Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MT Marine Tiger.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MT Marine Tiger._b1fc61aa0f0ff659922dc1f816562af76c8bcc3_d4dd14a2_f9207a17-8494-4b79-9815-4bb98abb0750\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DB1.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sun Jun 30 15:19:54 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EEB.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F3A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\regasm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MT Marine Tiger.exe
|
"C:\Users\user\Desktop\MT Marine Tiger.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1968 -s 1044
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\choice.exe
|
choice /C Y /N /D Y /T 3
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
ProgramId
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
FileId
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
LowerCaseLongPath
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
LongPathHash
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
Name
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
OriginalFileName
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
Publisher
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
Version
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
BinFileVersion
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
BinaryType
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
ProductName
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
ProductVersion
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
LinkDate
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
BinProductVersion
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
AppxPackageFullName
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
Size
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
Language
|
||
\REGISTRY\A\{402dac20-87bc-72d5-0f64-5abc90269c4e}\Root\InventoryApplicationFile\mt marine tiger.|c67994ed4091bb00
|
Usn
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
20D0FBB7000
|
trusted library allocation
|
page read and write
|
||
20D1FD68000
|
trusted library allocation
|
page read and write
|
||
20D0FEBB000
|
trusted library allocation
|
page read and write
|
||
660F000
|
stack
|
page read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
2B90000
|
heap
|
page read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
6FED000
|
stack
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
20D0FB9C000
|
trusted library allocation
|
page read and write
|
||
326A000
|
trusted library allocation
|
page read and write
|
||
20D0E113000
|
trusted library allocation
|
page read and write
|
||
FF7000
|
stack
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
3263000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
15E6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
20D27BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
20D28310000
|
heap
|
page read and write
|
||
4E8ECFF000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
20D0DE70000
|
heap
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
20D1FB81000
|
trusted library allocation
|
page read and write
|
||
3247000
|
trusted library allocation
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
2804000
|
heap
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
7FFD34944000
|
trusted library allocation
|
page read and write
|
||
4E8F2FE000
|
stack
|
page read and write
|
||
5649000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
20D0E1D0000
|
heap
|
page execute and read and write
|
||
20D0E080000
|
heap
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
50DC000
|
stack
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
40C9000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
57D0000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
1692000
|
heap
|
page read and write
|
||
20D0DEB0000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
1397000
|
heap
|
page read and write
|
||
20D0DDE0000
|
unkown
|
page readonly
|
||
1370000
|
heap
|
page read and write
|
||
20D0DEF2000
|
heap
|
page read and write
|
||
4E8EDFF000
|
stack
|
page read and write
|
||
7FFD347B4000
|
trusted library allocation
|
page read and write
|
||
317E000
|
trusted library allocation
|
page read and write
|
||
64CE000
|
stack
|
page read and write
|
||
10C000
|
stack
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
5B7D000
|
stack
|
page read and write
|
||
15EA000
|
trusted library allocation
|
page execute and read and write
|
||
56EE000
|
stack
|
page read and write
|
||
16F2000
|
heap
|
page read and write
|
||
650D000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5646000
|
trusted library allocation
|
page read and write
|
||
31E6000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
4E8F3FD000
|
stack
|
page read and write
|
||
20D0FB81000
|
trusted library allocation
|
page read and write
|
||
5C7F000
|
stack
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
31E2000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
20D0E0E0000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
stack
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
20D0DF23000
|
heap
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
2803000
|
heap
|
page read and write
|
||
20D0DE80000
|
heap
|
page read and write
|
||
160B000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
6EEC000
|
stack
|
page read and write
|
||
20D0FB70000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
2D4E000
|
unkown
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
29DF000
|
unkown
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
22AD000
|
stack
|
page read and write
|
||
7FFD34949000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
heap
|
page execute and read and write
|
||
15FB000
|
trusted library allocation
|
page execute and read and write
|
||
702D000
|
stack
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
5624000
|
trusted library allocation
|
page read and write
|
||
20D0DDE2000
|
unkown
|
page readonly
|
||
6EAF000
|
stack
|
page read and write
|
||
4E8EFFB000
|
stack
|
page read and write
|
||
20D28359000
|
heap
|
page read and write
|
||
4E8EEFE000
|
stack
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
20D0E250000
|
heap
|
page read and write
|
||
27EC000
|
heap
|
page read and write
|
||
20D0E165000
|
heap
|
page read and write
|
||
3211000
|
trusted library allocation
|
page read and write
|
||
4E8F0FE000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
13ED000
|
trusted library allocation
|
page execute and read and write
|
||
20D0DF1A000
|
heap
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
3256000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
7FF4F2D70000
|
trusted library allocation
|
page execute and read and write
|
||
6D0F000
|
stack
|
page read and write
|
||
31EE000
|
trusted library allocation
|
page read and write
|
||
20D0DEBC000
|
heap
|
page read and write
|
||
2558000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
3162000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
3086000
|
trusted library allocation
|
page read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
67A6000
|
heap
|
page read and write
|
||
4E8EAF3000
|
stack
|
page read and write
|
||
20D0DF1C000
|
heap
|
page read and write
|
||
243E000
|
stack
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
20D0E255000
|
heap
|
page read and write
|
||
20D28240000
|
trusted library section
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
247F000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
5655000
|
trusted library allocation
|
page read and write
|
||
273E000
|
unkown
|
page read and write
|
||
31DE000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
40A7000
|
trusted library allocation
|
page read and write
|
||
3090000
|
heap
|
page execute and read and write
|
||
3060000
|
trusted library allocation
|
page execute and read and write
|
||
20D1FB87000
|
trusted library allocation
|
page read and write
|
||
13E4000
|
trusted library allocation
|
page read and write
|
||
23AC000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
15F7000
|
trusted library allocation
|
page execute and read and write
|
||
20D1FF3C000
|
trusted library allocation
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
63CE000
|
stack
|
page read and write
|
||
7FFD3497D000
|
trusted library allocation
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page execute and read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
40A1000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
6750000
|
heap
|
page read and write
|
||
20D0E0A0000
|
heap
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
20D0E100000
|
trusted library allocation
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
20D0DEEF000
|
heap
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
6BCF000
|
stack
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
252F000
|
stack
|
page read and write
|
||
5CBD000
|
stack
|
page read and write
|
||
20D0E110000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
20D0DEDA000
|
heap
|
page read and write
|
||
4E8F1FE000
|
stack
|
page read and write
|
||
13E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
20D0E160000
|
heap
|
page read and write
|
||
15E2000
|
trusted library allocation
|
page read and write
|
||
562E000
|
trusted library allocation
|
page read and write
|
||
314D000
|
trusted library allocation
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
4E8EBFF000
|
stack
|
page read and write
|
||
1639000
|
heap
|
page read and write
|
||
31F6000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
67A8000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
3243000
|
trusted library allocation
|
page read and write
|
||
20D28300000
|
heap
|
page execute and read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
3203000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
31F2000
|
trusted library allocation
|
page read and write
|
||
51DC000
|
stack
|
page read and write
|
||
20D0DF8B000
|
heap
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
There are 215 hidden memdumps, click here to show them.