IOC Report
order and drawings_pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
order and drawings_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut620D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\gobioid
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\order and drawings_pdf.exe
"C:\Users\user\Desktop\order and drawings_pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\order and drawings_pdf.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ftp.gizemetiket.com.tr
unknown

Domains

Name
IP
Malicious
api.ipify.org
104.26.12.205
ftp.gizemetiket.com.tr
93.89.225.40

IPs

IP
Domain
Country
Malicious
104.26.12.205
api.ipify.org
United States
93.89.225.40
ftp.gizemetiket.com.tr
Turkey

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3670000
direct allocation
page read and write
malicious
2501000
trusted library allocation
page read and write
malicious
5C2000
system
page execute and read and write
malicious
252C000
trusted library allocation
page read and write
malicious
628000
heap
page read and write
2532000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
C60000
heap
page read and write
960000
heap
page read and write
EC08000
trusted library allocation
page read and write
C6A000
heap
page read and write
EC30000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
B2C000
stack
page read and write
654000
heap
page read and write
37D3000
direct allocation
page read and write
D32000
heap
page read and write
8ED000
trusted library allocation
page execute and read and write
AEC000
stack
page read and write
4AC0000
heap
page read and write
EBF4000
trusted library allocation
page read and write
3890000
direct allocation
page read and write
D50000
heap
page read and write
27A0000
trusted library allocation
page read and write
76F0000
heap
page read and write
64A000
heap
page read and write
4A0E000
trusted library allocation
page read and write
7F710000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
371C000
trusted library allocation
page read and write
4C69000
trusted library allocation
page read and write
620000
unkown
page readonly
AFE000
stack
page read and write
39BD000
direct allocation
page read and write
3850000
direct allocation
page read and write
940000
trusted library allocation
page read and write
5B7E000
stack
page read and write
D1CE000
trusted library allocation
page read and write
EBFE000
trusted library allocation
page read and write
90B000
trusted library allocation
page execute and read and write
4E7E000
stack
page read and write
EC0D000
trusted library allocation
page read and write
E54000
heap
page read and write
367C000
trusted library allocation
page read and write
EBEF000
trusted library allocation
page read and write
6310000
trusted library allocation
page execute and read and write
369C000
trusted library allocation
page read and write
588000
stack
page read and write
6CE000
unkown
page readonly
8E0000
trusted library allocation
page read and write
8FA000
trusted library allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
D1C9000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
6350000
heap
page read and write
4AD0000
heap
page read and write
AEF0000
trusted library allocation
page read and write
621000
unkown
page execute read
6AA000
heap
page read and write
39B9000
direct allocation
page read and write
34B1000
trusted library allocation
page read and write
26C8000
trusted library allocation
page read and write
4A02000
trusted library allocation
page read and write
397D000
direct allocation
page read and write
351C000
trusted library allocation
page read and write
24E6000
trusted library allocation
page read and write
2542000
trusted library allocation
page read and write
25C4000
trusted library allocation
page read and write
613E000
stack
page read and write
359C000
trusted library allocation
page read and write
49EE000
stack
page read and write
36B0000
direct allocation
page read and write
4A30000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
A6E000
stack
page read and write
4F7E000
stack
page read and write
4C70000
heap
page execute and read and write
8D3000
trusted library allocation
page execute and read and write
676D000
stack
page read and write
36B0000
direct allocation
page read and write
4AE0000
heap
page read and write
36F0000
direct allocation
page read and write
EC3F000
trusted library allocation
page read and write
9FCE000
trusted library allocation
page read and write
8D4000
trusted library allocation
page read and write
CAD000
heap
page read and write
702000
heap
page read and write
365C000
trusted library allocation
page read and write
B3E000
stack
page read and write
14DE000
stack
page read and write
67F0000
trusted library allocation
page read and write
967000
heap
page read and write
3850000
direct allocation
page read and write
EBEB000
trusted library allocation
page read and write
EC17000
trusted library allocation
page read and write
AEC000
stack
page read and write
503D000
stack
page read and write
3979000
direct allocation
page read and write
3813000
direct allocation
page read and write
D4F000
heap
page read and write
4C5C000
stack
page read and write
5E60000
trusted library allocation
page execute and read and write
905000
trusted library allocation
page execute and read and write
EC03000
trusted library allocation
page read and write
3194000
heap
page read and write
657000
heap
page read and write
397D000
direct allocation
page read and write
AAE000
stack
page read and write
6AD000
unkown
page readonly
2526000
trusted library allocation
page read and write
6DF000
unkown
page write copy
EC35000
trusted library allocation
page read and write
6AD000
unkown
page readonly
589E000
heap
page read and write
86F0000
trusted library allocation
page read and write
620000
heap
page read and write
35DC000
trusted library allocation
page read and write
39B9000
direct allocation
page read and write
8F6000
trusted library allocation
page execute and read and write
4A8C000
stack
page read and write
49FE000
trusted library allocation
page read and write
3813000
direct allocation
page read and write
4C1C000
stack
page read and write
6770000
trusted library allocation
page read and write
4A11000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
3890000
direct allocation
page read and write
4C60000
trusted library allocation
page read and write
36B0000
direct allocation
page read and write
D1C6000
trusted library allocation
page read and write
930000
trusted library allocation
page execute and read and write
8F0000
trusted library allocation
page read and write
E47000
heap
page read and write
373C000
trusted library allocation
page read and write
C6E000
heap
page read and write
69C000
heap
page read and write
EB2000
heap
page read and write
EC21000
trusted library allocation
page read and write
CA8000
heap
page execute and read and write
B0B000
stack
page read and write
39BD000
direct allocation
page read and write
62F0000
heap
page read and write
58BC000
heap
page read and write
37D3000
direct allocation
page read and write
39EE000
direct allocation
page read and write
5640000
heap
page read and write
5EFE000
stack
page read and write
B40000
trusted library allocation
page read and write
6B8000
heap
page read and write
67E0000
heap
page read and write
620000
unkown
page readonly
7A0000
heap
page read and write
2696000
trusted library allocation
page read and write
5E50000
trusted library allocation
page read and write
3850000
direct allocation
page read and write
907000
trusted library allocation
page execute and read and write
CAD000
heap
page read and write
CED000
heap
page read and write
357C000
trusted library allocation
page read and write
252A000
trusted library allocation
page read and write
253A000
trusted library allocation
page read and write
48A000
stack
page read and write
730000
heap
page read and write
5E46000
trusted library allocation
page read and write
9FC6000
trusted library allocation
page read and write
3890000
direct allocation
page read and write
EC1C000
trusted library allocation
page read and write
58D8000
heap
page read and write
3A2E000
direct allocation
page read and write
39EE000
direct allocation
page read and write
4AD4000
heap
page read and write
EC3A000
trusted library allocation
page read and write
363C000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
4F90000
heap
page read and write
950000
trusted library allocation
page read and write
109E000
stack
page read and write
4A16000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
CA9000
heap
page read and write
36BC000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
7D5000
heap
page read and write
B50000
heap
page read and write
D61000
heap
page read and write
C9E000
heap
page read and write
39BD000
direct allocation
page read and write
B60000
heap
page read and write
3850000
direct allocation
page read and write
353C000
trusted library allocation
page read and write
257C000
trusted library allocation
page read and write
2528000
trusted library allocation
page read and write
CA9000
heap
page read and write
36F0000
direct allocation
page read and write
58C5000
heap
page read and write
6E4000
unkown
page readonly
3979000
direct allocation
page read and write
4FFC000
stack
page read and write
5F50000
trusted library allocation
page execute and read and write
5DF7000
trusted library allocation
page read and write
CF3000
heap
page read and write
149F000
stack
page read and write
EBF9000
trusted library allocation
page read and write
49FB000
trusted library allocation
page read and write
3DA000
stack
page read and write
36DC000
trusted library allocation
page read and write
2544000
trusted library allocation
page read and write
CB0000
heap
page read and write
24A0000
heap
page read and write
34D9000
trusted library allocation
page read and write
36B0000
direct allocation
page read and write
35FC000
trusted library allocation
page read and write
EC2B000
trusted library allocation
page read and write
7700000
heap
page read and write
8F2000
trusted library allocation
page read and write
6DA000
unkown
page read and write
39EE000
direct allocation
page read and write
B70000
heap
page read and write
58BA000
heap
page read and write
77C000
stack
page read and write
36FC000
trusted library allocation
page read and write
3A2E000
direct allocation
page read and write
C9F000
heap
page read and write
662D000
stack
page read and write
39EE000
direct allocation
page read and write
5DF0000
trusted library allocation
page read and write
EC26000
trusted library allocation
page read and write
5C7E000
stack
page read and write
35DD000
heap
page read and write
2408000
trusted library allocation
page read and write
4A1D000
trusted library allocation
page read and write
27C5000
trusted library allocation
page read and write
617E000
stack
page read and write
257A000
trusted library allocation
page read and write
24EF000
trusted library allocation
page read and write
CD4000
heap
page read and write
5E3D000
stack
page read and write
B56000
heap
page read and write
2546000
trusted library allocation
page read and write
6E4000
unkown
page readonly
4D7C000
stack
page read and write
E54000
heap
page read and write
397D000
direct allocation
page read and write
621000
unkown
page execute read
AF0000
heap
page execute and read and write
3979000
direct allocation
page read and write
5F40000
trusted library allocation
page read and write
6300000
heap
page read and write
26EF000
trusted library allocation
page read and write
D12000
heap
page read and write
397D000
direct allocation
page read and write
8D0000
trusted library allocation
page read and write
5840000
heap
page read and write
3160000
heap
page read and write
6CE000
unkown
page readonly
1900000
heap
page read and write
36F0000
direct allocation
page read and write
37D3000
direct allocation
page read and write
24FD000
trusted library allocation
page read and write
35BC000
trusted library allocation
page read and write
24B1000
trusted library allocation
page read and write
D4F000
heap
page read and write
B50000
heap
page read and write
5CDE000
stack
page read and write
3A2E000
direct allocation
page read and write
CAD000
heap
page read and write
18DE000
stack
page read and write
CA9000
heap
page read and write
280C000
trusted library allocation
page read and write
CA9000
heap
page read and write
652C000
stack
page read and write
CB9000
heap
page read and write
3979000
direct allocation
page read and write
780000
heap
page read and write
6F6000
heap
page read and write
45AE000
stack
page read and write
666B000
stack
page read and write
28A5000
trusted library allocation
page read and write
5C0000
system
page execute and read and write
4A22000
trusted library allocation
page read and write
3813000
direct allocation
page read and write
39B9000
direct allocation
page read and write
67E9000
heap
page read and write
28CA000
trusted library allocation
page read and write
564A000
heap
page read and write
9FC9000
trusted library allocation
page read and write
6DA000
unkown
page write copy
23FE000
stack
page read and write
5DDE000
stack
page read and write
27D5000
trusted library allocation
page read and write
902000
trusted library allocation
page read and write
690000
heap
page read and write
3190000
heap
page read and write
8DD000
trusted library allocation
page execute and read and write
361C000
trusted library allocation
page read and write
2769000
trusted library allocation
page read and write
EC12000
trusted library allocation
page read and write
37D3000
direct allocation
page read and write
7D0000
heap
page read and write
583C000
stack
page read and write
67E7000
heap
page read and write
507E000
stack
page read and write
There are 293 hidden memdumps, click here to show them.