Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
tgBNtoWqIp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut8E4A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut8E7A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hepatoduodenostomy
|
ASCII text, with very long lines (28756), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\totten
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\tgBNtoWqIp.exe
|
"C:\Users\user\Desktop\tgBNtoWqIp.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\tgBNtoWqIp.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
http://r3.i.lencr.org/01
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://divanrestoran.com
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
http://mail.divanrestoran.com
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 3 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
divanrestoran.com
|
185.149.100.122
|
||
ip-api.com
|
208.95.112.1
|
||
mail.divanrestoran.com
|
unknown
|
||
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
185.149.100.122
|
divanrestoran.com
|
Turkey
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2BB9000
|
trusted library allocation
|
page read and write
|
||
2BC4000
|
trusted library allocation
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
3B21000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library section
|
page read and write
|
||
5160000
|
trusted library section
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
1D3D000
|
heap
|
page read and write
|
||
1D75000
|
heap
|
page read and write
|
||
1B16000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
1AAD000
|
heap
|
page read and write
|
||
26EB000
|
trusted library allocation
|
page execute and read and write
|
||
111E000
|
stack
|
page read and write
|
||
1B06000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
6F30000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page read and write
|
||
448E000
|
direct allocation
|
page read and write
|
||
51CE000
|
trusted library allocation
|
page read and write
|
||
448E000
|
direct allocation
|
page read and write
|
||
17FC000
|
stack
|
page read and write
|
||
6764000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
26CD000
|
trusted library allocation
|
page execute and read and write
|
||
42A0000
|
direct allocation
|
page read and write
|
||
1028000
|
unkown
|
page readonly
|
||
53EC000
|
stack
|
page read and write
|
||
BF0000
|
trusted library section
|
page read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
1CC8000
|
heap
|
page read and write
|
||
40B0000
|
direct allocation
|
page read and write
|
||
26B4000
|
trusted library allocation
|
page read and write
|
||
7C8000
|
stack
|
page read and write
|
||
3BEA000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
4419000
|
direct allocation
|
page read and write
|
||
443E000
|
direct allocation
|
page read and write
|
||
4419000
|
direct allocation
|
page read and write
|
||
4223000
|
direct allocation
|
page read and write
|
||
42A0000
|
direct allocation
|
page read and write
|
||
2A68000
|
trusted library allocation
|
page read and write
|
||
1B17000
|
heap
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
51DA000
|
trusted library allocation
|
page read and write
|
||
101F000
|
unkown
|
page write copy
|
||
62AD000
|
stack
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
43CD000
|
direct allocation
|
page read and write
|
||
1015000
|
unkown
|
page readonly
|
||
1B67000
|
heap
|
page read and write
|
||
2C89000
|
trusted library allocation
|
page read and write
|
||
3BD2000
|
trusted library allocation
|
page read and write
|
||
F60000
|
unkown
|
page readonly
|
||
C00000
|
heap
|
page read and write
|
||
1D47000
|
heap
|
page read and write
|
||
1A78000
|
heap
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
28FC000
|
stack
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
6799000
|
trusted library allocation
|
page read and write
|
||
1B48000
|
heap
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
443E000
|
direct allocation
|
page read and write
|
||
43C9000
|
direct allocation
|
page read and write
|
||
26C3000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page execute and read and write
|
||
1B19000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
1B07000
|
heap
|
page read and write
|
||
1D99000
|
heap
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
7F9A0000
|
trusted library allocation
|
page execute and read and write
|
||
63EE000
|
stack
|
page read and write
|
||
5486000
|
heap
|
page read and write
|
||
441D000
|
direct allocation
|
page read and write
|
||
1015000
|
unkown
|
page readonly
|
||
26E2000
|
trusted library allocation
|
page read and write
|
||
1AA7000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
42A0000
|
direct allocation
|
page read and write
|
||
2B74000
|
trusted library allocation
|
page read and write
|
||
43CD000
|
direct allocation
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
68C0000
|
trusted library allocation
|
page execute and read and write
|
||
51DE000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
E09000
|
stack
|
page read and write
|
||
6A8D000
|
heap
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
2B6C000
|
trusted library allocation
|
page read and write
|
||
4273000
|
direct allocation
|
page read and write
|
||
277E000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
269F000
|
stack
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
28B7000
|
heap
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
4100000
|
direct allocation
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
6A80000
|
heap
|
page read and write
|
||
26DA000
|
trusted library allocation
|
page execute and read and write
|
||
42F0000
|
direct allocation
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
2C77000
|
trusted library allocation
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
4150000
|
direct allocation
|
page read and write
|
||
F60000
|
unkown
|
page readonly
|
||
68D0000
|
trusted library allocation
|
page read and write
|
||
2717000
|
heap
|
page read and write
|
||
54EE000
|
heap
|
page read and write
|
||
1B9C000
|
heap
|
page read and write
|
||
52EC000
|
stack
|
page read and write
|
||
26BD000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page execute and read and write
|
||
443E000
|
direct allocation
|
page read and write
|
||
1AFE000
|
heap
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
1AA4000
|
heap
|
page read and write
|
||
3C2E000
|
trusted library allocation
|
page read and write
|
||
FEF000
|
unkown
|
page readonly
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
64ED000
|
stack
|
page read and write
|
||
4223000
|
direct allocation
|
page read and write
|
||
1023000
|
unkown
|
page write copy
|
||
226E000
|
stack
|
page read and write
|
||
446000
|
system
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1B28000
|
heap
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
4419000
|
direct allocation
|
page read and write
|
||
4273000
|
direct allocation
|
page read and write
|
||
2733000
|
heap
|
page read and write
|
||
4100000
|
direct allocation
|
page read and write
|
||
6790000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
17DB000
|
stack
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
6867000
|
trusted library allocation
|
page read and write
|
||
42F0000
|
direct allocation
|
page read and write
|
||
42F0000
|
direct allocation
|
page read and write
|
||
1AA2000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
2C7C000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
heap
|
page execute and read and write
|
||
17BF000
|
stack
|
page read and write
|
||
5760000
|
heap
|
page read and write
|
||
4223000
|
direct allocation
|
page read and write
|
||
6770000
|
trusted library allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
26B3000
|
trusted library allocation
|
page execute and read and write
|
||
F61000
|
unkown
|
page execute read
|
||
1D1E000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
43C9000
|
direct allocation
|
page read and write
|
||
4273000
|
direct allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
1B16000
|
heap
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
51CB000
|
trusted library allocation
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
1D32000
|
heap
|
page read and write
|
||
26D6000
|
trusted library allocation
|
page execute and read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
2C1C000
|
trusted library allocation
|
page read and write
|
||
2C65000
|
trusted library allocation
|
page read and write
|
||
51D2000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
4100000
|
direct allocation
|
page read and write
|
||
575D000
|
trusted library allocation
|
page read and write
|
||
2C67000
|
trusted library allocation
|
page read and write
|
||
26D2000
|
trusted library allocation
|
page read and write
|
||
4150000
|
direct allocation
|
page read and write
|
||
5414000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
11B0000
|
direct allocation
|
page execute and read and write
|
||
448E000
|
direct allocation
|
page read and write
|
||
1ABC000
|
heap
|
page read and write
|
||
101F000
|
unkown
|
page read and write
|
||
1028000
|
unkown
|
page readonly
|
||
1B7D000
|
heap
|
page read and write
|
||
43CD000
|
direct allocation
|
page read and write
|
||
6CA000
|
stack
|
page read and write
|
||
1B67000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
F61000
|
unkown
|
page execute read
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
26E7000
|
trusted library allocation
|
page execute and read and write
|
||
441D000
|
direct allocation
|
page read and write
|
||
2B59000
|
trusted library allocation
|
page read and write
|
||
441D000
|
direct allocation
|
page read and write
|
||
1B38000
|
heap
|
page read and write
|
||
AC0000
|
trusted library section
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
43C9000
|
direct allocation
|
page read and write
|
||
68B0000
|
heap
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
1AAD000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page execute and read and write
|
||
1B19000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
659E000
|
stack
|
page read and write
|
||
655D000
|
stack
|
page read and write
|
||
1B68000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
51C6000
|
trusted library allocation
|
page read and write
|
||
675F000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
51E1000
|
trusted library allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
FEF000
|
unkown
|
page readonly
|
||
4C1E000
|
stack
|
page read and write
|
||
1CBE000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
26E5000
|
trusted library allocation
|
page execute and read and write
|
||
10DD000
|
stack
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
51ED000
|
trusted library allocation
|
page read and write
|
||
266F000
|
stack
|
page read and write
|
||
4150000
|
direct allocation
|
page read and write
|
||
2BCD000
|
trusted library allocation
|
page read and write
|
||
51F2000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
2720000
|
trusted library allocation
|
page execute and read and write
|
There are 237 hidden memdumps, click here to show them.