Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
M.V TBN - VESSEL'S DETAILS.docx.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\M.V TBN - VESSEL'S DETAILS.docx.scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe
|
"C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe"
|
||
C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe
|
"C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe"
|
||
C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe
|
"C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe"
|
||
C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe
|
"C:\Users\user\Desktop\M.V TBN - VESSEL'S DETAILS.docx.scr.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://beirutrest.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
beirutrest.com
|
50.87.144.157
|
||
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
50.87.144.157
|
beirutrest.com
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\M_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
4DDD000
|
trusted library allocation
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
49BC000
|
stack
|
page read and write
|
||
A3AE000
|
stack
|
page read and write
|
||
68BD000
|
stack
|
page read and write
|
||
4A2000
|
unkown
|
page readonly
|
||
B2D000
|
trusted library allocation
|
page execute and read and write
|
||
7142000
|
trusted library allocation
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
1856000
|
trusted library allocation
|
page execute and read and write
|
||
5FC0000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page execute and read and write
|
||
70FE000
|
stack
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page execute and read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
B52000
|
trusted library allocation
|
page read and write
|
||
73B0000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
556000
|
unkown
|
page readonly
|
||
1850000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
heap
|
page read and write
|
||
5874000
|
trusted library allocation
|
page read and write
|
||
4D32000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page execute and read and write
|
||
5480000
|
trusted library section
|
page read and write
|
||
B1D000
|
trusted library allocation
|
page execute and read and write
|
||
15CF000
|
heap
|
page read and write
|
||
1589000
|
heap
|
page read and write
|
||
7014000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
183D000
|
trusted library allocation
|
page execute and read and write
|
||
271E000
|
stack
|
page read and write
|
||
1852000
|
trusted library allocation
|
page read and write
|
||
28C1000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page execute and read and write
|
||
950000
|
heap
|
page read and write
|
||
6FBF000
|
stack
|
page read and write
|
||
1865000
|
trusted library allocation
|
page execute and read and write
|
||
1880000
|
trusted library allocation
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
110A000
|
stack
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
B4A000
|
trusted library allocation
|
page execute and read and write
|
||
713E000
|
stack
|
page read and write
|
||
7050000
|
trusted library allocation
|
page execute and read and write
|
||
7610000
|
heap
|
page read and write
|
||
B14000
|
trusted library allocation
|
page read and write
|
||
583B000
|
trusted library allocation
|
page read and write
|
||
4D1E000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
1596000
|
heap
|
page read and write
|
||
15D7000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
4379000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
184D000
|
trusted library allocation
|
page execute and read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
1917000
|
heap
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
6BE4000
|
heap
|
page read and write
|
||
1860000
|
trusted library allocation
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
2790000
|
heap
|
page execute and read and write
|
||
1830000
|
trusted library allocation
|
page read and write
|
||
5842000
|
trusted library allocation
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
39B3000
|
trusted library allocation
|
page read and write
|
||
771F000
|
stack
|
page read and write
|
||
B46000
|
trusted library allocation
|
page execute and read and write
|
||
4FA0000
|
trusted library allocation
|
page execute and read and write
|
||
18B0000
|
heap
|
page read and write
|
||
1862000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
4D21000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
185A000
|
trusted library allocation
|
page execute and read and write
|
||
F20000
|
trusted library allocation
|
page execute and read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
B96000
|
heap
|
page read and write
|
||
162B000
|
heap
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
||
5EA000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
33C6000
|
trusted library allocation
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
5C5C000
|
stack
|
page read and write
|
||
1867000
|
trusted library allocation
|
page execute and read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
trusted library allocation
|
page read and write
|
||
6A40000
|
heap
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
1840000
|
trusted library allocation
|
page read and write
|
||
59DC000
|
stack
|
page read and write
|
||
18A0000
|
trusted library allocation
|
page execute and read and write
|
||
B60000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
B13000
|
trusted library allocation
|
page execute and read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
4D26000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
5862000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
1A1E000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
4E33000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
B42000
|
trusted library allocation
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
3386000
|
trusted library allocation
|
page read and write
|
||
B5B000
|
trusted library allocation
|
page execute and read and write
|
||
3240000
|
heap
|
page execute and read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
BDD000
|
heap
|
page read and write
|
||
8CFF000
|
stack
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
6C58000
|
heap
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
1833000
|
trusted library allocation
|
page execute and read and write
|
||
A1B0000
|
heap
|
page read and write
|
||
7147000
|
trusted library allocation
|
page read and write
|
||
8A58000
|
trusted library allocation
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
43BB000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page execute and read and write
|
||
4E21000
|
trusted library allocation
|
page read and write
|
||
1834000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
7000000
|
trusted library allocation
|
page execute and read and write
|
||
6FF7000
|
trusted library allocation
|
page read and write
|
||
6CBA000
|
heap
|
page read and write
|
||
321C000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library section
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
B57000
|
trusted library allocation
|
page execute and read and write
|
||
4DF0000
|
trusted library allocation
|
page execute and read and write
|
||
157E000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
6CC5000
|
heap
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
5A10000
|
heap
|
page execute and read and write
|
||
7F340000
|
trusted library allocation
|
page execute and read and write
|
||
F37000
|
heap
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
703D000
|
stack
|
page read and write
|
||
2923000
|
trusted library allocation
|
page read and write
|
||
186B000
|
trusted library allocation
|
page execute and read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
1593000
|
heap
|
page read and write
|
||
15EC000
|
heap
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
1A37000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
heap
|
page read and write
|
||
6C85000
|
heap
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
1893000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
6BB0000
|
heap
|
page read and write
|
||
7060000
|
trusted library allocation
|
page execute and read and write
|
||
B69000
|
heap
|
page read and write
|
||
6FD8000
|
trusted library allocation
|
page read and write
|
||
33D2000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
14F9000
|
stack
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
4351000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
4F3B000
|
stack
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
3391000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
7FC90000
|
trusted library allocation
|
page execute and read and write
|
||
C4C000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
79C0000
|
trusted library section
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
5836000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
trusted library section
|
page read and write
|
||
33C8000
|
trusted library allocation
|
page read and write
|
||
781F000
|
stack
|
page read and write
|
||
58BA000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page execute and read and write
|
||
33CA000
|
trusted library allocation
|
page read and write
|
||
339D000
|
trusted library allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
585D000
|
trusted library allocation
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
584E000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library section
|
page readonly
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
33DE000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
4F55000
|
heap
|
page read and write
|
||
6FED000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
trusted library allocation
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
6C40000
|
heap
|
page read and write
|
||
4D2C000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
6DEF000
|
stack
|
page read and write
|
There are 248 hidden memdumps, click here to show them.