IOC Report
0000003448.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
0000003448.pdf.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0000003448.pdf.e_e15196a8f0eb2511ce4747ffb907bdc14423242_a04c5d31_4c6ecd60-570c-451f-8116-ae129e58bb7d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER97AA.tmp.dmp
Mini DuMP crash report, 16 streams, Mon May 27 10:42:46 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9922.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9962.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0000003448.pdf.exe
"C:\Users\user\Desktop\0000003448.pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2520 -s 1084

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
http://upx.sf.net
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://drconstrucciones.es
unknown
http://mail.drconstrucciones.es
unknown

Domains

Name
IP
Malicious
drconstrucciones.es
185.5.126.24
malicious
mail.drconstrucciones.es
unknown
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
185.5.126.24
drconstrucciones.es
Spain
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
FileDirectory
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
ProgramId
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
FileId
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
LowerCaseLongPath
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
LongPathHash
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
Name
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
OriginalFileName
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
Publisher
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
Version
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
BinFileVersion
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
BinaryType
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
ProductName
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
ProductVersion
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
LinkDate
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
BinProductVersion
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
AppxPackageFullName
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
AppxPackageRelativeId
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
Size
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
Language
\REGISTRY\A\{59b3fee4-8e1d-d082-095c-f67908fbb7f1}\Root\InventoryApplicationFile\0000003448.pdf.e|163a3774a8e712e0
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
317B000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2475EA97000
trusted library allocation
page read and write
malicious
2474EB52000
trusted library allocation
page read and write
malicious
5696000
trusted library allocation
page read and write
6C00000
trusted library allocation
page execute and read and write
3162000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
3110000
heap
page execute and read and write
2474CEFB000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
65DA000
heap
page read and write
1405000
heap
page read and write
3600000
trusted library allocation
page read and write
3602000
trusted library allocation
page read and write
642D000
stack
page read and write
F5EA5FD000
stack
page read and write
56A2000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page execute and read and write
24767322000
heap
page read and write
5D2C000
stack
page read and write
57C0000
heap
page read and write
12F9000
stack
page read and write
2476731F000
heap
page read and write
F5EA4FE000
stack
page read and write
1461000
heap
page read and write
5650000
trusted library allocation
page read and write
13D0000
heap
page read and write
7FFB08821000
unkown
page execute read
2474CED3000
heap
page read and write
F5EA1FC000
stack
page read and write
52CD000
stack
page read and write
7FFB08836000
unkown
page readonly
2474CF64000
heap
page read and write
F5E9BA3000
stack
page read and write
7FFAACBDD000
trusted library allocation
page execute and read and write
6EDF1000
unkown
page execute read
2474D140000
heap
page read and write
67BD000
stack
page read and write
423C000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
F80000
heap
page read and write
580C000
stack
page read and write
95B7000
trusted library allocation
page read and write
7F4C0000
trusted library allocation
page execute and read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
959E000
trusted library allocation
page read and write
2474CE50000
heap
page read and write
6432000
heap
page read and write
2474CED1000
heap
page read and write
145E000
heap
page read and write
1840000
trusted library allocation
page read and write
3120000
heap
page read and write
7FF428410000
trusted library allocation
page execute and read and write
6485000
heap
page read and write
364E000
trusted library allocation
page read and write
14B5000
heap
page read and write
330A000
trusted library allocation
page read and write
7FFAACDD9000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
30CE000
stack
page read and write
596E000
stack
page read and write
1650000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
7FFB08820000
unkown
page readonly
F5EA3FE000
stack
page read and write
95CB000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
7FFAACC66000
trusted library allocation
page read and write
2474CD72000
unkown
page readonly
42BC000
trusted library allocation
page read and write
2474CE9C000
heap
page read and write
651F000
heap
page read and write
7FFAACC96000
trusted library allocation
page execute and read and write
958B000
trusted library allocation
page read and write
1860000
heap
page read and write
2474EA80000
heap
page read and write
6BE6000
trusted library allocation
page read and write
2474EA89000
heap
page read and write
2474D145000
heap
page read and write
6E9C000
stack
page read and write
F5EA0FE000
stack
page read and write
1454000
heap
page read and write
6EE0D000
unkown
page read and write
2474EB1C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2474E8F9000
heap
page read and write
340D000
trusted library allocation
page read and write
5682000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
95A3000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
369B000
trusted library allocation
page read and write
5D40000
heap
page read and write
6461000
heap
page read and write
7FFAACC0C000
trusted library allocation
page execute and read and write
569D000
trusted library allocation
page read and write
1692000
trusted library allocation
page read and write
68BE000
stack
page read and write
9A47000
heap
page read and write
5BAC000
stack
page read and write
95D0000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
6523000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
5660000
heap
page execute and read and write
7FFAACBDB000
trusted library allocation
page execute and read and write
419B000
trusted library allocation
page read and write
348B000
trusted library allocation
page read and write
7FFAACE00000
trusted library allocation
page read and write
652B000
heap
page read and write
31F3000
trusted library allocation
page read and write
3296000
trusted library allocation
page read and write
1420000
heap
page read and write
2474D0C0000
trusted library section
page read and write
2474EBDC000
trusted library allocation
page read and write
748E000
stack
page read and write
2475EA91000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
2474CE00000
heap
page read and write
15EB000
stack
page read and write
425C000
trusted library allocation
page read and write
7FFB08842000
unkown
page readonly
2474D0A3000
trusted library allocation
page read and write
5610000
trusted library allocation
page execute and read and write
421C000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
3461000
trusted library allocation
page read and write
15AC000
stack
page read and write
1673000
trusted library allocation
page execute and read and write
1670000
trusted library allocation
page read and write
99C9000
heap
page read and write
1696000
trusted library allocation
page execute and read and write
1690000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
64DC000
heap
page read and write
3526000
trusted library allocation
page read and write
2F7C000
stack
page read and write
7FFAACE10000
trusted library allocation
page read and write
155F000
stack
page read and write
FFE000
stack
page read and write
7FFAACD9A000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
6BDD000
stack
page read and write
2474CD7E000
unkown
page readonly
2474D120000
heap
page read and write
1640000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
42DC000
trusted library allocation
page read and write
2474CEBE000
heap
page read and write
43E000
remote allocation
page execute and read and write
9A5F000
heap
page read and write
95C6000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
9A6E000
heap
page read and write
567E000
trusted library allocation
page read and write
9990000
heap
page read and write
9992000
heap
page read and write
6EE0F000
unkown
page readonly
7FFAACDB0000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
5138000
trusted library allocation
page read and write
7380000
heap
page read and write
5AAC000
stack
page read and write
F5EA2FF000
stack
page read and write
2474CF04000
heap
page read and write
31FA000
trusted library allocation
page read and write
2474EE0D000
trusted library allocation
page read and write
95DF000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
958F000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
6C9E000
stack
page read and write
7FFB08840000
unkown
page read and write
7FFAACBB3000
trusted library allocation
page execute and read and write
3332000
trusted library allocation
page read and write
2474EA91000
trusted library allocation
page read and write
8390000
heap
page read and write
7FFAACD7F000
trusted library allocation
page read and write
9A3A000
heap
page read and write
3411000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
3576000
trusted library allocation
page read and write
420E000
trusted library allocation
page read and write
7FFAACE3B000
trusted library allocation
page read and write
7FFAACBD4000
trusted library allocation
page read and write
9A38000
heap
page read and write
9AA1000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
2474CE90000
heap
page read and write
1560000
trusted library allocation
page read and write
169A000
trusted library allocation
page execute and read and write
7FFAACDDD000
trusted library allocation
page read and write
6B8D000
trusted library allocation
page read and write
14E7000
heap
page read and write
1847000
trusted library allocation
page execute and read and write
5BEC000
stack
page read and write
95C1000
trusted library allocation
page read and write
1400000
heap
page read and write
9599000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
24766AC0000
trusted library allocation
page read and write
4159000
trusted library allocation
page read and write
7FFAACDF0000
trusted library allocation
page execute and read and write
7090000
trusted library allocation
page execute and read and write
163B000
stack
page read and write
7FFAACCD0000
trusted library allocation
page execute and read and write
7080000
trusted library allocation
page read and write
F1A000
stack
page read and write
3552000
trusted library allocation
page read and write
168D000
trusted library allocation
page execute and read and write
142B000
heap
page read and write
F5E9EFE000
stack
page read and write
1660000
trusted library allocation
page read and write
9A7F000
heap
page read and write
427C000
trusted library allocation
page read and write
69FE000
stack
page read and write
7FFAACC60000
trusted library allocation
page read and write
9594000
trusted library allocation
page read and write
5CEC000
stack
page read and write
6A5E000
stack
page read and write
316B000
trusted library allocation
page read and write
1842000
trusted library allocation
page read and write
2474EA40000
heap
page execute and read and write
7FFAACBCD000
trusted library allocation
page execute and read and write
7FFAACE40000
trusted library allocation
page read and write
2474CD70000
unkown
page readonly
A18F000
stack
page read and write
5A6D000
stack
page read and write
95BC000
trusted library allocation
page read and write
2474D0A0000
trusted library allocation
page read and write
16A0000
heap
page read and write
656E000
stack
page read and write
6B78000
trusted library allocation
page read and write
14F5000
heap
page read and write
6CE0000
trusted library allocation
page execute and read and write
7FFAACDC0000
trusted library allocation
page read and write
2474D0E0000
heap
page execute and read and write
3578000
trusted library allocation
page read and write
41FC000
trusted library allocation
page read and write
6B97000
trusted library allocation
page read and write
7FFAACBC2000
trusted library allocation
page read and write
F90000
heap
page read and write
2474D070000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
16A7000
heap
page read and write
2474CEBC000
heap
page read and write
2474D090000
trusted library allocation
page read and write
41BC000
trusted library allocation
page read and write
95D5000
trusted library allocation
page read and write
364A000
trusted library allocation
page read and write
95AD000
trusted library allocation
page read and write
310C000
stack
page read and write
590C000
stack
page read and write
6450000
heap
page read and write
6CDC000
stack
page read and write
34B6000
trusted library allocation
page read and write
1845000
trusted library allocation
page execute and read and write
429C000
trusted library allocation
page read and write
2474CE10000
heap
page read and write
1674000
trusted library allocation
page read and write
7FFAACC6C000
trusted library allocation
page execute and read and write
99F3000
heap
page read and write
340F000
trusted library allocation
page read and write
65D0000
heap
page read and write
8A8C000
stack
page read and write
705C000
stack
page read and write
999D000
heap
page read and write
7FFB08845000
unkown
page readonly
6BE0000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
6630000
heap
page read and write
6EDF0000
unkown
page readonly
1680000
trusted library allocation
page read and write
184B000
trusted library allocation
page execute and read and write
2474CE30000
heap
page read and write
70A0000
heap
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
7FFAACBB0000
trusted library allocation
page read and write
9AA5000
heap
page read and write
6EE06000
unkown
page readonly
6B5E000
stack
page read and write
7FFAACDE0000
trusted library allocation
page read and write
167D000
trusted library allocation
page execute and read and write
6430000
heap
page read and write
6F5C000
stack
page read and write
95A8000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
64D2000
heap
page read and write
2474D110000
heap
page read and write
7FFAACDEA000
trusted library allocation
page read and write
247672E0000
heap
page read and write
2474CECF000
heap
page read and write
6B70000
trusted library allocation
page read and write
2FCE000
stack
page read and write
83A0000
heap
page read and write
F5E9FFE000
stack
page read and write
7FFAACBB4000
trusted library allocation
page read and write
56C0000
heap
page read and write
35BD000
trusted library allocation
page read and write
68FE000
stack
page read and write
95DA000
trusted library allocation
page read and write
41DC000
trusted library allocation
page read and write
34DC000
trusted library allocation
page read and write
57C4000
heap
page read and write
95B2000
trusted library allocation
page read and write
1866000
heap
page read and write
24767250000
trusted library section
page read and write
3675000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
2474D115000
heap
page read and write
There are 307 hidden memdumps, click here to show them.