Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Order Details.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order Details.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Order Details.exe
|
"C:\Users\user\Desktop\Order Details.exe"
|
||
C:\Users\user\Desktop\Order Details.exe
|
"C:\Users\user\Desktop\Order Details.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
https://reallyfreegeoip.org/xml/8.46.123.189
|
104.21.32.1
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.189$
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
104.21.32.1
|
||
checkip.dyndns.com
|
193.122.6.168
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.32.1
|
reallyfreegeoip.org
|
United States
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Order Details_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
3986000
|
trusted library allocation
|
page read and write
|
||
351C000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page execute and read and write
|
||
579B000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
5E9F000
|
stack
|
page read and write
|
||
5AF0000
|
heap
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
17DF000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
6F9E000
|
trusted library allocation
|
page read and write
|
||
3495000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
43D3000
|
trusted library allocation
|
page read and write
|
||
D92000
|
heap
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
6FC3000
|
trusted library allocation
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
16BD000
|
trusted library allocation
|
page execute and read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
5D3F000
|
stack
|
page read and write
|
||
5796000
|
trusted library allocation
|
page read and write
|
||
6FCA000
|
trusted library allocation
|
page read and write
|
||
16E5000
|
trusted library allocation
|
page execute and read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
5920000
|
heap
|
page read and write
|
||
344D000
|
trusted library allocation
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
B5D000
|
stack
|
page read and write
|
||
50D0000
|
trusted library section
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
6B56000
|
heap
|
page read and write
|
||
127A000
|
stack
|
page read and write
|
||
6C4D000
|
stack
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
34A9000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library section
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
3443000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
3984000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page execute and read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
16E7000
|
trusted library allocation
|
page execute and read and write
|
||
19A0000
|
trusted library allocation
|
page execute and read and write
|
||
5D9E000
|
stack
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
1726000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
350E000
|
trusted library allocation
|
page read and write
|
||
579E000
|
trusted library allocation
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
trusted library allocation
|
page execute and read and write
|
||
4351000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
7B7000
|
stack
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
6BB000
|
stack
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page execute and read and write
|
||
35A4000
|
trusted library allocation
|
page read and write
|
||
43B8000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
34FF000
|
trusted library allocation
|
page read and write
|
||
35A8000
|
trusted library allocation
|
page read and write
|
||
34FB000
|
trusted library allocation
|
page read and write
|
||
277D000
|
stack
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page execute and read and write
|
||
342E000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
16B3000
|
trusted library allocation
|
page execute and read and write
|
||
16EB000
|
trusted library allocation
|
page execute and read and write
|
||
16E2000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
34B6000
|
trusted library allocation
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
6FAB000
|
trusted library allocation
|
page read and write
|
||
CF3000
|
trusted library allocation
|
page execute and read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
19B0000
|
trusted library allocation
|
page read and write
|
||
D37000
|
trusted library allocation
|
page execute and read and write
|
||
1910000
|
heap
|
page execute and read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
5066000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
504B000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
34A5000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
50C5000
|
trusted library allocation
|
page read and write
|
||
1773000
|
heap
|
page read and write
|
||
3459000
|
trusted library allocation
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
43E9000
|
trusted library allocation
|
page read and write
|
||
16B4000
|
trusted library allocation
|
page read and write
|
||
5061000
|
trusted library allocation
|
page read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
505E000
|
trusted library allocation
|
page read and write
|
||
1719000
|
heap
|
page read and write
|
||
4379000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
3499000
|
trusted library allocation
|
page read and write
|
||
585D000
|
stack
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
33F6000
|
trusted library allocation
|
page read and write
|
||
4FCA000
|
trusted library allocation
|
page read and write
|
||
340A000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
4EA8000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
592000
|
unkown
|
page readonly
|
||
D7B000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
6B10000
|
heap
|
page read and write
|
||
5930000
|
heap
|
page read and write
|
||
6FA6000
|
trusted library allocation
|
page read and write
|
||
7590000
|
heap
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
D04000
|
trusted library allocation
|
page read and write
|
||
5094000
|
trusted library allocation
|
page read and write
|
||
5075000
|
trusted library allocation
|
page read and write
|
||
349D000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page execute and read and write
|
||
6FD0000
|
trusted library allocation
|
page execute and read and write
|
||
D5E000
|
heap
|
page read and write
|
||
33FE000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
CF4000
|
trusted library allocation
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
4E97000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
trusted library allocation
|
page execute and read and write
|
||
34C4000
|
trusted library allocation
|
page read and write
|
||
6FCF000
|
trusted library allocation
|
page read and write
|
||
5923000
|
heap
|
page read and write
|
||
43DD000
|
trusted library allocation
|
page read and write
|
||
16DA000
|
trusted library allocation
|
page execute and read and write
|
||
D3B000
|
trusted library allocation
|
page execute and read and write
|
||
6FA8000
|
trusted library allocation
|
page read and write
|
||
5042000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page execute and read and write
|
||
511D000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
16D6000
|
trusted library allocation
|
page execute and read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
1377000
|
stack
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
3455000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
6DCF000
|
stack
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
530D000
|
heap
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
199E000
|
stack
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
2780000
|
heap
|
page execute and read and write
|
||
7090000
|
heap
|
page read and write
|
||
4FCD000
|
trusted library allocation
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
358A000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
5C9F000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
3586000
|
trusted library allocation
|
page read and write
|
||
35AD000
|
trusted library allocation
|
page read and write
|
||
D26000
|
trusted library allocation
|
page execute and read and write
|
||
CDF000
|
stack
|
page read and write
|
||
16D2000
|
trusted library allocation
|
page read and write
|
||
16CD000
|
trusted library allocation
|
page execute and read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
5099000
|
trusted library allocation
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
34D2000
|
trusted library allocation
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
6B75000
|
heap
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
35DC000
|
trusted library allocation
|
page read and write
|
||
3414000
|
trusted library allocation
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
359A000
|
trusted library allocation
|
page read and write
|
There are 233 hidden memdumps, click here to show them.