IOC Report
62402781, Fiyat Teklif Talebi.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
62402781, Fiyat Teklif Talebi.pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ctsdvwT.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Keily
data
dropped
C:\Users\user\AppData\Local\Temp\Maianthemum
ASCII text, with very long lines (28690), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut32DD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut332C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3686.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut36D6.tmp
data
dropped
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
malicious
C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
mail.musabody.com
malicious
https://account.dyn.com/
unknown
http://mail.musabody.com
unknown

Domains

Name
IP
Malicious
mail.musabody.com
108.167.140.123
malicious

IPs

IP
Domain
Country
Malicious
108.167.140.123
mail.musabody.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ctsdvwT

Memdumps

Base Address
Regiontype
Protect
Malicious
5120000
trusted library section
page read and write
malicious
400000
system
page execute and read and write
malicious
280F000
heap
page read and write
malicious
4F80000
trusted library section
page read and write
malicious
3C01000
trusted library allocation
page read and write
malicious
11F0000
direct allocation
page read and write
malicious
3CF0000
direct allocation
page read and write
malicious
86D000
trusted library allocation
page execute and read and write
88C000
unkown
page read and write
43A0000
direct allocation
page read and write
3C73000
direct allocation
page read and write
2740000
heap
page read and write
7C1000
unkown
page execute read
19CB000
heap
page read and write
882000
unkown
page readonly
8EC000
heap
page read and write
CDF000
heap
page read and write
4BA0000
heap
page execute and read and write
3E8E000
direct allocation
page read and write
B70000
heap
page read and write
1498000
heap
page read and write
12CC000
heap
page read and write
16B0000
trusted library allocation
page read and write
12E5000
heap
page read and write
1320000
heap
page read and write
2680000
trusted library allocation
page read and write
1995000
heap
page read and write
4E4E000
stack
page read and write
26EB000
trusted library allocation
page execute and read and write
1305000
heap
page read and write
26E7000
trusted library allocation
page execute and read and write
131B000
heap
page read and write
88C000
unkown
page read and write
14B5000
heap
page read and write
3CF0000
direct allocation
page read and write
9B0000
heap
page read and write
2730000
trusted library allocation
page execute and read and write
19A2000
heap
page read and write
50E0000
trusted library allocation
page read and write
131B000
heap
page read and write
4FD0000
heap
page execute and read and write
2A08000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
13BE000
heap
page read and write
3CF0000
direct allocation
page read and write
3E8E000
direct allocation
page read and write
116A000
stack
page read and write
1508000
heap
page read and write
131B000
heap
page read and write
19CB000
heap
page read and write
672E000
stack
page read and write
7C0000
unkown
page readonly
300E000
stack
page read and write
DC0000
trusted library allocation
page read and write
19CB000
heap
page read and write
1670000
heap
page read and write
930000
heap
page read and write
131B000
heap
page read and write
6050000
heap
page read and write
1239000
stack
page read and write
1950000
heap
page read and write
85C000
unkown
page readonly
FDB000
stack
page read and write
2C7D000
trusted library allocation
page read and write
B4E000
stack
page read and write
646A000
stack
page read and write
50DE000
stack
page read and write
8DB000
heap
page read and write
1120000
heap
page read and write
160F000
stack
page read and write
12C0000
heap
page read and write
3C73000
direct allocation
page read and write
5400000
heap
page read and write
2C01000
trusted library allocation
page read and write
53DC000
stack
page read and write
26D6000
trusted library allocation
page execute and read and write
887000
trusted library allocation
page execute and read and write
26CD000
trusted library allocation
page execute and read and write
27AE000
stack
page read and write
1958000
heap
page read and write
5112000
trusted library allocation
page read and write
BAE000
stack
page read and write
C6E000
stack
page read and write
88C000
unkown
page write copy
3C73000
direct allocation
page read and write
8B8000
heap
page read and write
1985000
heap
page read and write
14BA000
heap
page read and write
27C0000
heap
page read and write
16F7000
trusted library allocation
page execute and read and write
88C000
unkown
page write copy
2C71000
trusted library allocation
page read and write
1310000
heap
page read and write
5FFE000
trusted library allocation
page read and write
CD0000
heap
page read and write
12E4000
heap
page read and write
1994000
heap
page read and write
5680000
trusted library allocation
page read and write
BEE000
stack
page read and write
890000
unkown
page write copy
3E1D000
direct allocation
page read and write
26B0000
trusted library allocation
page read and write
85D000
trusted library allocation
page execute and read and write
14F8000
heap
page read and write
5FF3000
trusted library allocation
page read and write
3080000
trusted library allocation
page execute and read and write
B65000
heap
page read and write
197D000
heap
page read and write
85C000
unkown
page readonly
6130000
trusted library allocation
page read and write
B60000
trusted library allocation
page execute and read and write
2710000
trusted library allocation
page execute and read and write
57A0000
heap
page execute and read and write
11D0000
heap
page read and write
453E000
direct allocation
page read and write
C80000
heap
page read and write
3E19000
direct allocation
page read and write
2CCA000
trusted library allocation
page read and write
1470000
heap
page read and write
2750000
trusted library allocation
page read and write
B50000
heap
page read and write
168F000
stack
page read and write
DD0000
heap
page read and write
1996000
heap
page read and write
2D32000
trusted library allocation
page read and write
6140000
trusted library allocation
page execute and read and write
3DC0000
heap
page read and write
2D46000
trusted library allocation
page read and write
3CF0000
direct allocation
page read and write
790000
heap
page read and write
2C91000
trusted library allocation
page read and write
2ADC000
stack
page read and write
162F000
stack
page read and write
7DE000
stack
page read and write
50EE000
trusted library allocation
page read and write
9AD000
stack
page read and write
12D5000
heap
page read and write
1305000
heap
page read and write
2CD3000
trusted library allocation
page read and write
553E000
stack
page read and write
11C0000
heap
page read and write
2740000
heap
page execute and read and write
7F580000
trusted library allocation
page execute and read and write
26DA000
trusted library allocation
page execute and read and write
3CF0000
direct allocation
page read and write
1996000
heap
page read and write
27B0000
trusted library allocation
page read and write
FCE000
stack
page read and write
16C4000
trusted library allocation
page read and write
29EE000
stack
page read and write
1A26000
heap
page read and write
3070000
trusted library allocation
page read and write
4200000
direct allocation
page read and write
740000
heap
page read and write
5463000
heap
page read and write
8D6000
heap
page read and write
6010000
trusted library allocation
page read and write
19CB000
heap
page read and write
3E8E000
direct allocation
page read and write
921000
heap
page read and write
1900000
direct allocation
page execute and read and write
19B5000
heap
page read and write
18D0000
heap
page read and write
864000
trusted library allocation
page read and write
3C73000
direct allocation
page read and write
890000
unkown
page write copy
261E000
stack
page read and write
2680000
trusted library section
page read and write
88B000
trusted library allocation
page execute and read and write
34A000
unkown
page readonly
26C0000
trusted library allocation
page read and write
CA0000
heap
page read and write
1A6E000
heap
page read and write
4C0E000
stack
page read and write
18F0000
heap
page read and write
12F2000
heap
page read and write
484E000
stack
page read and write
78E000
stack
page read and write
567E000
stack
page read and write
44CD000
direct allocation
page read and write
2760000
heap
page read and write
27E0000
heap
page read and write
DBC000
stack
page read and write
3804000
heap
page read and write
26A0000
trusted library allocation
page read and write
7C0000
unkown
page readonly
CE1000
heap
page read and write
92A000
stack
page read and write
32A1000
trusted library allocation
page read and write
1720000
heap
page read and write
12A0000
heap
page read and write
6A6F000
stack
page read and write
5101000
trusted library allocation
page read and write
3B50000
direct allocation
page read and write
D81000
heap
page read and write
882000
unkown
page readonly
131B000
heap
page read and write
6000000
trusted library allocation
page execute and read and write
12D4000
heap
page read and write
1315000
heap
page read and write
3DC000
stack
page read and write
894000
unkown
page readonly
304C000
stack
page read and write
D06000
heap
page read and write
2C89000
trusted library allocation
page read and write
5408000
heap
page read and write
60EE000
stack
page read and write
1974000
heap
page read and write
6F9000
stack
page read and write
323E000
stack
page read and write
4200000
direct allocation
page read and write
3E1D000
direct allocation
page read and write
1376000
heap
page read and write
3E19000
direct allocation
page read and write
26C3000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
62F2000
trusted library allocation
page read and write
7C8000
stack
page read and write
2700000
trusted library allocation
page read and write
A30000
heap
page read and write
3E8E000
direct allocation
page read and write
15FF000
stack
page read and write
19CB000
heap
page read and write
50FE000
trusted library allocation
page read and write
6C9000
stack
page read and write
254E000
stack
page read and write
445000
system
page execute and read and write
19CB000
heap
page read and write
D99000
heap
page read and write
4D0E000
stack
page read and write
800000
heap
page read and write
29F0000
heap
page read and write
12F2000
heap
page read and write
1E9F000
stack
page read and write
4D4E000
stack
page read and write
592E000
stack
page read and write
3E19000
direct allocation
page read and write
1376000
heap
page read and write
1994000
heap
page read and write
8CF000
heap
page read and write
662E000
stack
page read and write
4F7E000
stack
page read and write
5D3E000
stack
page read and write
3E8E000
direct allocation
page read and write
2720000
trusted library allocation
page read and write
50E4000
trusted library allocation
page read and write
2C65000
trusted library allocation
page read and write
16C3000
trusted library allocation
page execute and read and write
563E000
stack
page read and write
58EE000
stack
page read and write
12C4000
heap
page read and write
17CE000
stack
page read and write
3E19000
direct allocation
page read and write
860000
trusted library allocation
page read and write
3B50000
direct allocation
page read and write
FBF000
stack
page read and write
27D0000
trusted library allocation
page read and write
43A0000
direct allocation
page read and write
8B0000
heap
page read and write
5180000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
342000
unkown
page readonly
44C9000
direct allocation
page read and write
3B50000
direct allocation
page read and write
7E5000
heap
page read and write
19CB000
heap
page read and write
1994000
heap
page read and write
3CC4000
trusted library allocation
page read and write
3C73000
direct allocation
page read and write
19B5000
heap
page read and write
1490000
heap
page read and write
2F0E000
stack
page read and write
106C000
stack
page read and write
197D000
heap
page read and write
26B3000
trusted library allocation
page execute and read and write
D0E000
heap
page read and write
9FE000
stack
page read and write
163F000
stack
page read and write
131B000
heap
page read and write
1301000
heap
page read and write
3B50000
direct allocation
page read and write
2BDD000
stack
page read and write
2CD0000
trusted library allocation
page read and write
16FB000
trusted library allocation
page execute and read and write
7C1000
unkown
page execute read
19B1000
heap
page read and write
1710000
trusted library allocation
page read and write
57EE000
stack
page read and write
16CD000
trusted library allocation
page execute and read and write
214E000
stack
page read and write
17D0000
heap
page read and write
19AA000
heap
page read and write
2D59000
trusted library allocation
page read and write
1376000
heap
page read and write
161B000
stack
page read and write
3E1D000
direct allocation
page read and write
2D2C000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
894000
unkown
page readonly
12A8000
heap
page read and write
62F0000
trusted library allocation
page read and write
12CC000
heap
page read and write
ABE000
stack
page read and write
426000
system
page execute and read and write
3DC4000
heap
page read and write
4F8E000
stack
page read and write
44CD000
direct allocation
page read and write
16F0000
trusted library allocation
page read and write
3CFF000
trusted library allocation
page read and write
D19000
heap
page read and write
3751000
trusted library allocation
page read and write
3E1D000
direct allocation
page read and write
26BD000
trusted library allocation
page execute and read and write
3E19000
direct allocation
page read and write
7C1000
unkown
page execute read
51A0000
heap
page read and write
1985000
heap
page read and write
960000
heap
page read and write
2764000
heap
page read and write
882000
unkown
page readonly
131B000
heap
page read and write
1A26000
heap
page read and write
19CB000
heap
page read and write
145E000
stack
page read and write
853000
trusted library allocation
page execute and read and write
7C1000
unkown
page execute read
882000
unkown
page readonly
1240000
heap
page read and write
3CF0000
direct allocation
page read and write
FEF000
stack
page read and write
D50000
heap
page read and write
3E8E000
direct allocation
page read and write
1984000
heap
page read and write
2D5F000
trusted library allocation
page read and write
4323000
direct allocation
page read and write
131B000
heap
page read and write
B60000
heap
page read and write
C2E000
stack
page read and write
5FC0000
trusted library allocation
page execute and read and write
2CC5000
trusted library allocation
page read and write
854000
trusted library allocation
page read and write
894000
unkown
page readonly
7C0000
unkown
page readonly
3060000
trusted library allocation
page read and write
D7E000
stack
page read and write
19D0000
heap
page read and write
3B50000
direct allocation
page read and write
62E0000
heap
page read and write
26E0000
heap
page execute and read and write
4E8E000
stack
page read and write
3C73000
direct allocation
page read and write
7E0000
heap
page read and write
3B50000
direct allocation
page read and write
50F2000
trusted library allocation
page read and write
16D4000
trusted library allocation
page read and write
CA8000
heap
page read and write
696F000
stack
page read and write
62FA000
trusted library allocation
page read and write
340000
unkown
page readonly
12E6000
heap
page read and write
510D000
trusted library allocation
page read and write
26B4000
trusted library allocation
page read and write
7C0000
unkown
page readonly
85C000
unkown
page readonly
FFF000
stack
page read and write
612F000
stack
page read and write
3050000
trusted library allocation
page execute and read and write
12FA000
heap
page read and write
85C000
unkown
page readonly
4323000
direct allocation
page read and write
1A9E000
stack
page read and write
453E000
direct allocation
page read and write
6300000
heap
page read and write
1A26000
heap
page read and write
50EB000
trusted library allocation
page read and write
178E000
stack
page read and write
3E1D000
direct allocation
page read and write
26D2000
trusted library allocation
page read and write
12D5000
heap
page read and write
26D0000
trusted library allocation
page read and write
3290000
heap
page execute and read and write
8D4000
heap
page read and write
5106000
trusted library allocation
page read and write
52DC000
stack
page read and write
14C7000
heap
page read and write
652E000
stack
page read and write
C7F000
stack
page read and write
5442000
heap
page read and write
130D000
stack
page read and write
2690000
trusted library section
page read and write
3E1D000
direct allocation
page read and write
2CC2000
trusted library allocation
page read and write
12B0000
heap
page read and write
2BF0000
heap
page read and write
42A1000
trusted library allocation
page read and write
3090000
heap
page read and write
26E2000
trusted library allocation
page read and write
131B000
heap
page read and write
16D0000
trusted library allocation
page read and write
577F000
stack
page read and write
5A2E000
stack
page read and write
131B000
heap
page read and write
3800000
heap
page read and write
3E19000
direct allocation
page read and write
27C6000
heap
page read and write
3CF0000
direct allocation
page read and write
894000
unkown
page readonly
636C000
stack
page read and write
2D4A000
trusted library allocation
page read and write
17F0000
heap
page read and write
44C9000
direct allocation
page read and write
19A2000
heap
page read and write
16DD000
trusted library allocation
page execute and read and write
141E000
stack
page read and write
11E0000
direct allocation
page execute and read and write
12E5000
heap
page read and write
267E000
stack
page read and write
There are 407 hidden memdumps, click here to show them.