Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ Img_Quotation PO 202400969 - HESSEN TECH_pdf.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ Img_Quotation PO 202400969 - HESSEN TECH_pdf.exe
|
"C:\Users\user\Desktop\RFQ Img_Quotation PO 202400969 - HESSEN TECH_pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
http://r3.o.lencr.org0
|
unknown
|
||
http://mail.temikan.com.tr
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://r3.i.lencr.org/0B
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://temikan.com.tr
|
unknown
|
||
http://cps.root-x1.letsencrypt.org0
|
unknown
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
temikan.com.tr
|
31.192.214.172
|
||
mail.temikan.com.tr
|
unknown
|
||
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
31.192.214.172
|
temikan.com.tr
|
Turkey
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
BCC000
|
unkown
|
page read and write
|
||
2DA1000
|
trusted library allocation
|
page read and write
|
||
2DCC000
|
trusted library allocation
|
page read and write
|
||
2DD4000
|
trusted library allocation
|
page read and write
|
||
65FD000
|
trusted library allocation
|
page read and write
|
||
BC2000
|
unkown
|
page readonly
|
||
11DA000
|
heap
|
page read and write
|
||
C07000
|
unkown
|
page execute and read and write
|
||
5206000
|
trusted library allocation
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
66DF000
|
stack
|
page read and write
|
||
6647000
|
trusted library allocation
|
page read and write
|
||
1112000
|
trusted library allocation
|
page read and write
|
||
7FC40000
|
trusted library allocation
|
page execute and read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
607A000
|
heap
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
6AA7000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page execute and read and write
|
||
BA1000
|
unkown
|
page execute read
|
||
5A4D000
|
stack
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
1127000
|
trusted library allocation
|
page execute and read and write
|
||
10FD000
|
trusted library allocation
|
page execute and read and write
|
||
5340000
|
heap
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
51FA000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
C09000
|
unkown
|
page readonly
|
||
5212000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page execute and read and write
|
||
1125000
|
trusted library allocation
|
page execute and read and write
|
||
51EE000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
528C000
|
stack
|
page read and write
|
||
607E000
|
heap
|
page read and write
|
||
51E6000
|
trusted library allocation
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
BA1000
|
unkown
|
page execute read
|
||
520D000
|
trusted library allocation
|
page read and write
|
||
2C78000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
113F000
|
stack
|
page read and write
|
||
BCC000
|
unkown
|
page write copy
|
||
51EB000
|
trusted library allocation
|
page read and write
|
||
BB9000
|
stack
|
page read and write
|
||
6720000
|
trusted library allocation
|
page execute and read and write
|
||
60C6000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
trusted library allocation
|
page read and write
|
||
110D000
|
trusted library allocation
|
page execute and read and write
|
||
590F000
|
stack
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
trusted library allocation
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4E8D000
|
stack
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
65EE000
|
stack
|
page read and write
|
||
ABA000
|
stack
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
112B000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
2DC6000
|
trusted library allocation
|
page read and write
|
||
D0D000
|
stack
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
3D79000
|
trusted library allocation
|
page read and write
|
||
C09000
|
unkown
|
page readonly
|
||
2D40000
|
heap
|
page read and write
|
||
11EB000
|
heap
|
page read and write
|
||
1192000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
3DB4000
|
trusted library allocation
|
page read and write
|
||
663D000
|
stack
|
page read and write
|
||
6B00000
|
heap
|
page read and write
|
||
611C000
|
heap
|
page read and write
|
||
2DC8000
|
trusted library allocation
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
13C6000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
BC2000
|
unkown
|
page readonly
|
||
1116000
|
trusted library allocation
|
page execute and read and write
|
||
1229000
|
heap
|
page read and write
|
||
560C000
|
stack
|
page read and write
|
||
5500000
|
heap
|
page execute and read and write
|
||
11F0000
|
heap
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
5201000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
trusted library allocation
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
118E000
|
stack
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page execute and read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
51F2000
|
trusted library allocation
|
page read and write
|
||
10F3000
|
trusted library allocation
|
page execute and read and write
|
||
F00000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
3D51000
|
trusted library allocation
|
page read and write
|
||
6110000
|
heap
|
page read and write
|
||
5343000
|
heap
|
page read and write
|
||
6070000
|
heap
|
page read and write
|
||
63AF000
|
stack
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
C08000
|
unkown
|
page read and write
|
||
4D8C000
|
stack
|
page read and write
|
||
548D000
|
stack
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
2DCA000
|
trusted library allocation
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
1122000
|
trusted library allocation
|
page read and write
|
||
111A000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2DDF000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
There are 136 hidden memdumps, click here to show them.