Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
mdWXrbOxsY.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\mdWXrbOxsY.exe
|
"C:\Users\user\Desktop\mdWXrbOxsY.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://t.me/xehook
|
unknown
|
||
http://unotree.ru
|
unknown
|
||
https://aiwhcpoaw.ru/
|
unknown
|
||
https://unotree.ru/
|
172.67.169.128
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.mF
|
unknown
|
||
http://ip-api.com/json/?fields=11827
|
unknown
|
||
https://unotree.ru
|
unknown
|
||
https://unotree.ru/getjson.php?id=88
|
172.67.169.128
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
unotree.ru
|
172.67.169.128
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
172.67.169.128
|
unotree.ru
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
31E2000
|
trusted library allocation
|
page read and write
|
||
A7B000
|
unkown
|
page write copy
|
||
59FE000
|
stack
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
A74000
|
unkown
|
page readonly
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
A74000
|
unkown
|
page readonly
|
||
61EE000
|
stack
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page execute and read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page execute and read and write
|
||
12A0000
|
heap
|
page read and write
|
||
3226000
|
trusted library allocation
|
page read and write
|
||
A92000
|
unkown
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
2D02000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
6372000
|
heap
|
page read and write
|
||
132D000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
1180000
|
heap
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
A93000
|
unkown
|
page readonly
|
||
58BE000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
646E000
|
stack
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
7EFB0000
|
trusted library allocation
|
page execute and read and write
|
||
60EE000
|
stack
|
page read and write
|
||
A93000
|
unkown
|
page readonly
|
||
31A6000
|
trusted library allocation
|
page read and write
|
||
65EE000
|
stack
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
6330000
|
heap
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
A91000
|
unkown
|
page execute and read and write
|
||
103C000
|
stack
|
page read and write
|
||
57B0000
|
heap
|
page execute and read and write
|
||
1270000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
574D000
|
stack
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
2CD3000
|
trusted library allocation
|
page execute and read and write
|
||
2D0B000
|
trusted library allocation
|
page execute and read and write
|
||
318A000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
622E000
|
stack
|
page read and write
|
||
12AB000
|
heap
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
14EF000
|
stack
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
632E000
|
stack
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page execute and read and write
|
||
656F000
|
stack
|
page read and write
|
||
65AE000
|
stack
|
page read and write
|
||
6366000
|
heap
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
2D07000
|
trusted library allocation
|
page execute and read and write
|
||
3254000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
stack
|
page read and write
|
||
3222000
|
trusted library allocation
|
page read and write
|
||
4111000
|
trusted library allocation
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
2CD4000
|
trusted library allocation
|
page read and write
|
||
1297000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
31AA000
|
trusted library allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
3237000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
3247000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
3184000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
637F000
|
heap
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
2CF6000
|
trusted library allocation
|
page execute and read and write
|
||
1138000
|
stack
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
A7B000
|
unkown
|
page read and write
|
||
B9F000
|
stack
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
2CDD000
|
trusted library allocation
|
page execute and read and write
|
||
13EE000
|
stack
|
page read and write
|
||
67D0000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute read
|
||
31CD000
|
trusted library allocation
|
page read and write
|
||
4117000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
There are 111 hidden memdumps, click here to show them.