Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Offer 2024-30496.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Hezron
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut7867.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut78D6.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\preinhered
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Offer 2024-30496.exe
|
"C:\Users\user\Desktop\Offer 2024-30496.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Offer 2024-30496.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://checkip.dyndns.com
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33x
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2D71000
|
trusted library allocation
|
page read and write
|
||
1200000
|
direct allocation
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2D19000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
2CE2000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
1ABE000
|
stack
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
37B4000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
2D35000
|
trusted library allocation
|
page read and write
|
||
A12000
|
unkown
|
page readonly
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
3DC9000
|
direct allocation
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
A1C000
|
unkown
|
page write copy
|
||
3C09000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
3DCD000
|
direct allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
14EA000
|
heap
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page execute and read and write
|
||
135F000
|
heap
|
page read and write
|
||
1315000
|
heap
|
page read and write
|
||
3025000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
10CD000
|
trusted library allocation
|
page execute and read and write
|
||
2FDA000
|
trusted library allocation
|
page read and write
|
||
3DC9000
|
direct allocation
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
3DC9000
|
direct allocation
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
132F000
|
heap
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
6C10000
|
heap
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
trusted library allocation
|
page read and write
|
||
3DCD000
|
direct allocation
|
page read and write
|
||
3DCD000
|
direct allocation
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
2D63000
|
trusted library allocation
|
page read and write
|
||
9EC000
|
unkown
|
page readonly
|
||
10EA000
|
trusted library allocation
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
301F000
|
trusted library allocation
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
3DCD000
|
direct allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page execute and read and write
|
||
12F2000
|
heap
|
page read and write
|
||
50C6000
|
trusted library allocation
|
page read and write
|
||
3CA0000
|
direct allocation
|
page read and write
|
||
6262000
|
heap
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
A24000
|
unkown
|
page readonly
|
||
50CB000
|
trusted library allocation
|
page read and write
|
||
951000
|
unkown
|
page execute read
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
149F000
|
heap
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
50E6000
|
trusted library allocation
|
page read and write
|
||
10F2000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
trusted library allocation
|
page read and write
|
||
2CF6000
|
trusted library allocation
|
page read and write
|
||
10F7000
|
trusted library allocation
|
page execute and read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
5663000
|
trusted library allocation
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
13EE000
|
heap
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
3BC9000
|
trusted library allocation
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
3C2E000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
1EBF000
|
stack
|
page read and write
|
||
3E3E000
|
direct allocation
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
2D55000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
trusted library allocation
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
2CA2000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
3C3A000
|
trusted library allocation
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page execute and read and write
|
||
50F2000
|
trusted library allocation
|
page read and write
|
||
3CA0000
|
direct allocation
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
3C23000
|
direct allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
566A000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page execute and read and write
|
||
14EF000
|
heap
|
page read and write
|
||
302B000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
trusted library allocation
|
page read and write
|
||
519E000
|
trusted library allocation
|
page read and write
|
||
639E000
|
stack
|
page read and write
|
||
6240000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
3019000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
6224000
|
heap
|
page read and write
|
||
3CA0000
|
direct allocation
|
page read and write
|
||
10DD000
|
trusted library allocation
|
page execute and read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
3CA0000
|
direct allocation
|
page read and write
|
||
10F5000
|
trusted library allocation
|
page execute and read and write
|
||
135F000
|
heap
|
page read and write
|
||
3C23000
|
direct allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
2CAA000
|
trusted library allocation
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
60DE000
|
stack
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
3CA0000
|
direct allocation
|
page read and write
|
||
50DA000
|
trusted library allocation
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
10C3000
|
trusted library allocation
|
page execute and read and write
|
||
14E9000
|
heap
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
3C23000
|
direct allocation
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
14BC000
|
heap
|
page read and write
|
||
649F000
|
stack
|
page read and write
|
||
50ED000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
830000
|
heap
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
142F000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
2FE3000
|
trusted library allocation
|
page read and write
|
||
A24000
|
unkown
|
page readonly
|
||
2A13000
|
heap
|
page read and write
|
||
3E3E000
|
direct allocation
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
2CEE000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
3CA0000
|
direct allocation
|
page read and write
|
||
3C23000
|
direct allocation
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page execute and read and write
|
||
135F000
|
heap
|
page read and write
|
||
2FED000
|
trusted library allocation
|
page read and write
|
||
2C68000
|
trusted library allocation
|
page read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
665E000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page write copy
|
||
3C23000
|
direct allocation
|
page read and write
|
||
12F3000
|
heap
|
page read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
3C25000
|
trusted library allocation
|
page read and write
|
||
3DC9000
|
direct allocation
|
page read and write
|
||
3E3E000
|
direct allocation
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
6670000
|
trusted library allocation
|
page execute and read and write
|
||
7C9000
|
stack
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
D86000
|
heap
|
page read and write
|
||
87D000
|
stack
|
page read and write
|
||
98A000
|
stack
|
page read and write
|
||
2C83000
|
trusted library allocation
|
page read and write
|
||
620C000
|
heap
|
page read and write
|
||
3C23000
|
direct allocation
|
page read and write
|
||
3E3E000
|
direct allocation
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
3DCD000
|
direct allocation
|
page read and write
|
||
2D27000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
3DC9000
|
direct allocation
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
10FB000
|
trusted library allocation
|
page execute and read and write
|
||
9EC000
|
unkown
|
page readonly
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page execute and read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
10E6000
|
trusted library allocation
|
page execute and read and write
|
||
2CF2000
|
trusted library allocation
|
page read and write
|
||
564B000
|
trusted library allocation
|
page read and write
|
||
3DC9000
|
direct allocation
|
page read and write
|
||
A12000
|
unkown
|
page readonly
|
||
12E3000
|
heap
|
page read and write
|
||
951000
|
unkown
|
page execute read
|
||
10B0000
|
heap
|
page read and write
|
||
A1C000
|
unkown
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
6730000
|
trusted library allocation
|
page execute and read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
133F000
|
heap
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
3E3E000
|
direct allocation
|
page read and write
|
||
620E000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
3E3E000
|
direct allocation
|
page read and write
|
||
2050000
|
heap
|
page read and write
|
||
3DCD000
|
direct allocation
|
page read and write
|
||
50E1000
|
trusted library allocation
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
1467000
|
heap
|
page read and write
|
||
5646000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
There are 251 hidden memdumps, click here to show them.