Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO#50124.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#50124.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PO#50124.exe
|
"C:\Users\user\Desktop\PO#50124.exe"
|
||
C:\Users\user\Desktop\PO#50124.exe
|
"C:\Users\user\Desktop\PO#50124.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
http://mail.alkuwaiti.com
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.alkuwaiti.com
|
50.87.219.149
|
||
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
50.87.219.149
|
mail.alkuwaiti.com
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO#50124_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3FC3000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
2D1C000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
10E4000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
2D24000
|
trusted library allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
1274000
|
heap
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
14E5000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
heap
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
7757000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
trusted library allocation
|
page execute and read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
3F59000
|
trusted library allocation
|
page read and write
|
||
58EF000
|
stack
|
page read and write
|
||
A1AE000
|
stack
|
page read and write
|
||
10B4000
|
trusted library allocation
|
page read and write
|
||
1106000
|
trusted library allocation
|
page execute and read and write
|
||
5890000
|
heap
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
2D1A000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page execute and read and write
|
||
10FB000
|
trusted library allocation
|
page execute and read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
10C5000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
68CE000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
FBC000
|
heap
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
7F0C0000
|
trusted library allocation
|
page execute and read and write
|
||
7F350000
|
trusted library allocation
|
page execute and read and write
|
||
10DD000
|
trusted library allocation
|
page execute and read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
trusted library allocation
|
page read and write
|
||
9F2D000
|
stack
|
page read and write
|
||
12DC000
|
stack
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
8B2E000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
A42000
|
unkown
|
page readonly
|
||
666F000
|
heap
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
69D0000
|
trusted library allocation
|
page execute and read and write
|
||
11E1000
|
heap
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
5660000
|
heap
|
page execute and read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
30AC000
|
trusted library allocation
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
9E2E000
|
stack
|
page read and write
|
||
678E000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
10ED000
|
trusted library allocation
|
page execute and read and write
|
||
3D0A000
|
trusted library allocation
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
640E000
|
stack
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page read and write
|
||
69E7000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
5514000
|
heap
|
page read and write
|
||
CF8000
|
stack
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
7745000
|
heap
|
page read and write
|
||
5AAD000
|
stack
|
page read and write
|
||
7690000
|
trusted library allocation
|
page execute and read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
10F7000
|
trusted library allocation
|
page execute and read and write
|
||
110A000
|
trusted library allocation
|
page execute and read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
766D000
|
stack
|
page read and write
|
||
10F5000
|
trusted library allocation
|
page execute and read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
5663000
|
heap
|
page execute and read and write
|
||
5190000
|
heap
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page execute and read and write
|
||
68E0000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
2D16000
|
trusted library allocation
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
7712000
|
heap
|
page read and write
|
||
AE6000
|
unkown
|
page readonly
|
||
BF0000
|
heap
|
page read and write
|
||
A2AE000
|
stack
|
page read and write
|
||
5680000
|
trusted library allocation
|
page execute and read and write
|
||
10F2000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
B7A000
|
stack
|
page read and write
|
||
119C000
|
stack
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
7751000
|
heap
|
page read and write
|
||
10D9000
|
trusted library allocation
|
page read and write
|
||
9D2E000
|
stack
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
heap
|
page read and write
|
||
3CC9000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page execute and read and write
|
||
47FD000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
55A0000
|
heap
|
page execute and read and write
|
||
10BD000
|
trusted library allocation
|
page execute and read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page execute and read and write
|
||
66DB000
|
heap
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
heap
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
15A7000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
753A000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
504C000
|
stack
|
page read and write
|
||
537C000
|
stack
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page execute and read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
1117000
|
trusted library allocation
|
page execute and read and write
|
||
104E000
|
stack
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
99A000
|
stack
|
page read and write
|
||
30AE000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
1112000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
2D18000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
5640000
|
trusted library section
|
page readonly
|
||
66F5000
|
heap
|
page read and write
|
||
2FBD000
|
trusted library allocation
|
page read and write
|
||
3CA1000
|
trusted library allocation
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
53B3000
|
heap
|
page read and write
|
||
3F5D000
|
trusted library allocation
|
page read and write
|
||
305E000
|
trusted library allocation
|
page read and write
|
||
F4B000
|
heap
|
page read and write
|
||
A40000
|
unkown
|
page readonly
|
||
57AF000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
A16E000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
heap
|
page read and write
|
||
10EA000
|
trusted library allocation
|
page execute and read and write
|
||
2CD6000
|
trusted library allocation
|
page read and write
|
||
9F30000
|
heap
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
5AED000
|
stack
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
10E6000
|
trusted library allocation
|
page execute and read and write
|
||
11C6000
|
heap
|
page read and write
|
||
2C0B000
|
trusted library allocation
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
135A000
|
heap
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
76F0000
|
heap
|
page read and write
|
||
6721000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
47AF000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
111B000
|
trusted library allocation
|
page execute and read and write
|
||
10C0000
|
heap
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
1263000
|
heap
|
page read and write
|
||
6699000
|
heap
|
page read and write
|
||
2D32000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
heap
|
page execute and read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
heap
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
A06E000
|
stack
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
8C2F000
|
stack
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page execute and read and write
|
||
5650000
|
heap
|
page read and write
|
||
5BE0000
|
trusted library section
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
56EC000
|
stack
|
page read and write
|
||
2C0E000
|
trusted library allocation
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
5895000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
4CA8000
|
trusted library allocation
|
page read and write
|
||
484B000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
2CED000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
1115000
|
trusted library allocation
|
page execute and read and write
|
||
5880000
|
trusted library section
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library section
|
page read and write
|
||
6650000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4936000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
650E000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
AC66000
|
trusted library allocation
|
page read and write
|
||
31D6000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
14CF000
|
stack
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
B090000
|
trusted library section
|
page read and write
|
||
10E3000
|
trusted library allocation
|
page execute and read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page execute and read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
10FD000
|
trusted library allocation
|
page execute and read and write
|
||
F05000
|
heap
|
page read and write
|
There are 271 hidden memdumps, click here to show them.