Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\PID8.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\kms.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\LIC_SWITCH.log
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log
|
||
C:\Windows\System32\cscript.exe
|
cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://autohotkey.com
|
unknown
|
||
https://autohotkey.comCould
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3184000
|
trusted library allocation
|
page read and write
|
||
1EC2A809000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
1EC2A849000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4A0000
|
unkown
|
page execute and read and write
|
||
110000
|
heap
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
135000
|
heap
|
page read and write
|
||
48369FE000
|
stack
|
page read and write
|
||
1EC2A844000
|
heap
|
page read and write
|
||
B68000
|
heap
|
page read and write
|
||
1EC2A85B000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
1EC2A840000
|
heap
|
page read and write
|
||
1EC2A84A000
|
heap
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
1EC2A864000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
1EC2A84F000
|
heap
|
page read and write
|
||
1EC2A81B000
|
heap
|
page read and write
|
||
586F000
|
stack
|
page read and write
|
||
2D58000
|
heap
|
page read and write
|
||
483611A000
|
stack
|
page read and write
|
||
1EC2A80A000
|
heap
|
page read and write
|
||
1EC2A84D000
|
heap
|
page read and write
|
||
1EC2C600000
|
heap
|
page read and write
|
||
4E9000
|
unkown
|
page execute and read and write
|
||
1EC2A85E000
|
heap
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
1EC2A7E8000
|
heap
|
page read and write
|
||
1EC2AB15000
|
heap
|
page read and write
|
||
1EC2A770000
|
heap
|
page read and write
|
||
48364FE000
|
stack
|
page read and write
|
||
1EC2A850000
|
heap
|
page read and write
|
||
1EC2A83D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
64E000
|
unkown
|
page write copy
|
||
4836BFF000
|
stack
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
1EC2A85D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1EC2A844000
|
heap
|
page read and write
|
||
1EC2A848000
|
heap
|
page read and write
|
||
A5A000
|
stack
|
page read and write
|
||
1EC2A83D000
|
heap
|
page read and write
|
||
4C4000
|
unkown
|
page execute and read and write
|
||
2D50000
|
heap
|
page read and write
|
||
542F000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1EC2A831000
|
heap
|
page read and write
|
||
1EC2A861000
|
heap
|
page read and write
|
||
B8A000
|
heap
|
page read and write
|
||
48365FE000
|
stack
|
page read and write
|
||
1EC2A858000
|
heap
|
page read and write
|
||
A63000
|
stack
|
page read and write
|
||
1EC2A863000
|
heap
|
page read and write
|
||
1EC2A84F000
|
heap
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
1EC2A81E000
|
heap
|
page read and write
|
||
1EC2A858000
|
heap
|
page read and write
|
||
1EC2A83E000
|
heap
|
page read and write
|
||
1EC2A800000
|
heap
|
page read and write
|
||
64E000
|
unkown
|
page read and write
|
||
1EC2A84F000
|
heap
|
page read and write
|
||
1EC2A844000
|
heap
|
page read and write
|
||
1EC2A832000
|
heap
|
page read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
1EC2A740000
|
heap
|
page read and write
|
||
1EC2A816000
|
heap
|
page read and write
|
||
1EC2A857000
|
heap
|
page read and write
|
||
1EC2A868000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
1EC2A815000
|
heap
|
page read and write
|
||
1EC2A750000
|
heap
|
page read and write
|
||
A55000
|
stack
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
1EC2A7F2000
|
heap
|
page read and write
|
||
1EC2A86B000
|
heap
|
page read and write
|
||
1EC2A85D000
|
heap
|
page read and write
|
||
48367FE000
|
stack
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
4CF000
|
unkown
|
page execute and read and write
|
||
1EC2A85F000
|
heap
|
page read and write
|
||
150A000
|
heap
|
page read and write
|
||
A32000
|
stack
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
1EC2A7E0000
|
heap
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
64D000
|
unkown
|
page execute and write copy
|
||
B8A000
|
heap
|
page read and write
|
||
1EC2A83D000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
48368FE000
|
stack
|
page read and write
|
||
1EC2A844000
|
heap
|
page read and write
|
||
1EC2A852000
|
heap
|
page read and write
|
||
1EC2A85A000
|
heap
|
page read and write
|
||
1EC2AB10000
|
heap
|
page read and write
|
||
1EC2A7D0000
|
heap
|
page read and write
|
||
B81000
|
heap
|
page read and write
|
||
4836AFF000
|
stack
|
page read and write
|
||
B8B000
|
heap
|
page read and write
|
||
4D0000
|
unkown
|
page execute and write copy
|
||
A68000
|
stack
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
1EC2A85D000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
A42000
|
stack
|
page read and write
|
||
BAC000
|
heap
|
page read and write
|
||
1EC2A7FC000
|
heap
|
page read and write
|
||
1EC2A846000
|
heap
|
page read and write
|
||
1EC2A868000
|
heap
|
page read and write
|
There are 112 hidden memdumps, click here to show them.