IOC Report
800399031-18.11.2024.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
800399031-18.11.2024.pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\800399031-18.11.2024.pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\pdf\logs.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
"C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"
malicious
C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
"C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"
malicious

URLs

Name
IP
Malicious
oyo.work.gd
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://geoplugin.net/json.gp/C
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
http://www.monotype.y
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
oyo.work.gd
154.216.20.185

IPs

IP
Domain
Country
Malicious
178.237.33.50
geoplugin.net
Netherlands
154.216.20.185
oyo.work.gd
Seychelles

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\jkm-I9KENP
exepath
HKEY_CURRENT_USER\SOFTWARE\jkm-I9KENP
licence

Memdumps

Base Address
Regiontype
Protect
Malicious
1408000
heap
page read and write
malicious
3479000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3F7A000
trusted library allocation
page read and write
malicious
4E4E000
stack
page read and write
986000
heap
page read and write
4A00000
trusted library allocation
page read and write
785000
heap
page read and write
49D2000
trusted library allocation
page read and write
6B30000
heap
page read and write
4F60000
heap
page read and write
1457000
heap
page read and write
ADE000
stack
page read and write
147D000
heap
page read and write
6E30000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
12FB000
stack
page read and write
944000
heap
page read and write
3471000
trusted library allocation
page read and write
6D9E000
stack
page read and write
9CDF000
stack
page read and write
6DB0000
trusted library allocation
page read and write
7050000
trusted library section
page read and write
1476000
heap
page read and write
4BE0000
trusted library section
page readonly
724E000
stack
page read and write
2290000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
4FB0000
heap
page read and write
320F000
stack
page read and write
4A10000
trusted library allocation
page read and write
672E000
stack
page read and write
FC0000
heap
page read and write
4990000
trusted library allocation
page read and write
4C40000
heap
page read and write
8D6000
heap
page read and write
4C3B000
stack
page read and write
17CF000
stack
page read and write
4BC0000
trusted library allocation
page read and write
5100000
trusted library allocation
page execute and read and write
948000
heap
page read and write
8AE000
heap
page read and write
22A6000
trusted library allocation
page execute and read and write
102000
unkown
page readonly
15E0000
heap
page read and write
5110000
trusted library allocation
page read and write
50E0000
heap
page read and write
13D0000
heap
page read and write
49C1000
trusted library allocation
page read and write
306E000
stack
page read and write
4A30000
trusted library allocation
page read and write
228D000
trusted library allocation
page execute and read and write
9F60000
heap
page read and write
9BDE000
stack
page read and write
8A8000
heap
page read and write
8E1000
heap
page read and write
6B3E000
heap
page read and write
6E60000
trusted library allocation
page read and write
2283000
trusted library allocation
page execute and read and write
6DA0000
trusted library section
page read and write
2460000
heap
page read and write
6DC0000
trusted library allocation
page read and write
3100000
heap
page read and write
22B7000
trusted library allocation
page execute and read and write
998000
heap
page read and write
344F000
stack
page read and write
1455000
heap
page read and write
927000
heap
page read and write
241F000
stack
page read and write
100000
unkown
page readonly
454C000
stack
page read and write
4478000
trusted library allocation
page read and write
1465000
heap
page read and write
75AE000
stack
page read and write
6E0000
heap
page read and write
2284000
trusted library allocation
page read and write
4B60000
heap
page read and write
9F5E000
stack
page read and write
780000
heap
page read and write
2450000
heap
page execute and read and write
475000
remote allocation
page execute and read and write
4BF5000
heap
page read and write
728E000
stack
page read and write
49E0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
4BF0000
heap
page read and write
49CD000
trusted library allocation
page read and write
22A0000
trusted library allocation
page read and write
13C0000
heap
page read and write
49C6000
trusted library allocation
page read and write
348E000
stack
page read and write
231E000
stack
page read and write
980000
heap
page read and write
6EAE000
stack
page read and write
6F7000
heap
page read and write
4A70000
heap
page read and write
2420000
heap
page read and write
4F70000
heap
page read and write
98A000
heap
page read and write
9E5E000
stack
page read and write
4FBA000
heap
page read and write
75E000
stack
page read and write
471000
remote allocation
page execute and read and write
1400000
heap
page read and write
4A90000
trusted library allocation
page execute and read and write
30AB000
stack
page read and write
2440000
trusted library allocation
page execute and read and write
8E3000
heap
page read and write
8A0000
heap
page read and write
2280000
trusted library allocation
page read and write
1447000
heap
page read and write
22D0000
trusted library allocation
page read and write
88E000
stack
page read and write
15D0000
heap
page read and write
6F0000
heap
page read and write
133E000
stack
page read and write
24E7000
trusted library allocation
page read and write
9DE000
stack
page read and write
4E50000
heap
page read and write
334D000
stack
page read and write
4BAE000
stack
page read and write
600000
heap
page read and write
229D000
trusted library allocation
page execute and read and write
29A000
stack
page read and write
49D0000
trusted library allocation
page read and write
6752000
trusted library allocation
page read and write
358F000
stack
page read and write
22B2000
trusted library allocation
page read and write
F5C000
stack
page read and write
4F5E000
stack
page read and write
22AA000
trusted library allocation
page execute and read and write
6730000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
4B63000
heap
page read and write
FD0000
heap
page read and write
4C50000
heap
page execute and read and write
4A05000
trusted library allocation
page read and write
3E2E000
stack
page read and write
9D1E000
stack
page read and write
6E20000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
9E1E000
stack
page read and write
99D000
heap
page read and write
13BE000
stack
page read and write
2293000
trusted library allocation
page read and write
8C0000
heap
page read and write
2471000
trusted library allocation
page read and write
49AB000
trusted library allocation
page read and write
49BE000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
330F000
stack
page read and write
4A84000
trusted library allocation
page read and write
464C000
stack
page read and write
710000
heap
page read and write
397000
stack
page read and write
49A4000
trusted library allocation
page read and write
3F2F000
stack
page read and write
30EC000
stack
page read and write
22BB000
trusted library allocation
page execute and read and write
22B0000
trusted library allocation
page read and write
13C5000
heap
page read and write
There are 151 hidden memdumps, click here to show them.