IOC Report
GkYUK8VCrO.exe

loading gif

Files

File Path
Type
Category
Malicious
GkYUK8VCrO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut6482.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut64C1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut679E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut67CE.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\subbase
ASCII text, with very long lines (28756), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\vaccinators
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GkYUK8VCrO.exe
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
malicious
C:\Users\user\Desktop\GkYUK8VCrO.exe
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
http://mail.fasmacopy.gr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
mail.fasmacopy.gr
79.170.44.32
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
79.170.44.32
mail.fasmacopy.gr
United Kingdom
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5870000
trusted library section
page read and write
malicious
44B5000
trusted library allocation
page read and write
malicious
347C000
trusted library allocation
page read and write
malicious
5900000
trusted library section
page read and write
malicious
2FBE000
heap
page read and write
malicious
3833000
direct allocation
page read and write
B63000
unkown
page write copy
12F1000
heap
page read and write
37B0000
trusted library allocation
page read and write
13D6000
heap
page read and write
EEE000
heap
page read and write
4557000
trusted library allocation
page read and write
5BBC000
stack
page read and write
39DD000
direct allocation
page read and write
E18000
heap
page read and write
B6C000
unkown
page readonly
3D09000
direct allocation
page read and write
322F000
stack
page read and write
45B7000
trusted library allocation
page read and write
4475000
trusted library allocation
page read and write
46B7000
trusted library allocation
page read and write
9BE000
stack
page read and write
F20000
heap
page read and write
3A29000
direct allocation
page read and write
340D000
stack
page read and write
EEF000
heap
page read and write
3883000
direct allocation
page read and write
B68000
unkown
page readonly
1A60000
direct allocation
page execute and read and write
B68000
unkown
page readonly
445000
system
page execute and read and write
1518000
heap
page read and write
58DE000
trusted library allocation
page read and write
3230000
heap
page read and write
58CB000
trusted library allocation
page read and write
3DA000
stack
page read and write
114E000
heap
page read and write
661C000
stack
page read and write
39D9000
direct allocation
page read and write
6D6D000
stack
page read and write
1A0E000
stack
page read and write
6BBE000
stack
page read and write
9CE000
stack
page read and write
1031000
heap
page read and write
D8E000
stack
page read and write
4737000
trusted library allocation
page read and write
83E0000
heap
page read and write
3893000
trusted library allocation
page read and write
1142000
heap
page read and write
1110000
heap
page read and write
14D4000
trusted library allocation
page read and write
3A2D000
direct allocation
page read and write
150A000
trusted library allocation
page execute and read and write
9CD1000
trusted library allocation
page read and write
6B7E000
stack
page read and write
37D4000
trusted library allocation
page read and write
1350000
heap
page read and write
4757000
trusted library allocation
page read and write
AA1000
unkown
page execute read
4797000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
3713000
trusted library allocation
page read and write
4637000
trusted library allocation
page read and write
2F5C000
stack
page read and write
EEE000
heap
page read and write
11A3000
heap
page read and write
4717000
trusted library allocation
page read and write
3124000
heap
page read and write
15BD000
heap
page read and write
685E000
stack
page read and write
3260000
heap
page read and write
B2F000
unkown
page readonly
74C0000
heap
page read and write
84D0000
heap
page read and write
3B63000
direct allocation
page read and write
1506000
trusted library allocation
page execute and read and write
3903000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
BA8000
unkown
page readonly
1480000
trusted library allocation
page read and write
36E9000
trusted library allocation
page read and write
3A4E000
direct allocation
page read and write
4697000
trusted library allocation
page read and write
EA0000
heap
page read and write
F9B000
heap
page read and write
96CC000
stack
page read and write
46D7000
trusted library allocation
page read and write
6A7E000
stack
page read and write
36C0000
direct allocation
page read and write
EB0000
heap
page read and write
1AE0000
heap
page read and write
154D000
heap
page read and write
B55000
unkown
page readonly
3739000
trusted library allocation
page read and write
4657000
trusted library allocation
page read and write
B6C000
unkown
page readonly
3D0D000
direct allocation
page read and write
38B9000
trusted library allocation
page read and write
100F000
stack
page read and write
586E000
stack
page read and write
157A000
heap
page read and write
B5F000
unkown
page write copy
F6B000
heap
page read and write
6D10000
trusted library allocation
page execute and read and write
68F0000
trusted library allocation
page execute and read and write
2F70000
trusted library allocation
page read and write
AA0000
unkown
page readonly
4536000
trusted library allocation
page read and write
11D3000
heap
page read and write
1460000
trusted library allocation
page read and write
B5F000
unkown
page write copy
58F2000
trusted library allocation
page read and write
11D3000
heap
page read and write
BA8000
unkown
page readonly
1118000
heap
page read and write
3A9E000
direct allocation
page read and write
3A29000
direct allocation
page read and write
1355000
heap
page read and write
14A0000
trusted library section
page read and write
FA8000
stack
page read and write
1198000
heap
page read and write
5E60000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
9CAA000
trusted library allocation
page read and write
14DD000
trusted library allocation
page execute and read and write
9CD6000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
3D7E000
direct allocation
page read and write
3900000
direct allocation
page read and write
851D000
heap
page read and write
3BE0000
direct allocation
page read and write
6E40000
trusted library allocation
page read and write
79E000
stack
page read and write
9DB000
stack
page read and write
ED0000
heap
page read and write
6CF0000
trusted library allocation
page read and write
5CBA000
heap
page read and write
3955000
trusted library allocation
page read and write
34DC000
trusted library allocation
page read and write
3267000
heap
page read and write
85D4000
heap
page read and write
133D000
heap
page read and write
5960000
trusted library allocation
page read and write
11EF000
heap
page read and write
14E3000
trusted library allocation
page read and write
129B000
heap
page read and write
1550000
heap
page read and write
2F90000
heap
page read and write
3D7E000
direct allocation
page read and write
58ED000
trusted library allocation
page read and write
3900000
direct allocation
page read and write
8567000
heap
page read and write
1200000
heap
page read and write
9CBD000
trusted library allocation
page read and write
3A9E000
direct allocation
page read and write
3760000
direct allocation
page read and write
EA1000
heap
page read and write
5990000
heap
page read and write
B6C000
unkown
page readonly
3A2D000
direct allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
ED0000
heap
page read and write
707F000
stack
page read and write
6D20000
trusted library allocation
page read and write
AA1000
unkown
page execute read
E46000
heap
page read and write
858B000
heap
page read and write
3100000
heap
page execute and read and write
38B0000
direct allocation
page read and write
38B0000
direct allocation
page read and write
1490000
heap
page read and write
190E000
stack
page read and write
369F000
trusted library allocation
page read and write
3A9E000
direct allocation
page read and write
3530000
direct allocation
page read and write
3463000
trusted library allocation
page read and write
5980000
heap
page read and write
1500000
trusted library allocation
page read and write
369D000
trusted library allocation
page read and write
1143000
heap
page read and write
11B4000
heap
page read and write
38B7000
trusted library allocation
page read and write
A20000
heap
page read and write
B68000
unkown
page readonly
38BB000
trusted library allocation
page read and write
13C7000
heap
page read and write
B2F000
unkown
page readonly
9FC000
stack
page read and write
4495000
trusted library allocation
page read and write
85A8000
heap
page read and write
98CC000
stack
page read and write
11EE000
heap
page read and write
373B000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
3957000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
1A5C000
stack
page read and write
71C0000
trusted library allocation
page read and write
B2F000
unkown
page readonly
1330000
heap
page read and write
3A4E000
direct allocation
page read and write
10C7000
heap
page read and write
5ABC000
stack
page read and write
100D000
heap
page read and write
4597000
trusted library allocation
page read and write
154A000
heap
page read and write
720000
heap
page read and write
3A2D000
direct allocation
page read and write
10BA000
heap
page read and write
EB1000
heap
page read and write
137F000
heap
page read and write
1572000
heap
page read and write
3760000
direct allocation
page read and write
9CB3000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
2F60000
trusted library allocation
page execute and read and write
44F3000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
FFF000
heap
page read and write
3580000
trusted library allocation
page read and write
3833000
direct allocation
page read and write
4431000
trusted library allocation
page read and write
689C000
stack
page read and write
B55000
unkown
page readonly
3B63000
direct allocation
page read and write
9CFE000
trusted library allocation
page read and write
145E000
stack
page read and write
1210000
heap
page read and write
3679000
trusted library allocation
page read and write
3A29000
direct allocation
page read and write
1540000
heap
page read and write
B5F000
unkown
page read and write
2F1E000
stack
page read and write
6AA000
stack
page read and write
3478000
trusted library allocation
page read and write
11D3000
heap
page read and write
AA1000
unkown
page execute read
384A000
trusted library allocation
page read and write
E42000
heap
page read and write
AA1000
unkown
page execute read
BA8000
unkown
page readonly
ED0000
heap
page read and write
7DD000
stack
page read and write
1A94000
heap
page read and write
2EB5000
trusted library allocation
page execute and read and write
AA0000
unkown
page readonly
103C000
stack
page read and write
10DA000
heap
page read and write
39DD000
direct allocation
page read and write
4577000
trusted library allocation
page read and write
4777000
trusted library allocation
page read and write
A8A7000
trusted library allocation
page read and write
14B0000
trusted library section
page read and write
A50000
heap
page read and write
B63000
unkown
page write copy
710000
heap
page read and write
9CEA000
trusted library allocation
page read and write
9CB8000
trusted library allocation
page read and write
1A90000
heap
page read and write
5BE0000
heap
page read and write
A40000
direct allocation
page execute and read and write
346A000
trusted library allocation
page read and write
45F7000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
EAA000
stack
page read and write
6CF8000
trusted library allocation
page read and write
6DFE000
stack
page read and write
A40000
heap
page read and write
357E000
trusted library allocation
page read and write
A8AE000
trusted library allocation
page read and write
373D000
trusted library allocation
page read and write
114E000
heap
page read and write
B55000
unkown
page readonly
B6C000
unkown
page readonly
5E5C000
stack
page read and write
58E6000
trusted library allocation
page read and write
3604000
heap
page read and write
3D0D000
direct allocation
page read and write
3A4E000
direct allocation
page read and write
3278000
trusted library allocation
page read and write
160E000
stack
page read and write
3784000
trusted library allocation
page read and write
9CF4000
trusted library allocation
page read and write
115C000
heap
page read and write
750000
heap
page read and write
3600000
heap
page read and write
3710000
direct allocation
page read and write
11A4000
heap
page read and write
9CCC000
trusted library allocation
page read and write
1333000
heap
page read and write
11EE000
heap
page read and write
58E1000
trusted library allocation
page read and write
5C43000
heap
page read and write
D4E000
stack
page read and write
30A0000
heap
page read and write
7FDE0000
trusted library allocation
page execute and read and write
F01000
heap
page read and write
71D0000
trusted library allocation
page read and write
68E0000
heap
page read and write
15A6000
heap
page read and write
12DB000
heap
page read and write
39D9000
direct allocation
page read and write
85A3000
heap
page read and write
3883000
direct allocation
page read and write
7ED0000
trusted library allocation
page read and write
1A9C000
stack
page read and write
364E000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
4455000
trusted library allocation
page read and write
83D0000
heap
page read and write
3250000
trusted library allocation
page read and write
39D9000
direct allocation
page read and write
1586000
heap
page read and write
4677000
trusted library allocation
page read and write
B68000
unkown
page readonly
37D6000
trusted library allocation
page read and write
AA0000
unkown
page readonly
8582000
heap
page read and write
B55000
unkown
page readonly
3870000
trusted library allocation
page read and write
3883000
direct allocation
page read and write
14D3000
trusted library allocation
page execute and read and write
58CE000
trusted library allocation
page read and write
38B0000
direct allocation
page read and write
3A40000
direct allocation
page read and write
3715000
trusted library allocation
page read and write
13C5000
heap
page read and write
EB2000
heap
page read and write
5C22000
heap
page read and write
5D1E000
stack
page read and write
4617000
trusted library allocation
page read and write
11A2000
heap
page read and write
6CBE000
stack
page read and write
A70000
heap
page read and write
A8A9000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
3710000
direct allocation
page read and write
B2F000
unkown
page readonly
68DA000
heap
page read and write
703E000
stack
page read and write
2ED0000
trusted library allocation
page read and write
45D7000
trusted library allocation
page read and write
5E6D000
trusted library allocation
page read and write
9CC2000
trusted library allocation
page read and write
675D000
stack
page read and write
3D09000
direct allocation
page read and write
9CE5000
trusted library allocation
page read and write
13B8000
heap
page read and write
9CE0000
trusted library allocation
page read and write
3A40000
direct allocation
page read and write
3833000
direct allocation
page read and write
B5F000
unkown
page read and write
3420000
heap
page execute and read and write
1303000
heap
page read and write
101B000
stack
page read and write
E10000
heap
page read and write
8515000
heap
page read and write
2EB7000
trusted library allocation
page execute and read and write
AA0000
unkown
page readonly
7240000
trusted library allocation
page execute and read and write
392F000
trusted library allocation
page read and write
10CA000
heap
page read and write
39A0000
trusted library allocation
page read and write
3526000
trusted library allocation
page read and write
10CA000
heap
page read and write
357C000
trusted library allocation
page read and write
400000
system
page execute and read and write
6D04000
trusted library allocation
page read and write
3553000
trusted library allocation
page read and write
9CF9000
trusted library allocation
page read and write
9CEF000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
651C000
stack
page read and write
FFF000
stack
page read and write
3953000
trusted library allocation
page read and write
2EBB000
trusted library allocation
page execute and read and write
46F7000
trusted library allocation
page read and write
9CAE000
trusted library allocation
page read and write
15F1000
heap
page read and write
3959000
trusted library allocation
page read and write
10DA000
heap
page read and write
19DB000
stack
page read and write
E43000
heap
page read and write
BA8000
unkown
page readonly
1A1B000
stack
page read and write
E4B000
heap
page read and write
14F0000
heap
page read and write
39DD000
direct allocation
page read and write
3760000
direct allocation
page read and write
A60000
heap
page read and write
1510000
heap
page read and write
37E5000
trusted library allocation
page read and write
E4B000
heap
page read and write
EC0000
heap
page read and write
E99000
heap
page read and write
85B2000
heap
page read and write
126B000
heap
page read and write
6E50000
trusted library allocation
page execute and read and write
9CDB000
trusted library allocation
page read and write
3710000
direct allocation
page read and write
7200000
heap
page read and write
1D0E000
stack
page read and write
11C3000
heap
page read and write
3BE0000
direct allocation
page read and write
14F7000
heap
page read and write
5E1E000
stack
page read and write
381E000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
30FE000
stack
page read and write
2EB2000
trusted library allocation
page read and write
1146000
heap
page read and write
6E46000
trusted library allocation
page read and write
68D0000
heap
page read and write
5BE4000
heap
page read and write
121F000
heap
page read and write
132E000
stack
page read and write
3900000
direct allocation
page read and write
14C0000
trusted library allocation
page read and write
3120000
heap
page read and write
1A40000
heap
page read and write
392D000
trusted library allocation
page read and write
9CC7000
trusted library allocation
page read and write
There are 413 hidden memdumps, click here to show them.