Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
gZIZ5eyCtS.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gZIZ5eyCtS.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\gZIZ5eyCtS.exe
|
"C:\Users\user\Desktop\gZIZ5eyCtS.exe"
|
||
C:\Users\user\Desktop\gZIZ5eyCtS.exe
|
"C:\Users\user\Desktop\gZIZ5eyCtS.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://aborters.duckdns.org:8081
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://schemas.xmlsoap.org/soap/http
|
unknown
|
||
http://anotherarmy.dns.army:8081t-
|
unknown
|
||
http://varders.kozow.com:8081t-
|
unknown
|
||
http://aborters.duckdns.org
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
http://anotherarmy.dns.army:8081/_send_.php?TS
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://aborters.duckdns.org:8081/_send_.php?TS
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://aborters.duckdns.org:8081t-
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://varders.kozow.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://reallyfreegeoip.org/xml/102.129.152.231$
|
unknown
|
||
http://varders.kozow.com:8081/_send_.php?TS
|
unknown
|
||
https://reallyfreegeoip.org/xml/102.129.152.231
|
172.67.177.134
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
aborters.duckdns.org
|
51.38.247.67
|
||
anotherarmy.dns.army
|
unknown
|
||
checkip.dyndns.org
|
unknown
|
||
reallyfreegeoip.org
|
172.67.177.134
|
||
varders.kozow.com
|
51.38.247.67
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
51.38.247.67
|
varders.kozow.com
|
France
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
||
172.67.177.134
|
reallyfreegeoip.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\gZIZ5eyCtS_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
29A1000
|
trusted library allocation
|
page read and write
|
||
4663000
|
trusted library allocation
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
1C11000
|
trusted library allocation
|
page read and write
|
||
CA2000
|
trusted library allocation
|
page read and write
|
||
2A57000
|
trusted library allocation
|
page read and write
|
||
114C000
|
stack
|
page read and write
|
||
5C8F000
|
stack
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page execute and read and write
|
||
632D000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
2AA6000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
trusted library allocation
|
page read and write
|
||
66AA000
|
trusted library allocation
|
page read and write
|
||
4571000
|
trusted library allocation
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
2BF4000
|
trusted library allocation
|
page read and write
|
||
1664000
|
trusted library allocation
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
C8D000
|
trusted library allocation
|
page execute and read and write
|
||
59B0000
|
trusted library section
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
1A60000
|
trusted library allocation
|
page read and write
|
||
17E7000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
C9A000
|
trusted library allocation
|
page execute and read and write
|
||
1C70000
|
heap
|
page execute and read and write
|
||
FBA000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
2BD6000
|
trusted library allocation
|
page read and write
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
trusted library allocation
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
1BF0000
|
trusted library allocation
|
page read and write
|
||
17AE000
|
heap
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page execute and read and write
|
||
E00000
|
heap
|
page read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
667D000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1CB0000
|
trusted library allocation
|
page read and write
|
||
3A38000
|
trusted library allocation
|
page read and write
|
||
1750000
|
trusted library allocation
|
page execute and read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
1783000
|
trusted library allocation
|
page read and write
|
||
EFF000
|
heap
|
page read and write
|
||
3A2C000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
trusted library allocation
|
page read and write
|
||
4EC3000
|
heap
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
166D000
|
trusted library allocation
|
page execute and read and write
|
||
1CB4000
|
trusted library allocation
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
1C16000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
2BDB000
|
trusted library allocation
|
page read and write
|
||
16B5000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
4B3D000
|
stack
|
page read and write
|
||
2AE6000
|
trusted library allocation
|
page read and write
|
||
61F2000
|
heap
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
5A40000
|
trusted library section
|
page read and write
|
||
1C6E000
|
stack
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1BF2000
|
trusted library allocation
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1C90000
|
heap
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
17EA000
|
heap
|
page read and write
|
||
1BF4000
|
trusted library allocation
|
page read and write
|
||
636E000
|
stack
|
page read and write
|
||
C74000
|
trusted library allocation
|
page read and write
|
||
2A63000
|
trusted library allocation
|
page read and write
|
||
4E8B000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
2A54000
|
trusted library allocation
|
page read and write
|
||
6685000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page execute and read and write
|
||
1A68000
|
trusted library allocation
|
page read and write
|
||
C92000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
trusted library allocation
|
page read and write
|
||
1686000
|
trusted library allocation
|
page execute and read and write
|
||
61F0000
|
heap
|
page read and write
|
||
1A56000
|
trusted library allocation
|
page read and write
|
||
1CB9000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
6760000
|
heap
|
page read and write
|
||
1C8A000
|
trusted library allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page execute and read and write
|
||
625B000
|
heap
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
1CBB000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
trusted library allocation
|
page read and write
|
||
4EB2000
|
trusted library allocation
|
page read and write
|
||
2A43000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page execute and read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
1BFB000
|
trusted library allocation
|
page read and write
|
||
CA7000
|
trusted library allocation
|
page execute and read and write
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
FF2000
|
unkown
|
page readonly
|
||
C96000
|
trusted library allocation
|
page execute and read and write
|
||
64AE000
|
stack
|
page read and write
|
||
1C85000
|
trusted library allocation
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
1786000
|
trusted library allocation
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
17E3000
|
heap
|
page read and write
|
||
1A50000
|
trusted library allocation
|
page read and write
|
||
3A22000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
75A000
|
stack
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page execute and read and write
|
||
2ADE000
|
trusted library allocation
|
page read and write
|
||
61F7000
|
heap
|
page read and write
|
||
2AF6000
|
trusted library allocation
|
page read and write
|
||
C7D000
|
trusted library allocation
|
page execute and read and write
|
||
1B7F000
|
stack
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
1898000
|
heap
|
page read and write
|
||
ECD000
|
stack
|
page read and write
|
||
1C0E000
|
trusted library allocation
|
page read and write
|
||
1663000
|
trusted library allocation
|
page execute and read and write
|
||
185A000
|
heap
|
page read and write
|
||
1C8D000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
heap
|
page execute and read and write
|
||
E30000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
199E000
|
stack
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
1CA0000
|
trusted library allocation
|
page read and write
|
||
6688000
|
trusted library allocation
|
page read and write
|
||
CAB000
|
trusted library allocation
|
page execute and read and write
|
||
1C80000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
C73000
|
trusted library allocation
|
page execute and read and write
|
||
174E000
|
stack
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
2A7B000
|
trusted library allocation
|
page read and write
|
||
1C25000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page execute and read and write
|
||
DFF000
|
stack
|
page read and write
|
||
185E000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
6740000
|
trusted library allocation
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
2ADA000
|
trusted library allocation
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
5A35000
|
trusted library allocation
|
page read and write
|
||
168A000
|
trusted library allocation
|
page execute and read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
39C9000
|
trusted library allocation
|
page read and write
|
||
2BF9000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
4E86000
|
trusted library allocation
|
page read and write
|
||
2A9A000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
2BEA000
|
trusted library allocation
|
page read and write
|
||
2AEA000
|
trusted library allocation
|
page read and write
|
||
6267000
|
heap
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
3571000
|
trusted library allocation
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
2974000
|
trusted library allocation
|
page read and write
|
||
1674000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page execute and read and write
|
||
5010000
|
heap
|
page read and write
|
||
1697000
|
trusted library allocation
|
page execute and read and write
|
||
296E000
|
stack
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
668B000
|
trusted library allocation
|
page read and write
|
||
2B1F000
|
trusted library allocation
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
1CBE000
|
trusted library allocation
|
page read and write
|
||
2C62000
|
trusted library allocation
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
2C2B000
|
trusted library allocation
|
page read and write
|
||
EF8000
|
heap
|
page read and write
|
||
2BFD000
|
trusted library allocation
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
3A07000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
169B000
|
trusted library allocation
|
page execute and read and write
|
||
5B2F000
|
stack
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
14F7000
|
stack
|
page read and write
|
||
CA5000
|
trusted library allocation
|
page execute and read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
1CC0000
|
heap
|
page read and write
|
||
6251000
|
heap
|
page read and write
|
||
2A92000
|
trusted library allocation
|
page read and write
|
There are 226 hidden memdumps, click here to show them.