IOC Report
AL DALEEL ELECT SWITCH GEAR TR LLC. - PO.exe

loading gif

Files

File Path
Type
Category
Malicious
AL DALEEL ELECT SWITCH GEAR TR LLC. - PO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\furcation
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AL DALEEL ELECT SWITCH GEAR TR LLC. - PO.exe
"C:\Users\user\Desktop\AL DALEEL ELECT SWITCH GEAR TR LLC. - PO.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\AL DALEEL ELECT SWITCH GEAR TR LLC. - PO.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
http://checkip.dyndns.org/
132.226.8.169
https://api.telegram.org/bot8080123058:AAEYMzGscYJylQTcyvJdcLEtQ0fTBfHxTRc/sendDocument?chat_id=5858
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://api.telegram.org
unknown
https://api.telegram.org/bot8080123058:AAEYMzGscYJylQTcyvJdcLEtQ0fTBfHxTRc/sendDocument?chat_id=5858365728&caption=user%20/%20Passwords%20/%20173.254.250.90
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/173.254.250.90
188.114.96.3
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
2A9B000
trusted library allocation
page read and write
malicious
39F0000
direct allocation
page read and write
malicious
A10000
heap
page read and write
40F9000
direct allocation
page read and write
1F0000
heap
page read and write
5C6E000
stack
page read and write
3B84000
heap
page read and write
3B83000
heap
page read and write
699000
stack
page read and write
7D0000
heap
page read and write
4AB000
unkown
page readonly
9A000
stack
page read and write
29E2000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
3F53000
direct allocation
page read and write
E05000
trusted library allocation
page execute and read and write
3941000
trusted library allocation
page read and write
DFA000
trusted library allocation
page execute and read and write
B18000
heap
page read and write
3C33000
heap
page execute and read and write
3A20000
heap
page read and write
DED000
trusted library allocation
page execute and read and write
40DD000
direct allocation
page read and write
623E000
stack
page read and write
4F00000
heap
page read and write
41A000
system
page execute and read and write
110000
heap
page read and write
5F70000
heap
page read and write
2930000
heap
page execute and read and write
354E000
stack
page read and write
3F53000
direct allocation
page read and write
E02000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
5E17000
heap
page read and write
4F03000
heap
page read and write
6461000
trusted library allocation
page read and write
490000
unkown
page read and write
93E000
stack
page read and write
3B4B000
heap
page read and write
2A21000
trusted library allocation
page read and write
9CE000
stack
page read and write
2A48000
trusted library allocation
page read and write
3E10000
direct allocation
page read and write
29A6000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
126E000
stack
page read and write
64C0000
heap
page read and write
DC0000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
5CAE000
stack
page read and write
3FD0000
direct allocation
page read and write
3E10000
direct allocation
page read and write
4DB2000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
2A2C000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
4E7E000
stack
page read and write
4E10000
trusted library allocation
page read and write
29FB000
trusted library allocation
page read and write
4DBE000
trusted library allocation
page read and write
8FE000
stack
page read and write
AE0000
heap
page read and write
5110000
heap
page execute and read and write
3BC3000
heap
page read and write
40F9000
direct allocation
page read and write
950000
heap
page read and write
400000
unkown
page readonly
29B4000
trusted library allocation
page read and write
40D9000
direct allocation
page read and write
5DAE000
stack
page read and write
E6E000
stack
page read and write
549E000
stack
page read and write
2A35000
trusted library allocation
page read and write
5F10000
trusted library allocation
page execute and read and write
4AB000
unkown
page readonly
400000
system
page execute and read and write
A60000
heap
page read and write
3FB0000
direct allocation
page read and write
2A5E000
trusted library allocation
page read and write
3F53000
direct allocation
page read and write
4DF0000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page execute and read and write
3956000
heap
page read and write
54B6000
trusted library allocation
page read and write
3E30000
direct allocation
page read and write
2B59000
trusted library allocation
page read and write
3C24000
heap
page read and write
40FD000
direct allocation
page read and write
414E000
direct allocation
page read and write
3C23000
heap
page read and write
4DD2000
trusted library allocation
page read and write
4A7000
unkown
page read and write
8AF000
stack
page read and write
2A44000
trusted library allocation
page read and write
3AD8000
heap
page read and write
4DCD000
trusted library allocation
page read and write
B0A000
heap
page read and write
A40000
heap
page read and write
3C23000
heap
page read and write
2941000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
3BC3000
heap
page read and write
A45000
heap
page read and write
5EB0000
trusted library allocation
page execute and read and write
396D000
trusted library allocation
page read and write
416E000
direct allocation
page read and write
5DF6000
heap
page read and write
DD4000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
4DBA000
trusted library allocation
page read and write
3B59000
heap
page read and write
40DD000
direct allocation
page read and write
3C37000
heap
page read and write
60FE000
stack
page read and write
29C0000
trusted library allocation
page read and write
3A56000
heap
page read and write
B9F000
heap
page read and write
54A0000
trusted library allocation
page read and write
4DA6000
trusted library allocation
page read and write
416E000
direct allocation
page read and write
29A3000
trusted library allocation
page read and write
531E000
stack
page read and write
4DAB000
trusted library allocation
page read and write
3C23000
heap
page read and write
60AF000
stack
page read and write
AAA000
heap
page read and write
54A3000
trusted library allocation
page read and write
7D5000
heap
page read and write
54B4000
trusted library allocation
page read and write
E07000
trusted library allocation
page execute and read and write
29AB000
trusted library allocation
page read and write
29BE000
trusted library allocation
page read and write
A70000
heap
page read and write
2B19000
trusted library allocation
page read and write
61FF000
stack
page read and write
6490000
trusted library allocation
page read and write
A7A000
heap
page read and write
414E000
direct allocation
page read and write
521E000
stack
page read and write
4DC1000
trusted library allocation
page read and write
490000
unkown
page write copy
416E000
direct allocation
page read and write
5E01000
heap
page read and write
797000
stack
page read and write
67FE000
stack
page read and write
F0000
heap
page read and write
DE0000
trusted library allocation
page read and write
40D9000
direct allocation
page read and write
166F000
stack
page read and write
2A26000
trusted library allocation
page read and write
EA0000
heap
page read and write
5E0D000
heap
page read and write
3964000
trusted library allocation
page read and write
3FD0000
direct allocation
page read and write
3E10000
direct allocation
page read and write
3E30000
direct allocation
page read and write
4EFE000
stack
page read and write
5E06000
heap
page read and write
3BC3000
heap
page read and write
3F33000
direct allocation
page read and write
E0B000
trusted library allocation
page execute and read and write
29ED000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
A70000
heap
page read and write
401000
unkown
page execute read
414E000
direct allocation
page read and write
66FE000
stack
page read and write
AFE000
heap
page read and write
39ED000
trusted library allocation
page read and write
9D0000
heap
page read and write
3979000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
3B20000
heap
page read and write
2B55000
trusted library allocation
page read and write
960000
heap
page read and write
4EBE000
stack
page read and write
401000
unkown
page execute read
BD1000
heap
page read and write
89F000
stack
page read and write
2A3F000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
3AF5000
heap
page read and write
39B1000
trusted library allocation
page read and write
3E30000
direct allocation
page read and write
39E0000
heap
page read and write
A7E000
heap
page read and write
40FD000
direct allocation
page read and write
AE8000
heap
page read and write
DF0000
trusted library allocation
page read and write
DDD000
trusted library allocation
page execute and read and write
4DC6000
trusted library allocation
page read and write
644F000
stack
page read and write
4A3E000
stack
page read and write
3F33000
direct allocation
page read and write
4DA0000
trusted library allocation
page read and write
5DE2000
heap
page read and write
482000
unkown
page readonly
400000
unkown
page readonly
4DAE000
trusted library allocation
page read and write
3F33000
direct allocation
page read and write
2B17000
trusted library allocation
page read and write
2A6B000
trusted library allocation
page read and write
40FD000
direct allocation
page read and write
8B4000
stack
page read and write
E70000
trusted library allocation
page execute and read and write
A2E000
stack
page read and write
5DB0000
heap
page read and write
3B59000
heap
page read and write
66B0000
heap
page read and write
40F9000
direct allocation
page read and write
292D000
stack
page read and write
541E000
stack
page read and write
394F000
stack
page read and write
3FD0000
direct allocation
page read and write
29F7000
trusted library allocation
page read and write
5F0E000
stack
page read and write
40D9000
direct allocation
page read and write
40DD000
direct allocation
page read and write
E80000
heap
page read and write
6470000
trusted library allocation
page read and write
9D4000
heap
page read and write
54BA000
trusted library allocation
page read and write
3FB0000
direct allocation
page read and write
DF6000
trusted library allocation
page execute and read and write
DD3000
trusted library allocation
page execute and read and write
482000
unkown
page readonly
284F000
stack
page read and write
3FB0000
direct allocation
page read and write
6468000
trusted library allocation
page read and write
4D80000
heap
page read and write
There are 222 hidden memdumps, click here to show them.