Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DHL_VTER000105453.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_VTER000105453.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DHL_VTER000105453.exe
|
"C:\Users\user\Desktop\DHL_VTER000105453.exe"
|
||
C:\Users\user\Desktop\DHL_VTER000105453.exe
|
"C:\Users\user\Desktop\DHL_VTER000105453.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
172.67.74.152
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://tempuri.org/DataSeta.xsd)Microsoft
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://nl9.nlkoddos.com
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
nl9.nlkoddos.com
|
89.249.49.141
|
||
api.ipify.org
|
172.67.74.152
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.249.49.141
|
nl9.nlkoddos.com
|
Russian Federation
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DHL_VTER000105453_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C1E000
|
trusted library allocation
|
page read and write
|
||
2BF5000
|
trusted library allocation
|
page read and write
|
||
252A000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
366E000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library section
|
page read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
2491000
|
trusted library allocation
|
page read and write
|
||
2292000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
6EE41000
|
unkown
|
page execute read
|
||
1032000
|
trusted library allocation
|
page read and write
|
||
22A2000
|
trusted library allocation
|
page read and write
|
||
4FDB000
|
trusted library allocation
|
page read and write
|
||
3B91000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
stack
|
page read and write
|
||
22F0000
|
heap
|
page execute and read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page execute and read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
103B000
|
trusted library allocation
|
page execute and read and write
|
||
7160000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
heap
|
page execute and read and write
|
||
66F0000
|
heap
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page execute and read and write
|
||
4A52000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
553F000
|
stack
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
2968000
|
trusted library allocation
|
page read and write
|
||
152000
|
unkown
|
page readonly
|
||
4F30000
|
trusted library section
|
page read and write
|
||
6EE40000
|
unkown
|
page readonly
|
||
ACF000
|
stack
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
68A0000
|
trusted library allocation
|
page read and write
|
||
6333000
|
heap
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
3535000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
228D000
|
trusted library allocation
|
page execute and read and write
|
||
5600000
|
heap
|
page read and write
|
||
6270000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
229A000
|
trusted library allocation
|
page execute and read and write
|
||
C60000
|
heap
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
499D000
|
trusted library allocation
|
page read and write
|
||
6EE5F000
|
unkown
|
page readonly
|
||
3BF8000
|
trusted library allocation
|
page read and write
|
||
62BA000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
6EE5D000
|
unkown
|
page read and write
|
||
2BDD000
|
trusted library allocation
|
page read and write
|
||
2BD9000
|
trusted library allocation
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
2290000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
662F000
|
stack
|
page read and write
|
||
49A2000
|
trusted library allocation
|
page read and write
|
||
9C9000
|
stack
|
page read and write
|
||
67FD000
|
stack
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
5EED000
|
stack
|
page read and write
|
||
97FF000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
44D8000
|
trusted library allocation
|
page read and write
|
||
2280000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page execute and read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
6907000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
66FE000
|
heap
|
page read and write
|
||
55F0000
|
heap
|
page read and write
|
||
5FEE000
|
stack
|
page read and write
|
||
1035000
|
trusted library allocation
|
page execute and read and write
|
||
6EE5D000
|
unkown
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
651000
|
heap
|
page read and write
|
||
22A7000
|
trusted library allocation
|
page execute and read and write
|
||
52B0000
|
heap
|
page execute and read and write
|
||
F3E000
|
unkown
|
page read and write
|
||
4B8C000
|
stack
|
page read and write
|
||
5002000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2C2E000
|
trusted library allocation
|
page read and write
|
||
2C28000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
22AB000
|
trusted library allocation
|
page execute and read and write
|
||
707000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
602D000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
95FE000
|
stack
|
page read and write
|
||
612F000
|
stack
|
page read and write
|
||
4996000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
689D000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
7FD00000
|
trusted library allocation
|
page execute and read and write
|
||
1026000
|
trusted library allocation
|
page execute and read and write
|
||
2480000
|
heap
|
page read and write
|
||
6D7C000
|
stack
|
page read and write
|
||
2273000
|
trusted library allocation
|
page execute and read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
2BC5000
|
trusted library allocation
|
page read and write
|
||
8CA000
|
stack
|
page read and write
|
||
3BB9000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
trusted library allocation
|
page read and write
|
||
630C000
|
heap
|
page read and write
|
||
96FE000
|
stack
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page execute and read and write
|
||
44D0000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
2283000
|
trusted library allocation
|
page read and write
|
||
243E000
|
stack
|
page read and write
|
||
6D2000
|
heap
|
page read and write
|
||
48A000
|
stack
|
page read and write
|
||
1037000
|
trusted library allocation
|
page execute and read and write
|
||
247C000
|
stack
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
1022000
|
trusted library allocation
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
86E000
|
stack
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
2C38000
|
trusted library allocation
|
page read and write
|
||
683C000
|
stack
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
94FF000
|
stack
|
page read and write
|
||
6911000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
5144000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
8080000
|
heap
|
page read and write
|
||
4FFD000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
6A7B000
|
stack
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
34E7000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
452D000
|
stack
|
page read and write
|
||
498E000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page execute and read and write
|
||
49D5000
|
trusted library allocation
|
page read and write
|
||
ECC000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page execute and read and write
|
||
6FA0000
|
heap
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
22D0000
|
trusted library allocation
|
page execute and read and write
|
||
4974000
|
trusted library allocation
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
100D000
|
trusted library allocation
|
page execute and read and write
|
||
102A000
|
trusted library allocation
|
page execute and read and write
|
||
EA8000
|
heap
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
101D000
|
trusted library allocation
|
page execute and read and write
|
||
68F0000
|
heap
|
page read and write
|
||
6900000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
53FC000
|
stack
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
3583000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
trusted library section
|
page readonly
|
||
227D000
|
trusted library allocation
|
page execute and read and write
|
||
653000
|
heap
|
page read and write
|
||
1003000
|
trusted library allocation
|
page execute and read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
FFB000
|
stack
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
716A000
|
heap
|
page read and write
|
||
4FDE000
|
trusted library allocation
|
page read and write
|
||
462C000
|
stack
|
page read and write
|
||
4A83000
|
heap
|
page read and write
|
||
52FC000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5140000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1004000
|
trusted library allocation
|
page read and write
|
||
587000
|
stack
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
FBE000
|
stack
|
page read and write
|
||
82D000
|
stack
|
page read and write
|
||
4FEE000
|
trusted library allocation
|
page read and write
|
||
F7E000
|
unkown
|
page read and write
|
||
6EE56000
|
unkown
|
page readonly
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
933E000
|
stack
|
page read and write
|
||
6280000
|
heap
|
page read and write
|
||
2270000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
6C7F000
|
stack
|
page read and write
|
||
92FE000
|
stack
|
page read and write
|
||
8070000
|
heap
|
page read and write
|
||
7F9F000
|
stack
|
page read and write
|
||
2B5C000
|
stack
|
page read and write
|
||
64D0000
|
heap
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
stack
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
64AD000
|
stack
|
page read and write
|
||
7D26000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
62F000
|
heap
|
page read and write
|
||
2274000
|
trusted library allocation
|
page read and write
|
||
667D000
|
stack
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
4FF6000
|
trusted library allocation
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page execute and read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page execute and read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
22A0000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
68A5000
|
trusted library allocation
|
page read and write
|
||
6C90000
|
trusted library section
|
page read and write
|
||
4991000
|
trusted library allocation
|
page read and write
|
||
4FF1000
|
trusted library allocation
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
2B74000
|
trusted library allocation
|
page read and write
|
||
3499000
|
trusted library allocation
|
page read and write
|
||
616D000
|
stack
|
page read and write
|
||
2296000
|
trusted library allocation
|
page execute and read and write
|
||
497B000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page execute and read and write
|
||
DBE000
|
stack
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page execute and read and write
|
There are 268 hidden memdumps, click here to show them.