IOC Report
CHARIKLIA JUNIOR DETAILS.pdf.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
CHARIKLIA JUNIOR DETAILS.pdf.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CHARIKLIA JUNIOR DETAILS.pdf.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwsuu0sb.sq3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqultexp.2j3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hqsknafn.34x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrbdbnsw.yx3.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS.pdf.scr.exe
"C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS.pdf.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS.pdf.scr.exe"
malicious
C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS.pdf.scr.exe
"C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS.pdf.scr.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
http://tempuri.org/ianiDataSet1.xsd
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://beirutrest.com
unknown
http://tempuri.org/ianiDataSet2.xsdM
unknown
http://tempuri.org/ianiDataSet.xsd
unknown

Domains

Name
IP
Malicious
beirutrest.com
50.87.144.157
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
104.26.12.205
api.ipify.org
United States
50.87.144.157
beirutrest.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CHARIKLIA JUNIOR DETAILS_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
327C000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3D79000
trusted library allocation
page read and write
malicious
3251000
trusted library allocation
page read and write
malicious
5240000
heap
page execute and read and write
3181000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
A98C000
stack
page read and write
5D70000
trusted library allocation
page read and write
6A12000
heap
page read and write
1300000
trusted library allocation
page read and write
5A0C000
stack
page read and write
7A46000
heap
page read and write
7140000
heap
page read and write
6D87000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
6F5E000
stack
page read and write
3276000
trusted library allocation
page read and write
1160000
heap
page read and write
708E000
stack
page read and write
5250000
trusted library section
page readonly
13E0000
heap
page read and write
5460000
trusted library section
page read and write
6D80000
trusted library allocation
page read and write
2CB6000
trusted library allocation
page read and write
F18000
heap
page read and write
1100000
trusted library allocation
page read and write
7340000
heap
page read and write
31A0000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
A5CE000
stack
page read and write
71AD000
stack
page read and write
1127000
trusted library allocation
page execute and read and write
2C8F000
stack
page read and write
5270000
heap
page read and write
12AE000
stack
page read and write
2C90000
trusted library allocation
page read and write
16B0000
heap
page read and write
577C000
stack
page read and write
6DE0000
trusted library allocation
page execute and read and write
15B2000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
13E7000
heap
page read and write
70CE000
stack
page read and write
323F000
trusted library allocation
page read and write
1355000
heap
page read and write
14A7000
heap
page read and write
5D78000
trusted library allocation
page read and write
1483000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
7A50000
heap
page read and write
2E68000
trusted library allocation
page read and write
304F000
stack
page read and write
2CC2000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
7A52000
heap
page read and write
A84E000
stack
page read and write
111A000
trusted library allocation
page execute and read and write
1328000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
126E000
stack
page read and write
F99000
stack
page read and write
12AD000
heap
page read and write
2DCA000
trusted library allocation
page read and write
5720000
heap
page read and write
112B000
trusted library allocation
page execute and read and write
31A4000
trusted library allocation
page read and write
56BD000
stack
page read and write
1490000
trusted library allocation
page read and write
56E5000
heap
page read and write
110D000
trusted library allocation
page execute and read and write
5283000
heap
page read and write
5D50000
heap
page read and write
E3E000
stack
page read and write
51C0000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
F7C000
heap
page read and write
316B000
trusted library allocation
page read and write
2F20000
trusted library allocation
page execute and read and write
328E000
trusted library allocation
page read and write
E60000
heap
page read and write
5830000
trusted library allocation
page execute and read and write
56C0000
trusted library allocation
page read and write
744F000
stack
page read and write
2CD5000
trusted library allocation
page read and write
3166000
trusted library allocation
page read and write
6D6E000
stack
page read and write
7A3F000
stack
page read and write
162E000
stack
page read and write
666E000
stack
page read and write
7A81000
heap
page read and write
15CB000
trusted library allocation
page execute and read and write
10EE000
stack
page read and write
128A000
heap
page read and write
1218000
heap
page read and write
6DF0000
trusted library allocation
page execute and read and write
6C6E000
stack
page read and write
2D60000
heap
page execute and read and write
FAA000
heap
page read and write
56D0000
trusted library allocation
page read and write
A4CE000
stack
page read and write
7A40000
heap
page read and write
2CBD000
trusted library allocation
page read and write
EB0000
heap
page read and write
6ECE000
stack
page read and write
6DD0000
trusted library allocation
page read and write
73AF000
stack
page read and write
1430000
heap
page read and write
3150000
trusted library allocation
page read and write
6DF0000
heap
page read and write
10F0000
trusted library allocation
page read and write
E65000
heap
page read and write
5260000
heap
page read and write
314E000
stack
page read and write
1246000
heap
page read and write
A9B0000
trusted library allocation
page read and write
1122000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
1484000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
1248000
heap
page read and write
134E000
stack
page read and write
1116000
trusted library allocation
page execute and read and write
7A44000
heap
page read and write
2F00000
heap
page read and write
A70E000
stack
page read and write
2F30000
trusted library allocation
page read and write
582E000
stack
page read and write
F33000
heap
page read and write
676F000
stack
page read and write
57B0000
heap
page execute and read and write
148D000
trusted library allocation
page execute and read and write
57C0000
heap
page read and write
1299000
heap
page read and write
6EE0000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
1150000
trusted library allocation
page execute and read and write
E9A000
stack
page read and write
5500000
trusted library allocation
page read and write
31F0000
heap
page execute and read and write
15C2000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
6A38000
heap
page read and write
4269000
trusted library allocation
page read and write
3236000
trusted library allocation
page read and write
EAE000
stack
page read and write
2CB1000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
6E8F000
stack
page read and write
69F0000
heap
page read and write
A9A0000
trusted library allocation
page read and write
57C3000
heap
page read and write
2F40000
heap
page read and write
3172000
trusted library allocation
page read and write
16B7000
heap
page read and write
71EE000
stack
page read and write
2D00000
trusted library allocation
page read and write
D10000
heap
page read and write
56E0000
heap
page read and write
523B000
stack
page read and write
A60E000
stack
page read and write
5510000
trusted library allocation
page execute and read and write
2D40000
heap
page read and write
A38E000
stack
page read and write
CF7000
stack
page read and write
2CAE000
trusted library allocation
page read and write
6DCE000
stack
page read and write
2D71000
trusted library allocation
page read and write
710E000
stack
page read and write
7450000
heap
page read and write
7230000
trusted library section
page read and write
1103000
trusted library allocation
page read and write
A74E000
stack
page read and write
1210000
heap
page read and write
F25000
heap
page read and write
1310000
heap
page read and write
56F0000
heap
page read and write
149D000
trusted library allocation
page execute and read and write
12C0000
heap
page read and write
EFE000
heap
page read and write
2C9B000
trusted library allocation
page read and write
7A58000
heap
page read and write
7110000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
15AF000
stack
page read and write
A48E000
stack
page read and write
316E000
trusted library allocation
page read and write
16AC000
stack
page read and write
A88C000
stack
page read and write
10F3000
trusted library allocation
page execute and read and write
722E000
stack
page read and write
5430000
trusted library allocation
page execute and read and write
6B2E000
stack
page read and write
1200000
heap
page read and write
15B6000
trusted library allocation
page execute and read and write
317E000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5280000
heap
page read and write
EF0000
heap
page read and write
15BA000
trusted library allocation
page execute and read and write
2D50000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
12EB000
stack
page read and write
4229000
trusted library allocation
page read and write
6ED7000
trusted library allocation
page read and write
52FE000
stack
page read and write
A13E000
stack
page read and write
324D000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
4E6C000
stack
page read and write
2DD5000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
14A0000
heap
page read and write
10F4000
trusted library allocation
page read and write
9AA000
stack
page read and write
10FD000
trusted library allocation
page execute and read and write
820000
unkown
page readonly
166E000
stack
page read and write
FDF000
heap
page read and write
5470000
heap
page read and write
4201000
trusted library allocation
page read and write
317A000
trusted library allocation
page read and write
6D7D000
trusted library allocation
page read and write
F31000
heap
page read and write
5700000
heap
page read and write
910000
unkown
page readonly
51B0000
trusted library allocation
page execute and read and write
123A000
heap
page read and write
5640000
heap
page read and write
A23E000
stack
page read and write
822000
unkown
page readonly
15C5000
trusted library allocation
page execute and read and write
6C2E000
stack
page read and write
7A74000
heap
page read and write
74F2000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
129E000
heap
page read and write
15B0000
trusted library allocation
page read and write
15C7000
trusted library allocation
page execute and read and write
DF0000
heap
page read and write
7150000
trusted library allocation
page execute and read and write
1110000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
There are 241 hidden memdumps, click here to show them.