IOC Report
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut42B5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\lecheries
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
"C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://beirutrest.com
unknown

Domains

Name
IP
Malicious
beirutrest.com
50.87.144.157
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
104.26.12.205
api.ipify.org
United States
50.87.144.157
beirutrest.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5340000
trusted library section
page read and write
malicious
2AB0000
trusted library section
page read and write
malicious
297E000
heap
page read and write
malicious
2D04000
trusted library allocation
page read and write
malicious
2D2F000
trusted library allocation
page read and write
malicious
3CB1000
trusted library allocation
page read and write
malicious
CF4000
trusted library allocation
page read and write
1480000
heap
page read and write
62A000
unkown
page read and write
2C7A000
trusted library allocation
page read and write
2B40000
heap
page execute and read and write
4230000
direct allocation
page read and write
54CC000
stack
page read and write
E13000
heap
page read and write
D50000
heap
page read and write
52D3000
heap
page read and write
2C6E000
trusted library allocation
page read and write
D03000
trusted library allocation
page read and write
1490000
heap
page read and write
571000
unkown
page execute read
6600000
trusted library allocation
page read and write
D28000
heap
page read and write
571000
unkown
page execute read
4230000
direct allocation
page read and write
4090000
direct allocation
page read and write
4230000
direct allocation
page read and write
227E000
stack
page read and write
693E000
stack
page read and write
16BE000
heap
page read and write
DCC000
heap
page read and write
26CB000
trusted library allocation
page execute and read and write
41B3000
direct allocation
page read and write
23C0000
heap
page read and write
141D000
stack
page read and write
F1E000
stack
page read and write
68FE000
stack
page read and write
4359000
direct allocation
page read and write
435D000
direct allocation
page read and write
65F0000
trusted library allocation
page read and write
CF3000
trusted library allocation
page execute and read and write
51EE000
stack
page read and write
41B3000
direct allocation
page read and write
D0D000
trusted library allocation
page execute and read and write
62F000
unkown
page write copy
D10000
trusted library allocation
page read and write
16A3000
heap
page read and write
6608000
trusted library allocation
page read and write
2C5E000
stack
page read and write
26C7000
trusted library allocation
page execute and read and write
2B50000
heap
page read and write
5335000
heap
page read and write
2CB1000
trusted library allocation
page read and write
66FE000
stack
page read and write
BD5000
heap
page read and write
4230000
direct allocation
page read and write
426000
system
page execute and read and write
140F000
stack
page read and write
435D000
direct allocation
page read and write
55CC000
stack
page read and write
5230000
heap
page execute and read and write
3D53000
trusted library allocation
page read and write
B10000
heap
page read and write
2C86000
trusted library allocation
page read and write
D20000
heap
page read and write
435D000
direct allocation
page read and write
2C6B000
trusted library allocation
page read and write
41B3000
direct allocation
page read and write
D8B000
heap
page read and write
AF8000
stack
page read and write
69D0000
heap
page read and write
5200000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
103A000
stack
page read and write
2B10000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
4090000
direct allocation
page read and write
41B3000
direct allocation
page read and write
5FD000
unkown
page readonly
43CE000
direct allocation
page read and write
69C0000
heap
page read and write
BBE000
stack
page read and write
2950000
heap
page read and write
16AE000
heap
page read and write
43CE000
direct allocation
page read and write
7A9000
stack
page read and write
177C000
heap
page read and write
2D41000
trusted library allocation
page read and write
43CE000
direct allocation
page read and write
2C66000
trusted library allocation
page read and write
CD0000
trusted library section
page read and write
445000
system
page execute and read and write
1865000
heap
page read and write
4230000
direct allocation
page read and write
4359000
direct allocation
page read and write
4359000
direct allocation
page read and write
61E0000
heap
page read and write
64BE000
stack
page read and write
43CE000
direct allocation
page read and write
4090000
direct allocation
page read and write
2C60000
trusted library allocation
page read and write
18D8000
heap
page read and write
3D73000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
4DAE000
stack
page read and write
15BD000
stack
page read and write
5260000
heap
page read and write
2C7E000
trusted library allocation
page read and write
6CEE000
stack
page read and write
B5E000
stack
page read and write
5390000
heap
page read and write
BC0000
trusted library section
page read and write
4230000
direct allocation
page read and write
1680000
heap
page read and write
637D000
stack
page read and write
2D35000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
61E000
unkown
page readonly
143C000
stack
page read and write
2957000
heap
page read and write
168A000
heap
page read and write
6740000
trusted library allocation
page read and write
65BE000
stack
page read and write
1839000
heap
page read and write
2C8D000
trusted library allocation
page read and write
26C5000
trusted library allocation
page execute and read and write
2C81000
trusted library allocation
page read and write
647F000
stack
page read and write
2770000
heap
page read and write
D1A000
trusted library allocation
page execute and read and write
2888000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2930000
trusted library allocation
page execute and read and write
5240000
heap
page read and write
666D000
stack
page read and write
177B000
heap
page read and write
1E7E000
stack
page read and write
526A000
heap
page read and write
D12000
trusted library allocation
page read and write
CB0000
heap
page read and write
6620000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
D5A000
heap
page read and write
400000
system
page execute and read and write
570000
unkown
page readonly
4090000
direct allocation
page read and write
3D44000
heap
page read and write
287E000
stack
page read and write
65F4000
trusted library allocation
page read and write
3D40000
heap
page read and write
2920000
heap
page read and write
13FB000
stack
page read and write
2CEA000
trusted library allocation
page read and write
2AAE000
stack
page read and write
697F000
stack
page read and write
CF0000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
1570000
heap
page read and write
2300000
direct allocation
page read and write
43CE000
direct allocation
page read and write
16CA000
heap
page execute and read and write
26C0000
trusted library allocation
page read and write
1660000
heap
page read and write
62A000
unkown
page write copy
16CA000
heap
page read and write
58ED000
trusted library allocation
page read and write
CFD000
trusted library allocation
page execute and read and write
61E000
unkown
page readonly
2CA0000
heap
page read and write
7F530000
trusted library allocation
page execute and read and write
16CE000
heap
page read and write
3DB4000
trusted library allocation
page read and write
D5D000
heap
page read and write
16CE000
heap
page read and write
4090000
direct allocation
page read and write
4090000
direct allocation
page read and write
52BD000
heap
page read and write
2923000
heap
page read and write
634000
unkown
page readonly
41B3000
direct allocation
page read and write
177B000
heap
page read and write
634000
unkown
page readonly
2C92000
trusted library allocation
page read and write
15FD000
stack
page read and write
2B00000
trusted library allocation
page read and write
43CE000
direct allocation
page read and write
2D00000
trusted library allocation
page read and write
41B3000
direct allocation
page read and write
168E000
heap
page read and write
2C72000
trusted library allocation
page read and write
5244000
heap
page read and write
2B20000
trusted library allocation
page read and write
2CF3000
trusted library allocation
page read and write
D16000
trusted library allocation
page execute and read and write
6990000
trusted library allocation
page execute and read and write
D7D000
heap
page read and write
1710000
heap
page read and write
B60000
heap
page read and write
5FD000
unkown
page readonly
16CA000
heap
page read and write
435D000
direct allocation
page read and write
276C000
stack
page read and write
6980000
trusted library allocation
page read and write
6BEE000
stack
page read and write
435D000
direct allocation
page read and write
4359000
direct allocation
page read and write
BD0000
heap
page read and write
52A3000
heap
page read and write
61F0000
trusted library allocation
page execute and read and write
2940000
trusted library allocation
page read and write
6610000
trusted library allocation
page execute and read and write
673E000
stack
page read and write
4359000
direct allocation
page read and write
272E000
stack
page read and write
4359000
direct allocation
page read and write
26C2000
trusted library allocation
page read and write
435D000
direct allocation
page read and write
6747000
trusted library allocation
page read and write
5248000
heap
page read and write
570000
unkown
page readonly
There are 209 hidden memdumps, click here to show them.