Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33p
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://103.130.147.85
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.130.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
140002000
|
remote allocation
|
page execute and read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
13C95000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
13AA1000
|
trusted library allocation
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
7FFAAC54D000
|
trusted library allocation
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3633000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page execute and read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
3893000
|
trusted library allocation
|
page read and write
|
||
18C0000
|
heap
|
page execute and read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
1E3DE000
|
stack
|
page read and write
|
||
7FFAAC54B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC53D000
|
trusted library allocation
|
page execute and read and write
|
||
E03000
|
heap
|
page read and write
|
||
7FFAAC5D6000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
trusted library allocation
|
page read and write
|
||
3801000
|
trusted library allocation
|
page read and write
|
||
37A5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54D000
|
trusted library allocation
|
page execute and read and write
|
||
386D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
7FFAAC6C2000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
1ED20000
|
heap
|
page read and write
|
||
3998000
|
trusted library allocation
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
136B1000
|
trusted library allocation
|
page read and write
|
||
37A2000
|
trusted library allocation
|
page read and write
|
||
7FF4DEEE0000
|
trusted library allocation
|
page execute and read and write
|
||
3868000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page read and write
|
||
1D6FF000
|
stack
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
1D0E000
|
stack
|
page read and write
|
||
1C1B1000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FFAAC713000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
7FFAAC544000
|
trusted library allocation
|
page read and write
|
||
39A1000
|
trusted library allocation
|
page read and write
|
||
3991000
|
trusted library allocation
|
page read and write
|
||
39EC000
|
trusted library allocation
|
page read and write
|
||
3864000
|
trusted library allocation
|
page read and write
|
||
1C7DE000
|
stack
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
1043000
|
trusted library allocation
|
page read and write
|
||
37B5000
|
trusted library allocation
|
page read and write
|
||
7FFB0BA42000
|
unkown
|
page readonly
|
||
13723000
|
trusted library allocation
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
39AF000
|
trusted library allocation
|
page read and write
|
||
3860000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page read and write
|
||
1CC40000
|
heap
|
page read and write
|
||
38BA000
|
trusted library allocation
|
page read and write
|
||
1E7DE000
|
stack
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
39E5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC54B000
|
trusted library allocation
|
page execute and read and write
|
||
13748000
|
trusted library allocation
|
page read and write
|
||
1CE90000
|
trusted library section
|
page read and write
|
||
7FFAAC606000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page execute and read and write
|
||
C2D000
|
stack
|
page read and write
|
||
3812000
|
trusted library allocation
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
37B9000
|
trusted library allocation
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
7FFAAC533000
|
trusted library allocation
|
page read and write
|
||
1373F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC744000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
1DAFE000
|
stack
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC522000
|
trusted library allocation
|
page read and write
|
||
1C20C000
|
stack
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page execute and read and write
|
||
37E9000
|
trusted library allocation
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
13A98000
|
trusted library allocation
|
page read and write
|
||
1C6C4000
|
heap
|
page read and write
|
||
1C170000
|
heap
|
page read and write
|
||
7FFAAC5D6000
|
trusted library allocation
|
page read and write
|
||
3850000
|
trusted library allocation
|
page read and write
|
||
E6C000
|
heap
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
7FFAAC57C000
|
trusted library allocation
|
page execute and read and write
|
||
39AB000
|
trusted library allocation
|
page read and write
|
||
398D000
|
trusted library allocation
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
1C1AF000
|
heap
|
page read and write
|
||
7FFB0BA40000
|
unkown
|
page read and write
|
||
7FFAAC73D000
|
trusted library allocation
|
page read and write
|
||
1CB40000
|
heap
|
page read and write
|
||
7FFAAC53D000
|
trusted library allocation
|
page execute and read and write
|
||
DF2000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
1E8FE000
|
stack
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
3854000
|
trusted library allocation
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
1C5F0000
|
heap
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page execute and read and write
|
||
13E04000
|
trusted library allocation
|
page read and write
|
||
7FFAAC606000
|
trusted library allocation
|
page execute and read and write
|
||
E2D000
|
heap
|
page read and write
|
||
1C290000
|
heap
|
page execute and read and write
|
||
385C000
|
trusted library allocation
|
page read and write
|
||
3530000
|
heap
|
page execute and read and write
|
||
EA5000
|
heap
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
1C5D0000
|
trusted library section
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
37C9000
|
trusted library allocation
|
page read and write
|
||
39B4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
39DF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
1EBDE000
|
stack
|
page read and write
|
||
1D2FF000
|
stack
|
page read and write
|
||
7FFAAC523000
|
trusted library allocation
|
page execute and read and write
|
||
31B3000
|
heap
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page execute and read and write
|
||
DEC000
|
heap
|
page read and write
|
||
3630000
|
heap
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
1BAC0000
|
trusted library allocation
|
page read and write
|
||
1E300000
|
heap
|
page read and write
|
||
7FFAAC57C000
|
trusted library allocation
|
page execute and read and write
|
||
37A8000
|
trusted library allocation
|
page read and write
|
||
7FFB0BA20000
|
unkown
|
page readonly
|
||
E7D000
|
heap
|
page read and write
|
||
7FFAAC739000
|
trusted library allocation
|
page read and write
|
||
1C6F0000
|
trusted library section
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
1CB3C000
|
stack
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
1905000
|
heap
|
page read and write
|
||
3A2B000
|
trusted library allocation
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFAAC6E8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC544000
|
trusted library allocation
|
page read and write
|
||
38A6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC524000
|
trusted library allocation
|
page read and write
|
||
13754000
|
trusted library allocation
|
page read and write
|
||
38DC000
|
trusted library allocation
|
page read and write
|
||
3A91000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FFB0BA45000
|
unkown
|
page readonly
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
DF2000
|
stack
|
page read and write
|
||
3689000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
13A91000
|
trusted library allocation
|
page read and write
|
||
3BB3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5DC000
|
trusted library allocation
|
page execute and read and write
|
||
37AB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page execute and read and write
|
||
11C5000
|
heap
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1786000
|
heap
|
page read and write
|
||
7FFB0BA36000
|
unkown
|
page readonly
|
||
1DEFE000
|
stack
|
page read and write
|
||
13BAB000
|
trusted library allocation
|
page read and write
|
||
3817000
|
trusted library allocation
|
page read and write
|
||
3520000
|
trusted library section
|
page read and write
|
||
7FFB0BA21000
|
unkown
|
page execute read
|
||
7FFAAC524000
|
trusted library allocation
|
page read and write
|
||
7FFAAC717000
|
trusted library allocation
|
page read and write
|
||
1E2FB000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page execute and read and write
|
||
E00000
|
heap
|
page read and write
|
||
380A000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
1BE2D000
|
stack
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FFAAC52D000
|
trusted library allocation
|
page execute and read and write
|
||
38D8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
380E000
|
trusted library allocation
|
page read and write
|
||
140022000
|
remote allocation
|
page execute and read and write
|
||
37AE000
|
trusted library allocation
|
page read and write
|
||
39F2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC52D000
|
trusted library allocation
|
page execute and read and write
|
||
EAC000
|
heap
|
page read and write
|
||
177E000
|
stack
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
1C208000
|
heap
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5DC000
|
trusted library allocation
|
page execute and read and write
|
||
1900000
|
heap
|
page read and write
|
||
1C710000
|
heap
|
page read and write
|
||
1C730000
|
heap
|
page read and write
|
||
7FFAAC6EB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC523000
|
trusted library allocation
|
page execute and read and write
|
||
19CF000
|
stack
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
There are 223 hidden memdumps, click here to show them.