Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
55ryoipjfdr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\winapp\client_id
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\winapp\group_tag
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\55ryoipjfdr.exe
|
"C:\Users\user\Desktop\55ryoipjfdr.exe"
|
||
C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
|
C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
|
||
C:\Windows\System32\svchost.exe
|
svchost.exe -k netsvcs
|
||
C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
|
C:\Users\user\AppData\Roaming\winapp\44qxnhoiecq.exe
|
||
C:\Windows\System32\svchost.exe
|
svchost.exe -k netsvcs
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
|
194.87.99.210
|
||
https://194.87.95.122/
|
unknown
|
||
https://194.87.95.122:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
|
unknown
|
||
https://194.87.99.210/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/u
|
unknown
|
||
https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
|
unknown
|
||
https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/
|
unknown
|
||
https://194.87.99.210/
|
unknown
|
||
https://194.87.95.122/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/H
|
unknown
|
||
https://194.87.99.210:443/mac1/530978_W10019045.DA5B53966FEFB74C898363C3EE618EB5/5/spk/pD
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.ipify.org
|
104.26.12.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
178.156.202.97
|
unknown
|
Romania
|
||
194.87.99.62
|
unknown
|
Russian Federation
|
||
194.87.146.180
|
unknown
|
Russian Federation
|
||
194.87.111.6
|
unknown
|
Russian Federation
|
||
194.87.95.122
|
unknown
|
Russian Federation
|
||
147.135.196.128
|
unknown
|
France
|
||
195.133.147.135
|
unknown
|
Russian Federation
|
||
195.133.197.187
|
unknown
|
Russian Federation
|
||
194.87.99.210
|
unknown
|
Russian Federation
|
||
185.15.245.102
|
unknown
|
Germany
|
||
185.15.245.103
|
unknown
|
Germany
|
||
194.87.95.120
|
unknown
|
Russian Federation
|
||
185.158.113.62
|
unknown
|
Russian Federation
|
||
194.87.239.114
|
unknown
|
Russian Federation
|
||
195.133.48.80
|
unknown
|
Russian Federation
|
||
194.87.99.220
|
unknown
|
Russian Federation
|
||
169.239.129.42
|
unknown
|
Seychelles
|
||
193.19.118.207
|
unknown
|
Russian Federation
|
||
91.83.88.51
|
unknown
|
Hungary
|
||
199.48.160.60
|
unknown
|
United States
|
||
94.242.224.218
|
unknown
|
Luxembourg
|
||
104.26.12.205
|
api.ipify.org
|
United States
|
There are 12 hidden IPs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
159F2A13000
|
heap
|
page read and write
|
||
1DD0F013000
|
heap
|
page read and write
|
||
3330177000
|
stack
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
7D0000
|
direct allocation
|
page read and write
|
||
159F3410000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
1DD0F031000
|
heap
|
page read and write
|
||
140000000
|
remote allocation
|
page readonly
|
||
6AF000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
159F2A92000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
8F1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
159F2A2F000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
159F3440000
|
heap
|
page read and write
|
||
4C0000
|
direct allocation
|
page execute and read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
159F371E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
861000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
1DD0EE20000
|
remote allocation
|
page execute and read and write
|
||
861000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
861000
|
heap
|
page read and write
|
||
159F3600000
|
heap
|
page read and write
|
||
140019000
|
remote allocation
|
page readonly
|
||
544000
|
heap
|
page read and write
|
||
140001000
|
remote allocation
|
page execute read
|
||
951000
|
heap
|
page read and write
|
||
7C0000
|
direct allocation
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
33307FF000
|
stack
|
page read and write
|
||
159F3460000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
159F2A57000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
159F2AA0000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
159F3800000
|
trusted library allocation
|
page read and write
|
||
33304FB000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
159F2AEA000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
159F2A90000
|
heap
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page readonly
|
||
159F2A6A000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
232F000
|
stack
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
9C000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
870000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
10004000
|
direct allocation
|
page readonly
|
||
500000
|
heap
|
page read and write
|
||
140021000
|
remote allocation
|
page readonly
|
||
10004000
|
direct allocation
|
page readonly
|
||
951000
|
heap
|
page read and write
|
||
159F3430000
|
heap
|
page read and write
|
||
7B0000
|
direct allocation
|
page execute and read and write
|
||
951000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
159F2A00000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
159F2AB9000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
159F2A77000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
159F2A84000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
952000
|
heap
|
page read and write
|
||
1DD0F002000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
1DD0EE40000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8F1000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
159F30B0000
|
remote allocation
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page readonly
|
||
861000
|
heap
|
page read and write
|
||
159F3450000
|
heap
|
page read and write
|
||
159F30B0000
|
remote allocation
|
page read and write
|
||
159F2AFA000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
4D0000
|
direct allocation
|
page execute and read and write
|
||
412000
|
unkown
|
page write copy
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
1DD0F102000
|
heap
|
page read and write
|
||
7AF000
|
stack
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
33301FE000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
33305FC000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
58A000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
1DD0EE60000
|
heap
|
page read and write
|
||
140001000
|
remote allocation
|
page execute read
|
||
861000
|
heap
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
952000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
159F2A71000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
159F2A40000
|
heap
|
page read and write
|
||
159F3706000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page readonly
|
||
404000
|
unkown
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
950000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
1DD0F000000
|
heap
|
page read and write
|
||
1DD0EF60000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
159F2A46000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page readonly
|
||
159F28A0000
|
remote allocation
|
page execute and read and write
|
||
861000
|
heap
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
B25F727000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
B25F72D000
|
stack
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
140020000
|
remote allocation
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
159F30B0000
|
remote allocation
|
page read and write
|
||
159F3470000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
140021000
|
remote allocation
|
page readonly
|
||
8F1000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
159F3700000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
140020000
|
remote allocation
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
159F2AA7000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page readonly
|
||
159F3420000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
159F2ADB000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page readonly
|
||
B0F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
B25FA7F000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
333047E000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
159F2A0B000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
10005000
|
direct allocation
|
page read and write
|
||
233F000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
159F3716000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
159F3602000
|
heap
|
page read and write
|
||
6B0000
|
direct allocation
|
page execute and read and write
|
||
861000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
159F28E0000
|
heap
|
page read and write
|
||
1DD0F033000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
8F1000
|
heap
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
159F2AC0000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
403000
|
unkown
|
page readonly
|
||
951000
|
heap
|
page read and write
|
||
1DD0F02F000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
159F2A3A000
|
heap
|
page read and write
|
||
88E000
|
unkown
|
page read and write
|
||
33306FF000
|
stack
|
page read and write
|
||
333057D000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
159F35D4000
|
trusted library allocation
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
B25F7AE000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
159F2B02000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
10004000
|
direct allocation
|
page readonly
|
||
5A7000
|
heap
|
page read and write
|
||
159F29E0000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
140019000
|
remote allocation
|
page readonly
|
||
85E000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
10004000
|
direct allocation
|
page readonly
|
||
861000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
159F28C0000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
A80000
|
heap
|
page read and write
|
||
140000000
|
remote allocation
|
page readonly
|
||
10005000
|
direct allocation
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
10006000
|
direct allocation
|
page readonly
|
||
951000
|
heap
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page readonly
|
||
6C0000
|
direct allocation
|
page execute and read and write
|
||
951000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
951000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
159F3702000
|
heap
|
page read and write
|
There are 313 hidden memdumps, click here to show them.