Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
order and drawings_pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut620D.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gobioid
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\order and drawings_pdf.exe
|
"C:\Users\user\Desktop\order and drawings_pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\order and drawings_pdf.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ftp.gizemetiket.com.tr
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.ipify.org
|
104.26.12.205
|
||
ftp.gizemetiket.com.tr
|
93.89.225.40
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.26.12.205
|
api.ipify.org
|
United States
|
||
93.89.225.40
|
ftp.gizemetiket.com.tr
|
Turkey
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3670000
|
direct allocation
|
page read and write
|
||
2501000
|
trusted library allocation
|
page read and write
|
||
5C2000
|
system
|
page execute and read and write
|
||
252C000
|
trusted library allocation
|
page read and write
|
||
628000
|
heap
|
page read and write
|
||
2532000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
EC08000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
EC30000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
stack
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
37D3000
|
direct allocation
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
8ED000
|
trusted library allocation
|
page execute and read and write
|
||
AEC000
|
stack
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
EBF4000
|
trusted library allocation
|
page read and write
|
||
3890000
|
direct allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
4A0E000
|
trusted library allocation
|
page read and write
|
||
7F710000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
371C000
|
trusted library allocation
|
page read and write
|
||
4C69000
|
trusted library allocation
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
AFE000
|
stack
|
page read and write
|
||
39BD000
|
direct allocation
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
D1CE000
|
trusted library allocation
|
page read and write
|
||
EBFE000
|
trusted library allocation
|
page read and write
|
||
90B000
|
trusted library allocation
|
page execute and read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
EC0D000
|
trusted library allocation
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
367C000
|
trusted library allocation
|
page read and write
|
||
EBEF000
|
trusted library allocation
|
page read and write
|
||
6310000
|
trusted library allocation
|
page execute and read and write
|
||
369C000
|
trusted library allocation
|
page read and write
|
||
588000
|
stack
|
page read and write
|
||
6CE000
|
unkown
|
page readonly
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
trusted library allocation
|
page execute and read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
D1C9000
|
trusted library allocation
|
page read and write
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
6350000
|
heap
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
AEF0000
|
trusted library allocation
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
6AA000
|
heap
|
page read and write
|
||
39B9000
|
direct allocation
|
page read and write
|
||
34B1000
|
trusted library allocation
|
page read and write
|
||
26C8000
|
trusted library allocation
|
page read and write
|
||
4A02000
|
trusted library allocation
|
page read and write
|
||
397D000
|
direct allocation
|
page read and write
|
||
351C000
|
trusted library allocation
|
page read and write
|
||
24E6000
|
trusted library allocation
|
page read and write
|
||
2542000
|
trusted library allocation
|
page read and write
|
||
25C4000
|
trusted library allocation
|
page read and write
|
||
613E000
|
stack
|
page read and write
|
||
359C000
|
trusted library allocation
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page execute and read and write
|
||
8D3000
|
trusted library allocation
|
page execute and read and write
|
||
676D000
|
stack
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
36F0000
|
direct allocation
|
page read and write
|
||
EC3F000
|
trusted library allocation
|
page read and write
|
||
9FCE000
|
trusted library allocation
|
page read and write
|
||
8D4000
|
trusted library allocation
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
365C000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
EBEB000
|
trusted library allocation
|
page read and write
|
||
EC17000
|
trusted library allocation
|
page read and write
|
||
AEC000
|
stack
|
page read and write
|
||
503D000
|
stack
|
page read and write
|
||
3979000
|
direct allocation
|
page read and write
|
||
3813000
|
direct allocation
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page execute and read and write
|
||
905000
|
trusted library allocation
|
page execute and read and write
|
||
EC03000
|
trusted library allocation
|
page read and write
|
||
3194000
|
heap
|
page read and write
|
||
657000
|
heap
|
page read and write
|
||
397D000
|
direct allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
6AD000
|
unkown
|
page readonly
|
||
2526000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
unkown
|
page write copy
|
||
EC35000
|
trusted library allocation
|
page read and write
|
||
6AD000
|
unkown
|
page readonly
|
||
589E000
|
heap
|
page read and write
|
||
86F0000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
35DC000
|
trusted library allocation
|
page read and write
|
||
39B9000
|
direct allocation
|
page read and write
|
||
8F6000
|
trusted library allocation
|
page execute and read and write
|
||
4A8C000
|
stack
|
page read and write
|
||
49FE000
|
trusted library allocation
|
page read and write
|
||
3813000
|
direct allocation
|
page read and write
|
||
4C1C000
|
stack
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
4A11000
|
trusted library allocation
|
page read and write
|
||
355C000
|
trusted library allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
3890000
|
direct allocation
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
D1C6000
|
trusted library allocation
|
page read and write
|
||
930000
|
trusted library allocation
|
page execute and read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
373C000
|
trusted library allocation
|
page read and write
|
||
C6E000
|
heap
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
EC21000
|
trusted library allocation
|
page read and write
|
||
CA8000
|
heap
|
page execute and read and write
|
||
B0B000
|
stack
|
page read and write
|
||
39BD000
|
direct allocation
|
page read and write
|
||
62F0000
|
heap
|
page read and write
|
||
58BC000
|
heap
|
page read and write
|
||
37D3000
|
direct allocation
|
page read and write
|
||
39EE000
|
direct allocation
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
7A0000
|
heap
|
page read and write
|
||
2696000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
907000
|
trusted library allocation
|
page execute and read and write
|
||
CAD000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
357C000
|
trusted library allocation
|
page read and write
|
||
252A000
|
trusted library allocation
|
page read and write
|
||
253A000
|
trusted library allocation
|
page read and write
|
||
48A000
|
stack
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
9FC6000
|
trusted library allocation
|
page read and write
|
||
3890000
|
direct allocation
|
page read and write
|
||
EC1C000
|
trusted library allocation
|
page read and write
|
||
58D8000
|
heap
|
page read and write
|
||
3A2E000
|
direct allocation
|
page read and write
|
||
39EE000
|
direct allocation
|
page read and write
|
||
4AD4000
|
heap
|
page read and write
|
||
EC3A000
|
trusted library allocation
|
page read and write
|
||
363C000
|
trusted library allocation
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
4A16000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
36BC000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
C9E000
|
heap
|
page read and write
|
||
39BD000
|
direct allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
353C000
|
trusted library allocation
|
page read and write
|
||
257C000
|
trusted library allocation
|
page read and write
|
||
2528000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
36F0000
|
direct allocation
|
page read and write
|
||
58C5000
|
heap
|
page read and write
|
||
6E4000
|
unkown
|
page readonly
|
||
3979000
|
direct allocation
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page execute and read and write
|
||
5DF7000
|
trusted library allocation
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
149F000
|
stack
|
page read and write
|
||
EBF9000
|
trusted library allocation
|
page read and write
|
||
49FB000
|
trusted library allocation
|
page read and write
|
||
3DA000
|
stack
|
page read and write
|
||
36DC000
|
trusted library allocation
|
page read and write
|
||
2544000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
34D9000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
35FC000
|
trusted library allocation
|
page read and write
|
||
EC2B000
|
trusted library allocation
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
8F2000
|
trusted library allocation
|
page read and write
|
||
6DA000
|
unkown
|
page read and write
|
||
39EE000
|
direct allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
58BA000
|
heap
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
36FC000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
direct allocation
|
page read and write
|
||
C9F000
|
heap
|
page read and write
|
||
662D000
|
stack
|
page read and write
|
||
39EE000
|
direct allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
EC26000
|
trusted library allocation
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
35DD000
|
heap
|
page read and write
|
||
2408000
|
trusted library allocation
|
page read and write
|
||
4A1D000
|
trusted library allocation
|
page read and write
|
||
27C5000
|
trusted library allocation
|
page read and write
|
||
617E000
|
stack
|
page read and write
|
||
257A000
|
trusted library allocation
|
page read and write
|
||
24EF000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5E3D000
|
stack
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
2546000
|
trusted library allocation
|
page read and write
|
||
6E4000
|
unkown
|
page readonly
|
||
4D7C000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
397D000
|
direct allocation
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
AF0000
|
heap
|
page execute and read and write
|
||
3979000
|
direct allocation
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
6300000
|
heap
|
page read and write
|
||
26EF000
|
trusted library allocation
|
page read and write
|
||
D12000
|
heap
|
page read and write
|
||
397D000
|
direct allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
5840000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
6CE000
|
unkown
|
page readonly
|
||
1900000
|
heap
|
page read and write
|
||
36F0000
|
direct allocation
|
page read and write
|
||
37D3000
|
direct allocation
|
page read and write
|
||
24FD000
|
trusted library allocation
|
page read and write
|
||
35BC000
|
trusted library allocation
|
page read and write
|
||
24B1000
|
trusted library allocation
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
3A2E000
|
direct allocation
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
18DE000
|
stack
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
280C000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
652C000
|
stack
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
3979000
|
direct allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
666B000
|
stack
|
page read and write
|
||
28A5000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
system
|
page execute and read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
3813000
|
direct allocation
|
page read and write
|
||
39B9000
|
direct allocation
|
page read and write
|
||
67E9000
|
heap
|
page read and write
|
||
28CA000
|
trusted library allocation
|
page read and write
|
||
564A000
|
heap
|
page read and write
|
||
9FC9000
|
trusted library allocation
|
page read and write
|
||
6DA000
|
unkown
|
page write copy
|
||
23FE000
|
stack
|
page read and write
|
||
5DDE000
|
stack
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
902000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
8DD000
|
trusted library allocation
|
page execute and read and write
|
||
361C000
|
trusted library allocation
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
EC12000
|
trusted library allocation
|
page read and write
|
||
37D3000
|
direct allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
583C000
|
stack
|
page read and write
|
||
67E7000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
There are 293 hidden memdumps, click here to show them.