Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
m6tly2Aqw4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files\Common Files\System\symsrv.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\m6tly2Aqw4.exe
|
"C:\Users\user\Desktop\m6tly2Aqw4.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://5isohu.com/
|
unknown
|
||
http://www.aieov.com/#
|
unknown
|
||
http://www.aieov.com/
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows
|
RequireSignedAppInit_DLLs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows
|
AppInit_DLLs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Windows
|
LoadAppInit_DLLs
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
DD000
|
unkown
|
page execute and write copy
|
||
D89000
|
unkown
|
page execute and write copy
|
||
61C000
|
unkown
|
page execute and write copy
|
||
196000
|
unkown
|
page execute and write copy
|
||
30DB000
|
heap
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
61C000
|
unkown
|
page execute and write copy
|
||
3EC1000
|
direct allocation
|
page execute and read and write
|
||
14EE000
|
stack
|
page read and write
|
||
1002B000
|
unkown
|
page execute and read and write
|
||
152D000
|
stack
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
15FD000
|
stack
|
page read and write
|
||
822000
|
unkown
|
page execute and read and write
|
||
51000
|
unkown
|
page execute and write copy
|
||
363E000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
1002D000
|
unkown
|
page execute and write copy
|
||
51000
|
unkown
|
page execute and write copy
|
||
590000
|
unkown
|
page execute and write copy
|
||
367E000
|
stack
|
page read and write
|
||
3D10000
|
heap
|
page read and write
|
||
3ED0000
|
direct allocation
|
page execute and read and write
|
||
D89000
|
unkown
|
page execute and read and write
|
||
51000
|
unkown
|
page execute and write copy
|
||
3ED4000
|
direct allocation
|
page execute and read and write
|
||
182E000
|
stack
|
page read and write
|
||
135C000
|
stack
|
page read and write
|
||
6E5000
|
unkown
|
page execute and read and write
|
||
10001000
|
unkown
|
page execute and read and write
|
||
DA000
|
unkown
|
page execute and read and write
|
||
10025000
|
unkown
|
page execute and read and write
|
||
1001E000
|
unkown
|
page execute and read and write
|
||
163E000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page execute and write copy
|
||
4140000
|
heap
|
page read and write
|
||
792000
|
unkown
|
page execute and read and write
|
||
15A0000
|
heap
|
page read and write
|
||
3D00000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
3ED4000
|
direct allocation
|
page execute and read and write
|
||
6AF000
|
unkown
|
page execute and write copy
|
||
125C000
|
stack
|
page read and write
|
||
825000
|
unkown
|
page execute and read and write
|
||
14A0000
|
heap
|
page read and write
|
||
15A4000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page execute and write copy
|
||
B08000
|
unkown
|
page execute and read and write
|
||
1002F000
|
unkown
|
page read and write
|
||
78E000
|
unkown
|
page execute and read and write
|
||
50000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
50000
|
unkown
|
page readonly
|
||
163A000
|
heap
|
page read and write
|
||
3D90000
|
direct allocation
|
page execute and read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
6AF000
|
unkown
|
page execute and write copy
|
||
10020000
|
unkown
|
page execute and read and write
|
||
7A1000
|
unkown
|
page execute and read and write
|
||
590000
|
unkown
|
page execute and write copy
|
||
7EE30000
|
direct allocation
|
page execute and read and write
|
||
13C0000
|
heap
|
page read and write
|
||
3BC0000
|
direct allocation
|
page execute and read and write
|
||
15B0000
|
heap
|
page read and write
|
||
783000
|
unkown
|
page execute and read and write
|
||
3EC4000
|
direct allocation
|
page execute and read and write
|
||
1540000
|
heap
|
page read and write
|
||
3E90000
|
direct allocation
|
page execute and read and write
|
||
195000
|
unkown
|
page execute and read and write
|
There are 59 hidden memdumps, click here to show them.