IOC Report
Offer 2024-30496.exe

loading gif

Files

File Path
Type
Category
Malicious
Offer 2024-30496.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Hezron
data
dropped
C:\Users\user\AppData\Local\Temp\aut7867.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut78D6.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\preinhered
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Offer 2024-30496.exe
"C:\Users\user\Desktop\Offer 2024-30496.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Offer 2024-30496.exe"
malicious

URLs

Name
IP
Malicious
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
193.122.6.168
http://checkip.dyndns.com
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/8.46.123.33x
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D71000
trusted library allocation
page read and write
malicious
1200000
direct allocation
page read and write
malicious
2BA1000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2D19000
trusted library allocation
page read and write
2A90000
heap
page read and write
2CE2000
trusted library allocation
page read and write
880000
heap
page read and write
1300000
heap
page read and write
135F000
heap
page read and write
137F000
heap
page read and write
1ABE000
stack
page read and write
54BD000
stack
page read and write
37B4000
heap
page read and write
4D7E000
stack
page read and write
10D0000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2D35000
trusted library allocation
page read and write
A12000
unkown
page readonly
2D51000
trusted library allocation
page read and write
50DE000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
1360000
heap
page read and write
3DC9000
direct allocation
page read and write
655E000
stack
page read and write
A1C000
unkown
page write copy
3C09000
trusted library allocation
page read and write
1300000
heap
page read and write
940000
heap
page read and write
3DCD000
direct allocation
page read and write
12FA000
heap
page read and write
14EA000
heap
page read and write
61E0000
heap
page read and write
5160000
heap
page execute and read and write
135F000
heap
page read and write
1315000
heap
page read and write
3025000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
108E000
stack
page read and write
10CD000
trusted library allocation
page execute and read and write
2FDA000
trusted library allocation
page read and write
3DC9000
direct allocation
page read and write
12C8000
heap
page read and write
3DC9000
direct allocation
page read and write
950000
unkown
page readonly
132F000
heap
page read and write
635E000
stack
page read and write
D3E000
stack
page read and write
6C10000
heap
page read and write
1130000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
3DCD000
direct allocation
page read and write
3DCD000
direct allocation
page read and write
14AB000
heap
page read and write
55BF000
stack
page read and write
14ED000
heap
page read and write
2D63000
trusted library allocation
page read and write
9EC000
unkown
page readonly
10EA000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
301F000
trusted library allocation
page read and write
2D0C000
trusted library allocation
page read and write
3DCD000
direct allocation
page read and write
5650000
trusted library allocation
page execute and read and write
12F2000
heap
page read and write
50C6000
trusted library allocation
page read and write
3CA0000
direct allocation
page read and write
6262000
heap
page read and write
3B00000
direct allocation
page read and write
A24000
unkown
page readonly
50CB000
trusted library allocation
page read and write
951000
unkown
page execute read
2FD3000
trusted library allocation
page read and write
631E000
stack
page read and write
149F000
heap
page read and write
E75000
heap
page read and write
50E6000
trusted library allocation
page read and write
10F2000
trusted library allocation
page read and write
50CE000
trusted library allocation
page read and write
2CF6000
trusted library allocation
page read and write
10F7000
trusted library allocation
page execute and read and write
5170000
trusted library allocation
page read and write
5663000
trusted library allocation
page read and write
651E000
stack
page read and write
13EE000
heap
page read and write
2C50000
trusted library allocation
page read and write
64DE000
stack
page read and write
3BC9000
trusted library allocation
page read and write
2B9F000
stack
page read and write
3C2E000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
D58000
heap
page read and write
1EBF000
stack
page read and write
3E3E000
direct allocation
page read and write
950000
unkown
page readonly
2FF1000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
14BB000
heap
page read and write
2CA2000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
5240000
heap
page read and write
3C3A000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
1120000
trusted library allocation
page execute and read and write
50F2000
trusted library allocation
page read and write
3CA0000
direct allocation
page read and write
135F000
heap
page read and write
3C23000
direct allocation
page read and write
6680000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
D79000
heap
page read and write
135F000
heap
page read and write
566A000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
14EF000
heap
page read and write
302B000
trusted library allocation
page read and write
10C4000
trusted library allocation
page read and write
519E000
trusted library allocation
page read and write
639E000
stack
page read and write
6240000
heap
page read and write
1300000
heap
page read and write
3019000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
6224000
heap
page read and write
3CA0000
direct allocation
page read and write
10DD000
trusted library allocation
page execute and read and write
3B00000
direct allocation
page read and write
11EF000
stack
page read and write
3CA0000
direct allocation
page read and write
10F5000
trusted library allocation
page execute and read and write
135F000
heap
page read and write
3C23000
direct allocation
page read and write
1110000
trusted library allocation
page read and write
3B00000
direct allocation
page read and write
134E000
heap
page read and write
2CAA000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
60DE000
stack
page read and write
11DB000
stack
page read and write
E3D000
heap
page read and write
3CA0000
direct allocation
page read and write
50DA000
trusted library allocation
page read and write
14FA000
heap
page read and write
1340000
heap
page read and write
E70000
heap
page read and write
10C3000
trusted library allocation
page execute and read and write
14E9000
heap
page read and write
37B0000
heap
page read and write
3C23000
direct allocation
page read and write
3B00000
direct allocation
page read and write
14BC000
heap
page read and write
649F000
stack
page read and write
50ED000
trusted library allocation
page read and write
11FF000
stack
page read and write
135F000
heap
page read and write
3BA1000
trusted library allocation
page read and write
400000
system
page execute and read and write
830000
heap
page read and write
2CFA000
trusted library allocation
page read and write
142F000
heap
page read and write
104E000
stack
page read and write
2FE3000
trusted library allocation
page read and write
A24000
unkown
page readonly
2A13000
heap
page read and write
3E3E000
direct allocation
page read and write
124E000
stack
page read and write
2CEE000
trusted library allocation
page read and write
14C0000
heap
page read and write
8FE000
stack
page read and write
2C58000
trusted library allocation
page read and write
3CA0000
direct allocation
page read and write
3C23000
direct allocation
page read and write
2C6B000
trusted library allocation
page read and write
29F0000
heap
page read and write
2A20000
heap
page execute and read and write
135F000
heap
page read and write
2FED000
trusted library allocation
page read and write
2C68000
trusted library allocation
page read and write
566F000
trusted library allocation
page read and write
665E000
stack
page read and write
5190000
trusted library allocation
page read and write
61DE000
stack
page read and write
2CEA000
trusted library allocation
page read and write
130F000
heap
page read and write
A20000
unkown
page write copy
3C23000
direct allocation
page read and write
12F3000
heap
page read and write
2FF6000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page read and write
3C25000
trusted library allocation
page read and write
3DC9000
direct allocation
page read and write
3E3E000
direct allocation
page read and write
5648000
trusted library allocation
page read and write
12C0000
heap
page read and write
11BF000
stack
page read and write
6670000
trusted library allocation
page execute and read and write
7C9000
stack
page read and write
14AB000
heap
page read and write
D86000
heap
page read and write
87D000
stack
page read and write
98A000
stack
page read and write
2C83000
trusted library allocation
page read and write
620C000
heap
page read and write
3C23000
direct allocation
page read and write
3E3E000
direct allocation
page read and write
14BA000
heap
page read and write
1140000
heap
page read and write
10F0000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
3DCD000
direct allocation
page read and write
2D27000
trusted library allocation
page read and write
8B0000
heap
page read and write
134E000
heap
page read and write
10E2000
trusted library allocation
page read and write
12FA000
heap
page read and write
3DC9000
direct allocation
page read and write
3B00000
direct allocation
page read and write
D40000
heap
page read and write
2A6E000
stack
page read and write
10FB000
trusted library allocation
page execute and read and write
9EC000
unkown
page readonly
66A0000
trusted library allocation
page read and write
14FA000
heap
page read and write
11CE000
stack
page read and write
6660000
trusted library allocation
page execute and read and write
4C7E000
stack
page read and write
10E6000
trusted library allocation
page execute and read and write
2CF2000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
3DC9000
direct allocation
page read and write
A12000
unkown
page readonly
12E3000
heap
page read and write
951000
unkown
page execute read
10B0000
heap
page read and write
A1C000
unkown
page read and write
2A10000
heap
page read and write
6730000
trusted library allocation
page execute and read and write
BD0000
direct allocation
page execute and read and write
133F000
heap
page read and write
CF7000
stack
page read and write
D6E000
heap
page read and write
12F2000
heap
page read and write
3E3E000
direct allocation
page read and write
620E000
heap
page read and write
9F0000
heap
page read and write
3E3E000
direct allocation
page read and write
2050000
heap
page read and write
3DCD000
direct allocation
page read and write
50E1000
trusted library allocation
page read and write
6720000
heap
page read and write
3B00000
direct allocation
page read and write
1467000
heap
page read and write
5646000
trusted library allocation
page read and write
E0B000
heap
page read and write
2C48000
trusted library allocation
page read and write
There are 251 hidden memdumps, click here to show them.