Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Comprobante9404638600.pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\atule
|
ASCII text, with very long lines (29732), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut2E3C.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut2ED9.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nonplacental
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Comprobante9404638600.pdf.exe
|
"C:\Users\user\Desktop\Comprobante9404638600.pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Comprobante9404638600.pdf.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r3.i.lencr.org/0/
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
http://itzayanaland.com
|
unknown
|
||
http://mail.itzayanaland.com
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.itzayanaland.com
|
unknown
|
||
itzayanaland.com
|
107.161.75.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.161.75.133
|
itzayanaland.com
|
Canada
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
3C70000
|
direct allocation
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
322C000
|
trusted library allocation
|
page read and write
|
||
3202000
|
trusted library allocation
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
5D98000
|
trusted library allocation
|
page read and write
|
||
15EA000
|
heap
|
page read and write
|
||
4190000
|
direct allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
3028000
|
trusted library allocation
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
3D54000
|
heap
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
||
320A000
|
trusted library allocation
|
page read and write
|
||
FAA000
|
stack
|
page read and write
|
||
190A000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
14BA000
|
trusted library allocation
|
page execute and read and write
|
||
1858000
|
heap
|
page read and write
|
||
1893000
|
heap
|
page read and write
|
||
1883000
|
heap
|
page read and write
|
||
190A000
|
heap
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
1893000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
318D000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
1494000
|
trusted library allocation
|
page read and write
|
||
597C000
|
stack
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
1893000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
4D5000
|
unkown
|
page readonly
|
||
4DF000
|
unkown
|
page read and write
|
||
14C7000
|
trusted library allocation
|
page execute and read and write
|
||
1909000
|
heap
|
page read and write
|
||
42B3000
|
direct allocation
|
page read and write
|
||
1966000
|
heap
|
page read and write
|
||
4190000
|
direct allocation
|
page read and write
|
||
1883000
|
heap
|
page read and write
|
||
18B3000
|
heap
|
page read and write
|
||
1956000
|
heap
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
653F000
|
heap
|
page read and write
|
||
4459000
|
direct allocation
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
||
445D000
|
direct allocation
|
page read and write
|
||
421000
|
unkown
|
page execute read
|
||
7F610000
|
trusted library allocation
|
page execute and read and write
|
||
42B3000
|
direct allocation
|
page read and write
|
||
187F000
|
heap
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
153A000
|
heap
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
584C000
|
stack
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
F7A000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
15DB000
|
stack
|
page read and write
|
||
445D000
|
direct allocation
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
1937000
|
heap
|
page read and write
|
||
64E0000
|
heap
|
page read and write
|
||
4459000
|
direct allocation
|
page read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
3153000
|
heap
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
||
6CFE000
|
stack
|
page read and write
|
||
1966000
|
heap
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
1919000
|
heap
|
page read and write
|
||
68BD000
|
stack
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
323C000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page execute and read and write
|
||
1493000
|
trusted library allocation
|
page execute and read and write
|
||
187E000
|
heap
|
page read and write
|
||
4E3000
|
unkown
|
page write copy
|
||
1956000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
42B3000
|
direct allocation
|
page read and write
|
||
1877000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
445D000
|
direct allocation
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
3172000
|
trusted library allocation
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
6D00000
|
heap
|
page read and write
|
||
44CE000
|
direct allocation
|
page read and write
|
||
1966000
|
heap
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
1544000
|
heap
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
14C2000
|
trusted library allocation
|
page read and write
|
||
445D000
|
direct allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
66FD000
|
stack
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
187F000
|
heap
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
421000
|
unkown
|
page execute read
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
4217000
|
trusted library allocation
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
4E8000
|
unkown
|
page readonly
|
||
18A2000
|
heap
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page execute and read and write
|
||
4190000
|
direct allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
42B3000
|
direct allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
4190000
|
direct allocation
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
4190000
|
direct allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
661D000
|
stack
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
190A000
|
heap
|
page read and write
|
||
30FC000
|
stack
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
18A2000
|
heap
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
1877000
|
heap
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
1546000
|
heap
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
||
187E000
|
heap
|
page read and write
|
||
4E8000
|
unkown
|
page readonly
|
||
31A0000
|
heap
|
page execute and read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
17AE000
|
stack
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page execute and read and write
|
||
14AD000
|
trusted library allocation
|
page execute and read and write
|
||
44CE000
|
direct allocation
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
445D000
|
direct allocation
|
page read and write
|
||
44CE000
|
direct allocation
|
page read and write
|
||
44CE000
|
direct allocation
|
page read and write
|
||
1820000
|
direct allocation
|
page execute and read and write
|
||
4459000
|
direct allocation
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
445D000
|
direct allocation
|
page read and write
|
||
4DF000
|
unkown
|
page write copy
|
||
5870000
|
heap
|
page execute and read and write
|
||
15FC000
|
stack
|
page read and write
|
||
3228000
|
trusted library allocation
|
page read and write
|
||
41D9000
|
trusted library allocation
|
page read and write
|
||
44CE000
|
direct allocation
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
||
42B3000
|
direct allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
204F000
|
stack
|
page read and write
|
||
1873000
|
heap
|
page read and write
|
||
44CE000
|
direct allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
190A000
|
heap
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
4459000
|
direct allocation
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
3186000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
187E000
|
heap
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page execute and read and write
|
||
18AF000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
317A000
|
trusted library allocation
|
page read and write
|
||
4190000
|
direct allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
42B3000
|
direct allocation
|
page read and write
|
||
317E000
|
trusted library allocation
|
page read and write
|
||
652F000
|
heap
|
page read and write
|
||
14B6000
|
trusted library allocation
|
page execute and read and write
|
||
321B000
|
trusted library allocation
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
4459000
|
direct allocation
|
page read and write
|
||
149D000
|
trusted library allocation
|
page execute and read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
1909000
|
heap
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
66BE000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
18AF000
|
heap
|
page read and write
|
||
14CB000
|
trusted library allocation
|
page execute and read and write
|
||
4459000
|
direct allocation
|
page read and write
|
||
14C5000
|
trusted library allocation
|
page execute and read and write
|
||
59BE000
|
stack
|
page read and write
|
||
1966000
|
heap
|
page read and write
|
||
7000000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
4330000
|
direct allocation
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
4D5000
|
unkown
|
page readonly
|
||
1883000
|
heap
|
page read and write
|
||
1937000
|
heap
|
page read and write
|
||
41B1000
|
trusted library allocation
|
page read and write
|
||
1956000
|
heap
|
page read and write
|
||
4330000
|
direct allocation
|
page read and write
|
||
1892000
|
heap
|
page read and write
|
There are 233 hidden memdumps, click here to show them.