Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
URGENT ORDER.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\URGENT ORDER.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\URGENT ORDER.exe
|
"C:\Users\user\Desktop\URGENT ORDER.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.google.com
|
unknown
|
||
http://www.google.com/t
|
unknown
|
||
http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgRmgZjcGLPerbEGIjDUAttsuaejjF-8
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.google.comd
|
unknown
|
||
https://csp.withgoogle.com/csp/gws/other-hp
|
unknown
|
||
https://www.google.com/recaptcha/api.js
|
unknown
|
||
http://www.google.com/
|
142.250.217.196
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.217.196
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.217.196
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\URGENT ORDER_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5E9E000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
1060000
|
unkown
|
page execute read
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
1517000
|
trusted library allocation
|
page execute and read and write
|
||
18CC000
|
stack
|
page read and write
|
||
43B5000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
1B90000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
14E3000
|
trusted library allocation
|
page execute and read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
3428000
|
trusted library allocation
|
page read and write
|
||
1077000
|
unkown
|
page execute read
|
||
F50000
|
heap
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
1052000
|
unkown
|
page execute read
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
trusted library allocation
|
page read and write
|
||
340F000
|
trusted library allocation
|
page read and write
|
||
6968000
|
heap
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
43B1000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
1098000
|
unkown
|
page readonly
|
||
694E000
|
stack
|
page read and write
|
||
1055000
|
unkown
|
page execute read
|
||
106C000
|
unkown
|
page execute read
|
||
32B6000
|
trusted library allocation
|
page read and write
|
||
15F9000
|
heap
|
page read and write
|
||
105B000
|
unkown
|
page execute read
|
||
5D9F000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
1066000
|
unkown
|
page execute read
|
||
1506000
|
trusted library allocation
|
page execute and read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
341B000
|
trusted library allocation
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
5B90000
|
heap
|
page execute and read and write
|
||
680F000
|
stack
|
page read and write
|
||
5B6D000
|
stack
|
page read and write
|
||
18D0000
|
trusted library allocation
|
page read and write
|
||
340A000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
FD2000
|
unkown
|
page execute read
|
||
670E000
|
stack
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
EEB000
|
stack
|
page read and write
|
||
3418000
|
trusted library allocation
|
page read and write
|
||
1626000
|
heap
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
14E4000
|
trusted library allocation
|
page read and write
|
||
1044000
|
unkown
|
page execute read
|
||
6B0E000
|
stack
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
6C8F000
|
stack
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
1198000
|
stack
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
150A000
|
trusted library allocation
|
page execute and read and write
|
||
33A0000
|
heap
|
page execute and read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
151B000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
32C4000
|
trusted library allocation
|
page read and write
|
||
32BB000
|
trusted library allocation
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
15B6000
|
trusted library allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
6ACF000
|
stack
|
page read and write
|
||
103E000
|
unkown
|
page execute read
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
FD2000
|
unkown
|
page execute read
|
||
5C9E000
|
stack
|
page read and write
|
||
1540000
|
trusted library allocation
|
page execute and read and write
|
||
1639000
|
heap
|
page read and write
|
||
1038000
|
unkown
|
page execute read
|
||
6950000
|
heap
|
page read and write
|
||
19EE000
|
stack
|
page read and write
|
||
1072000
|
unkown
|
page execute read
|
||
32B4000
|
trusted library allocation
|
page read and write
|
||
15E5000
|
trusted library allocation
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
1B80000
|
trusted library allocation
|
page read and write
|
||
5EDE000
|
stack
|
page read and write
|
||
15C9000
|
trusted library allocation
|
page read and write
|
||
684D000
|
stack
|
page read and write
|
||
6C0F000
|
stack
|
page read and write
|
||
107D000
|
unkown
|
page execute read
|
||
16A6000
|
heap
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
6992000
|
heap
|
page read and write
|
There are 102 hidden memdumps, click here to show them.