Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
43643456.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut5703.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut5742.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\brawlys
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\intemeration
|
ASCII text, with very long lines (28720), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\43643456.exe
|
"C:\Users\user\Desktop\43643456.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\43643456.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ip-api.com/line/?fields=hosting$
|
unknown
|
||
http://ip-api.com/line/?fields=hosting2
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
1040000
|
heap
|
page read and write
|
||
5246000
|
trusted library allocation
|
page read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
52C3000
|
heap
|
page read and write
|
||
523A000
|
trusted library allocation
|
page read and write
|
||
6158000
|
heap
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
35F0000
|
direct allocation
|
page read and write
|
||
3713000
|
direct allocation
|
page read and write
|
||
440000
|
unkown
|
page write copy
|
||
43C000
|
unkown
|
page read and write
|
||
3740000
|
direct allocation
|
page read and write
|
||
6630000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
38BD000
|
direct allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page execute and read and write
|
||
126A000
|
trusted library allocation
|
page execute and read and write
|
||
3250000
|
heap
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
3790000
|
direct allocation
|
page read and write
|
||
36C3000
|
direct allocation
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
38B9000
|
direct allocation
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
524D000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
63AD000
|
stack
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
AE9000
|
stack
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page execute and read and write
|
||
371000
|
unkown
|
page execute read
|
||
FBF000
|
heap
|
page read and write
|
||
38BD000
|
direct allocation
|
page read and write
|
||
3D69000
|
trusted library allocation
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
7FA10000
|
trusted library allocation
|
page execute and read and write
|
||
1077000
|
heap
|
page read and write
|
||
38B9000
|
direct allocation
|
page read and write
|
||
444000
|
unkown
|
page readonly
|
||
BBE000
|
stack
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
3740000
|
direct allocation
|
page read and write
|
||
2E17000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
heap
|
page read and write
|
||
61A1000
|
heap
|
page read and write
|
||
3713000
|
direct allocation
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page readonly
|
||
432000
|
unkown
|
page readonly
|
||
3D41000
|
trusted library allocation
|
page read and write
|
||
5241000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
1244000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
10CF000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
12C7000
|
heap
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
DCB000
|
heap
|
page read and write
|
||
386D000
|
direct allocation
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
ECB000
|
heap
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
2D1C000
|
stack
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
111B000
|
heap
|
page read and write
|
||
444000
|
unkown
|
page readonly
|
||
3790000
|
direct allocation
|
page read and write
|
||
392E000
|
direct allocation
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
2E45000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
124D000
|
trusted library allocation
|
page execute and read and write
|
||
64EE000
|
stack
|
page read and write
|
||
540C000
|
stack
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
3790000
|
direct allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
125D000
|
trusted library allocation
|
page execute and read and write
|
||
38BD000
|
direct allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
3869000
|
direct allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
386D000
|
direct allocation
|
page read and write
|
||
1243000
|
trusted library allocation
|
page execute and read and write
|
||
4D48000
|
trusted library allocation
|
page read and write
|
||
432000
|
unkown
|
page readonly
|
||
1277000
|
trusted library allocation
|
page execute and read and write
|
||
38DE000
|
direct allocation
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
38DE000
|
direct allocation
|
page read and write
|
||
DB8000
|
heap
|
page read and write
|
||
3DA1000
|
trusted library allocation
|
page read and write
|
||
3254000
|
heap
|
page read and write
|
||
2E2C000
|
trusted library allocation
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
578F000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
6890000
|
heap
|
page read and write
|
||
392E000
|
direct allocation
|
page read and write
|
||
197E000
|
stack
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
43C000
|
unkown
|
page write copy
|
||
660B000
|
trusted library allocation
|
page read and write
|
||
522B000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page execute and read and write
|
||
560000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
BFF000
|
stack
|
page read and write
|
||
38B9000
|
direct allocation
|
page read and write
|
||
65EE000
|
stack
|
page read and write
|
||
3869000
|
direct allocation
|
page read and write
|
||
36C3000
|
direct allocation
|
page read and write
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
1266000
|
trusted library allocation
|
page execute and read and write
|
||
568E000
|
stack
|
page read and write
|
||
DBD000
|
heap
|
page read and write
|
||
BE9000
|
stack
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
40C000
|
unkown
|
page readonly
|
||
1075000
|
heap
|
page read and write
|
||
6610000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page read and write
|
||
DBD000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
392E000
|
direct allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
direct allocation
|
page read and write
|
||
65F7000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
3740000
|
direct allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
38DE000
|
direct allocation
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
3869000
|
direct allocation
|
page read and write
|
||
35F0000
|
direct allocation
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
6184000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
371000
|
unkown
|
page execute read
|
||
F74000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page execute and read and write
|
||
2DFC000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
36C3000
|
direct allocation
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
550C000
|
stack
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
CE0000
|
direct allocation
|
page execute and read and write
|
||
127B000
|
trusted library allocation
|
page execute and read and write
|
||
6130000
|
heap
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
386D000
|
direct allocation
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
1272000
|
trusted library allocation
|
page read and write
|
||
1101000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
3713000
|
direct allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
stack
|
page read and write
|
||
5232000
|
trusted library allocation
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
EF9000
|
heap
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
10BB000
|
heap
|
page read and write
|
||
2EA000
|
stack
|
page read and write
|
There are 206 hidden memdumps, click here to show them.