Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
00_datos de la transacci#U00f3n rechazada y n#U00famero de cuenta incorrecto.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\autEBDE.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autEC2D.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gobioid
|
ASCII text, with very long lines (29732), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\putrefactible
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\00_datos de la transacci#U00f3n rechazada y n#U00famero de cuenta incorrecto.exe
|
"C:\Users\user\Desktop\00_datos de la transacci#U00f3n rechazada y n#U00famero de cuenta incorrecto.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\00_datos de la transacci#U00f3n rechazada y n#U00famero de cuenta incorrecto.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
||
http://ip-api.com/line/?fields=hostingXrA
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3970000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
3A00000
|
direct allocation
|
page read and write
|
||
3C7D000
|
direct allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
55AE000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
1CFE000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page execute and read and write
|
||
3A00000
|
direct allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
1158000
|
stack
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
1E80000
|
heap
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
3C79000
|
direct allocation
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
3AD3000
|
direct allocation
|
page read and write
|
||
3233000
|
trusted library allocation
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
591C000
|
stack
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
11BC000
|
heap
|
page read and write
|
||
3B23000
|
direct allocation
|
page read and write
|
||
13AD000
|
trusted library allocation
|
page execute and read and write
|
||
163E000
|
stack
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
FFD000
|
stack
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
55B1000
|
trusted library allocation
|
page read and write
|
||
1DF0000
|
heap
|
page read and write
|
||
55BD000
|
trusted library allocation
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
3CEE000
|
direct allocation
|
page read and write
|
||
113C000
|
heap
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
1E10000
|
direct allocation
|
page execute and read and write
|
||
31C5000
|
trusted library allocation
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
3CC9000
|
direct allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
3B23000
|
direct allocation
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
13C2000
|
trusted library allocation
|
page read and write
|
||
365000
|
unkown
|
page readonly
|
||
131A000
|
heap
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
6BA0000
|
heap
|
page read and write
|
||
1172000
|
heap
|
page read and write
|
||
105A000
|
stack
|
page read and write
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
direct allocation
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
4151000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
1151000
|
heap
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
2B1000
|
unkown
|
page execute read
|
||
6436000
|
heap
|
page read and write
|
||
6416000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
63EC000
|
heap
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
FBD000
|
stack
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
3AD3000
|
direct allocation
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
1172000
|
heap
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
3CCD000
|
direct allocation
|
page read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
1E40000
|
heap
|
page read and write
|
||
3D3E000
|
direct allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
139D000
|
trusted library allocation
|
page execute and read and write
|
||
1690000
|
heap
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page execute and read and write
|
||
68A0000
|
heap
|
page read and write
|
||
142A000
|
heap
|
page read and write
|
||
3CC9000
|
direct allocation
|
page read and write
|
||
373000
|
unkown
|
page write copy
|
||
1168000
|
heap
|
page read and write
|
||
4179000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
378000
|
unkown
|
page readonly
|
||
1E44000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page execute and read and write
|
||
119C000
|
heap
|
page read and write
|
||
55B6000
|
trusted library allocation
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
167C000
|
stack
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
3CEE000
|
direct allocation
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
365000
|
unkown
|
page readonly
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
1151000
|
heap
|
page read and write
|
||
3CCD000
|
direct allocation
|
page read and write
|
||
13B6000
|
trusted library allocation
|
page execute and read and write
|
||
13C7000
|
trusted library allocation
|
page execute and read and write
|
||
5CDD000
|
stack
|
page read and write
|
||
3CCD000
|
direct allocation
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
5653000
|
heap
|
page read and write
|
||
3A00000
|
direct allocation
|
page read and write
|
||
63C0000
|
heap
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
55C2000
|
trusted library allocation
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
322C000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
13BA000
|
trusted library allocation
|
page execute and read and write
|
||
579E000
|
stack
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
41BA000
|
trusted library allocation
|
page read and write
|
||
1394000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
36F000
|
unkown
|
page read and write
|
||
13B2000
|
trusted library allocation
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
324D000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
378000
|
unkown
|
page readonly
|
||
119C000
|
heap
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
E1B000
|
stack
|
page read and write
|
||
2F68000
|
trusted library allocation
|
page read and write
|
||
3B23000
|
direct allocation
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
3AD3000
|
direct allocation
|
page read and write
|
||
1393000
|
trusted library allocation
|
page execute and read and write
|
||
A3A000
|
stack
|
page read and write
|
||
5660000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
5810000
|
heap
|
page execute and read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
36F000
|
unkown
|
page write copy
|
||
14FA000
|
heap
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
2B1000
|
unkown
|
page execute read
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
3C79000
|
direct allocation
|
page read and write
|
||
3C79000
|
direct allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page execute and read and write
|
||
129D000
|
heap
|
page read and write
|
||
3249000
|
trusted library allocation
|
page read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
33F000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page readonly
|
||
12D4000
|
heap
|
page read and write
|
||
33F000
|
unkown
|
page readonly
|
||
561C000
|
stack
|
page read and write
|
||
3D3E000
|
direct allocation
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
3CEE000
|
direct allocation
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
3C7D000
|
direct allocation
|
page read and write
|
||
3CC9000
|
direct allocation
|
page read and write
|
||
3185000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
13CB000
|
trusted library allocation
|
page execute and read and write
|
||
3C7D000
|
direct allocation
|
page read and write
|
||
640E000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
There are 210 hidden memdumps, click here to show them.