IOC Report
INVOICE_MAY-888201-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
INVOICE_MAY-888201-2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INVOICE_MAY-888201-2024.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INVOICE_MAY-888201-2024.exe
"C:\Users\user\Desktop\INVOICE_MAY-888201-2024.exe"
malicious
C:\Users\user\Desktop\INVOICE_MAY-888201-2024.exe
"C:\Users\user\Desktop\INVOICE_MAY-888201-2024.exe"
malicious
C:\Users\user\Desktop\INVOICE_MAY-888201-2024.exe
"C:\Users\user\Desktop\INVOICE_MAY-888201-2024.exe"
malicious

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://github.com/romenrg/genetic-startups
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://ipr-co.org
unknown
http://r3.i.lencr.org/0
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://r3.o.lencr.org0
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://tempuri.org/DataSet1.xsd#tableLayoutPanel1
unknown
http://mail.ipr-co.org
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.ipr-co.org
unknown
malicious
ipr-co.org
185.55.225.242
18.31.95.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.55.225.242
ipr-co.org
Iran (ISLAMIC Republic Of)

Memdumps

Base Address
Regiontype
Protect
Malicious
2A91000
trusted library allocation
page read and write
malicious
2ADE000
trusted library allocation
page read and write
malicious
40E6000
trusted library allocation
page read and write
malicious
2B09000
trusted library allocation
page read and write
malicious
3E79000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
BB0000
heap
page read and write
5650000
trusted library allocation
page read and write
74F4000
heap
page read and write
63D2000
heap
page read and write
400000
remote allocation
page execute and read and write
5730000
trusted library allocation
page execute and read and write
77E0000
trusted library allocation
page read and write
591E000
heap
page read and write
53E2000
trusted library allocation
page read and write
D84000
heap
page read and write
773E000
stack
page read and write
4B8D000
stack
page read and write
CA0000
trusted library allocation
page read and write
1116000
heap
page read and write
D20000
trusted library allocation
page execute and read and write
F60000
heap
page read and write
2AE6000
trusted library allocation
page read and write
61CD000
stack
page read and write
57E0000
heap
page read and write
5720000
trusted library allocation
page read and write
74E0000
heap
page read and write
12CE000
stack
page read and write
2EB1000
trusted library allocation
page read and write
2932000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
5790000
heap
page read and write
2E71000
trusted library allocation
page read and write
BAD000
trusted library allocation
page execute and read and write
1340000
trusted library allocation
page read and write
2926000
trusted library allocation
page read and write
54E5000
heap
page read and write
D1E000
stack
page read and write
74B0000
trusted library allocation
page execute and read and write
54D0000
trusted library section
page readonly
2CF0000
heap
page read and write
56D0000
trusted library allocation
page read and write
A82000
unkown
page readonly
5013000
heap
page read and write
1346000
trusted library allocation
page execute and read and write
1370000
heap
page read and write
C90000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
E3E000
heap
page read and write
660E000
stack
page read and write
D58000
heap
page read and write
CAA000
trusted library allocation
page execute and read and write
CA6000
trusted library allocation
page execute and read and write
2E00000
trusted library allocation
page read and write
5540000
heap
page read and write
554E000
stack
page read and write
A1FE000
stack
page read and write
500C000
stack
page read and write
1352000
trusted library allocation
page read and write
BFA000
stack
page read and write
10D0000
heap
page read and write
D50000
heap
page read and write
564E000
stack
page read and write
70B0000
trusted library allocation
page read and write
2A8F000
stack
page read and write
6740000
heap
page read and write
F70000
heap
page read and write
A1AE000
stack
page read and write
10DE000
heap
page read and write
2DFE000
stack
page read and write
1320000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
53B0000
heap
page read and write
2900000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
5680000
heap
page read and write
552B000
stack
page read and write
BA4000
trusted library allocation
page read and write
1110000
heap
page read and write
30C1000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
75A000
stack
page read and write
F50000
trusted library allocation
page read and write
2ADC000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
DC0000
heap
page read and write
7FD20000
trusted library allocation
page execute and read and write
D7A000
heap
page read and write
2CDB000
stack
page read and write
6390000
heap
page read and write
A5AF000
stack
page read and write
53CF000
stack
page read and write
2980000
heap
page execute and read and write
5F2D000
stack
page read and write
74C0000
trusted library section
page read and write
B68000
unkown
page readonly
10D8000
heap
page read and write
BB5000
heap
page read and write
1333000
trusted library allocation
page read and write
5010000
heap
page read and write
57A0000
heap
page read and write
2E55000
trusted library allocation
page read and write
7840000
trusted library allocation
page execute and read and write
291A000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
550E000
stack
page read and write
130E000
stack
page read and write
2C9E000
stack
page read and write
5543000
heap
page read and write
F4F000
stack
page read and write
28FC000
stack
page read and write
5530000
heap
page read and write
1119000
heap
page read and write
D40000
heap
page read and write
BA0000
trusted library allocation
page read and write
7F940000
trusted library allocation
page execute and read and write
DE5000
heap
page read and write
2E50000
trusted library allocation
page read and write
D87000
heap
page read and write
578D000
stack
page read and write
D6F000
heap
page read and write
7C0000
heap
page read and write
290B000
trusted library allocation
page read and write
CB5000
trusted library allocation
page execute and read and write
798E000
stack
page read and write
2950000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
CB2000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
5AF0000
trusted library section
page read and write
7830000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
2E60000
heap
page execute and read and write
5640000
heap
page read and write
528C000
stack
page read and write
6017000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
6940000
heap
page read and write
54E0000
heap
page read and write
2B04000
trusted library allocation
page read and write
63A8000
heap
page read and write
5490000
trusted library allocation
page read and write
AF9000
stack
page read and write
1620000
trusted library allocation
page execute and read and write
4E78000
trusted library allocation
page read and write
1640000
heap
page read and write
FA0000
heap
page read and write
5350000
trusted library allocation
page read and write
57A9000
heap
page read and write
75F0000
trusted library allocation
page read and write
F60000
heap
page read and write
53E7000
trusted library allocation
page read and write
3FFC000
trusted library allocation
page read and write
5726000
trusted library allocation
page read and write
290E000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
70D2000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
4ED0000
heap
page read and write
D30000
trusted library allocation
page read and write
1191000
heap
page read and write
5910000
heap
page read and write
5FCE000
stack
page read and write
7AF0000
trusted library section
page read and write
2CE0000
trusted library allocation
page read and write
A4AE000
stack
page read and write
1350000
trusted library allocation
page read and write
5668000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
2944000
trusted library allocation
page read and write
788E000
stack
page read and write
56D8000
trusted library allocation
page read and write
670E000
stack
page read and write
2921000
trusted library allocation
page read and write
147E000
stack
page read and write
C9D000
trusted library allocation
page execute and read and write
500C000
stack
page read and write
52CE000
stack
page read and write
1323000
trusted library allocation
page execute and read and write
570C000
trusted library allocation
page read and write
53C0000
trusted library allocation
page execute and read and write
CA2000
trusted library allocation
page read and write
7C6E000
stack
page read and write
3AF8000
trusted library allocation
page read and write
5F30000
trusted library allocation
page execute and read and write
B4E000
unkown
page read and write
291E000
trusted library allocation
page read and write
1647000
heap
page read and write
CBB000
trusted library allocation
page execute and read and write
292D000
trusted library allocation
page read and write
763E000
stack
page read and write
BA3000
trusted library allocation
page execute and read and write
CD0000
trusted library allocation
page read and write
133D000
trusted library allocation
page execute and read and write
7838000
trusted library allocation
page read and write
540E000
stack
page read and write
CB7000
trusted library allocation
page execute and read and write
2E1E000
trusted library allocation
page read and write
10BE000
stack
page read and write
600E000
stack
page read and write
2AF7000
trusted library allocation
page read and write
7D0000
heap
page read and write
EF7000
stack
page read and write
2E26000
trusted library allocation
page read and write
5180000
heap
page execute and read and write
A2B0000
heap
page read and write
134A000
trusted library allocation
page execute and read and write
53D0000
heap
page execute and read and write
135B000
trusted library allocation
page execute and read and write
782E000
stack
page read and write
75E0000
trusted library allocation
page read and write
57CE000
heap
page read and write
1078000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
3AB9000
trusted library allocation
page read and write
1324000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
2912000
trusted library allocation
page read and write
A80000
unkown
page readonly
1106000
heap
page read and write
1357000
trusted library allocation
page execute and read and write
2E2D000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
54B0000
trusted library allocation
page execute and read and write
There are 220 hidden memdumps, click here to show them.