Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\7jgFDJY46m.exe
|
"C:\Users\user\Desktop\7jgFDJY46m.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /delete /tn CleanSweepCheck /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /sc minute /mo 1 /tn CleanSweepCheck /tr C:\Users\user\Desktop\7jgFDJY46m.exe
|
||
C:\Windows\SysWOW64\reg.exe
|
reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
|
||
C:\Users\user\Desktop\7jgFDJY46m.exe
|
C:\Users\user\Desktop\7jgFDJY46m.exe
|
||
C:\Users\user\Desktop\7jgFDJY46m.exe
|
C:\Users\user\Desktop\7jgFDJY46m.exe
|
||
C:\Users\user\Desktop\7jgFDJY46m.exe
|
C:\Users\user\Desktop\7jgFDJY46m.exe
|
||
C:\Users\user\Desktop\7jgFDJY46m.exe
|
C:\Users\user\Desktop\7jgFDJY46m.exe
|
||
C:\Users\user\Desktop\7jgFDJY46m.exe
|
C:\Users\user\Desktop\7jgFDJY46m.exe
|
||
C:\Windows\SysWOW64\attrib.exe
|
attrib +h "C:\Users\user\Desktop\7jgFDJY46m.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c reg ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://go.microsoft.
|
unknown
|
||
http://go.microsoft.LinkId=42127
|
unknown
|
||
https://pastebin.com/raw/???
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
area-paid.gl.at.ply.gg
|
147.185.221.23
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.23
|
area-paid.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_CURRENT_USER\SOFTWARE\59211d537036a82f5e7ec159326cddf1
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
EC2000
|
unkown
|
page readonly
|
||
17EA000
|
trusted library allocation
|
page execute and read and write
|
||
590E000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
17DA000
|
trusted library allocation
|
page execute and read and write
|
||
2988000
|
heap
|
page read and write
|
||
17E7000
|
trusted library allocation
|
page execute and read and write
|
||
57C3000
|
heap
|
page read and write
|
||
3245000
|
heap
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
602A000
|
stack
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
285F000
|
stack
|
page read and write
|
||
23BD000
|
stack
|
page read and write
|
||
322C000
|
heap
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
2A5A000
|
heap
|
page read and write
|
||
16AF000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
34A000
|
stack
|
page read and write
|
||
2E5D000
|
stack
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
30D000
|
stack
|
page read and write
|
||
165D000
|
heap
|
page read and write
|
||
17FA000
|
trusted library allocation
|
page execute and read and write
|
||
57A0000
|
trusted library allocation
|
page execute and read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
6318000
|
heap
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
341F000
|
unkown
|
page read and write
|
||
555C000
|
stack
|
page read and write
|
||
17D2000
|
trusted library allocation
|
page execute and read and write
|
||
5C0000
|
heap
|
page read and write
|
||
30CE000
|
unkown
|
page read and write
|
||
3578000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
58B0000
|
unclassified section
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
1802000
|
trusted library allocation
|
page read and write
|
||
3735000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
25F0000
|
heap
|
page read and write
|
||
62FD000
|
heap
|
page read and write
|
||
580C000
|
stack
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
1800000
|
trusted library allocation
|
page read and write
|
||
27BF000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
55C000
|
stack
|
page read and write
|
||
15B3000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
256F000
|
unkown
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
F6A000
|
stack
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
17C2000
|
trusted library allocation
|
page execute and read and write
|
||
3220000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
169C000
|
heap
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page read and write
|
||
5A0F000
|
stack
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
5E00000
|
heap
|
page read and write
|
||
283F000
|
stack
|
page read and write
|
||
25AE000
|
stack
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
5849000
|
stack
|
page read and write
|
||
25F7000
|
heap
|
page read and write
|
||
1807000
|
trusted library allocation
|
page execute and read and write
|
||
3243000
|
heap
|
page read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page execute and read and write
|
||
1888000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page execute and read and write
|
||
2980000
|
heap
|
page read and write
|
||
574C000
|
stack
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page execute and read and write
|
||
180B000
|
trusted library allocation
|
page execute and read and write
|
||
62D0000
|
trusted library allocation
|
page execute and read and write
|
||
5EE0000
|
heap
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
1CE000
|
unkown
|
page read and write
|
||
16A8000
|
heap
|
page read and write
|
||
7F5D0000
|
trusted library allocation
|
page execute and read and write
|
||
15CE000
|
heap
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
51D000
|
stack
|
page read and write
|
||
83E000
|
unkown
|
page read and write
|
||
5F2B000
|
stack
|
page read and write
|
||
140000
|
heap
|
page read and write
|
||
2A57000
|
heap
|
page read and write
|
||
4521000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
62F0000
|
heap
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
17CA000
|
trusted library allocation
|
page execute and read and write
|
||
1926000
|
heap
|
page read and write
|
||
6325000
|
heap
|
page read and write
|
||
16BE000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
23FD000
|
stack
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
578A000
|
stack
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
290A000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
25EF000
|
stack
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
258F000
|
unkown
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
3521000
|
trusted library allocation
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
17F2000
|
trusted library allocation
|
page execute and read and write
|
||
5E10000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
3FE000
|
unkown
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
87F000
|
unkown
|
page read and write
|
There are 134 hidden memdumps, click here to show them.