Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut42B5.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lecheries
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
|
"C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://beirutrest.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
beirutrest.com
|
50.87.144.157
|
||
api.ipify.org
|
104.26.12.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.26.12.205
|
api.ipify.org
|
United States
|
||
50.87.144.157
|
beirutrest.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5340000
|
trusted library section
|
page read and write
|
||
2AB0000
|
trusted library section
|
page read and write
|
||
297E000
|
heap
|
page read and write
|
||
2D04000
|
trusted library allocation
|
page read and write
|
||
2D2F000
|
trusted library allocation
|
page read and write
|
||
3CB1000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
62A000
|
unkown
|
page read and write
|
||
2C7A000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page execute and read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
54CC000
|
stack
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
52D3000
|
heap
|
page read and write
|
||
2C6E000
|
trusted library allocation
|
page read and write
|
||
D03000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
571000
|
unkown
|
page execute read
|
||
6600000
|
trusted library allocation
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
571000
|
unkown
|
page execute read
|
||
4230000
|
direct allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
227E000
|
stack
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
16BE000
|
heap
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
26CB000
|
trusted library allocation
|
page execute and read and write
|
||
41B3000
|
direct allocation
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
141D000
|
stack
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
4359000
|
direct allocation
|
page read and write
|
||
435D000
|
direct allocation
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
CF3000
|
trusted library allocation
|
page execute and read and write
|
||
51EE000
|
stack
|
page read and write
|
||
41B3000
|
direct allocation
|
page read and write
|
||
D0D000
|
trusted library allocation
|
page execute and read and write
|
||
62F000
|
unkown
|
page write copy
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
16A3000
|
heap
|
page read and write
|
||
6608000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
26C7000
|
trusted library allocation
|
page execute and read and write
|
||
2B50000
|
heap
|
page read and write
|
||
5335000
|
heap
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
140F000
|
stack
|
page read and write
|
||
435D000
|
direct allocation
|
page read and write
|
||
55CC000
|
stack
|
page read and write
|
||
5230000
|
heap
|
page execute and read and write
|
||
3D53000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
435D000
|
direct allocation
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
41B3000
|
direct allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
AF8000
|
stack
|
page read and write
|
||
69D0000
|
heap
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
103A000
|
stack
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
41B3000
|
direct allocation
|
page read and write
|
||
5FD000
|
unkown
|
page readonly
|
||
43CE000
|
direct allocation
|
page read and write
|
||
69C0000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
16AE000
|
heap
|
page read and write
|
||
43CE000
|
direct allocation
|
page read and write
|
||
7A9000
|
stack
|
page read and write
|
||
177C000
|
heap
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
43CE000
|
direct allocation
|
page read and write
|
||
2C66000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
trusted library section
|
page read and write
|
||
445000
|
system
|
page execute and read and write
|
||
1865000
|
heap
|
page read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
4359000
|
direct allocation
|
page read and write
|
||
4359000
|
direct allocation
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
64BE000
|
stack
|
page read and write
|
||
43CE000
|
direct allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
18D8000
|
heap
|
page read and write
|
||
3D73000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
15BD000
|
stack
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
2C7E000
|
trusted library allocation
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
BC0000
|
trusted library section
|
page read and write
|
||
4230000
|
direct allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
637D000
|
stack
|
page read and write
|
||
2D35000
|
trusted library allocation
|
page read and write
|
||
2D2D000
|
trusted library allocation
|
page read and write
|
||
61E000
|
unkown
|
page readonly
|
||
143C000
|
stack
|
page read and write
|
||
2957000
|
heap
|
page read and write
|
||
168A000
|
heap
|
page read and write
|
||
6740000
|
trusted library allocation
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
1839000
|
heap
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page read and write
|
||
26C5000
|
trusted library allocation
|
page execute and read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
647F000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
D1A000
|
trusted library allocation
|
page execute and read and write
|
||
2888000
|
trusted library allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
2930000
|
trusted library allocation
|
page execute and read and write
|
||
5240000
|
heap
|
page read and write
|
||
666D000
|
stack
|
page read and write
|
||
177B000
|
heap
|
page read and write
|
||
1E7E000
|
stack
|
page read and write
|
||
526A000
|
heap
|
page read and write
|
||
D12000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
570000
|
unkown
|
page readonly
|
||
4090000
|
direct allocation
|
page read and write
|
||
3D44000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
65F4000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
13FB000
|
stack
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
697F000
|
stack
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
2D2B000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
2300000
|
direct allocation
|
page read and write
|
||
43CE000
|
direct allocation
|
page read and write
|
||
16CA000
|
heap
|
page execute and read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
62A000
|
unkown
|
page write copy
|
||
16CA000
|
heap
|
page read and write
|
||
58ED000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
unkown
|
page readonly
|
||
2CA0000
|
heap
|
page read and write
|
||
7F530000
|
trusted library allocation
|
page execute and read and write
|
||
16CE000
|
heap
|
page read and write
|
||
3DB4000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
heap
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
4090000
|
direct allocation
|
page read and write
|
||
52BD000
|
heap
|
page read and write
|
||
2923000
|
heap
|
page read and write
|
||
634000
|
unkown
|
page readonly
|
||
41B3000
|
direct allocation
|
page read and write
|
||
177B000
|
heap
|
page read and write
|
||
634000
|
unkown
|
page readonly
|
||
2C92000
|
trusted library allocation
|
page read and write
|
||
15FD000
|
stack
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
43CE000
|
direct allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
41B3000
|
direct allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
2C72000
|
trusted library allocation
|
page read and write
|
||
5244000
|
heap
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
2CF3000
|
trusted library allocation
|
page read and write
|
||
D16000
|
trusted library allocation
|
page execute and read and write
|
||
6990000
|
trusted library allocation
|
page execute and read and write
|
||
D7D000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
5FD000
|
unkown
|
page readonly
|
||
16CA000
|
heap
|
page read and write
|
||
435D000
|
direct allocation
|
page read and write
|
||
276C000
|
stack
|
page read and write
|
||
6980000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
435D000
|
direct allocation
|
page read and write
|
||
4359000
|
direct allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
52A3000
|
heap
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page execute and read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
6610000
|
trusted library allocation
|
page execute and read and write
|
||
673E000
|
stack
|
page read and write
|
||
4359000
|
direct allocation
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
4359000
|
direct allocation
|
page read and write
|
||
26C2000
|
trusted library allocation
|
page read and write
|
||
435D000
|
direct allocation
|
page read and write
|
||
6747000
|
trusted library allocation
|
page read and write
|
||
5248000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
There are 209 hidden memdumps, click here to show them.