Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
hesaphareketi-015232024.SCR.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hesaphareketi-015232024.SCR.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\hesaphareketi-015232024.SCR.exe
|
"C:\Users\user\Desktop\hesaphareketi-015232024.SCR.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
172.67.74.152
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://tqpas.com
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tqpas.com
|
91.235.116.231
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
91.235.116.231
|
tqpas.com
|
Romania
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
2AEB000
|
trusted library allocation
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
5D9F000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page execute and read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
2F5C000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
788F000
|
stack
|
page read and write
|
||
5174000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
heap
|
page read and write
|
||
3027000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
heap
|
page execute and read and write
|
||
6D89000
|
heap
|
page read and write
|
||
91A0000
|
heap
|
page read and write
|
||
63E6000
|
trusted library allocation
|
page read and write
|
||
C55000
|
trusted library allocation
|
page execute and read and write
|
||
92AF000
|
heap
|
page read and write
|
||
6CFB000
|
stack
|
page read and write
|
||
F0F000
|
heap
|
page read and write
|
||
D58C000
|
stack
|
page read and write
|
||
5D09000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
557C000
|
stack
|
page read and write
|
||
91C0000
|
heap
|
page read and write
|
||
3B49000
|
trusted library allocation
|
page read and write
|
||
3611000
|
trusted library allocation
|
page read and write
|
||
2AE7000
|
trusted library allocation
|
page read and write
|
||
91E2000
|
heap
|
page read and write
|
||
4A81000
|
trusted library allocation
|
page read and write
|
||
C42000
|
trusted library allocation
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page execute and read and write
|
||
92D1000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
35A000
|
stack
|
page read and write
|
||
5770000
|
heap
|
page read and write
|
||
923F000
|
heap
|
page read and write
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page execute and read and write
|
||
AD6000
|
trusted library allocation
|
page execute and read and write
|
||
8FB000
|
heap
|
page read and write
|
||
2816000
|
trusted library allocation
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
664C000
|
stack
|
page read and write
|
||
2C43000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page execute and read and write
|
||
4F00000
|
trusted library allocation
|
page execute and read and write
|
||
F61000
|
heap
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
C57000
|
trusted library allocation
|
page execute and read and write
|
||
EAF000
|
stack
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
272000
|
unkown
|
page readonly
|
||
7B0000
|
heap
|
page read and write
|
||
EE90000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
4A6E000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
2E27000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
8B4000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
heap
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
trusted library allocation
|
page read and write
|
||
2B5D000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
7E6000
|
heap
|
page read and write
|
||
4F9B000
|
stack
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
5D98000
|
heap
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page execute and read and write
|
||
5CEA000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
470B000
|
stack
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
5794000
|
heap
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
2B9B000
|
trusted library allocation
|
page read and write
|
||
27BC000
|
stack
|
page read and write
|
||
625E000
|
stack
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
8C3000
|
trusted library allocation
|
page read and write
|
||
75BE000
|
stack
|
page read and write
|
||
2834000
|
trusted library allocation
|
page read and write
|
||
5DBF000
|
heap
|
page read and write
|
||
55FD000
|
stack
|
page read and write
|
||
9192000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page execute and read and write
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
5DA8000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
828B000
|
stack
|
page read and write
|
||
2D31000
|
trusted library allocation
|
page read and write
|
||
76FE000
|
stack
|
page read and write
|
||
922C000
|
heap
|
page read and write
|
||
6860000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
6890000
|
trusted library allocation
|
page execute and read and write
|
||
561D000
|
trusted library allocation
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
24EB000
|
stack
|
page read and write
|
||
2CF8000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
5DDB000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
71A000
|
stack
|
page read and write
|
||
4ABF000
|
trusted library allocation
|
page read and write
|
||
26BB000
|
stack
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
C46000
|
trusted library allocation
|
page execute and read and write
|
||
6F62000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
547C000
|
stack
|
page read and write
|
||
92CF000
|
heap
|
page read and write
|
||
2DD7000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
trusted library section
|
page read and write
|
||
26E8000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
9263000
|
heap
|
page read and write
|
||
3003000
|
trusted library allocation
|
page read and write
|
||
4AB8000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page execute and read and write
|
||
9190000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
5CE6000
|
heap
|
page read and write
|
||
639E000
|
stack
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
C4A000
|
trusted library allocation
|
page execute and read and write
|
||
7382000
|
heap
|
page read and write
|
||
4B9D000
|
stack
|
page read and write
|
||
91CC000
|
heap
|
page read and write
|
||
2CAD000
|
trusted library allocation
|
page read and write
|
||
AE7000
|
trusted library allocation
|
page execute and read and write
|
||
67DC000
|
stack
|
page read and write
|
||
5CDD000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
C2D000
|
trusted library allocation
|
page execute and read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
2611000
|
trusted library allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
7F370000
|
trusted library allocation
|
page execute and read and write
|
||
AE2000
|
trusted library allocation
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
BFF000
|
stack
|
page read and write
|
||
92A0000
|
heap
|
page read and write
|
||
9195000
|
heap
|
page read and write
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
2822000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
2D48000
|
trusted library allocation
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
8CD000
|
trusted library allocation
|
page execute and read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
91F5000
|
heap
|
page read and write
|
||
66DC000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
747E000
|
stack
|
page read and write
|
||
2C0E000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page read and write
|
||
64DC000
|
stack
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
281D000
|
trusted library allocation
|
page read and write
|
||
2500000
|
heap
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
265B000
|
stack
|
page read and write
|
||
2B59000
|
trusted library allocation
|
page read and write
|
||
4F1C000
|
stack
|
page read and write
|
||
8B3000
|
trusted library allocation
|
page execute and read and write
|
||
F51000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
3B29000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
3AC9000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
2EBA000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
91D5000
|
heap
|
page read and write
|
||
2B75000
|
trusted library allocation
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
6D80000
|
heap
|
page read and write
|
||
91A4000
|
heap
|
page read and write
|
||
ADA000
|
trusted library allocation
|
page execute and read and write
|
||
280E000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
AEB000
|
trusted library allocation
|
page execute and read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
268C000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
9278000
|
heap
|
page read and write
|
||
2EE4000
|
trusted library allocation
|
page read and write
|
||
4F9C000
|
stack
|
page read and write
|
||
2AE3000
|
trusted library allocation
|
page read and write
|
||
F9B000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
5D92000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
4A86000
|
trusted library allocation
|
page read and write
|
||
4A92000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
5074000
|
heap
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
649F000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
2DEA000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
heap
|
page read and write
|
||
27FB000
|
trusted library allocation
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
C23000
|
trusted library allocation
|
page execute and read and write
|
||
68A0000
|
heap
|
page read and write
|
||
4FC5000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
trusted library allocation
|
page execute and read and write
|
||
914000
|
heap
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
3AA1000
|
trusted library allocation
|
page read and write
|
||
EDB000
|
heap
|
page read and write
|
||
9235000
|
heap
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
C24000
|
trusted library allocation
|
page read and write
|
||
4A64000
|
trusted library allocation
|
page read and write
|
||
4A6B000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library section
|
page read and write
|
||
C5B000
|
trusted library allocation
|
page execute and read and write
|
||
2F0A000
|
trusted library allocation
|
page read and write
|
||
55BC000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library section
|
page readonly
|
||
5760000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
91B9000
|
heap
|
page read and write
|
||
924A000
|
heap
|
page read and write
|
||
C3D000
|
trusted library allocation
|
page execute and read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
63DD000
|
stack
|
page read and write
|
||
5EDD000
|
stack
|
page read and write
|
||
6F8000
|
stack
|
page read and write
|
||
99B000
|
heap
|
page read and write
|
||
9200000
|
heap
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
C52000
|
trusted library allocation
|
page read and write
|
||
4A8D000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
2B55000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page read and write
|
There are 304 hidden memdumps, click here to show them.