Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Halkbank_Ekstre_20230426_075819_154055.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Halkbank_Ekstre_20230426_075819_154055.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154055.exe
|
"C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154055.exe"
|
||
C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154055.exe
|
"C:\Users\user\Desktop\Halkbank_Ekstre_20230426_075819_154055.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
132.226.247.73
|
||
http://tempuri.org/DataSeta.xsd)Microsoft
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://scratchdreams.tk
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/191.96.150.225
|
172.67.177.134
|
||
https://scratchdreams.tk/_send_.php?TS
|
104.21.27.85
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://scratchdreams.tk
|
unknown
|
||
https://reallyfreegeoip.org/xml/191.96.150.225$
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.org
|
unknown
|
||
reallyfreegeoip.org
|
172.67.177.134
|
||
scratchdreams.tk
|
104.21.27.85
|
||
checkip.dyndns.com
|
132.226.247.73
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.177.134
|
reallyfreegeoip.org
|
United States
|
||
104.21.27.85
|
scratchdreams.tk
|
United States
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Halkbank_Ekstre_20230426_075819_154055_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2813000
|
trusted library allocation
|
page read and write
|
||
394E000
|
trusted library allocation
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
6C00000
|
trusted library section
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
4E55000
|
trusted library allocation
|
page read and write
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
6ACF000
|
stack
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
F63000
|
trusted library allocation
|
page execute and read and write
|
||
3863000
|
trusted library allocation
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
2490000
|
trusted library allocation
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
8A2000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
3A2D000
|
trusted library allocation
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
601E000
|
stack
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
66A000
|
stack
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
2BF2000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
trusted library allocation
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
4E41000
|
trusted library allocation
|
page read and write
|
||
9D8F000
|
stack
|
page read and write
|
||
767000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
62AD000
|
stack
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
trusted library allocation
|
page execute and read and write
|
||
CEF000
|
stack
|
page read and write
|
||
4BD6000
|
trusted library allocation
|
page read and write
|
||
6890000
|
heap
|
page read and write
|
||
2AE4000
|
trusted library allocation
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
2AD8000
|
trusted library allocation
|
page read and write
|
||
4E3A000
|
trusted library allocation
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
2B4E000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
689E000
|
heap
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
2B87000
|
trusted library allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page execute and read and write
|
||
9B8E000
|
stack
|
page read and write
|
||
F82000
|
trusted library allocation
|
page read and write
|
||
39C9000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
65FF000
|
stack
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page execute and read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
998E000
|
stack
|
page read and write
|
||
3A3B000
|
trusted library allocation
|
page read and write
|
||
79B000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
2C0B000
|
trusted library allocation
|
page read and write
|
||
24AB000
|
trusted library allocation
|
page execute and read and write
|
||
99CE000
|
stack
|
page read and write
|
||
780000
|
trusted library allocation
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
2A65000
|
trusted library allocation
|
page read and write
|
||
2B06000
|
trusted library allocation
|
page read and write
|
||
4E26000
|
trusted library allocation
|
page read and write
|
||
8A6000
|
heap
|
page read and write
|
||
4F73000
|
heap
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
6620000
|
trusted library allocation
|
page execute and read and write
|
||
6D40000
|
trusted library allocation
|
page execute and read and write
|
||
2A7D000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
26E8000
|
trusted library allocation
|
page read and write
|
||
37C7000
|
trusted library allocation
|
page read and write
|
||
4E46000
|
trusted library allocation
|
page read and write
|
||
2550000
|
trusted library allocation
|
page execute and read and write
|
||
AE0000
|
heap
|
page read and write
|
||
2496000
|
trusted library allocation
|
page execute and read and write
|
||
C79000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
61C3000
|
heap
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page execute and read and write
|
||
61B5000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
2C4A000
|
trusted library allocation
|
page read and write
|
||
254C000
|
stack
|
page read and write
|
||
249A000
|
trusted library allocation
|
page execute and read and write
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
trusted library allocation
|
page execute and read and write
|
||
A4E000
|
stack
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
280A000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
2ADC000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
heap
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
4BCE000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page execute and read and write
|
||
4E52000
|
trusted library allocation
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
78C000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
24A2000
|
trusted library allocation
|
page read and write
|
||
AD3000
|
trusted library allocation
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
70A000
|
stack
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
668E000
|
trusted library allocation
|
page read and write
|
||
2BF8000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
6EB2000
|
trusted library allocation
|
page read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
3815000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
3A08000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
4BBB000
|
trusted library allocation
|
page read and write
|
||
F9B000
|
trusted library allocation
|
page execute and read and write
|
||
F64000
|
trusted library allocation
|
page read and write
|
||
80E000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page execute and read and write
|
||
2890000
|
heap
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page execute and read and write
|
||
4F70000
|
heap
|
page read and write
|
||
6AD0000
|
trusted library section
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
5120000
|
heap
|
page execute and read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
4CE0000
|
trusted library section
|
page readonly
|
||
FFE000
|
stack
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
394000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1024000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
F97000
|
trusted library allocation
|
page execute and read and write
|
||
7C0000
|
heap
|
page read and write
|
||
6630000
|
trusted library allocation
|
page execute and read and write
|
||
64BF000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
486B000
|
stack
|
page read and write
|
||
8387000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
4CDB000
|
stack
|
page read and write
|
||
7300000
|
trusted library section
|
page read and write
|
||
2C38000
|
trusted library allocation
|
page read and write
|
||
9C8F000
|
stack
|
page read and write
|
||
2B89000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
2B5D000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4E2E000
|
trusted library allocation
|
page read and write
|
||
302000
|
unkown
|
page readonly
|
||
AC4000
|
trusted library allocation
|
page read and write
|
||
2AEC000
|
trusted library allocation
|
page read and write
|
||
3779000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page execute and read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
F92000
|
trusted library allocation
|
page read and write
|
||
4BDD000
|
trusted library allocation
|
page read and write
|
||
2492000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
4ADE000
|
stack
|
page read and write
|
||
6160000
|
heap
|
page read and write
|
||
2A9C000
|
trusted library allocation
|
page read and write
|
||
ADD000
|
trusted library allocation
|
page execute and read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
ACD000
|
trusted library allocation
|
page execute and read and write
|
||
3A23000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
stack
|
page read and write
|
||
3A39000
|
trusted library allocation
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
4D23000
|
heap
|
page read and write
|
||
5EDE000
|
stack
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
4E2B000
|
trusted library allocation
|
page read and write
|
||
F7D000
|
trusted library allocation
|
page execute and read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
2C7B000
|
trusted library allocation
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
88B000
|
heap
|
page read and write
|
||
4BB4000
|
trusted library allocation
|
page read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
2B6B000
|
trusted library allocation
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
2AE8000
|
trusted library allocation
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
2BED000
|
trusted library allocation
|
page read and write
|
||
789000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page execute and read and write
|
||
269F000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
2AA4000
|
trusted library allocation
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
F95000
|
trusted library allocation
|
page execute and read and write
|
||
24A7000
|
trusted library allocation
|
page execute and read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
860E000
|
stack
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
787000
|
trusted library allocation
|
page read and write
|
||
4C52000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page execute and read and write
|
||
49DE000
|
stack
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
4BD1000
|
trusted library allocation
|
page read and write
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
F86000
|
trusted library allocation
|
page execute and read and write
|
||
300000
|
unkown
|
page readonly
|
||
616D000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page execute and read and write
|
||
8C0000
|
heap
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
D6B000
|
trusted library allocation
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
827000
|
heap
|
page read and write
|
There are 265 hidden memdumps, click here to show them.