Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NEW ORDER.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Bactris
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Prober
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autDE75.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autDEB4.tmp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\NEW ORDER.exe
|
"C:\Users\user\Desktop\NEW ORDER.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\NEW ORDER.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ip-api.com/line/?fields=hostingS
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
C61000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
1142000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
57AD000
|
stack
|
page read and write
|
||
39CD000
|
direct allocation
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
2EC6000
|
trusted library allocation
|
page read and write
|
||
6081000
|
heap
|
page read and write
|
||
1113000
|
trusted library allocation
|
page execute and read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
526E000
|
trusted library allocation
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
3DF9000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page execute and read and write
|
||
13F8000
|
trusted library allocation
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
494000
|
unkown
|
page readonly
|
||
3700000
|
direct allocation
|
page read and write
|
||
3823000
|
direct allocation
|
page read and write
|
||
F3E000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
5282000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
397D000
|
direct allocation
|
page read and write
|
||
39EE000
|
direct allocation
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
BE9000
|
stack
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
2E9C000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
1132000
|
trusted library allocation
|
page read and write
|
||
494000
|
unkown
|
page readonly
|
||
D05000
|
heap
|
page read and write
|
||
113A000
|
trusted library allocation
|
page execute and read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
3A3E000
|
direct allocation
|
page read and write
|
||
2DD1000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
39C9000
|
direct allocation
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
3E40000
|
trusted library allocation
|
page read and write
|
||
E52000
|
heap
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
CD0000
|
heap
|
page read and write
|
||
39EE000
|
direct allocation
|
page read and write
|
||
1147000
|
trusted library allocation
|
page execute and read and write
|
||
C8C000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
38A0000
|
direct allocation
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
2EEC000
|
trusted library allocation
|
page read and write
|
||
114B000
|
trusted library allocation
|
page execute and read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
1114000
|
trusted library allocation
|
page read and write
|
||
4E0C000
|
stack
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
1A50000
|
heap
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
4F0D000
|
stack
|
page read and write
|
||
5276000
|
trusted library allocation
|
page read and write
|
||
53D3000
|
heap
|
page read and write
|
||
37D3000
|
direct allocation
|
page read and write
|
||
3979000
|
direct allocation
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page execute and read and write
|
||
53D0000
|
heap
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
3A3E000
|
direct allocation
|
page read and write
|
||
39C9000
|
direct allocation
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
6074000
|
heap
|
page read and write
|
||
14E6000
|
heap
|
page read and write
|
||
6060000
|
heap
|
page read and write
|
||
63BE000
|
stack
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
D5F000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
3979000
|
direct allocation
|
page read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
39C9000
|
direct allocation
|
page read and write
|
||
38A0000
|
direct allocation
|
page read and write
|
||
3700000
|
direct allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
58AF000
|
stack
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
397D000
|
direct allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
2ECA000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
6607000
|
trusted library allocation
|
page read and write
|
||
F4A000
|
heap
|
page read and write
|
||
6630000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
604E000
|
heap
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page execute and read and write
|
||
7FD20000
|
trusted library allocation
|
page execute and read and write
|
||
3DD9000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
heap
|
page read and write
|
||
3823000
|
direct allocation
|
page read and write
|
||
2ECC000
|
trusted library allocation
|
page read and write
|
||
3DD1000
|
trusted library allocation
|
page read and write
|
||
57A000
|
stack
|
page read and write
|
||
39CD000
|
direct allocation
|
page read and write
|
||
54DC000
|
stack
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
48C000
|
unkown
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
C00000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
112D000
|
trusted library allocation
|
page execute and read and write
|
||
5256000
|
trusted library allocation
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
397D000
|
direct allocation
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
2ED9000
|
trusted library allocation
|
page read and write
|
||
38A0000
|
direct allocation
|
page read and write
|
||
14B0000
|
heap
|
page execute and read and write
|
||
53CC000
|
stack
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
AEA000
|
stack
|
page read and write
|
||
F56000
|
heap
|
page read and write
|
||
525E000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
37D3000
|
direct allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
5960000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3300000
|
direct allocation
|
page execute and read and write
|
||
F24000
|
heap
|
page read and write
|
||
3700000
|
direct allocation
|
page read and write
|
||
6610000
|
trusted library allocation
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
BDB000
|
stack
|
page read and write
|
||
3324000
|
heap
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
48C000
|
unkown
|
page write copy
|
||
65FE000
|
stack
|
page read and write
|
||
3979000
|
direct allocation
|
page read and write
|
||
37D3000
|
direct allocation
|
page read and write
|
||
2EBC000
|
trusted library allocation
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
6920000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
BFF000
|
stack
|
page read and write
|
||
3A3E000
|
direct allocation
|
page read and write
|
||
2E05000
|
trusted library allocation
|
page read and write
|
||
3823000
|
direct allocation
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
39EE000
|
direct allocation
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
526A000
|
trusted library allocation
|
page read and write
|
||
1136000
|
trusted library allocation
|
page execute and read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
5271000
|
trusted library allocation
|
page read and write
|
||
5987000
|
trusted library allocation
|
page read and write
|
||
39CD000
|
direct allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
6600000
|
trusted library allocation
|
page read and write
|
There are 207 hidden memdumps, click here to show them.