Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
whiteee.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut7961.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut7991.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\eupolyzoan
|
ASCII text, with very long lines (28680), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\horrify
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\whiteee.exe
|
"C:\Users\user\Desktop\whiteee.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\whiteee.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
checkip.dyndns.org
|
unknown
|
||
56.126.166.20.in-addr.arpa
|
unknown
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B11000
|
trusted library allocation
|
page read and write
|
||
1100000
|
direct allocation
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
117F000
|
heap
|
page read and write
|
||
3D49000
|
direct allocation
|
page read and write
|
||
6650000
|
heap
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
43C000
|
unkown
|
page write copy
|
||
121F000
|
heap
|
page read and write
|
||
3D4D000
|
direct allocation
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
2BBB000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
63CE000
|
stack
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page readonly
|
||
1174000
|
heap
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
2C5E000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1175000
|
heap
|
page read and write
|
||
1E90000
|
heap
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
612F000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
3D4D000
|
direct allocation
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
3C20000
|
direct allocation
|
page read and write
|
||
3D49000
|
direct allocation
|
page read and write
|
||
2C12000
|
trusted library allocation
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
2D4E000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
654F000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
3B7C000
|
trusted library allocation
|
page read and write
|
||
444000
|
unkown
|
page readonly
|
||
DED000
|
trusted library allocation
|
page execute and read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
640E000
|
stack
|
page read and write
|
||
2AC6000
|
trusted library allocation
|
page read and write
|
||
3DBE000
|
direct allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
1EA0000
|
heap
|
page read and write
|
||
2AE6000
|
trusted library allocation
|
page read and write
|
||
3BA3000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
3B39000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2C62000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page execute and read and write
|
||
11D2000
|
heap
|
page read and write
|
||
3DBE000
|
direct allocation
|
page read and write
|
||
3D49000
|
direct allocation
|
page read and write
|
||
E8A000
|
heap
|
page read and write
|
||
2CD3000
|
trusted library allocation
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
2D62000
|
trusted library allocation
|
page read and write
|
||
3DBE000
|
direct allocation
|
page read and write
|
||
6573000
|
trusted library allocation
|
page read and write
|
||
DF6000
|
trusted library allocation
|
page execute and read and write
|
||
657A000
|
trusted library allocation
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
655B000
|
trusted library allocation
|
page read and write
|
||
2C97000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
stack
|
page read and write
|
||
3BA3000
|
direct allocation
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
6550000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
DFA000
|
trusted library allocation
|
page execute and read and write
|
||
DD4000
|
trusted library allocation
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
51A3000
|
heap
|
page read and write
|
||
65B0000
|
trusted library allocation
|
page read and write
|
||
6610000
|
trusted library allocation
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
3BA3000
|
direct allocation
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
3D4D000
|
direct allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page execute and read and write
|
||
60CE000
|
stack
|
page read and write
|
||
2BDB000
|
trusted library allocation
|
page read and write
|
||
E68000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
2BD8000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page write copy
|
||
11D2000
|
heap
|
page read and write
|
||
3A80000
|
direct allocation
|
page read and write
|
||
628E000
|
stack
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
2DA5000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
3D49000
|
direct allocation
|
page read and write
|
||
432000
|
unkown
|
page readonly
|
||
6590000
|
trusted library allocation
|
page execute and read and write
|
||
638E000
|
stack
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
3A80000
|
direct allocation
|
page read and write
|
||
5050000
|
heap
|
page execute and read and write
|
||
E6B000
|
stack
|
page read and write
|
||
371000
|
unkown
|
page execute read
|
||
DF2000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
trusted library allocation
|
page read and write
|
||
620E000
|
stack
|
page read and write
|
||
2ACB000
|
trusted library allocation
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
371000
|
unkown
|
page execute read
|
||
3C20000
|
direct allocation
|
page read and write
|
||
2AED000
|
trusted library allocation
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
E9C000
|
heap
|
page read and write
|
||
657F000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
3A80000
|
direct allocation
|
page read and write
|
||
2BF3000
|
trusted library allocation
|
page read and write
|
||
3BA3000
|
direct allocation
|
page read and write
|
||
EDC000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
6580000
|
trusted library allocation
|
page execute and read and write
|
||
3D49000
|
direct allocation
|
page read and write
|
||
2CA5000
|
trusted library allocation
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
3D4D000
|
direct allocation
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
3C20000
|
direct allocation
|
page read and write
|
||
432000
|
unkown
|
page readonly
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
E05000
|
trusted library allocation
|
page execute and read and write
|
||
3C20000
|
direct allocation
|
page read and write
|
||
3D4D000
|
direct allocation
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
6138000
|
heap
|
page read and write
|
||
3DBE000
|
direct allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
stack
|
page read and write
|
||
8AA000
|
stack
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
2D53000
|
trusted library allocation
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
3BA3000
|
direct allocation
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page readonly
|
||
43C000
|
unkown
|
page read and write
|
||
E0B000
|
trusted library allocation
|
page execute and read and write
|
||
2C6A000
|
trusted library allocation
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
DDD000
|
trusted library allocation
|
page execute and read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
2ADA000
|
trusted library allocation
|
page read and write
|
||
3DBE000
|
direct allocation
|
page read and write
|
||
2C66000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
6560000
|
trusted library allocation
|
page execute and read and write
|
||
624E000
|
stack
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page execute and read and write
|
||
60DE000
|
heap
|
page read and write
|
||
3A80000
|
direct allocation
|
page read and write
|
||
3C20000
|
direct allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
3D49000
|
direct allocation
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
613E000
|
heap
|
page read and write
|
||
2C89000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
direct allocation
|
page execute and read and write
|
||
1E94000
|
heap
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
6556000
|
trusted library allocation
|
page read and write
|
||
6570000
|
trusted library allocation
|
page read and write
|
||
3BA3000
|
direct allocation
|
page read and write
|
||
60D0000
|
heap
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
3DBE000
|
direct allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
2ADE000
|
trusted library allocation
|
page read and write
|
||
3B11000
|
trusted library allocation
|
page read and write
|
||
2CC4000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
trusted library allocation
|
page execute and read and write
|
||
2C56000
|
trusted library allocation
|
page read and write
|
||
E07000
|
trusted library allocation
|
page execute and read and write
|
||
6558000
|
trusted library allocation
|
page read and write
|
||
2D59000
|
trusted library allocation
|
page read and write
|
||
2D6C000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
direct allocation
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
615D000
|
heap
|
page read and write
|
||
6123000
|
heap
|
page read and write
|
||
2BCF000
|
trusted library allocation
|
page read and write
|
||
444000
|
unkown
|
page readonly
|
||
3C20000
|
direct allocation
|
page read and write
|
||
1D2E000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
E02000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
60F4000
|
heap
|
page read and write
|
||
117C000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
2D99000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
3BAC000
|
trusted library allocation
|
page read and write
|
||
2BCC000
|
trusted library allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
2C7B000
|
trusted library allocation
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
3D4D000
|
direct allocation
|
page read and write
|
||
FDD000
|
stack
|
page read and write
|
||
3A80000
|
direct allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
5FCE000
|
stack
|
page read and write
|
||
3B96000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page execute and read and write
|
||
3BA3000
|
direct allocation
|
page read and write
|
||
2BC3000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
111F000
|
stack
|
page read and write
|
||
3BA0000
|
trusted library allocation
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
9A7000
|
stack
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
There are 260 hidden memdumps, click here to show them.