Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ORDER SPECIFICATION.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER SPECIFICATION.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ORDER SPECIFICATION.exe
|
"C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
|
||
C:\Users\user\Desktop\ORDER SPECIFICATION.exe
|
"C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
|
||
C:\Users\user\Desktop\ORDER SPECIFICATION.exe
|
"C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://mail.techwiser.in
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://tempuri.org/DataSet1.xsd)Microsoft
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.techwiser.in
|
162.241.123.30
|
||
api.ipify.org
|
104.26.12.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.241.123.30
|
mail.techwiser.in
|
United States
|
||
104.26.12.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER SPECIFICATION_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3169000
|
trusted library allocation
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
432E000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page execute and read and write
|
||
5683000
|
heap
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
5691000
|
heap
|
page read and write
|
||
45AC000
|
stack
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
69CF000
|
heap
|
page read and write
|
||
574F000
|
stack
|
page read and write
|
||
6A59000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
77E000
|
stack
|
page read and write
|
||
4922000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
A47000
|
trusted library allocation
|
page execute and read and write
|
||
16D7000
|
trusted library allocation
|
page execute and read and write
|
||
813000
|
trusted library allocation
|
page execute and read and write
|
||
83BD000
|
stack
|
page read and write
|
||
2470000
|
trusted library allocation
|
page read and write
|
||
A4B000
|
trusted library allocation
|
page execute and read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
40000
|
unkown
|
page readonly
|
||
B00000
|
trusted library allocation
|
page execute and read and write
|
||
8070000
|
heap
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
2F6B000
|
trusted library allocation
|
page read and write
|
||
5750000
|
heap
|
page read and write
|
||
59CC000
|
stack
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
1331000
|
heap
|
page read and write
|
||
72B0000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
6D67000
|
trusted library allocation
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
16D2000
|
trusted library allocation
|
page read and write
|
||
5640000
|
heap
|
page execute and read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
491D000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
69F5000
|
heap
|
page read and write
|
||
937000
|
heap
|
page read and write
|
||
16BD000
|
trusted library allocation
|
page execute and read and write
|
||
16DB000
|
trusted library allocation
|
page execute and read and write
|
||
4C60000
|
heap
|
page execute and read and write
|
||
2FA0000
|
heap
|
page execute and read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
48F4000
|
trusted library allocation
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page execute and read and write
|
||
560C000
|
stack
|
page read and write
|
||
6A7E000
|
heap
|
page read and write
|
||
34B1000
|
trusted library allocation
|
page read and write
|
||
48FB000
|
trusted library allocation
|
page read and write
|
||
49BB000
|
trusted library allocation
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
823000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
6BF8000
|
trusted library allocation
|
page read and write
|
||
8DD000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page execute and read and write
|
||
12EA000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library section
|
page read and write
|
||
2480000
|
trusted library allocation
|
page read and write
|
||
6C80000
|
trusted library allocation
|
page execute and read and write
|
||
528E000
|
stack
|
page read and write
|
||
817D000
|
stack
|
page read and write
|
||
4CD1000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
6D1F000
|
stack
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
30F1000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
24E6000
|
trusted library allocation
|
page read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
4158000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
trusted library allocation
|
page read and write
|
||
7FD90000
|
trusted library allocation
|
page execute and read and write
|
||
4CE0000
|
trusted library allocation
|
page execute and read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
1363000
|
heap
|
page read and write
|
||
4911000
|
trusted library allocation
|
page read and write
|
||
7110000
|
heap
|
page read and write
|
||
1D9000
|
stack
|
page read and write
|
||
106A000
|
stack
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
63EF000
|
stack
|
page read and write
|
||
40F1000
|
trusted library allocation
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
4119000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
24B1000
|
trusted library allocation
|
page read and write
|
||
490E000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
trusted library allocation
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
814000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page execute and read and write
|
||
16AD000
|
trusted library allocation
|
page execute and read and write
|
||
12C0000
|
heap
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page read and write
|
||
16C2000
|
trusted library allocation
|
page read and write
|
||
4935000
|
trusted library allocation
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
A42000
|
trusted library allocation
|
page read and write
|
||
1737000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
317E000
|
trusted library allocation
|
page read and write
|
||
87F000
|
heap
|
page read and write
|
||
7C63000
|
trusted library allocation
|
page read and write
|
||
16C6000
|
trusted library allocation
|
page execute and read and write
|
||
135C000
|
heap
|
page read and write
|
||
42000
|
unkown
|
page readonly
|
||
248F000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
trusted library allocation
|
page read and write
|
||
6C0D000
|
trusted library allocation
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
245F000
|
stack
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
3519000
|
trusted library allocation
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
25CC000
|
trusted library allocation
|
page read and write
|
||
3F15000
|
trusted library allocation
|
page read and write
|
||
69AD000
|
stack
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1169000
|
stack
|
page read and write
|
||
2493000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library section
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
AEB000
|
stack
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
12F4000
|
heap
|
page read and write
|
||
16D5000
|
trusted library allocation
|
page execute and read and write
|
||
69B0000
|
heap
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
6C17000
|
trusted library allocation
|
page read and write
|
||
6A73000
|
heap
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
6C5E000
|
stack
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
83D0000
|
trusted library section
|
page read and write
|
||
6A4D000
|
heap
|
page read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
8180000
|
heap
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page execute and read and write
|
||
7120000
|
trusted library allocation
|
page execute and read and write
|
||
836000
|
trusted library allocation
|
page execute and read and write
|
||
3E2A000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
82D000
|
trusted library allocation
|
page execute and read and write
|
||
16A3000
|
trusted library allocation
|
page execute and read and write
|
||
2708000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
heap
|
page read and write
|
||
2705000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
34B9000
|
trusted library allocation
|
page read and write
|
||
83A000
|
trusted library allocation
|
page execute and read and write
|
||
16CA000
|
trusted library allocation
|
page execute and read and write
|
||
7EFB000
|
stack
|
page read and write
|
||
4916000
|
trusted library allocation
|
page read and write
|
||
50F8000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
12DE000
|
heap
|
page read and write
|
||
6A41000
|
heap
|
page read and write
|
||
BA7E000
|
stack
|
page read and write
|
||
806D000
|
stack
|
page read and write
|
||
81D000
|
trusted library allocation
|
page execute and read and write
|
||
7F080000
|
trusted library allocation
|
page execute and read and write
|
||
65EE000
|
stack
|
page read and write
|
||
1700000
|
trusted library allocation
|
page execute and read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
837E000
|
stack
|
page read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
3186000
|
trusted library allocation
|
page read and write
|
||
49B2000
|
trusted library allocation
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
4CB0000
|
trusted library section
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
There are 235 hidden memdumps, click here to show them.