Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Factura adjunta.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Halitherses
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Lymnaeidae
|
ASCII text, with very long lines (28756), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut663B.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut6699.tmp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Factura adjunta.exe
|
"C:\Users\user\Desktop\Factura adjunta.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Factura adjunta.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://mail.floormelody.com.sg
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
mail.floormelody.com.sg
|
101.100.211.111
|
||
api.ipify.org
|
104.26.12.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
101.100.211.111
|
mail.floormelody.com.sg
|
Singapore
|
||
104.26.12.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2ADF000
|
heap
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
3EF1000
|
trusted library allocation
|
page read and write
|
||
2F89000
|
trusted library allocation
|
page read and write
|
||
2F57000
|
trusted library allocation
|
page read and write
|
||
5270000
|
trusted library section
|
page read and write
|
||
2E70000
|
trusted library section
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
F46000
|
trusted library allocation
|
page execute and read and write
|
||
542C000
|
heap
|
page read and write
|
||
EBC000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
F52000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
3570000
|
direct allocation
|
page read and write
|
||
FE2000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
664F000
|
stack
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
unkown
|
page write copy
|
||
ED0000
|
heap
|
page read and write
|
||
3699000
|
direct allocation
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page execute and read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
102F000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
5310000
|
heap
|
page execute and read and write
|
||
F11000
|
heap
|
page read and write
|
||
33D0000
|
direct allocation
|
page read and write
|
||
36E9000
|
direct allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
370E000
|
direct allocation
|
page read and write
|
||
375E000
|
direct allocation
|
page read and write
|
||
FF2000
|
heap
|
page read and write
|
||
9C8000
|
stack
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
36ED000
|
direct allocation
|
page read and write
|
||
34F3000
|
direct allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
6BF5000
|
heap
|
page read and write
|
||
8D1000
|
unkown
|
page execute and read and write
|
||
64BF000
|
stack
|
page read and write
|
||
2F29000
|
trusted library allocation
|
page read and write
|
||
881000
|
unkown
|
page execute and write copy
|
||
C30000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
5256000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
F23000
|
trusted library allocation
|
page execute and read and write
|
||
5A0000
|
heap
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
F2D000
|
trusted library allocation
|
page execute and read and write
|
||
D85000
|
heap
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
375E000
|
direct allocation
|
page read and write
|
||
FB2000
|
heap
|
page read and write
|
||
6814000
|
trusted library allocation
|
page read and write
|
||
369D000
|
direct allocation
|
page read and write
|
||
3FF4000
|
trusted library allocation
|
page read and write
|
||
CA000
|
stack
|
page read and write
|
||
760000
|
direct allocation
|
page execute and read and write
|
||
375E000
|
direct allocation
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
2F7F000
|
trusted library allocation
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
FB2000
|
heap
|
page read and write
|
||
5483000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
34F3000
|
direct allocation
|
page read and write
|
||
6940000
|
heap
|
page read and write
|
||
445000
|
system
|
page execute and read and write
|
||
87E000
|
unkown
|
page execute and read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
3543000
|
direct allocation
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
FC2000
|
heap
|
page read and write
|
||
8CA000
|
stack
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
stack
|
page read and write
|
||
36ED000
|
direct allocation
|
page read and write
|
||
6BD0000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
1A7E000
|
stack
|
page read and write
|
||
3699000
|
direct allocation
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
369D000
|
direct allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
stack
|
page read and write
|
||
F82000
|
heap
|
page read and write
|
||
6900000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
2F7D000
|
trusted library allocation
|
page read and write
|
||
F5B000
|
trusted library allocation
|
page execute and read and write
|
||
F33000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
direct allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
F93000
|
heap
|
page read and write
|
||
F24000
|
trusted library allocation
|
page read and write
|
||
6970000
|
trusted library allocation
|
page execute and read and write
|
||
F11000
|
heap
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
7F490000
|
trusted library allocation
|
page execute and read and write
|
||
3699000
|
direct allocation
|
page read and write
|
||
525D000
|
trusted library allocation
|
page read and write
|
||
36ED000
|
direct allocation
|
page read and write
|
||
FE6000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
571C000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
EFB000
|
heap
|
page read and write
|
||
2EDD000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
3543000
|
direct allocation
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page execute and read and write
|
||
660E000
|
stack
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
FCA000
|
heap
|
page read and write
|
||
370E000
|
direct allocation
|
page read and write
|
||
54B6000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
3543000
|
direct allocation
|
page read and write
|
||
3420000
|
direct allocation
|
page read and write
|
||
2F95000
|
trusted library allocation
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
F83000
|
heap
|
page read and write
|
||
7050000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
370E000
|
direct allocation
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
36E9000
|
direct allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
6897000
|
trusted library allocation
|
page read and write
|
||
29D6000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
6820000
|
trusted library allocation
|
page execute and read and write
|
||
680F000
|
stack
|
page read and write
|
||
2F9D000
|
trusted library allocation
|
page read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
EFC000
|
heap
|
page read and write
|
||
F83000
|
heap
|
page read and write
|
||
F3D000
|
trusted library allocation
|
page execute and read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
D70000
|
trusted library section
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
D2D000
|
stack
|
page read and write
|
||
3FB5000
|
trusted library allocation
|
page read and write
|
||
5422000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
17E000
|
stack
|
page read and write
|
||
86F000
|
unkown
|
page execute and read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
34F3000
|
direct allocation
|
page read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
6849000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
F12000
|
heap
|
page read and write
|
||
8D8000
|
unkown
|
page read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
52FC000
|
stack
|
page read and write
|
||
3570000
|
direct allocation
|
page read and write
|
||
5242000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
5428000
|
heap
|
page read and write
|
||
F57000
|
trusted library allocation
|
page execute and read and write
|
||
F11000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
167D000
|
stack
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
524E000
|
trusted library allocation
|
page read and write
|
||
7B1000
|
unkown
|
page execute and read and write
|
||
36E9000
|
direct allocation
|
page read and write
|
||
3570000
|
direct allocation
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
E88000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
2F33000
|
trusted library allocation
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
5A6D000
|
stack
|
page read and write
|
||
4E4000
|
heap
|
page read and write
|
||
FC2000
|
heap
|
page read and write
|
||
865000
|
unkown
|
page execute and read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
750000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
2F9A000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
ECF000
|
heap
|
page read and write
|
||
369D000
|
direct allocation
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
F08000
|
heap
|
page read and write
|
||
F55000
|
trusted library allocation
|
page execute and read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
ECF000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
33D0000
|
direct allocation
|
page read and write
|
||
8D7000
|
unkown
|
page execute and write copy
|
||
F42000
|
trusted library allocation
|
page read and write
|
||
ED1000
|
heap
|
page read and write
|
||
ED0000
|
trusted library section
|
page read and write
|
||
29E8000
|
trusted library allocation
|
page read and write
|
||
678D000
|
stack
|
page read and write
|
||
F4A000
|
trusted library allocation
|
page execute and read and write
|
There are 239 hidden memdumps, click here to show them.