Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Rendeles_042024,jpg.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Rendeles_042024,jpg.scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe
|
"C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe"
|
||
C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe
|
"C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe"
|
||
C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe
|
"C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
https://api.ipify.org
|
unknown
|
||
http://mail.woxi.cz
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.woxi.cz
|
77.93.220.4
|
||
api.ipify.org
|
104.26.13.205
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.93.220.4
|
mail.woxi.cz
|
Czech Republic
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3004000
|
trusted library allocation
|
page read and write
|
||
302D000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
4EFE000
|
trusted library allocation
|
page read and write
|
||
3259000
|
trusted library allocation
|
page read and write
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
7BB0000
|
trusted library section
|
page read and write
|
||
7FAC0000
|
trusted library allocation
|
page execute and read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
heap
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
15B3000
|
trusted library allocation
|
page execute and read and write
|
||
5780000
|
heap
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
7BA0000
|
trusted library section
|
page read and write
|
||
10F8000
|
stack
|
page read and write
|
||
4B5E000
|
trusted library allocation
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page execute and read and write
|
||
15D2000
|
trusted library allocation
|
page read and write
|
||
54B2000
|
trusted library allocation
|
page read and write
|
||
5486000
|
trusted library allocation
|
page read and write
|
||
4985000
|
trusted library allocation
|
page read and write
|
||
5750000
|
heap
|
page execute and read and write
|
||
3527000
|
trusted library allocation
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
302B000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
5C9F000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
9DA2000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
trusted library allocation
|
page execute and read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
7F88000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
138E000
|
unkown
|
page read and write
|
||
7F80000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
96AE000
|
heap
|
page read and write
|
||
3571000
|
trusted library allocation
|
page read and write
|
||
6828000
|
heap
|
page read and write
|
||
DA7E000
|
stack
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
13E7000
|
trusted library allocation
|
page execute and read and write
|
||
A2EE000
|
stack
|
page read and write
|
||
57B3000
|
heap
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
15B4000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page execute and read and write
|
||
1441000
|
heap
|
page read and write
|
||
7F95000
|
heap
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
4A73000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
36B4000
|
trusted library allocation
|
page read and write
|
||
6D43000
|
trusted library allocation
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
7FD4000
|
heap
|
page read and write
|
||
DEBF000
|
stack
|
page read and write
|
||
7E60000
|
heap
|
page read and write
|
||
13A4000
|
trusted library allocation
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
3070000
|
trusted library section
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
9C8D000
|
stack
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
D89000
|
stack
|
page read and write
|
||
3160000
|
trusted library allocation
|
page execute and read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
14F6000
|
heap
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
49D7000
|
trusted library allocation
|
page read and write
|
||
6B3D000
|
stack
|
page read and write
|
||
7910000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
D32000
|
unkown
|
page execute and read and write
|
||
7B80000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
15DA000
|
trusted library allocation
|
page execute and read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
heap
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page execute and read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
3525000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
unkown
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
7F90000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
15CD000
|
trusted library allocation
|
page execute and read and write
|
||
3000000
|
heap
|
page read and write
|
||
DEFE000
|
stack
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page execute and read and write
|
||
DB7E000
|
stack
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
unkown
|
page execute and read and write
|
||
DDBE000
|
stack
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page execute and read and write
|
||
D97E000
|
stack
|
page read and write
|
||
3125000
|
trusted library allocation
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
3027000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
A30A000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
A31A000
|
heap
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
4009000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
6D63000
|
trusted library allocation
|
page read and write
|
||
2D9B000
|
trusted library allocation
|
page execute and read and write
|
||
7BD0000
|
heap
|
page execute and read and write
|
||
6D80000
|
trusted library allocation
|
page execute and read and write
|
||
1428000
|
heap
|
page read and write
|
||
5726000
|
trusted library allocation
|
page read and write
|
||
6B7F000
|
stack
|
page read and write
|
||
13BD000
|
trusted library allocation
|
page execute and read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
2FDF000
|
trusted library allocation
|
page read and write
|
||
5792000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
9B4E000
|
stack
|
page read and write
|
||
15E7000
|
heap
|
page read and write
|
||
2FED000
|
trusted library allocation
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
599C000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
13C6000
|
trusted library allocation
|
page execute and read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
9B0E000
|
stack
|
page read and write
|
||
1449000
|
heap
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
96A0000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
2D92000
|
trusted library allocation
|
page read and write
|
||
3FA1000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
trusted library allocation
|
page execute and read and write
|
||
136E000
|
stack
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
64FF000
|
stack
|
page read and write
|
||
D30000
|
unkown
|
page readonly
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
107A000
|
stack
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
9A50000
|
trusted library section
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
67C6000
|
heap
|
page read and write
|
||
9C4E000
|
stack
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
DDB000
|
unkown
|
page execute and read and write
|
||
7DAB000
|
stack
|
page read and write
|
||
15BD000
|
trusted library allocation
|
page execute and read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
34D1000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page execute and read and write
|
||
D32000
|
unkown
|
page readonly
|
||
2F7F000
|
stack
|
page read and write
|
||
2FD5000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
1177000
|
stack
|
page read and write
|
||
D30000
|
unkown
|
page execute and read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
13E2000
|
trusted library allocation
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
3573000
|
trusted library allocation
|
page read and write
|
||
30EC000
|
stack
|
page read and write
|
||
2F90000
|
heap
|
page execute and read and write
|
||
7E30000
|
trusted library allocation
|
page execute and read and write
|
||
7F70000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page execute and read and write
|
||
2FF0000
|
trusted library allocation
|
page execute and read and write
|
||
5573000
|
heap
|
page read and write
|
||
6D6D000
|
trusted library allocation
|
page read and write
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
13A3000
|
trusted library allocation
|
page execute and read and write
|
||
DC80000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
13EB000
|
trusted library allocation
|
page execute and read and write
|
||
4989000
|
trusted library allocation
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page execute and read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
A2F0000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
63FD000
|
stack
|
page read and write
|
||
551C000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
A305000
|
heap
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
DFFE000
|
stack
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
7F6D000
|
stack
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
3FC9000
|
trusted library allocation
|
page read and write
|
||
13AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FA0000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
DC7D000
|
stack
|
page read and write
|
||
7B60000
|
trusted library section
|
page readonly
|
||
713E000
|
stack
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page execute and read and write
|
||
122E000
|
stack
|
page read and write
|
||
6812000
|
heap
|
page read and write
|
There are 265 hidden memdumps, click here to show them.