IOC Report
600000sqm_pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
600000sqm_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\oampomo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\buziwssym
data
dropped
C:\Users\user\AppData\Local\Temp\nsm7EC9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\r8pmu65b4mp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\600000sqm_pdf.exe
"C:\Users\user\Desktop\600000sqm_pdf.exe"
malicious
C:\Users\user\AppData\Local\Temp\oampomo.exe
C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
malicious
C:\Users\user\AppData\Local\Temp\oampomo.exe
C:\Users\user\AppData\Local\Temp\oampomo.exe C:\Users\user\AppData\Local\Temp\buziwssym
malicious

URLs

Name
IP
Malicious
www.theayushtrivedi.xyz/m1e8/
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1360000
direct allocation
page read and write
malicious
230000
unkown
page write copy
66777E000
stack
page read and write
13D06020000
heap
page read and write
217A6B02000
heap
page read and write
217A6B18000
heap
page read and write
28B0AC54000
heap
page read and write
1F4C0C61000
heap
page read and write
222BD400000
heap
page read and write
1E00B450000
heap
page read and write
13D06280000
heap
page read and write
217A6A02000
heap
page read and write
234000
unkown
page readonly
20FE000
stack
page read and write
1E00BE02000
heap
page read and write
D78A6FE000
stack
page read and write
2092F85F000
heap
page read and write
1F4C09C0000
heap
page read and write
2092F887000
heap
page read and write
9F34AFE000
stack
page read and write
10FC000
stack
page read and write
6758FF000
stack
page read and write
28B10320000
trusted library allocation
page read and write
1F4C0C57000
heap
page read and write
217A6B13000
heap
page read and write
295057E000
stack
page read and write
15C57013000
heap
page read and write
DD0000
trusted library allocation
page read and write
8DF000
stack
page read and write
8D6FE7B000
stack
page read and write
230000
unkown
page write copy
DF0000
direct allocation
page execute and read and write
222BD200000
heap
page read and write
28B0B5F0000
trusted library allocation
page read and write
FB65F7E000
stack
page read and write
2092F85C000
heap
page read and write
13D0625A000
heap
page read and write
15C56F80000
heap
page read and write
28B0BC00000
trusted library section
page readonly
1D995E02000
heap
page read and write
15C56FF0000
heap
page read and write
2290000
heap
page read and write
1C78F502000
heap
page read and write
1F4C0C7E000
heap
page read and write
230000
unkown
page write copy
28B0BC50000
trusted library section
page readonly
15C57050000
heap
page read and write
28B10340000
trusted library allocation
page read and write
66757F000
stack
page read and write
217A8A10000
remote allocation
page read and write
13D06280000
heap
page read and write
28B0AC13000
heap
page read and write
1F4C0C26000
heap
page read and write
1D995E89000
heap
page read and write
6669DB000
stack
page read and write
2092F913000
heap
page read and write
222BD48D000
heap
page read and write
28B103F0000
trusted library allocation
page read and write
13D06010000
heap
page read and write
28B106A0000
heap
page read and write
150BF602000
trusted library allocation
page read and write
40B000
unkown
page read and write
22B000
unkown
page readonly
AB9CFE000
stack
page read and write
296B87B000
stack
page read and write
13D06302000
heap
page read and write
217A8A10000
remote allocation
page read and write
1F1EC102000
heap
page read and write
28B0B602000
heap
page read and write
FB6607B000
stack
page read and write
150BEE5B000
heap
page read and write
15CE000
stack
page read and write
22B000
unkown
page readonly
150BEE13000
heap
page read and write
28B10656000
heap
page read and write
42C000
unkown
page readonly
150BEE41000
heap
page read and write
1F1EC100000
heap
page read and write
1E00B713000
heap
page read and write
200000
remote allocation
page read and write
28B10480000
remote allocation
page read and write
D6D000
stack
page read and write
1E00B440000
heap
page read and write
13D0622E000
heap
page read and write
AB9AF7000
stack
page read and write
28B10663000
heap
page read and write
26DF000
stack
page read and write
1D995E00000
heap
page read and write
68EFFFD000
stack
page read and write
68EFD7E000
stack
page read and write
28B1061C000
heap
page read and write
28B0AC56000
heap
page read and write
28B1069E000
heap
page read and write
9F34F7E000
stack
page read and write
150BECB0000
heap
page read and write
150BEE00000
heap
page read and write
28B0AC79000
heap
page read and write
66707C000
stack
page read and write
1F1EBFF0000
trusted library allocation
page read and write
28B10480000
trusted library allocation
page read and write
295067F000
stack
page read and write
210000
unkown
page readonly
42C000
unkown
page readonly
2092F900000
heap
page read and write
1F4C0D02000
heap
page read and write
1D995D20000
heap
page read and write
28B0AC29000
heap
page read and write
2270000
heap
page read and write
19A000
stack
page read and write
2092F908000
heap
page read and write
217A8402000
trusted library allocation
page read and write
28B10700000
heap
page read and write
222BD462000
heap
page read and write
AB948C000
stack
page read and write
1F1EC029000
heap
page read and write
28B0ACFB000
heap
page read and write
28B10440000
trusted library allocation
page read and write
1F4C0C62000
heap
page read and write
67512E000
stack
page read and write
1C78F42A000
heap
page read and write
28B0C180000
trusted library allocation
page read and write
407000
unkown
page readonly
28B0AC00000
heap
page read and write
295077C000
stack
page read and write
28B10200000
trusted library allocation
page read and write
211000
unkown
page execute read
1F4C0C5F000
heap
page read and write
1E00B6C4000
heap
page read and write
1D995F02000
heap
page read and write
296BCF7000
stack
page read and write
71B000
heap
page read and write
28B10704000
heap
page read and write
1F1EC073000
heap
page read and write
401000
unkown
page execute read
210000
unkown
page readonly
1D995D90000
heap
page read and write
28B10190000
trusted library allocation
page read and write
13D0625E000
heap
page read and write
296B97E000
stack
page read and write
1C78FC02000
trusted library allocation
page read and write
1F4C0C29000
heap
page read and write
222BD270000
heap
page read and write
9F34D7F000
stack
page read and write
28B10480000
remote allocation
page read and write
13D06281000
heap
page read and write
9F34E7F000
stack
page read and write
66767F000
stack
page read and write
234000
unkown
page readonly
1210000
heap
page read and write
1F4C0C13000
heap
page read and write
222BD210000
heap
page read and write
217A6A79000
heap
page read and write
211000
unkown
page execute read
234000
unkown
page readonly
1F4C0C69000
heap
page read and write
28B0B759000
heap
page read and write
1C78F43D000
heap
page read and write
15C57076000
heap
page read and write
1F4C0A20000
heap
page read and write
1C78F45C000
heap
page read and write
1F4C0C63000
heap
page read and write
FB664FF000
stack
page read and write
217A6A74000
heap
page read and write
1E00BF00000
heap
page read and write
28B0AC9D000
heap
page read and write
1F4C0C39000
heap
page read and write
9B000
stack
page read and write
68EF8FB000
stack
page read and write
1E00B613000
heap
page read and write
1F4C0C5A000
heap
page read and write
15C5705F000
heap
page read and write
234000
unkown
page readonly
1F4C0C6D000
heap
page read and write
439000
unkown
page readonly
222BD500000
heap
page read and write
15C57053000
heap
page read and write
FB66277000
stack
page read and write
2160000
heap
page read and write
15C57113000
heap
page read and write
211000
unkown
page execute read
AB9BFC000
stack
page read and write
9F34DFF000
stack
page read and write
1F1EC113000
heap
page read and write
28B0AC74000
heap
page read and write
28B106FB000
heap
page read and write
28B10705000
heap
page read and write
28B0BC30000
trusted library section
page readonly
1D995E13000
heap
page read and write
806D7C000
stack
page read and write
28B10350000
trusted library allocation
page read and write
68F017D000
stack
page read and write
1F1EBEF0000
heap
page read and write
28B106F9000
heap
page read and write
28B0AB10000
heap
page read and write
8065FC000
stack
page read and write
9F350FE000
stack
page read and write
296BDFF000
stack
page read and write
FB6617B000
stack
page read and write
AB9DFF000
stack
page read and write
15C5705F000
heap
page read and write
2950A7D000
stack
page read and write
80687E000
stack
page read and write
1F4C0C66000
heap
page read and write
6E0000
heap
page read and write
13D06180000
trusted library allocation
page read and write
222BD502000
heap
page read and write
28B10328000
trusted library allocation
page read and write
28B0B600000
heap
page read and write
1F4C0C74000
heap
page read and write
518187E000
stack
page read and write
1D995E3C000
heap
page read and write
15C5703C000
heap
page read and write
28B10180000
trusted library allocation
page read and write
217A8650000
trusted library allocation
page read and write
1F4C0C41000
heap
page read and write
28B10600000
heap
page read and write
520000
trusted library allocation
page read and write
296BBFE000
stack
page read and write
211000
unkown
page execute read
D00000
heap
page read and write
13D0625F000
heap
page read and write
131D000
stack
page read and write
1D995F13000
heap
page read and write
28B0C161000
trusted library allocation
page read and write
2092F880000
heap
page read and write
1F4C0C4D000
heap
page read and write
15C57049000
heap
page read and write
28B10685000
heap
page read and write
D78AAFE000
stack
page read and write
13D06202000
heap
page read and write
30000
heap
page read and write
15C56F90000
heap
page read and write
217A6A2A000
heap
page read and write
28B10320000
trusted library allocation
page read and write
28B106EB000
heap
page read and write
150BEE29000
heap
page read and write
1F4C0C5C000
heap
page read and write
6755FB000
stack
page read and write
2092F83C000
heap
page read and write
210000
unkown
page readonly
66727D000
stack
page read and write
28B0BC10000
trusted library section
page readonly
D78A3AB000
stack
page read and write
28B0BD40000
trusted library allocation
page read and write
150BEF02000
heap
page read and write
28B0B758000
heap
page read and write
2092F82A000
heap
page read and write
295087C000
stack
page read and write
1F1EBE90000
heap
page read and write
1F4C0C3C000
heap
page read and write
1F4C0C55000
heap
page read and write
1D996802000
trusted library allocation
page read and write
68EFEFE000
stack
page read and write
15C57081000
heap
page read and write
1E00B4B0000
heap
page read and write
28B0AC8B000
heap
page read and write
222BD44C000
heap
page read and write
217A8610000
trusted library allocation
page read and write
13D06200000
heap
page read and write
1E00B6E2000
heap
page read and write
68F027D000
stack
page read and write
1E00B6CC000
heap
page read and write
26EE000
trusted library allocation
page read and write
120D000
stack
page read and write
217A6A13000
heap
page read and write
22B000
unkown
page readonly
1C78F402000
heap
page read and write
15C5704D000
heap
page read and write
1C78F3F0000
remote allocation
page read and write
222BD43C000
heap
page read and write
13D06308000
heap
page read and write
210000
unkown
page readonly
217A6A5B000
heap
page read and write
15C57102000
heap
page read and write
401000
unkown
page execute read
15C57A02000
trusted library allocation
page read and write
1F4C0C56000
heap
page read and write
2092F790000
trusted library allocation
page read and write
421000
unkown
page read and write
217A6A3E000
heap
page read and write
1F1EC079000
heap
page read and write
28B0AB80000
heap
page read and write
1F1EBE80000
heap
page read and write
28B0B801000
trusted library allocation
page read and write
8069FD000
stack
page read and write
9F34CFB000
stack
page read and write
1C78F3F0000
remote allocation
page read and write
AB950E000
stack
page read and write
13D06253000
heap
page read and write
1F4C1402000
trusted library allocation
page read and write
5AE000
stack
page read and write
68EFDFE000
stack
page read and write
217A6A4A000
heap
page read and write
1F4C09B0000
heap
page read and write
15C5708C000
heap
page read and write
2EC0000
heap
page read and write
22B000
unkown
page readonly
22B000
unkown
page readonly
217A6A4B000
heap
page read and write
FB662FE000
stack
page read and write
28B0AC6F000
heap
page read and write
15C57029000
heap
page read and write
222BD508000
heap
page read and write
1F4C0C6F000
heap
page read and write
1F4C0C59000
heap
page read and write
2092F902000
heap
page read and write
150BEE02000
heap
page read and write
226F000
stack
page read and write
234000
unkown
page readonly
5181AFB000
stack
page read and write
28B10210000
trusted library allocation
page read and write
1F1EC03C000
heap
page read and write
13D0628B000
heap
page read and write
51818FE000
stack
page read and write
211000
unkown
page execute read
13D0625C000
heap
page read and write
200000
remote allocation
page read and write
1D995D30000
heap
page read and write
150BEF13000
heap
page read and write
80677F000
stack
page read and write
1E00B702000
heap
page read and write
296B8FF000
stack
page read and write
28B10360000
trusted library allocation
page read and write
28B10460000
trusted library allocation
page read and write
28B106AD000
heap
page read and write
28B10613000
heap
page read and write
806C7E000
stack
page read and write
8061CB000
stack
page read and write
200000
remote allocation
page read and write
28B0B718000
heap
page read and write
28B0AD02000
heap
page read and write
71B000
heap
page read and write
9F343BB000
stack
page read and write
806E7F000
stack
page read and write
1D995E29000
heap
page read and write
1F4C0C67000
heap
page read and write
28B0AC77000
heap
page read and write
15C57100000
heap
page read and write
217A6A68000
heap
page read and write
407000
unkown
page readonly
409000
unkown
page read and write
28B0BC40000
trusted library section
page readonly
28B10430000
trusted library allocation
page read and write
FB663FE000
stack
page read and write
1F4C0C30000
heap
page read and write
28B10341000
trusted library allocation
page read and write
15C5704C000
heap
page read and write
8D7017B000
stack
page read and write
15C5708E000
heap
page read and write
217A8A10000
remote allocation
page read and write
13D06261000
heap
page read and write
28B106FA000
heap
page read and write
217A83E0000
trusted library allocation
page read and write
1D995DC0000
trusted library allocation
page read and write
2092F630000
heap
page read and write
6EA000
heap
page read and write
1F1EC002000
heap
page read and write
150BEE78000
heap
page read and write
1F4C0C64000
heap
page read and write
1E00B6BB000
heap
page read and write
222BDC02000
trusted library allocation
page read and write
222BD479000
heap
page read and write
28B10470000
trusted library allocation
page read and write
28B0ABB0000
trusted library allocation
page read and write
222BD454000
heap
page read and write
230000
unkown
page read and write
28B1063C000
heap
page read and write
1F4C0C5D000
heap
page read and write
296BA7C000
stack
page read and write
5181E7F000
stack
page read and write
1F1EC075000
heap
page read and write
68EFC7E000
stack
page read and write
217A68C0000
heap
page read and write
15C5702C000
heap
page read and write
1E00B5B0000
trusted library allocation
page read and write
222BD460000
heap
page read and write
D78A67E000
stack
page read and write
222BD413000
heap
page read and write
9F34FFE000
stack
page read and write
FB65EFE000
stack
page read and write
28B0AC91000
heap
page read and write
1F4C0C84000
heap
page read and write
296BB7B000
stack
page read and write
28B0ACAC000
heap
page read and write
6757FE000
stack
page read and write
13D06080000
heap
page read and write
400000
unkown
page readonly
1F4C0B20000
trusted library allocation
page read and write
FB65E7B000
stack
page read and write
222BD370000
trusted library allocation
page read and write
1E00B670000
heap
page read and write
1F1EC05A000
heap
page read and write
409000
unkown
page write copy
1F1EC802000
trusted library allocation
page read and write
429000
unkown
page read and write
1E00BF32000
heap
page read and write
28B106F7000
heap
page read and write
28B1062A000
heap
page read and write
295047F000
stack
page read and write
1E00B667000
heap
page read and write
5181C7F000
stack
page read and write
1F1EC000000
heap
page read and write
806B7D000
stack
page read and write
6756F7000
stack
page read and write
666DFB000
stack
page read and write
230000
unkown
page write copy
28B0B702000
heap
page read and write
66717F000
stack
page read and write
217A6A5C000
heap
page read and write
1D995E82000
heap
page read and write
1E00B651000
heap
page read and write
28B0ABC0000
trusted library section
page read and write
13D0000
heap
page read and write
135D000
stack
page read and write
6754FC000
stack
page read and write
28B10649000
heap
page read and write
217A68B0000
heap
page read and write
22B000
unkown
page readonly
217A6A5A000
heap
page read and write
28B0AC8D000
heap
page read and write
22B000
unkown
page readonly
230000
unkown
page write copy
294FECC000
stack
page read and write
6751AE000
stack
page read and write
217A6920000
heap
page read and write
D78A9FF000
stack
page read and write
13D06A02000
trusted library allocation
page read and write
9F348FB000
stack
page read and write
28B0B615000
heap
page read and write
28B0B5F3000
trusted library allocation
page read and write
13D06224000
heap
page read and write
13D0625B000
heap
page read and write
217A6A00000
heap
page read and write
1F1EC013000
heap
page read and write
9F347F7000
stack
page read and write
28B10350000
trusted library allocation
page read and write
15C57000000
heap
page read and write
28B10344000
trusted library allocation
page read and write
1D995E70000
heap
page read and write
2092F690000
heap
page read and write
5181BF7000
stack
page read and write
66737E000
stack
page read and write
28B0B718000
heap
page read and write
217A6A4C000
heap
page read and write
439000
unkown
page readonly
28B0AB20000
heap
page read and write
1F4C0C58000
heap
page read and write
13D06259000
heap
page read and write
1C78F413000
heap
page read and write
729000
heap
page read and write
1F4C0C60000
heap
page read and write
AB99FB000
stack
page read and write
28B106F3000
heap
page read and write
1C78F3C0000
trusted library allocation
page read and write
28B0AC3F000
heap
page read and write
2092F862000
heap
page read and write
2092F620000
heap
page read and write
211000
unkown
page execute read
724000
heap
page read and write
5D0000
heap
page read and write
1F4C0C75000
heap
page read and write
29502FE000
stack
page read and write
28B10702000
heap
page read and write
150BED20000
heap
page read and write
68F007F000
stack
page read and write
706000
heap
page read and write
6750AB000
stack
page read and write
5181D7F000
stack
page read and write
1C78F400000
heap
page read and write
13DA000
heap
page read and write
AB958F000
stack
page read and write
9F34EFE000
stack
page read and write
234000
unkown
page readonly
210000
unkown
page readonly
150BF5C0000
trusted library allocation
page read and write
9F352FF000
stack
page read and write
1C78F250000
heap
page read and write
15C57108000
heap
page read and write
211000
unkown
page execute read
1F4C0C7B000
heap
page read and write
9F34BFA000
stack
page read and write
28B0AD13000
heap
page read and write
28B106FD000
heap
page read and write
1E00B629000
heap
page read and write
724000
heap
page read and write
8068FC000
stack
page read and write
28B10364000
trusted library allocation
page read and write
666F7F000
stack
page read and write
28B10480000
remote allocation
page read and write
1C78F3F0000
remote allocation
page read and write
1F4C0C40000
heap
page read and write
51815FB000
stack
page read and write
20930002000
trusted library allocation
page read and write
2092F802000
heap
page read and write
222BD45A000
heap
page read and write
8D7027B000
stack
page read and write
150BECC0000
heap
page read and write
400000
unkown
page readonly
66747F000
stack
page read and write
1C78F425000
heap
page read and write
1C78F433000
heap
page read and write
15C57890000
trusted library allocation
page read and write
1F4C0C00000
heap
page read and write
13D06300000
heap
page read and write
28B0B700000
heap
page read and write
2092F800000
heap
page read and write
28B0B713000
heap
page read and write
222BD45C000
heap
page read and write
D78A8FE000
stack
page read and write
1C78F2C0000
heap
page read and write
217A83C0000
trusted library allocation
page read and write
150BEE58000
heap
page read and write
13D0623C000
heap
page read and write
2092F813000
heap
page read and write
20BE000
stack
page read and write
295097E000
stack
page read and write
234000
unkown
page readonly
210000
unkown
page readonly
9F349FA000
stack
page read and write
1F4C0C6B000
heap
page read and write
6DF000
stack
page read and write
210000
unkown
page readonly
702000
heap
page read and write
1F4C0C7D000
heap
page read and write
15C5706A000
heap
page read and write
217A6B00000
heap
page read and write
222BD45E000
heap
page read and write
8D7037F000
stack
page read and write
28B0BC20000
trusted library section
page readonly
13D06313000
heap
page read and write
13D06213000
heap
page read and write
222BD486000
heap
page read and write
56E000
stack
page read and write
1F4C0C42000
heap
page read and write
28B1032E000
trusted library allocation
page read and write
1F4C0C46000
heap
page read and write
28B10450000
trusted library allocation
page read and write
1E00B600000
heap
page read and write
222BD42A000
heap
page read and write
806A7B000
stack
page read and write
1C78F260000
heap
page read and write
296BEFD000
stack
page read and write
230000
unkown
page write copy
222BD513000
heap
page read and write
There are 534 hidden memdumps, click here to show them.