Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
New_Order_Inquiry.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Sheitan
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut2F3.tmp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\New_Order_Inquiry.exe
|
"C:\Users\user\Desktop\New_Order_Inquiry.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\New_Order_Inquiry.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://mail.zqamcx.com
|
unknown
|
||
http://zqamcx.com
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://r11.i.lencr.org/0#
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.zqamcx.com
|
unknown
|
||
zqamcx.com
|
78.110.166.82
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
78.110.166.82
|
zqamcx.com
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23C5000
|
trusted library allocation
|
page read and write
|
||
412000
|
system
|
page execute and read and write
|
||
2415000
|
trusted library allocation
|
page read and write
|
||
23F2000
|
trusted library allocation
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
5719000
|
heap
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
5BBD000
|
stack
|
page read and write
|
||
C61000
|
unkown
|
page execute read
|
||
3F09000
|
direct allocation
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
3D63000
|
direct allocation
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
642000
|
trusted library allocation
|
page read and write
|
||
1753000
|
heap
|
page read and write
|
||
17A6000
|
heap
|
page read and write
|
||
4852000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
D57000
|
unkown
|
page readonly
|
||
4914000
|
heap
|
page read and write
|
||
D0E000
|
unkown
|
page readonly
|
||
3F0D000
|
direct allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
3F7E000
|
direct allocation
|
page read and write
|
||
154B000
|
heap
|
page read and write
|
||
601E000
|
stack
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
3C40000
|
direct allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
heap
|
page read and write
|
||
3F7E000
|
direct allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
CED000
|
unkown
|
page readonly
|
||
115C000
|
stack
|
page read and write
|
||
D24000
|
unkown
|
page readonly
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
D1A000
|
unkown
|
page write copy
|
||
3D63000
|
direct allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
3F7E000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
3D63000
|
direct allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
3D63000
|
direct allocation
|
page read and write
|
||
6290000
|
heap
|
page read and write
|
||
2423000
|
trusted library allocation
|
page read and write
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
5CA0000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
117B000
|
stack
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
1797000
|
heap
|
page read and write
|
||
5CAB000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
16B5000
|
heap
|
page read and write
|
||
410000
|
system
|
page execute and read and write
|
||
2380000
|
heap
|
page execute and read and write
|
||
3D63000
|
direct allocation
|
page read and write
|
||
3F0D000
|
direct allocation
|
page read and write
|
||
65B000
|
trusted library allocation
|
page execute and read and write
|
||
D1A000
|
unkown
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
3F09000
|
direct allocation
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
62D000
|
trusted library allocation
|
page execute and read and write
|
||
484E000
|
trusted library allocation
|
page read and write
|
||
2411000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
unkown
|
page readonly
|
||
174C000
|
heap
|
page read and write
|
||
210E000
|
stack
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
stack
|
page read and write
|
||
151E000
|
heap
|
page read and write
|
||
15F9000
|
heap
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
61D000
|
trusted library allocation
|
page execute and read and write
|
||
655000
|
trusted library allocation
|
page execute and read and write
|
||
D1F000
|
unkown
|
page write copy
|
||
9DE000
|
stack
|
page read and write
|
||
59FD000
|
stack
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
3F7E000
|
direct allocation
|
page read and write
|
||
3F7E000
|
direct allocation
|
page read and write
|
||
3F0D000
|
direct allocation
|
page read and write
|
||
4B1C000
|
stack
|
page read and write
|
||
C60000
|
unkown
|
page readonly
|
||
1552000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
5F5D000
|
stack
|
page read and write
|
||
3F09000
|
direct allocation
|
page read and write
|
||
652000
|
trusted library allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
657000
|
trusted library allocation
|
page execute and read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
2428000
|
trusted library allocation
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
38F0000
|
heap
|
page read and write
|
||
3F7E000
|
direct allocation
|
page read and write
|
||
3F0D000
|
direct allocation
|
page read and write
|
||
7F990000
|
trusted library allocation
|
page execute and read and write
|
||
484B000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
119D000
|
stack
|
page read and write
|
||
C61000
|
unkown
|
page execute read
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
3C40000
|
direct allocation
|
page read and write
|
||
485E000
|
trusted library allocation
|
page read and write
|
||
2391000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
heap
|
page read and write
|
||
CED000
|
unkown
|
page readonly
|
||
77E000
|
heap
|
page read and write
|
||
3F09000
|
direct allocation
|
page read and write
|
||
3C40000
|
direct allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page execute and read and write
|
||
1555000
|
heap
|
page read and write
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
15F8000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
3F0D000
|
direct allocation
|
page read and write
|
||
174C000
|
heap
|
page read and write
|
||
241D000
|
trusted library allocation
|
page read and write
|
||
116F000
|
stack
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
3D63000
|
direct allocation
|
page read and write
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
5AFD000
|
stack
|
page read and write
|
||
DA000
|
stack
|
page read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
3C40000
|
direct allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
1D0E000
|
stack
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page execute and read and write
|
||
3D63000
|
direct allocation
|
page read and write
|
||
D57000
|
unkown
|
page readonly
|
||
226F000
|
stack
|
page read and write
|
||
3F0D000
|
direct allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
640000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page execute and read and write
|
||
4866000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
stack
|
page read and write
|
||
24FD000
|
trusted library allocation
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
3F09000
|
direct allocation
|
page read and write
|
||
613000
|
trusted library allocation
|
page execute and read and write
|
||
646000
|
trusted library allocation
|
page execute and read and write
|
||
3C40000
|
direct allocation
|
page read and write
|
||
486D000
|
trusted library allocation
|
page read and write
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
242C000
|
trusted library allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
1609000
|
heap
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
1796000
|
heap
|
page read and write
|
||
4900000
|
heap
|
page execute and read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
175F000
|
heap
|
page read and write
|
||
3F7E000
|
direct allocation
|
page read and write
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
2404000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
38F4000
|
heap
|
page read and write
|
||
9C6000
|
heap
|
page read and write
|
||
1628000
|
heap
|
page read and write
|
||
3F0D000
|
direct allocation
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
1D9000
|
stack
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
174B000
|
heap
|
page execute and read and write
|
||
6EE000
|
heap
|
page read and write
|
||
918000
|
trusted library allocation
|
page read and write
|
||
625E000
|
stack
|
page read and write
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
33B9000
|
trusted library allocation
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
4C2E000
|
unkown
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
33F8000
|
trusted library allocation
|
page read and write
|
||
3F09000
|
direct allocation
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
1582000
|
heap
|
page read and write
|
||
3391000
|
trusted library allocation
|
page read and write
|
||
3F09000
|
direct allocation
|
page read and write
|
||
65F0000
|
heap
|
page read and write
|
||
614000
|
trusted library allocation
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
3C40000
|
direct allocation
|
page read and write
|
||
5694000
|
heap
|
page read and write
|
||
4938000
|
heap
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
43CC000
|
stack
|
page read and write
|
||
4F9D000
|
stack
|
page read and write
|
||
64A000
|
trusted library allocation
|
page execute and read and write
|
||
D24000
|
unkown
|
page readonly
|
||
4872000
|
trusted library allocation
|
page read and write
|
||
174C000
|
heap
|
page read and write
|
||
4861000
|
trusted library allocation
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
3C40000
|
direct allocation
|
page read and write
|
||
48EC000
|
stack
|
page read and write
|
There are 214 hidden memdumps, click here to show them.