IOC Report
Orden de compra.000854657689654253545676785436.exe

loading gif

Files

File Path
Type
Category
Malicious
Orden de compra.000854657689654253545676785436.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autE17D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autE1BD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\cerecloths
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\molecast
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Orden de compra.000854657689654253545676785436.exe
"C:\Users\user\Desktop\Orden de compra.000854657689654253545676785436.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Orden de compra.000854657689654253545676785436.exe"
malicious

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
1310000
direct allocation
page read and write
malicious
6547000
trusted library allocation
page read and write
1400000
heap
page read and write
52FC000
stack
page read and write
13EA000
heap
page read and write
109C000
unkown
page read and write
6510000
heap
page read and write
2DA5000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
2B1C000
stack
page read and write
140C000
heap
page read and write
159A000
heap
page read and write
154F000
heap
page read and write
6900000
heap
page read and write
6560000
trusted library allocation
page read and write
56ED000
stack
page read and write
2B83000
heap
page read and write
10E5000
heap
page read and write
519A000
trusted library allocation
page read and write
3D90000
direct allocation
page read and write
6530000
trusted library allocation
page read and write
DFF000
stack
page read and write
38A4000
heap
page read and write
F32000
trusted library allocation
page read and write
7E9000
stack
page read and write
1125000
heap
page read and write
2D16000
trusted library allocation
page read and write
5EE8000
heap
page read and write
1400000
heap
page read and write
2CA1000
trusted library allocation
page read and write
2DB9000
trusted library allocation
page read and write
10A4000
unkown
page readonly
3D90000
direct allocation
page read and write
3EB9000
direct allocation
page read and write
3EB9000
direct allocation
page read and write
10A4000
unkown
page readonly
DCE000
stack
page read and write
11A0000
heap
page read and write
F47000
trusted library allocation
page execute and read and write
1092000
unkown
page readonly
1403000
heap
page read and write
EF0000
trusted library allocation
page read and write
7EF60000
trusted library allocation
page execute and read and write
6570000
trusted library allocation
page execute and read and write
1394000
heap
page read and write
14A9000
heap
page read and write
F20000
heap
page read and write
5192000
trusted library allocation
page read and write
2B40000
heap
page execute and read and write
F70000
trusted library allocation
page execute and read and write
1401000
heap
page read and write
F70000
heap
page read and write
400000
system
page execute and read and write
F00000
trusted library allocation
page read and write
E60000
heap
page read and write
FD1000
unkown
page execute read
3D0A000
trusted library allocation
page read and write
3EB9000
direct allocation
page read and write
140D000
heap
page read and write
51AD000
trusted library allocation
page read and write
3CA9000
trusted library allocation
page read and write
F26000
heap
page read and write
139B000
heap
page read and write
10B3000
heap
page read and write
106A000
heap
page read and write
109C000
unkown
page write copy
1554000
heap
page read and write
1092000
unkown
page readonly
3D13000
direct allocation
page read and write
3D19000
direct allocation
page read and write
3EBD000
direct allocation
page read and write
51A1000
trusted library allocation
page read and write
1593000
heap
page read and write
F60000
trusted library allocation
page read and write
1563000
heap
page read and write
3823000
direct allocation
page read and write
DDB000
stack
page read and write
FD1000
unkown
page execute read
1030000
trusted library allocation
page read and write
2D8C000
trusted library allocation
page read and write
F4B000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
EB0000
heap
page read and write
F10000
trusted library allocation
page read and write
1394000
heap
page read and write
518B000
trusted library allocation
page read and write
1040000
heap
page read and write
63FE000
stack
page read and write
3BF0000
direct allocation
page read and write
3D1D000
direct allocation
page read and write
105E000
heap
page read and write
3D13000
direct allocation
page read and write
13EC000
heap
page read and write
F03000
trusted library allocation
page execute and read and write
1368000
heap
page read and write
139E000
heap
page read and write
13DB000
heap
page read and write
3F2E000
direct allocation
page read and write
139E000
heap
page read and write
2D7C000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
14E9000
heap
page read and write
6540000
trusted library allocation
page read and write
F80000
heap
page read and write
5EE0000
heap
page read and write
51C0000
heap
page read and write
140C000
heap
page read and write
1300000
direct allocation
page execute and read and write
556E000
stack
page read and write
1384000
heap
page read and write
FCE000
stack
page read and write
1403000
heap
page read and write
2B20000
trusted library allocation
page read and write
FBE000
stack
page read and write
3D8E000
direct allocation
page read and write
2D83000
trusted library allocation
page read and write
E50000
heap
page read and write
1048000
heap
page read and write
D38000
stack
page read and write
139B000
heap
page read and write
10A0000
unkown
page write copy
6600000
trusted library allocation
page read and write
13EA000
heap
page read and write
DBE000
stack
page read and write
F36000
trusted library allocation
page execute and read and write
F04000
trusted library allocation
page read and write
2D68000
trusted library allocation
page read and write
F0D000
trusted library allocation
page execute and read and write
F30000
trusted library allocation
page read and write
1394000
heap
page read and write
3D1D000
direct allocation
page read and write
C39000
stack
page read and write
FD0000
unkown
page readonly
1563000
heap
page read and write
3CA1000
trusted library allocation
page read and write
13AD000
heap
page read and write
3BF0000
direct allocation
page read and write
1074000
heap
page read and write
3700000
direct allocation
page read and write
12D0000
heap
page read and write
546E000
stack
page read and write
5DDE000
stack
page read and write
2D62000
trusted library allocation
page read and write
3D8E000
direct allocation
page read and write
5320000
heap
page execute and read and write
140C000
heap
page read and write
3823000
direct allocation
page read and write
38A0000
heap
page read and write
1010000
heap
page read and write
2CD5000
trusted library allocation
page read and write
5EEC000
heap
page read and write
F3A000
trusted library allocation
page execute and read and write
1494000
heap
page read and write
159A000
heap
page read and write
111F000
heap
page read and write
4CA8000
trusted library allocation
page read and write
2B80000
heap
page read and write
3D13000
direct allocation
page read and write
63BF000
stack
page read and write
3CC9000
trusted library allocation
page read and write
56AE000
stack
page read and write
140C000
heap
page read and write
DEF000
stack
page read and write
F6E000
stack
page read and write
2ADE000
stack
page read and write
2D90000
trusted library allocation
page read and write
140C000
heap
page read and write
6537000
trusted library allocation
page read and write
64FE000
stack
page read and write
3D8E000
direct allocation
page read and write
62BD000
stack
page read and write
5186000
trusted library allocation
page read and write
5F18000
heap
page read and write
106C000
unkown
page readonly
6520000
trusted library allocation
page execute and read and write
13EB000
heap
page read and write
1B5E000
stack
page read and write
1F5E000
stack
page read and write
139E000
heap
page read and write
51A6000
trusted library allocation
page read and write
E65000
heap
page read and write
542C000
stack
page read and write
3BF0000
direct allocation
page read and write
519E000
trusted library allocation
page read and write
10C5000
heap
page read and write
2D92000
trusted library allocation
page read and write
1360000
heap
page read and write
3700000
direct allocation
page read and write
2DB3000
trusted library allocation
page read and write
FD0000
unkown
page readonly
55AE000
stack
page read and write
F42000
trusted library allocation
page read and write
106C000
unkown
page readonly
1554000
heap
page read and write
5F00000
heap
page read and write
3D90000
direct allocation
page read and write
13ED000
heap
page read and write
13EA000
heap
page read and write
5180000
trusted library allocation
page read and write
4E3D000
stack
page read and write
13EC000
heap
page read and write
65F0000
heap
page read and write
2B90000
heap
page read and write
1545000
heap
page read and write
3F2E000
direct allocation
page read and write
3EBD000
direct allocation
page read and write
3BF0000
direct allocation
page read and write
140C000
heap
page read and write
1554000
heap
page read and write
13EA000
heap
page read and write
3EBD000
direct allocation
page read and write
146A000
heap
page read and write
6550000
trusted library allocation
page read and write
1569000
heap
page read and write
1077000
heap
page read and write
2DA0000
trusted library allocation
page read and write
3D1D000
direct allocation
page read and write
140C000
heap
page read and write
1485000
heap
page read and write
43E000
system
page execute and read and write
3D19000
direct allocation
page read and write
6500000
trusted library allocation
page read and write
3823000
direct allocation
page read and write
3700000
direct allocation
page read and write
140C000
heap
page read and write
51B2000
trusted library allocation
page read and write
1563000
heap
page read and write
142C000
heap
page read and write
3D19000
direct allocation
page read and write
12E0000
heap
page read and write
3F2E000
direct allocation
page read and write
F1D000
trusted library allocation
page execute and read and write
3BF0000
direct allocation
page read and write
2B30000
trusted library allocation
page read and write
518E000
trusted library allocation
page read and write
There are 226 hidden memdumps, click here to show them.