Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
17304785458593769886a354fbce7baa74763cdd4a7b5002da27c7b9fc27af676129226c18112.dat-decoded.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\x-manager.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x-manager.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Nov 1 15:30:59
2024, mtime=Fri Nov 1 15:30:59 2024, atime=Fri Nov 1 15:30:59 2024, length=154624, window=hide
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\17304785458593769886a354fbce7baa74763cdd4a7b5002da27c7b9fc27af676129226c18112.dat-decoded.exe
|
"C:\Users\user\Desktop\17304785458593769886a354fbce7baa74763cdd4a7b5002da27c7b9fc27af676129226c18112.dat-decoded.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
browser-hazard.gl.at.ply.gg
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
browser-hazard.gl.at.ply.gg
|
147.185.221.23
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.23
|
browser-hazard.gl.at.ply.gg
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C52000
|
unkown
|
page readonly
|
||
13048000
|
trusted library allocation
|
page read and write
|
||
104C000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1063000
|
heap
|
page read and write
|
||
7FF4C8DF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1B5CC000
|
stack
|
page read and write
|
||
DB1000
|
stack
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
C5C000
|
unkown
|
page readonly
|
||
1C25A000
|
stack
|
page read and write
|
||
10CD000
|
heap
|
page read and write
|
||
1C420000
|
heap
|
page read and write
|
||
1BABF000
|
heap
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
13074000
|
trusted library allocation
|
page read and write
|
||
1BD5E000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
1250000
|
heap
|
page read and write
|
||
1BA50000
|
heap
|
page execute and read and write
|
||
1BAE0000
|
heap
|
page read and write
|
||
1123000
|
heap
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1C155000
|
stack
|
page read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
2E60000
|
heap
|
page read and write
|
||
1BAEA000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
1B3C7000
|
heap
|
page read and write
|
||
14B3000
|
trusted library allocation
|
page read and write
|
||
1CA1A000
|
stack
|
page read and write
|
||
2E63000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
10D4000
|
heap
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1BE5E000
|
stack
|
page read and write
|
||
1C354000
|
stack
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
1BACD000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
2E10000
|
heap
|
page read and write
|
||
1C91B000
|
stack
|
page read and write
|
||
1BA60000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
1C81C000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
1BF5F000
|
stack
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
1505000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page execute and read and write
|
||
1083000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
1500000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
10BB000
|
heap
|
page read and write
|
||
10AD000
|
heap
|
page read and write
|
||
145C000
|
stack
|
page read and write
|
||
1B070000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
13077000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
13041000
|
trusted library allocation
|
page read and write
|
||
111D000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1BB0B000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
There are 80 hidden memdumps, click here to show them.