Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://t.me/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://t.me/freakcodingspot
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://t.me/TheDyer
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://get.geH
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://get.geojs.io
|
unknown
|
||
https://api.tele
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://get.geojs.io
|
unknown
|
||
https://api.telegram.org/bot6217988193:AAFiJwdcFHDuCM08fAA_dnBQZGLDPSVjUQY/sendDocument
|
149.154.167.220
|
||
https://get.geojs.io/v1/ip/geo.json
|
104.26.0.100
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://t.me/webster480
|
unknown
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
||
get.geojs.io
|
104.26.0.100
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
104.26.0.100
|
get.geojs.io
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1E394D0B000
|
trusted library allocation
|
page read and write
|
||
1E393384000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1E3A5051000
|
trusted library allocation
|
page read and write
|
||
1E393440000
|
heap
|
page execute and read and write
|
||
1E3AD8C8000
|
heap
|
page read and write
|
||
1E3AD8A5000
|
heap
|
page read and write
|
||
1E3932D1000
|
heap
|
page read and write
|
||
1E394EEA000
|
trusted library allocation
|
page read and write
|
||
1E3AE680000
|
heap
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
1E3AD79D000
|
heap
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
1E3931F0000
|
heap
|
page read and write
|
||
1E3AD553000
|
heap
|
page read and write
|
||
1E3AD7D2000
|
heap
|
page read and write
|
||
1E3AD7C9000
|
heap
|
page read and write
|
||
1E394E73000
|
trusted library allocation
|
page read and write
|
||
7FF848F71000
|
trusted library allocation
|
page read and write
|
||
1E3AD5B0000
|
heap
|
page execute and read and write
|
||
1E3AD84B000
|
heap
|
page read and write
|
||
1E3AD7EE000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
1E3932F4000
|
heap
|
page read and write
|
||
1E393020000
|
unkown
|
page readonly
|
||
42B5DFE000
|
stack
|
page read and write
|
||
1E3AD8EC000
|
heap
|
page read and write
|
||
1E3AD48D000
|
heap
|
page read and write
|
||
1E3AD7A9000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
1E3932B0000
|
heap
|
page read and write
|
||
1E3AD690000
|
heap
|
page read and write
|
||
1E3AD8D8000
|
heap
|
page read and write
|
||
42B52FE000
|
stack
|
page read and write
|
||
42B4DEF000
|
stack
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1E394EC4000
|
trusted library allocation
|
page read and write
|
||
7FF848D9B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1E3AD800000
|
heap
|
page read and write
|
||
1E3AD770000
|
heap
|
page read and write
|
||
1E394E7B000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
1E3AD8DC000
|
heap
|
page read and write
|
||
42B5FFD000
|
stack
|
page read and write
|
||
7FF4D6120000
|
trusted library allocation
|
page execute and read and write
|
||
1E393020000
|
unkown
|
page readonly
|
||
1E3AD46E000
|
heap
|
page read and write
|
||
42B5BFE000
|
stack
|
page read and write
|
||
1E3AD885000
|
heap
|
page read and write
|
||
1E394DC6000
|
trusted library allocation
|
page read and write
|
||
42B53FF000
|
stack
|
page read and write
|
||
1E394CF9000
|
trusted library allocation
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
42B5CFD000
|
stack
|
page read and write
|
||
1E3A52E7000
|
trusted library allocation
|
page read and write
|
||
1E3AD868000
|
heap
|
page read and write
|
||
1E3A4EF9000
|
trusted library allocation
|
page read and write
|
||
1E395095000
|
trusted library allocation
|
page read and write
|
||
1E393250000
|
trusted library allocation
|
page read and write
|
||
1E394CF0000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
1E3AD496000
|
heap
|
page read and write
|
||
1E3AD881000
|
heap
|
page read and write
|
||
42B55FC000
|
stack
|
page read and write
|
||
1E3AD780000
|
heap
|
page read and write
|
||
1E394E82000
|
trusted library allocation
|
page read and write
|
||
7FF848D9D000
|
trusted library allocation
|
page execute and read and write
|
||
1E3AD915000
|
heap
|
page read and write
|
||
1E3AD48A000
|
heap
|
page read and write
|
||
1E393480000
|
heap
|
page read and write
|
||
42B50F3000
|
stack
|
page read and write
|
||
1E394EFA000
|
trusted library allocation
|
page read and write
|
||
1E393240000
|
heap
|
page read and write
|
||
42B56FE000
|
stack
|
page read and write
|
||
1E3A4EEC000
|
trusted library allocation
|
page read and write
|
||
1E3A4EDF000
|
trusted library allocation
|
page read and write
|
||
1E3932F1000
|
heap
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
1E3931D0000
|
heap
|
page read and write
|
||
1E394D25000
|
trusted library allocation
|
page read and write
|
||
1E3931B0000
|
heap
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
42B51FF000
|
stack
|
page read and write
|
||
1E3AD513000
|
heap
|
page read and write
|
||
1E3930D0000
|
heap
|
page read and write
|
||
1E393372000
|
heap
|
page read and write
|
||
1E393450000
|
trusted library allocation
|
page read and write
|
||
1E3AD895000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
1E3A4CB1000
|
trusted library allocation
|
page read and write
|
||
1E394E0E000
|
trusted library allocation
|
page read and write
|
||
1E39331E000
|
heap
|
page read and write
|
||
42B59FD000
|
stack
|
page read and write
|
||
1E3A4CF7000
|
trusted library allocation
|
page read and write
|
||
1E393387000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
1E3932DC000
|
heap
|
page read and write
|
||
1E3934E5000
|
heap
|
page read and write
|
||
1E394C91000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
1E3AD460000
|
heap
|
page read and write
|
||
1E3A4EE7000
|
trusted library allocation
|
page read and write
|
||
1E3AE691000
|
heap
|
page read and write
|
||
1E3AD816000
|
heap
|
page read and write
|
||
1E3934E0000
|
heap
|
page read and write
|
||
1E3AD874000
|
heap
|
page read and write
|
||
1E3A4CA0000
|
trusted library allocation
|
page read and write
|
||
1E3934EB000
|
heap
|
page read and write
|
||
1E3AD8F0000
|
heap
|
page read and write
|
||
1E3AD8CB000
|
heap
|
page read and write
|
||
42B54FE000
|
stack
|
page read and write
|
||
1E393270000
|
trusted library allocation
|
page read and write
|
||
1E394EC8000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
1E3A4C91000
|
trusted library allocation
|
page read and write
|
||
1E3AD535000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
1E3AD858000
|
heap
|
page read and write
|
||
1E3AD7B2000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1E39331C000
|
heap
|
page read and write
|
||
1E394CFB000
|
trusted library allocation
|
page read and write
|
||
1E3AD4CD000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
1E393245000
|
heap
|
page read and write
|
||
1E3AD7D7000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1E3A4EF3000
|
trusted library allocation
|
page read and write
|
||
1E3AD532000
|
heap
|
page read and write
|
||
1E3A50D7000
|
trusted library allocation
|
page read and write
|
||
1E3AD483000
|
heap
|
page read and write
|
||
1E3ACCC0000
|
trusted library allocation
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
1E394EB8000
|
trusted library allocation
|
page read and write
|
||
1E3932B6000
|
heap
|
page read and write
|
||
1E3AD789000
|
heap
|
page read and write
|
||
1E394D07000
|
trusted library allocation
|
page read and write
|
||
1E393370000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
1E3AD825000
|
heap
|
page read and write
|
||
42B60FE000
|
stack
|
page read and write
|
||
1E3AE69A000
|
heap
|
page read and write
|
||
42B57FE000
|
stack
|
page read and write
|
||
1E3AD4C1000
|
heap
|
page read and write
|
||
1E3AD7DD000
|
heap
|
page read and write
|
||
1E394EB6000
|
trusted library allocation
|
page read and write
|
||
42B58FE000
|
stack
|
page read and write
|
||
1E3A4ED9000
|
trusted library allocation
|
page read and write
|
||
42B5EFE000
|
stack
|
page read and write
|
||
1E3AD7B9000
|
heap
|
page read and write
|
||
1E3AD883000
|
heap
|
page read and write
|
||
1E393022000
|
unkown
|
page readonly
|
There are 146 hidden memdumps, click here to show them.