Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1Md4DEEyQN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1Md4DEEyQN.exe
|
"C:\Users\user\Desktop\1Md4DEEyQN.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\Desktop\1Md4DEEyQN.exe" "1Md4DEEyQN.exe" ENABLE
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
|||
https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
3.125.223.134
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.125.223.134
|
0.tcp.eu.ngrok.io
|
United States
|
||
3.125.209.94
|
unknown
|
United States
|
||
3.124.142.205
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
712000
|
unkown
|
page readonly
|
||
DF6000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
100A000
|
trusted library allocation
|
page execute and read and write
|
||
D00000
|
heap
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
5297000
|
heap
|
page read and write
|
||
1017000
|
trusted library allocation
|
page execute and read and write
|
||
F3E000
|
unkown
|
page read and write
|
||
5296000
|
heap
|
page read and write
|
||
3CC1000
|
trusted library allocation
|
page read and write
|
||
4D9C000
|
stack
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
5063000
|
heap
|
page read and write
|
||
5286000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
5295000
|
heap
|
page read and write
|
||
5286000
|
heap
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
D6D000
|
heap
|
page read and write
|
||
4F8C000
|
stack
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
1002000
|
trusted library allocation
|
page execute and read and write
|
||
D5B000
|
heap
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
102A000
|
trusted library allocation
|
page execute and read and write
|
||
AF6000
|
stack
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
5295000
|
heap
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
C6E000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
D8C000
|
heap
|
page read and write
|
||
104B000
|
trusted library allocation
|
page execute and read and write
|
||
500C000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
528A000
|
heap
|
page read and write
|
||
5048000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
5286000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
2D18000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
5299000
|
heap
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
D6D000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
D6F000
|
heap
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D52000
|
heap
|
page read and write
|
||
D56000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
5298000
|
heap
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
D86000
|
heap
|
page read and write
|
||
DD6000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
5281000
|
heap
|
page read and write
|
||
4CC8000
|
trusted library allocation
|
page read and write
|
||
101A000
|
trusted library allocation
|
page execute and read and write
|
||
5060000
|
heap
|
page read and write
|
||
FFA000
|
trusted library allocation
|
page execute and read and write
|
||
C9F000
|
heap
|
page read and write
|
||
5282000
|
heap
|
page read and write
|
||
D72000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page execute and read and write
|
||
D73000
|
heap
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
1047000
|
trusted library allocation
|
page execute and read and write
|
||
D0C000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
5296000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
D6D000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
D86000
|
heap
|
page read and write
|
||
FF2000
|
trusted library allocation
|
page execute and read and write
|
||
5640000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
D11000
|
heap
|
page read and write
|
||
7EEB0000
|
trusted library allocation
|
page execute and read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
D59000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
50E0000
|
unclassified section
|
page read and write
|
||
7AA000
|
stack
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
10A6000
|
heap
|
page read and write
|
||
D6D000
|
heap
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page execute and read and write
|
||
E3E000
|
unkown
|
page read and write
|
||
C68000
|
heap
|
page read and write
|
||
D59000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page execute and read and write
|
||
D7F000
|
heap
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
71C000
|
unkown
|
page readonly
|
||
5283000
|
heap
|
page read and write
|
||
B5B000
|
stack
|
page read and write
|
||
D8F000
|
heap
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
D1F000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
D87000
|
heap
|
page read and write
|
||
CFF000
|
heap
|
page read and write
|
||
5295000
|
heap
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
1156000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
D21000
|
heap
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
B53000
|
stack
|
page read and write
|
||
D84000
|
heap
|
page read and write
|
||
A5B000
|
stack
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
1022000
|
trusted library allocation
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
528D000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
D56000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
D59000
|
heap
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
D49000
|
heap
|
page read and write
|
||
11AF000
|
stack
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
5298000
|
heap
|
page read and write
|
||
4FCB000
|
stack
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
F7D000
|
stack
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
5286000
|
heap
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
D82000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
D21000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
5261000
|
heap
|
page read and write
|
||
5287000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
5287000
|
heap
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
1042000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page execute and read and write
|
||
D21000
|
heap
|
page read and write
|
||
D59000
|
heap
|
page read and write
|
||
5295000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
There are 208 hidden memdumps, click here to show them.