000
|
unkown
|
page readonly
|
||
DCF000
|
heap
|
page read and write
|
||
F6B000
|
trusted library allocation
|
page execute and read and write
|
||
2A8D000
|
stack
|
page read and write
|
||
B37000
|
trusted library allocation
|
page execute and read and write
|
||
41CD000
|
direct allocation
|
page read and write
|
||
423E000
|
direct allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
234E000
|
stack
|
page read and write
|
||
2CC000
|
stack
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
1738000
|
heap
|
page read and write
|
||
D34000
|
trusted library allocation
|
page read and write
|
||
423E000
|
direct allocation
|
page read and write
|
||
A04000
|
unkown
|
page execute and read and write
|
||
4FE1000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page execute and read and write
|
||
8EE000
|
stack
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
6120000
|
trusted library allocation
|
page execute and read and write
|
||
180C000
|
heap
|
page read and write
|
||
427E000
|
direct allocation
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
D9D000
|
trusted library allocation
|
page execute and read and write
|
||
1675000
|
heap
|
page read and write
|
||
40E0000
|
direct allocation
|
page read and write
|
||
A57000
|
unkown
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
E2E000
|
stack
|
page read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
420D000
|
direct allocation
|
page read and write
|
||
9DE000
|
unkown
|
page execute and read and write
|
||
106D000
|
heap
|
page read and write
|
||
7FA000
|
stack
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
4E9F000
|
stack
|
page read and write
|
||
F67000
|
trusted library allocation
|
page execute and read and write
|
||
1860000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
3F00000
|
direct allocation
|
page read and write
|
||
B79000
|
stack
|
page read and write
|
||
D33000
|
trusted library allocation
|
page execute and read and write
|
||
EC2000
|
trusted library allocation
|
page read and write
|
||
628E000
|
stack
|
page read and write
|
||
4209000
|
direct allocation
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
17F9000
|
heap
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
4023000
|
direct allocation
|
page read and write
|
||
13FD000
|
stack
|
page read and write
|
||
4C10000
|
heap
|
page execute and read and write
|
||
74E000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
6100000
|
trusted library allocation
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
926000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
222E000
|
stack
|
page read and write
|
||
EC6000
|
trusted library allocation
|
page execute and read and write
|
||
163E000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page execute and read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
40A0000
|
direct allocation
|
page read and write
|
||
4FCB000
|
trusted library allocation
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
D4D000
|
trusted library allocation
|
page execute and read and write
|
||
25C0000
|
heap
|
page execute and read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
4209000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
A4F000
|
unkown
|
page execute and read and write
|
||
2F14000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page execute and read and write
|
||
2F8C000
|
trusted library allocation
|
page read and write
|
||
2F98000
|
trusted library allocation
|
page read and write
|
||
930000
|
unkown
|
page readonly
|
||
41C9000
|
direct allocation
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
40A0000
|
direct allocation
|
page read and write
|
||
B1D000
|
trusted library allocation
|
page execute and read and write
|
||
4FDA000
|
trusted library allocation
|
page read and write
|
||
40E0000
|
direct allocation
|
page read and write
|
||
16A8000
|
heap
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
41CD000
|
direct allocation
|
page read and write
|
||
D3D000
|
trusted library allocation
|
page execute and read and write
|
||
101B000
|
heap
|
page read and write
|
||
6110000
|
trusted library allocation
|
page execute and read and write
|
||
1160000
|
heap
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
6130000
|
trusted library allocation
|
page execute and read and write
|
||
2430000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
1003000
|
heap
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
107F000
|
heap
|
page read and write
|
||
D93000
|
trusted library allocation
|
page execute and read and write
|
||
28C0000
|
trusted library allocation
|
page execute and read and write
|
||
1098000
|
trusted library allocation
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
100C000
|
stack
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
66A000
|
unkown
|
page readonly
|
||
1757000
|
heap
|
page read and write
|
||
2F76000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
16C2000
|
heap
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
1725000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
427E000
|
direct allocation
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
4FF2000
|
trusted library allocation
|
page read and write
|
||
630E000
|
unkown
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
4023000
|
direct allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
5100000
|
heap
|
page execute and read and write
|
||
5040000
|
heap
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
7F870000
|
trusted library allocation
|
page execute and read and write
|
||
28BE000
|
stack
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
62CF000
|
unkown
|
page read and write
|
||
4063000
|
direct allocation
|
page read and write
|
||
4063000
|
direct allocation
|
page read and write
|
||
6750000
|
heap
|
page read and write
|
||
3B69000
|
trusted library allocation
|
page read and write
|
||
41CD000
|
direct allocation
|
page read and write
|
||
106B000
|
heap
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page execute and read and write
|
||
1724000
|
heap
|
page read and write
|
||
B03000
|
trusted library allocation
|
page execute and read and write
|
||
5D5C000
|
heap
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
ED2000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
3B41000
|
trusted library allocation
|
page read and write
|
||
420D000
|
direct allocation
|
page read and write
|
||
4209000
|
direct allocation
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
EBD000
|
trusted library allocation
|
page execute and read and write
|
||
1450000
|
heap
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page execute and read and write
|
||
644E000
|
stack
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page execute and read and write
|
||
4063000
|
direct allocation
|
page read and write
|
||
EDB000
|
trusted library allocation
|
page execute and read and write
|
||
3F00000
|
direct allocation
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
6109000
|
trusted library allocation
|
page read and write
|
||
660D000
|
stack
|
page read and write
|
||
5E5C000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
1724000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page execute and read and write
|
||
965000
|
heap
|
page read and write
|
||
4FCE000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
trusted library allocation
|
page execute and read and write
|
||
D8F000
|
heap
|
page read and write
|
||
A55000
|
unkown
|
page execute and write copy
|
||
CEE000
|
stack
|
page read and write
|
||
427E000
|
direct allocation
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
41C9000
|
direct allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
4FED000
|
trusted library allocation
|
page read and write
|
||
18B7000
|
heap
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
918000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
670C000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
41C9000
|
direct allocation
|
page read and write
|
||
B3B000
|
trusted library allocation
|
page execute and read and write
|
||
420D000
|
direct allocation
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
13DC000
|
stack
|
page read and write
|
||
A7A000
|
stack
|
page read and write
|
||
D7A000
|
heap
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
2F94000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
heap
|
page read and write
|
||
2F74000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
There are 297 hidden memdumps, click here to show them.