Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ynhHNexysa.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ynhHNexysa.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ynhHNexysa.exe
|
"C:\Users\user\Desktop\ynhHNexysa.exe"
|
||
C:\Users\user\Desktop\ynhHNexysa.exe
|
"C:\Users\user\Desktop\ynhHNexysa.exe"
|
||
C:\Users\user\Desktop\ynhHNexysa.exe
|
"C:\Users\user\Desktop\ynhHNexysa.exe"
|
||
C:\Users\user\Desktop\ynhHNexysa.exe
|
"C:\Users\user\Desktop\ynhHNexysa.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
172.67.74.152
|
||
http://smtp.jlahuachem.com
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://tempuri.org/dxsss.xsd
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://us2.smtp.mailhostbox.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
smtp.jlahuachem.com
|
unknown
|
||
us2.smtp.mailhostbox.com
|
208.91.199.225
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.91.198.143
|
unknown
|
United States
|
||
208.91.199.225
|
us2.smtp.mailhostbox.com
|
United States
|
||
208.91.199.223
|
unknown
|
United States
|
||
208.91.199.224
|
unknown
|
United States
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ynhHNexysa_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2AB5000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3FA9000
|
trusted library allocation
|
page read and write
|
||
4024000
|
trusted library allocation
|
page read and write
|
||
1620000
|
trusted library allocation
|
page execute and read and write
|
||
2F40000
|
heap
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
71F0000
|
heap
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
28BC000
|
stack
|
page read and write
|
||
29DE000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
D8A000
|
stack
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page execute and read and write
|
||
CB0000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
62D0000
|
heap
|
page read and write
|
||
3AA7000
|
trusted library allocation
|
page read and write
|
||
15C3000
|
trusted library allocation
|
page execute and read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
D04000
|
trusted library allocation
|
page read and write
|
||
7A9000
|
stack
|
page read and write
|
||
29E2000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page execute and read and write
|
||
66DD000
|
stack
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
2ACF000
|
trusted library allocation
|
page read and write
|
||
F3B000
|
trusted library allocation
|
page execute and read and write
|
||
6364000
|
heap
|
page read and write
|
||
3A69000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
A4DD000
|
stack
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
C50000
|
unkown
|
page readonly
|
||
F37000
|
trusted library allocation
|
page execute and read and write
|
||
2A05000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
A81E000
|
stack
|
page read and write
|
||
75FB000
|
trusted library allocation
|
page read and write
|
||
D03000
|
trusted library allocation
|
page execute and read and write
|
||
15F7000
|
trusted library allocation
|
page execute and read and write
|
||
287E000
|
stack
|
page read and write
|
||
604E000
|
stack
|
page read and write
|
||
7440000
|
heap
|
page read and write
|
||
A5DD000
|
stack
|
page read and write
|
||
2A7F000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
50E3000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
C20000
|
trusted library allocation
|
page execute and read and write
|
||
7F350000
|
trusted library allocation
|
page execute and read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
6510000
|
heap
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
15FB000
|
trusted library allocation
|
page execute and read and write
|
||
128A000
|
heap
|
page read and write
|
||
2A41000
|
trusted library allocation
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
3F81000
|
trusted library allocation
|
page read and write
|
||
2A02000
|
trusted library allocation
|
page read and write
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
D26000
|
trusted library allocation
|
page execute and read and write
|
||
567E000
|
stack
|
page read and write
|
||
15E6000
|
trusted library allocation
|
page execute and read and write
|
||
1340000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
15CD000
|
trusted library allocation
|
page execute and read and write
|
||
6520000
|
trusted library allocation
|
page read and write
|
||
A25E000
|
stack
|
page read and write
|
||
5A75000
|
heap
|
page read and write
|
||
532C000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page execute and read and write
|
||
5030000
|
heap
|
page execute and read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
F32000
|
trusted library allocation
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
A39E000
|
stack
|
page read and write
|
||
7FDB0000
|
trusted library allocation
|
page execute and read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
8DCE000
|
stack
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
A85E000
|
stack
|
page read and write
|
||
56CB000
|
stack
|
page read and write
|
||
78F2000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
CF7000
|
heap
|
page read and write
|
||
29DB000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
trusted library allocation
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library section
|
page readonly
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
1630000
|
heap
|
page execute and read and write
|
||
6529000
|
trusted library allocation
|
page read and write
|
||
650E000
|
stack
|
page read and write
|
||
7462000
|
heap
|
page read and write
|
||
3016000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
7600000
|
trusted library allocation
|
page execute and read and write
|
||
542E000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
15E2000
|
trusted library allocation
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
A49E000
|
stack
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
3BD5000
|
trusted library allocation
|
page read and write
|
||
2A76000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
C58000
|
trusted library allocation
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
1657000
|
heap
|
page read and write
|
||
D0D000
|
trusted library allocation
|
page execute and read and write
|
||
DB3000
|
heap
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1231000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page execute and read and write
|
||
29F6000
|
trusted library allocation
|
page read and write
|
||
15C4000
|
trusted library allocation
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
6697000
|
trusted library allocation
|
page read and write
|
||
62FA000
|
heap
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
A71E000
|
stack
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
29D6000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
7560000
|
trusted library section
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page execute and read and write
|
||
D2A000
|
trusted library allocation
|
page execute and read and write
|
||
515C000
|
stack
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
640E000
|
stack
|
page read and write
|
||
A35E000
|
stack
|
page read and write
|
||
C40000
|
trusted library allocation
|
page execute and read and write
|
||
50DE000
|
stack
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
F35000
|
trusted library allocation
|
page execute and read and write
|
||
507C000
|
stack
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
C52000
|
unkown
|
page readonly
|
||
5860000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
415E000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
trusted library allocation
|
page execute and read and write
|
||
7430000
|
heap
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
2C39000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
5C20000
|
trusted library section
|
page read and write
|
||
3A41000
|
trusted library allocation
|
page read and write
|
||
2FC5000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
15DD000
|
trusted library allocation
|
page execute and read and write
|
||
668D000
|
trusted library allocation
|
page read and write
|
||
5540000
|
heap
|
page execute and read and write
|
||
50E0000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
505B000
|
stack
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
666F000
|
stack
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
A95E000
|
stack
|
page read and write
|
||
6384000
|
heap
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page execute and read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
6320000
|
heap
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
4A48000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
D22000
|
trusted library allocation
|
page read and write
|
||
A21F000
|
stack
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
15EA000
|
trusted library allocation
|
page execute and read and write
|
||
15D3000
|
trusted library allocation
|
page read and write
|
||
5683000
|
heap
|
page read and write
|
||
29EE000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
5C10000
|
trusted library section
|
page read and write
|
||
A5E0000
|
heap
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
7627000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
heap
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
There are 245 hidden memdumps, click here to show them.