Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
QUG24-2003700542005180.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\isochronally
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\QUG24-2003700542005180.exe
|
"C:\Users\user\Desktop\QUG24-2003700542005180.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\QUG24-2003700542005180.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3F11000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library section
|
page read and write
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
41B1000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
14A7000
|
trusted library allocation
|
page read and write
|
||
129D000
|
trusted library allocation
|
page execute and read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
F37000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
5AD2000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
3B42000
|
heap
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
14BA000
|
trusted library allocation
|
page execute and read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
41AC000
|
heap
|
page read and write
|
||
5630000
|
trusted library section
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
3171000
|
trusted library allocation
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
56D0000
|
trusted library section
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
41B1000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
40EE000
|
heap
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page execute and read and write
|
||
5A40000
|
trusted library allocation
|
page execute and read and write
|
||
2E00000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
4070000
|
heap
|
page read and write
|
||
5AD4000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3154000
|
trusted library allocation
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
12A0000
|
heap
|
page read and write
|
||
7F420000
|
trusted library allocation
|
page execute and read and write
|
||
40DE000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
4F18000
|
trusted library allocation
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
5795000
|
trusted library allocation
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
400A000
|
heap
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
41AC000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
400F000
|
heap
|
page read and write
|
||
4475000
|
heap
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
3D00000
|
direct allocation
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
316D000
|
trusted library allocation
|
page read and write
|
||
3173000
|
trusted library allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
316F000
|
trusted library allocation
|
page read and write
|
||
4013000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
4026000
|
trusted library allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
149F000
|
stack
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
4002000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page execute and read and write
|
||
10D0000
|
heap
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
599F000
|
stack
|
page read and write
|
||
400D000
|
heap
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
315E000
|
trusted library allocation
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
3B4B000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
41B0000
|
heap
|
page execute and read and write
|
||
AA9000
|
heap
|
page read and write
|
||
A7A000
|
heap
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
41B1000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
3BDB000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
3177000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
3FFA000
|
heap
|
page read and write
|
||
408A000
|
heap
|
page read and write
|
||
47A9000
|
direct allocation
|
page read and write
|
||
4680000
|
direct allocation
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
2E15000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
3FDD000
|
trusted library allocation
|
page read and write
|
||
41F6000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3186000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
1294000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
3D70000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
3E70000
|
heap
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
41B1000
|
heap
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
4094000
|
heap
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
41AC000
|
heap
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page execute and read and write
|
||
482000
|
unkown
|
page readonly
|
||
950000
|
heap
|
page read and write
|
||
41B5000
|
heap
|
page read and write
|
||
3188000
|
trusted library allocation
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
14CB000
|
trusted library allocation
|
page execute and read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
3139000
|
trusted library allocation
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
1293000
|
trusted library allocation
|
page execute and read and write
|
||
1361000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
481E000
|
direct allocation
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
5EE0000
|
heap
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
4011000
|
heap
|
page read and write
|
||
5400000
|
trusted library allocation
|
page execute and read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page execute and read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
4603000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1315000
|
heap
|
page read and write
|
||
41B1000
|
heap
|
page read and write
|
||
401B000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
312A000
|
trusted library allocation
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
41B1000
|
heap
|
page read and write
|
||
41B1000
|
heap
|
page read and write
|
||
14B6000
|
trusted library allocation
|
page execute and read and write
|
||
40DE000
|
heap
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
318A000
|
trusted library allocation
|
page read and write
|
||
414A000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
5774000
|
trusted library allocation
|
page read and write
|
||
14C2000
|
trusted library allocation
|
page read and write
|
||
41B1000
|
heap
|
page read and write
|
||
3B42000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
315C000
|
trusted library allocation
|
page read and write
|
||
3175000
|
trusted library allocation
|
page read and write
|
||
14C7000
|
trusted library allocation
|
page execute and read and write
|
||
47AD000
|
direct allocation
|
page read and write
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
3FFF000
|
heap
|
page read and write
|
||
3FF8000
|
heap
|
page read and write
|
||
5D6E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4610000
|
direct allocation
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
3143000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page execute and read and write
|
||
1130000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
There are 268 hidden memdumps, click here to show them.