Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
edlyEKgpaz.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\edlyEKgpaz.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\edlyEKgpaz.exe
|
"C:\Users\user\Desktop\edlyEKgpaz.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\edlyEKgpaz.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\choice.exe
|
choice /C Y /N /D Y /T 3
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.247.73
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/102.129.152.231p
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://scratchdreams.tk
|
unknown
|
||
https://reallyfreegeoip.org/xml/102.129.152.231
|
104.21.67.152
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.org
|
unknown
|
||
reallyfreegeoip.org
|
104.21.67.152
|
||
checkip.dyndns.com
|
132.226.247.73
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.67.152
|
reallyfreegeoip.org
|
United States
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\edlyEKgpaz_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3BB1000
|
trusted library allocation
|
page read and write
|
||
922000
|
unkown
|
page readonly
|
||
3D5A000
|
trusted library allocation
|
page read and write
|
||
3D8D000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
2654F810000
|
heap
|
page read and write
|
||
3DD7000
|
trusted library allocation
|
page read and write
|
||
3CFA000
|
trusted library allocation
|
page read and write
|
||
3D4A000
|
trusted library allocation
|
page read and write
|
||
3CA5000
|
trusted library allocation
|
page read and write
|
||
7FFB4B1C6000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
F784DBE000
|
stack
|
page read and write
|
||
3D52000
|
trusted library allocation
|
page read and write
|
||
FF2000
|
stack
|
page read and write
|
||
2654F7E0000
|
heap
|
page read and write
|
||
7FF4A9170000
|
trusted library allocation
|
page execute and read and write
|
||
3CAA000
|
trusted library allocation
|
page read and write
|
||
2ECABF28000
|
heap
|
page read and write
|
||
1FB0E000
|
stack
|
page read and write
|
||
6A664FF000
|
unkown
|
page read and write
|
||
7FFB4B120000
|
trusted library allocation
|
page read and write
|
||
1CDDE000
|
stack
|
page read and write
|
||
7FFB4B2C0000
|
trusted library allocation
|
page execute and read and write
|
||
1E1DE000
|
stack
|
page read and write
|
||
7FFB4B11D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B1D0000
|
trusted library allocation
|
page execute and read and write
|
||
3DD3000
|
trusted library allocation
|
page read and write
|
||
1D9DF000
|
stack
|
page read and write
|
||
113B000
|
heap
|
page read and write
|
||
1C7FE000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
3DB5000
|
trusted library allocation
|
page read and write
|
||
1D1DE000
|
stack
|
page read and write
|
||
7FFB4B12D000
|
trusted library allocation
|
page execute and read and write
|
||
1E9DE000
|
stack
|
page read and write
|
||
920000
|
unkown
|
page readonly
|
||
2654F7D0000
|
heap
|
page read and write
|
||
7FFB4B13D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B1CC000
|
trusted library allocation
|
page execute and read and write
|
||
3CA7000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
7FFB4B1C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B1F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B129000
|
trusted library allocation
|
page read and write
|
||
2ECABEF5000
|
heap
|
page read and write
|
||
1C43D000
|
stack
|
page read and write
|
||
2ECABEF0000
|
heap
|
page read and write
|
||
2ECABE80000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
2654F85B000
|
heap
|
page read and write
|
||
13BC1000
|
trusted library allocation
|
page read and write
|
||
2654F874000
|
heap
|
page read and write
|
||
3D56000
|
trusted library allocation
|
page read and write
|
||
3DFD000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3700000
|
heap
|
page read and write
|
||
2ECABD80000
|
heap
|
page read and write
|
||
13BB8000
|
trusted library allocation
|
page read and write
|
||
6A661FC000
|
stack
|
page read and write
|
||
3D04000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
trusted library allocation
|
page read and write
|
||
3D62000
|
trusted library allocation
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
1183000
|
heap
|
page read and write
|
||
1C822000
|
heap
|
page read and write
|
||
1E5DD000
|
stack
|
page read and write
|
||
2ECABF20000
|
heap
|
page read and write
|
||
1AEE000
|
stack
|
page read and write
|
||
7FFB4B123000
|
trusted library allocation
|
page read and write
|
||
3CC2000
|
trusted library allocation
|
page read and write
|
||
2654F878000
|
heap
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
3D7A000
|
trusted library allocation
|
page read and write
|
||
1D5DD000
|
stack
|
page read and write
|
||
2654F7E5000
|
heap
|
page read and write
|
||
7FFB4B130000
|
trusted library allocation
|
page read and write
|
||
1C890000
|
heap
|
page execute and read and write
|
||
1FF1E000
|
stack
|
page read and write
|
||
7FFB4B16C000
|
trusted library allocation
|
page execute and read and write
|
||
F784D3F000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
7FFB4B113000
|
trusted library allocation
|
page execute and read and write
|
||
1DDDE000
|
stack
|
page read and write
|
||
2ECABE60000
|
heap
|
page read and write
|
||
3D10000
|
trusted library allocation
|
page read and write
|
||
3D0C000
|
trusted library allocation
|
page read and write
|
||
3D5E000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
3D08000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
3730000
|
heap
|
page execute and read and write
|
||
F784CBC000
|
stack
|
page read and write
|
||
7FFB4B230000
|
trusted library allocation
|
page execute and read and write
|
||
2654FA20000
|
heap
|
page read and write
|
||
1EEE000
|
stack
|
page read and write
|
||
7FFB4B2B0000
|
trusted library allocation
|
page read and write
|
||
6A665FF000
|
stack
|
page read and write
|
||
1F6EB000
|
stack
|
page read and write
|
||
7FFB4B114000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
1EDDE000
|
stack
|
page read and write
|
||
3DE9000
|
trusted library allocation
|
page read and write
|
||
13BBD000
|
trusted library allocation
|
page read and write
|
||
3D66000
|
trusted library allocation
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
2654F7F0000
|
heap
|
page read and write
|
||
1C7C8000
|
heap
|
page read and write
|
||
13BB3000
|
trusted library allocation
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
13BB1000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1116000
|
heap
|
page read and write
|
||
3DA1000
|
trusted library allocation
|
page read and write
|
||
2654F850000
|
heap
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
1F1DF000
|
stack
|
page read and write
|
||
7FFB4B134000
|
trusted library allocation
|
page read and write
|
||
3CE2000
|
trusted library allocation
|
page read and write
|
||
1C7CA000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
7FFB4B13B000
|
trusted library allocation
|
page execute and read and write
|
||
1C780000
|
heap
|
page read and write
|
There are 116 hidden memdumps, click here to show them.