IOC Report
O4oLJdI3gs.exe

loading gif

Files

File Path
Type
Category
Malicious
O4oLJdI3gs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_fontdrvhost.exe_d32c824e8915b30da4efd4eabd13e74e4ef8c1_ad0be647_1ab57e78-9611-486c-b44e-7ce3542d872f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9287.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jan 16 12:25:34 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER92D7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9306.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\O4oLJdI3gs.exe
"C:\Users\user\Desktop\O4oLJdI3gs.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Windows\System32\fontdrvhost.exe
"C:\Windows\System32\fontdrvhost.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7720 -s 136

URLs

Name
IP
Malicious
https://154.216.19.249:3637/4b5f27f1f9aa29/ax406g6n.eednw
malicious
https://154.216.19.249:3637/4b5f27f1f9aa29/ax406g6n.eednwx
unknown
https://cloudflare-dns.com/dns-query
unknown
http://upx.sf.net
unknown
https://154.216.19.249:3637/4b5f27f1f9aa29/ax406g6n.eednwkernelbasentdllkernel32GetProcessMitigation
unknown
https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172

IPs

IP
Domain
Country
Malicious
154.216.19.249
unknown
Seychelles
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn3
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProgramId
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
FileId
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LowerCaseLongPath
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LongPathHash
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Name
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
OriginalFileName
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Publisher
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Version
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinFileVersion
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinaryType
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProductName
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
ProductVersion
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
LinkDate
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
BinProductVersion
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
AppxPackageFullName
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
AppxPackageRelativeId
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Size
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Language
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
IsOsComponent
\REGISTRY\A\{6390db85-2195-b288-03fc-0a153a368d77}\Root\InventoryApplicationFile\fontdrvhost.exe|415bd9bd265b6ee3
Usn
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2AC0000
direct allocation
page execute and read and write
malicious
4A0000
direct allocation
page read and write
malicious
570000
direct allocation
page read and write
malicious
A80000
direct allocation
page execute and read and write
malicious
2942000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
9A64D5D000
stack
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
549000
unkown
page execute and read and write
2942000
heap
page read and write
2932000
heap
page read and write
3047000
unkown
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
430000
unkown
page execute and read and write
4A70000
unkown
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
98A000
heap
page read and write
4B40000
unkown
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
4BB0000
unkown
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
1C181C00000
unkown
page execute and read and write
2942000
heap
page read and write
794000
heap
page read and write
280E000
heap
page read and write
4D22000
unkown
page read and write
2942000
heap
page read and write
794000
heap
page read and write
2B0E000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
570000
heap
page read and write
2600000
heap
page read and write
2932000
heap
page read and write
490000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
2B60000
heap
page read and write
2932000
heap
page read and write
460000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
4E01000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2ACF000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
5400000
heap
page read and write
49C0000
unkown
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
4B3C000
stack
page read and write
2942000
heap
page read and write
2D80000
unkown
page read and write
2942000
heap
page read and write
284D000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
510000
unkown
page readonly
2B61000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
5200000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2FC2000
unkown
page read and write
2942000
heap
page read and write
430000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2A7E000
stack
page read and write
2942000
heap
page read and write
F7F000
stack
page read and write
2932000
heap
page read and write
790000
heap
page read and write
9FD000
heap
page read and write
2ACE000
heap
page read and write
2942000
heap
page read and write
299F000
heap
page read and write
2932000
heap
page read and write
4AFF000
stack
page read and write
2932000
heap
page read and write
73C8D000
unkown
page read and write
794000
heap
page read and write
2932000
heap
page read and write
4DC1000
unkown
page read and write
58C000
unkown
page readonly
2942000
heap
page read and write
2942000
heap
page read and write
1C181C50000
unkown
page execute and read and write
2942000
heap
page read and write
4F00000
heap
page read and write
9A6517E000
stack
page read and write
2932000
heap
page read and write
49C0000
unkown
page read and write
511000
unkown
page execute read
2900000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2FD6000
unkown
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
794000
heap
page read and write
58A000
unkown
page read and write
4A60000
unkown
page read and write
2DB0000
unkown
page read and write
2942000
heap
page read and write
98E000
heap
page read and write
2FB6000
unkown
page read and write
9F4000
heap
page read and write
73C8F000
unkown
page readonly
2DE0000
unkown
page read and write
794000
heap
page read and write
4DE000
stack
page read and write
4F36000
heap
page read and write
2800000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2613000
heap
page read and write
73C86000
unkown
page readonly
2F2D000
unkown
page read and write
2912000
heap
page read and write
2932000
heap
page read and write
2DD8000
unkown
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
4C50000
direct allocation
page read and write
2942000
heap
page read and write
5200000
heap
page read and write
2932000
heap
page read and write
511000
unkown
page execute read
2942000
heap
page read and write
980000
heap
page read and write
2613000
heap
page read and write
1C182006000
heap
page read and write
1C181C7A000
heap
page read and write
25D0000
direct allocation
page read and write
2943000
heap
page read and write
2C60000
unkown
page read and write
2F9E000
unkown
page read and write
510000
unkown
page readonly
559000
unkown
page readonly
2932000
heap
page read and write
2942000
heap
page read and write
4C8D000
unkown
page read and write
995000
heap
page read and write
299F000
heap
page read and write
2910000
heap
page read and write
290C000
heap
page read and write
49FE000
stack
page read and write
2942000
heap
page read and write
2ABE000
stack
page read and write
4BFF000
stack
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
950000
heap
page read and write
2932000
heap
page read and write
4F36000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
4A52000
unkown
page read and write
43C000
stack
page read and write
794000
heap
page read and write
9D5000
heap
page read and write
2942000
heap
page read and write
4F01000
heap
page read and write
2932000
heap
page read and write
2F29000
unkown
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2C60000
unkown
page read and write
953000
heap
page read and write
293D000
heap
page read and write
73C70000
unkown
page readonly
2942000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2CF2000
unkown
page read and write
49C0000
unkown
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
4BE0000
unkown
page read and write
588000
unkown
page write copy
69D000
stack
page read and write
2932000
heap
page read and write
588000
unkown
page write copy
2942000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2A3E000
stack
page read and write
2932000
heap
page read and write
2C60000
unkown
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
89F000
stack
page read and write
2942000
heap
page read and write
73C71000
unkown
page execute read
2942000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2B61000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
58C000
unkown
page readonly
2812000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
9FD000
heap
page read and write
2D00000
unkown
page read and write
2C60000
unkown
page read and write
1C181C20000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
299F000
heap
page read and write
2E00000
unkown
page read and write
2942000
heap
page read and write
5100000
heap
page read and write
549000
unkown
page execute and read and write
4C89000
unkown
page read and write
2942000
heap
page read and write
480000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
4AE3000
unkown
page read and write
2942000
heap
page read and write
9A6507E000
stack
page read and write
4B38000
unkown
page read and write
299F000
heap
page read and write
1C181C30000
heap
page read and write
2953000
heap
page read and write
4DA7000
unkown
page read and write
2DD0000
unkown
page read and write
2EC0000
direct allocation
page read and write
299F000
heap
page read and write
490000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
4CFE000
unkown
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
9D5000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
4B30000
unkown
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
4B0000
direct allocation
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
25CD000
stack
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
4D16000
unkown
page read and write
1FC000
stack
page read and write
2932000
heap
page read and write
4B60000
unkown
page read and write
8DE000
stack
page read and write
2942000
heap
page read and write
2613000
heap
page read and write
2942000
heap
page read and write
559000
unkown
page readonly
2932000
heap
page read and write
2942000
heap
page read and write
794000
heap
page read and write
4D36000
unkown
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
4BBE000
stack
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
4AE0000
unkown
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
3061000
unkown
page read and write
1BB000
stack
page read and write
2942000
heap
page read and write
2A60000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2E50000
unkown
page read and write
2942000
heap
page read and write
9FD000
heap
page read and write
2D83000
unkown
page read and write
2942000
heap
page read and write
2932000
heap
page read and write
440000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
794000
heap
page read and write
49C0000
unkown
page read and write
1C181C70000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
285C000
heap
page read and write
2932000
heap
page read and write
2D10000
unkown
page read and write
2E80000
unkown
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2602000
heap
page read and write
2942000
heap
page read and write
4B10000
unkown
page read and write
2843000
heap
page read and write
2932000
heap
page read and write
2942000
heap
page read and write
2942000
heap
page read and write
1C181C60000
heap
page readonly
2932000
heap
page read and write
9D6000
heap
page read and write
4C90000
heap
page read and write
794000
heap
page read and write
4B7C000
stack
page read and write
2942000
heap
page read and write
2867000
heap
page read and write
There are 364 hidden memdumps, click here to show them.