Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Rapid Test Installer.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Rapid Test Installer.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPFD9FC.tmp
|
PNG image data, 300 x 300, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpD3C0.tmp
|
ASCII text, with very long lines (1136), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpD3E0.tmp
|
ASCII text, with very long lines (1136), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Rapid Test Installer.exe
|
"C:\Users\user\Desktop\Rapid Test Installer.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://foo/Resources/app.Light.ico
|
unknown
|
||
http://foo/bar/resources/app.light.ico
|
unknown
|
||
http://defaultcontainer/StoreInstaller;component/Resources/app.Light.ico
|
unknown
|
||
http://defaultcontainer/StoreInstaller;component/Resources/Theme/Light.xaml
|
unknown
|
||
http://schemas.datacontract.org/
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
http://foo/Resources/StoreLogo.Light.png
|
unknown
|
||
http://schemas.datacontract.org/2004/07/
|
unknown
|
||
http://foo/bar/resources/storeapplist.light.png
|
unknown
|
||
http://schemas.datacontract.org/2004/07/StoreInstaller.Models
|
unknown
|
||
http://foo/Resources/StoreAppList.Light.png
|
unknown
|
||
http://defaultcontainer/StoreInstaller;component/Resources/StoreAppList.Light.png
|
unknown
|
||
http://foo/bar/resources/storelogo.light.png
|
unknown
|
||
http://defaultcontainer/StoreInstaller;component/Resources/StoreLogo.Light.png
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.w3.oh
|
unknown
|
There are 6 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Rapid Test Installer_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
|
Left
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
|
Top
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
214F9618000
|
heap
|
page read and write
|
||
D7B833E000
|
stack
|
page read and write
|
||
214F987A000
|
heap
|
page read and write
|
||
214FD8AC000
|
heap
|
page read and write
|
||
214FAC09000
|
heap
|
page read and write
|
||
214DF4A0000
|
trusted library allocation
|
page read and write
|
||
214F955E000
|
heap
|
page read and write
|
||
7FFD9B642000
|
trusted library allocation
|
page read and write
|
||
214FAB84000
|
heap
|
page read and write
|
||
D7B71FE000
|
stack
|
page read and write
|
||
214F9839000
|
heap
|
page read and write
|
||
214DF4B0000
|
heap
|
page read and write
|
||
214F0E7D000
|
trusted library allocation
|
page read and write
|
||
D7B7BF9000
|
stack
|
page read and write
|
||
214F952D000
|
heap
|
page read and write
|
||
7FFD9B897000
|
trusted library allocation
|
page read and write
|
||
214FD813000
|
heap
|
page read and write
|
||
7FFD9B69C000
|
trusted library allocation
|
page execute and read and write
|
||
214DF350000
|
heap
|
page read and write
|
||
214FAB8C000
|
heap
|
page read and write
|
||
214E1241000
|
trusted library allocation
|
page read and write
|
||
214FD903000
|
heap
|
page read and write
|
||
214E0E50000
|
heap
|
page execute and read and write
|
||
214DEF92000
|
unkown
|
page readonly
|
||
214DF6A0000
|
heap
|
page read and write
|
||
214DF150000
|
heap
|
page read and write
|
||
7FFD9B8E1000
|
trusted library allocation
|
page read and write
|
||
214DEF90000
|
unkown
|
page readonly
|
||
214E12C1000
|
trusted library allocation
|
page read and write
|
||
214DF390000
|
trusted library allocation
|
page read and write
|
||
7FFD9B653000
|
trusted library allocation
|
page read and write
|
||
214FAC01000
|
heap
|
page read and write
|
||
214FAC2F000
|
heap
|
page read and write
|
||
214E1304000
|
trusted library allocation
|
page read and write
|
||
214FD7BA000
|
heap
|
page read and write
|
||
D7B70FE000
|
stack
|
page read and write
|
||
7FFD9B893000
|
trusted library allocation
|
page read and write
|
||
214DF180000
|
heap
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page execute and read and write
|
||
214DF1EA000
|
heap
|
page read and write
|
||
214E0DD0000
|
trusted library section
|
page readonly
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
D7B7DFB000
|
stack
|
page read and write
|
||
214FDC32000
|
trusted library allocation
|
page read and write
|
||
214E1403000
|
trusted library allocation
|
page read and write
|
||
D7B7CFC000
|
stack
|
page read and write
|
||
7FFD9B6F6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B726000
|
trusted library allocation
|
page execute and read and write
|
||
214F9607000
|
heap
|
page read and write
|
||
214FAABD000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
214FAAA0000
|
heap
|
page read and write
|
||
214DF1BD000
|
heap
|
page read and write
|
||
214FD822000
|
heap
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
D7B6DEF000
|
stack
|
page read and write
|
||
214FD939000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
7FF442180000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B803000
|
trusted library allocation
|
page read and write
|
||
214FD924000
|
heap
|
page read and write
|
||
214F95D9000
|
heap
|
page read and write
|
||
214FD8CB000
|
heap
|
page read and write
|
||
214DF460000
|
heap
|
page read and write
|
||
214E13FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
214FD80A000
|
heap
|
page read and write
|
||
214FAC56000
|
heap
|
page read and write
|
||
7FFD9B8EF000
|
trusted library allocation
|
page read and write
|
||
D7B73FE000
|
stack
|
page read and write
|
||
214E10CF000
|
trusted library allocation
|
page read and write
|
||
214FD8A6000
|
heap
|
page read and write
|
||
7FFD9B8E3000
|
trusted library allocation
|
page read and write
|
||
D7B7F3D000
|
stack
|
page read and write
|
||
214DF6A5000
|
heap
|
page read and write
|
||
214FAADC000
|
heap
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page read and write
|
||
214DF660000
|
heap
|
page execute and read and write
|
||
214DF1A7000
|
heap
|
page read and write
|
||
214F9830000
|
heap
|
page read and write
|
||
214FAC98000
|
heap
|
page read and write
|
||
214DF130000
|
heap
|
page read and write
|
||
214E1302000
|
trusted library allocation
|
page read and write
|
||
D7B6D9E000
|
stack
|
page read and write
|
||
D7B7AF5000
|
stack
|
page read and write
|
||
D7B813E000
|
stack
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
D7B74FB000
|
stack
|
page read and write
|
||
214E12BD000
|
trusted library allocation
|
page read and write
|
||
214DF120000
|
heap
|
page read and write
|
||
214E123D000
|
trusted library allocation
|
page read and write
|
||
214F9542000
|
heap
|
page read and write
|
||
D7B803E000
|
stack
|
page read and write
|
||
7FFD9B644000
|
trusted library allocation
|
page read and write
|
||
D7B79FE000
|
stack
|
page read and write
|
||
214F9820000
|
heap
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
214FAB58000
|
heap
|
page read and write
|
||
D7B72FE000
|
stack
|
page read and write
|
||
7FFD9B82E000
|
trusted library allocation
|
page read and write
|
||
214E1225000
|
trusted library allocation
|
page read and write
|
||
214F9564000
|
heap
|
page read and write
|
||
D7B77FB000
|
stack
|
page read and write
|
||
214FAB79000
|
heap
|
page read and write
|
||
214FAB73000
|
heap
|
page read and write
|
||
214E0CC2000
|
heap
|
page read and write
|
||
214F953B000
|
heap
|
page read and write
|
||
214DF3B0000
|
trusted library allocation
|
page read and write
|
||
D7B7E3E000
|
stack
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
214F9520000
|
heap
|
page read and write
|
||
7FFD9B66B000
|
trusted library allocation
|
page execute and read and write
|
||
214FAADF000
|
heap
|
page read and write
|
||
D7B857C000
|
stack
|
page read and write
|
||
214FAC4A000
|
heap
|
page read and write
|
||
214FD88D000
|
heap
|
page read and write
|
||
214FD7C0000
|
heap
|
page read and write
|
||
214FD7BD000
|
heap
|
page read and write
|
||
214FD81C000
|
heap
|
page read and write
|
||
214E0E61000
|
trusted library allocation
|
page read and write
|
||
D7B867D000
|
stack
|
page read and write
|
||
214FD8F8000
|
heap
|
page read and write
|
||
214FABFA000
|
heap
|
page read and write
|
||
214FD87B000
|
heap
|
page read and write
|
||
214F0E61000
|
trusted library allocation
|
page read and write
|
||
214E12EF000
|
trusted library allocation
|
page read and write
|
||
214FAAF1000
|
heap
|
page read and write
|
||
214FAAB7000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
214F9582000
|
heap
|
page read and write
|
||
7FFD9B65B000
|
trusted library allocation
|
page read and write
|
||
214DF07C000
|
unkown
|
page readonly
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page execute and read and write
|
||
214FD910000
|
heap
|
page read and write
|
||
214FD7D2000
|
heap
|
page read and write
|
||
214FAB42000
|
heap
|
page read and write
|
||
214E1147000
|
trusted library allocation
|
page read and write
|
||
214FD8D6000
|
heap
|
page read and write
|
||
214F9633000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
214DF480000
|
heap
|
page read and write
|
||
214FD8C9000
|
heap
|
page read and write
|
||
214FABFD000
|
heap
|
page read and write
|
||
214FAC6B000
|
heap
|
page read and write
|
||
214FAC6E000
|
heap
|
page read and write
|
||
7FFD9B643000
|
trusted library allocation
|
page execute and read and write
|
||
214FAC9E000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
214FAAED000
|
heap
|
page read and write
|
||
214F956D000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
214F9612000
|
heap
|
page read and write
|
||
214F8E60000
|
trusted library allocation
|
page read and write
|
||
214DF395000
|
trusted library allocation
|
page read and write
|
||
214F9545000
|
heap
|
page read and write
|
||
214FD8E0000
|
heap
|
page read and write
|
||
214E0F7F000
|
trusted library allocation
|
page read and write
|
||
214FD866000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8DC000
|
trusted library allocation
|
page read and write
|
||
D7B877E000
|
stack
|
page read and write
|
||
214E10CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8EB000
|
trusted library allocation
|
page read and write
|
||
214FD7E0000
|
heap
|
page read and write
|
||
214F8E90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F2000
|
trusted library allocation
|
page read and write
|
||
214FAAF9000
|
heap
|
page read and write
|
||
214E132A000
|
trusted library allocation
|
page read and write
|
||
214E12AF000
|
trusted library allocation
|
page read and write
|
||
214F9522000
|
heap
|
page read and write
|
||
214FAB49000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
214FAC85000
|
heap
|
page read and write
|
||
214E1328000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
214FD876000
|
heap
|
page read and write
|
||
214DF219000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
214F957F000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B64D000
|
trusted library allocation
|
page execute and read and write
|
||
214FD8F5000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
214DF1EC000
|
heap
|
page read and write
|
||
214FAAC2000
|
heap
|
page read and write
|
||
7FFD9B65D000
|
trusted library allocation
|
page execute and read and write
|
||
214DF252000
|
heap
|
page read and write
|
||
D7B78FB000
|
stack
|
page read and write
|
||
214FAC14000
|
heap
|
page read and write
|
||
214F9630000
|
heap
|
page read and write
|
||
214DF1BF000
|
heap
|
page read and write
|
||
214FAB61000
|
heap
|
page read and write
|
||
214F98BB000
|
heap
|
page read and write
|
||
D7B843B000
|
stack
|
page read and write
|
||
214F9860000
|
heap
|
page read and write
|
||
214DEF90000
|
unkown
|
page readonly
|
||
D7B823D000
|
stack
|
page read and write
|
||
214F9810000
|
heap
|
page execute and read and write
|
||
214F9540000
|
heap
|
page read and write
|
||
7FFD9B8B8000
|
trusted library allocation
|
page read and write
|
||
D7B847E000
|
stack
|
page read and write
|
||
D7B76FE000
|
stack
|
page read and write
|
||
214FAAD7000
|
heap
|
page read and write
|
||
214F9867000
|
heap
|
page read and write
|
||
214FAACA000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
214FAAE7000
|
heap
|
page read and write
|
||
7FFD9B7F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82A000
|
trusted library allocation
|
page read and write
|
||
D7B75FE000
|
stack
|
page read and write
|
||
214FAABA000
|
heap
|
page read and write
|
||
214FD85D000
|
heap
|
page read and write
|
||
214DF4B5000
|
heap
|
page read and write
|
||
214F985D000
|
heap
|
page read and write
|
||
214FD818000
|
heap
|
page read and write
|
||
214FAADA000
|
heap
|
page read and write
|
||
214FAC0E000
|
heap
|
page read and write
|
||
7FFD9B83B000
|
trusted library allocation
|
page read and write
|
||
D7B887B000
|
stack
|
page read and write
|
||
214FAB2F000
|
heap
|
page read and write
|
||
214FD7E8000
|
heap
|
page read and write
|
||
214E1326000
|
trusted library allocation
|
page read and write
|
||
214FD6E0000
|
heap
|
page read and write
|
||
214E1151000
|
trusted library allocation
|
page read and write
|
||
214F9813000
|
heap
|
page execute and read and write
|
There are 219 hidden memdumps, click here to show them.