Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
R86BRY7DdC.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\R86BRY7DdC.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\Victim_SID[1].bd
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\Ebagelog[1].bd
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\R86BRY7DdC.exe
|
"C:\Users\user\Desktop\R86BRY7DdC.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
193.122.6.168
|
||
https://investdirectinsurance.com/NO
|
unknown
|
||
https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdU
|
unknown
|
||
https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdN
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
https://investdirectinsurance.com/assuence/litesolidCha/Ebagelog.bd
|
172.67.189.102
|
||
http://checkip.dyndns.comh
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdK
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd-
|
unknown
|
||
https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd
|
172.67.189.102
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://investdirectinsurance.com/zOO
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://investdirectinsurance.com/
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdi/certs/Micr
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 11 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
checkip.dyndns.com
|
193.122.6.168
|
||
checkip.dyndns.org
|
unknown
|
||
investdirectinsurance.com
|
172.67.189.102
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.122.6.168
|
checkip.dyndns.com
|
United States
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
172.67.189.102
|
investdirectinsurance.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
128E9000
|
trusted library allocation
|
page read and write
|
||
356B000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
31CF000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page execute and read and write
|
||
14F4000
|
heap
|
page read and write
|
||
443E000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
ABF000
|
heap
|
page read and write
|
||
1478000
|
heap
|
page read and write
|
||
3034000
|
trusted library allocation
|
page read and write
|
||
4417000
|
trusted library allocation
|
page read and write
|
||
A5C000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
3033000
|
trusted library allocation
|
page execute and read and write
|
||
5BD0000
|
heap
|
page execute and read and write
|
||
4447000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page execute and read and write
|
||
6A3D000
|
heap
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
3508000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page execute and read and write
|
||
348F000
|
trusted library allocation
|
page read and write
|
||
1B38E000
|
stack
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
1B28B000
|
stack
|
page read and write
|
||
1519000
|
heap
|
page read and write
|
||
3056000
|
trusted library allocation
|
page execute and read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
3519000
|
trusted library allocation
|
page read and write
|
||
363D000
|
trusted library allocation
|
page read and write
|
||
32EB000
|
trusted library allocation
|
page read and write
|
||
34B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
5E8000
|
unkown
|
page readonly
|
||
6BBE000
|
stack
|
page read and write
|
||
3462000
|
trusted library allocation
|
page read and write
|
||
FE7000
|
stack
|
page read and write
|
||
1B48E000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page execute and read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
35EB000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
3067000
|
trusted library allocation
|
page execute and read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
5986000
|
trusted library allocation
|
page read and write
|
||
B3F000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
5990000
|
heap
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
350C000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
trusted library allocation
|
page read and write
|
||
597E000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
306B000
|
trusted library allocation
|
page execute and read and write
|
||
1B78E000
|
stack
|
page read and write
|
||
32FE000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
35F5000
|
trusted library allocation
|
page read and write
|
||
34FB000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
6E7F000
|
stack
|
page read and write
|
||
2822000
|
trusted library allocation
|
page read and write
|
||
3562000
|
trusted library allocation
|
page read and write
|
||
12803000
|
trusted library allocation
|
page read and write
|
||
1B68E000
|
stack
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
3306000
|
trusted library allocation
|
page read and write
|
||
752000
|
stack
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
304D000
|
trusted library allocation
|
page execute and read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
4431000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
35FE000
|
trusted library allocation
|
page read and write
|
||
3062000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
1BA8E000
|
stack
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
5993000
|
heap
|
page read and write
|
||
A56000
|
heap
|
page read and write
|
||
330D000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
3526000
|
trusted library allocation
|
page read and write
|
||
34F3000
|
trusted library allocation
|
page read and write
|
||
346B000
|
trusted library allocation
|
page read and write
|
||
305A000
|
trusted library allocation
|
page execute and read and write
|
||
A92000
|
heap
|
page read and write
|
||
1B98F000
|
stack
|
page read and write
|
||
34F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
6CFE000
|
stack
|
page read and write
|
||
5988000
|
trusted library allocation
|
page read and write
|
||
5880000
|
trusted library allocation
|
page execute and read and write
|
||
3052000
|
trusted library allocation
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
32F2000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
7FFD9B8F7000
|
trusted library allocation
|
page read and write
|
||
1B7C6000
|
heap
|
page read and write
|
||
345A000
|
trusted library allocation
|
page read and write
|
||
3603000
|
trusted library allocation
|
page read and write
|
||
7FF4BF6D0000
|
trusted library allocation
|
page execute and read and write
|
||
5F5000
|
unkown
|
page readonly
|
||
1250000
|
heap
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
69FF000
|
stack
|
page read and write
|
||
35E5000
|
trusted library allocation
|
page read and write
|
||
43B1000
|
trusted library allocation
|
page read and write
|
||
3065000
|
trusted library allocation
|
page execute and read and write
|
||
5F20000
|
trusted library allocation
|
page execute and read and write
|
||
1B0E0000
|
trusted library section
|
page read and write
|
||
1553000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
26F0000
|
heap
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
443B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
EEA000
|
stack
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
12808000
|
trusted library allocation
|
page read and write
|
||
3632000
|
trusted library allocation
|
page read and write
|
||
5BB3000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
12801000
|
trusted library allocation
|
page read and write
|
||
3040000
|
trusted library allocation
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
12805000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
362B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
3607000
|
trusted library allocation
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
34A5000
|
trusted library allocation
|
page read and write
|
||
34B2000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page execute and read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
34BA000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
1AD8D000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
1B58E000
|
stack
|
page read and write
|
||
34FF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
6B3D000
|
stack
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
7400000
|
heap
|
page read and write
|
||
43D9000
|
trusted library allocation
|
page read and write
|
||
355D000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
582D000
|
stack
|
page read and write
|
||
5D2000
|
unkown
|
page readonly
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
3477000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page execute and read and write
|
||
3474000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
598B000
|
trusted library allocation
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
1B180000
|
heap
|
page read and write
|
||
303D000
|
trusted library allocation
|
page execute and read and write
|
||
3504000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
heap
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
There are 205 hidden memdumps, click here to show them.