IOC Report
Rendeles_042024,jpg.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
Rendeles_042024,jpg.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Rendeles_042024,jpg.scr.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe
"C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe"
malicious
C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe
"C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe"
malicious
C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe
"C:\Users\user\Desktop\Rendeles_042024,jpg.scr.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
http://mail.woxi.cz
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
mail.woxi.cz
77.93.220.4
malicious
api.ipify.org
104.26.13.205
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
77.93.220.4
mail.woxi.cz
Czech Republic
malicious
208.95.112.1
ip-api.com
United States
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Rendeles_042024,jpg_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3004000
trusted library allocation
page read and write
malicious
302D000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4EFE000
trusted library allocation
page read and write
malicious
3259000
trusted library allocation
page read and write
malicious
4E82000
trusted library allocation
page read and write
malicious
3035000
trusted library allocation
page read and write
malicious
7BB0000
trusted library section
page read and write
malicious
7FAC0000
trusted library allocation
page execute and read and write
2EA0000
trusted library allocation
page read and write
6F10000
heap
page read and write
548E000
trusted library allocation
page read and write
4A25000
trusted library allocation
page read and write
150E000
stack
page read and write
3130000
trusted library allocation
page read and write
1250000
heap
page read and write
15B3000
trusted library allocation
page execute and read and write
5780000
heap
page read and write
303B000
trusted library allocation
page read and write
7BA0000
trusted library section
page read and write
10F8000
stack
page read and write
4B5E000
trusted library allocation
page read and write
7B90000
trusted library allocation
page execute and read and write
15D2000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
5486000
trusted library allocation
page read and write
4985000
trusted library allocation
page read and write
5750000
heap
page execute and read and write
3527000
trusted library allocation
page read and write
2E3C000
stack
page read and write
302B000
trusted library allocation
page read and write
15FE000
stack
page read and write
124A000
heap
page read and write
1443000
heap
page read and write
11FA000
heap
page read and write
548B000
trusted library allocation
page read and write
5C9F000
stack
page read and write
1420000
heap
page read and write
5B9E000
stack
page read and write
1435000
heap
page read and write
9DA2000
trusted library allocation
page read and write
13CA000
trusted library allocation
page execute and read and write
6F20000
trusted library allocation
page read and write
7F88000
trusted library allocation
page read and write
1300000
heap
page read and write
138E000
unkown
page read and write
7F80000
trusted library allocation
page read and write
56FE000
stack
page read and write
96AE000
heap
page read and write
3571000
trusted library allocation
page read and write
6828000
heap
page read and write
DA7E000
stack
page read and write
2DFE000
stack
page read and write
5721000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
14F2000
heap
page read and write
1400000
heap
page read and write
13E7000
trusted library allocation
page execute and read and write
A2EE000
stack
page read and write
57B3000
heap
page read and write
2F84000
trusted library allocation
page read and write
15B4000
trusted library allocation
page read and write
3170000
heap
page execute and read and write
1441000
heap
page read and write
7F95000
heap
page read and write
5D07000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
4A73000
trusted library allocation
page read and write
1207000
heap
page read and write
7E40000
trusted library allocation
page read and write
1275000
heap
page read and write
36B4000
trusted library allocation
page read and write
6D43000
trusted library allocation
page read and write
5740000
heap
page read and write
5570000
heap
page read and write
7FD4000
heap
page read and write
DEBF000
stack
page read and write
7E60000
heap
page read and write
13A4000
trusted library allocation
page read and write
527C000
stack
page read and write
7BC0000
trusted library allocation
page read and write
6BBE000
stack
page read and write
3070000
trusted library section
page read and write
1240000
heap
page read and write
57A0000
trusted library allocation
page read and write
9C8D000
stack
page read and write
43E000
remote allocation
page execute and read and write
D89000
stack
page read and write
3160000
trusted library allocation
page execute and read and write
4181000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
14F6000
heap
page read and write
124C000
heap
page read and write
49D7000
trusted library allocation
page read and write
6B3D000
stack
page read and write
7910000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
D32000
unkown
page execute and read and write
7B80000
heap
page read and write
3100000
trusted library allocation
page read and write
11EF000
heap
page read and write
16FE000
stack
page read and write
15DA000
trusted library allocation
page execute and read and write
3090000
trusted library allocation
page read and write
140E000
heap
page read and write
13C0000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
7FB0000
heap
page read and write
571E000
trusted library allocation
page read and write
13D0000
heap
page read and write
68BE000
stack
page read and write
2E40000
trusted library allocation
page execute and read and write
5790000
trusted library allocation
page read and write
3525000
trusted library allocation
page read and write
13CE000
unkown
page read and write
5580000
heap
page read and write
7F90000
heap
page read and write
2F80000
trusted library allocation
page read and write
1255000
heap
page read and write
11D0000
heap
page read and write
15CD000
trusted library allocation
page execute and read and write
3000000
heap
page read and write
DEFE000
stack
page read and write
2D95000
trusted library allocation
page execute and read and write
DB7E000
stack
page read and write
15A0000
trusted library allocation
page read and write
DE5000
unkown
page execute and read and write
DDBE000
stack
page read and write
6780000
heap
page read and write
7E50000
trusted library allocation
page execute and read and write
D97E000
stack
page read and write
3125000
trusted library allocation
page read and write
69BE000
stack
page read and write
3027000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
A30A000
heap
page read and write
DE0000
heap
page read and write
A31A000
heap
page read and write
6DCE000
stack
page read and write
4009000
trusted library allocation
page read and write
2EEE000
stack
page read and write
6D63000
trusted library allocation
page read and write
2D9B000
trusted library allocation
page execute and read and write
7BD0000
heap
page execute and read and write
6D80000
trusted library allocation
page execute and read and write
1428000
heap
page read and write
5726000
trusted library allocation
page read and write
6B7F000
stack
page read and write
13BD000
trusted library allocation
page execute and read and write
2FF1000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
5792000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
DE5000
heap
page read and write
9B4E000
stack
page read and write
15E7000
heap
page read and write
2FED000
trusted library allocation
page read and write
55FE000
stack
page read and write
599C000
stack
page read and write
1204000
heap
page read and write
6E80000
trusted library allocation
page read and write
2FEE000
stack
page read and write
15D0000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
1247000
heap
page read and write
14CE000
stack
page read and write
13C6000
trusted library allocation
page execute and read and write
15B0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
9B0E000
stack
page read and write
1449000
heap
page read and write
1390000
trusted library allocation
page read and write
11D8000
heap
page read and write
96A0000
heap
page read and write
306E000
stack
page read and write
54C0000
trusted library allocation
page read and write
2D92000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
15D6000
trusted library allocation
page execute and read and write
136E000
stack
page read and write
80E0000
trusted library allocation
page read and write
134E000
stack
page read and write
12D0000
heap
page read and write
64FF000
stack
page read and write
D30000
unkown
page readonly
3140000
trusted library allocation
page read and write
107A000
stack
page read and write
3120000
trusted library allocation
page read and write
9A50000
trusted library section
page read and write
6DD0000
heap
page read and write
13E0000
trusted library allocation
page read and write
67C6000
heap
page read and write
9C4E000
stack
page read and write
56FF000
stack
page read and write
DDB000
unkown
page execute and read and write
7DAB000
stack
page read and write
15BD000
trusted library allocation
page execute and read and write
6D40000
trusted library allocation
page read and write
12A9000
heap
page read and write
11E0000
heap
page read and write
2E60000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
1447000
heap
page read and write
15C0000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
57B0000
heap
page read and write
5A9E000
stack
page read and write
2D97000
trusted library allocation
page execute and read and write
D32000
unkown
page readonly
2F7F000
stack
page read and write
2FD5000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
1177000
stack
page read and write
D30000
unkown
page execute and read and write
5740000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
13E2000
trusted library allocation
page read and write
142D000
heap
page read and write
3573000
trusted library allocation
page read and write
30EC000
stack
page read and write
2F90000
heap
page execute and read and write
7E30000
trusted library allocation
page execute and read and write
7F70000
trusted library allocation
page read and write
11D0000
heap
page read and write
3020000
trusted library allocation
page execute and read and write
2FF0000
trusted library allocation
page execute and read and write
5573000
heap
page read and write
6D6D000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
13A3000
trusted library allocation
page execute and read and write
DC80000
heap
page read and write
5700000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
15E0000
heap
page read and write
1408000
heap
page read and write
DF0000
heap
page read and write
13EB000
trusted library allocation
page execute and read and write
4989000
trusted library allocation
page read and write
1307000
heap
page read and write
6AFE000
stack
page read and write
6F60000
trusted library allocation
page execute and read and write
6D70000
trusted library allocation
page read and write
A2F0000
heap
page read and write
400000
remote allocation
page execute and read and write
63FD000
stack
page read and write
551C000
stack
page read and write
2E70000
heap
page read and write
549E000
trusted library allocation
page read and write
69FE000
stack
page read and write
A305000
heap
page read and write
56BE000
stack
page read and write
DFFE000
stack
page read and write
54AD000
trusted library allocation
page read and write
7B70000
heap
page read and write
570B000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
7F6D000
stack
page read and write
6CBE000
stack
page read and write
3FC9000
trusted library allocation
page read and write
13AD000
trusted library allocation
page execute and read and write
7FA0000
heap
page read and write
7230000
heap
page read and write
54A1000
trusted library allocation
page read and write
513E000
stack
page read and write
DC7D000
stack
page read and write
7B60000
trusted library section
page readonly
713E000
stack
page read and write
54A6000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
122E000
stack
page read and write
6812000
heap
page read and write
There are 265 hidden memdumps, click here to show them.