IOC Report
FVN001-230824.exe

loading gif

Files

File Path
Type
Category
Malicious
FVN001-230824.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FVN001-230824.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FVN001-230824.exe
C:\Users\user\Desktop\FVN001-230824.exe
malicious
C:\Users\user\Desktop\FVN001-230824.exe
C:\Users\user\Desktop\FVN001-230824.exe
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
http://smtp.pcpatelinfra.com
unknown
http://support.mailhostbox.com/email-administrators-guide-error-codes/
unknown
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://us2.smtp.mailhostbox.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown

Domains

Name
IP
Malicious
smtp.pcpatelinfra.com
unknown
malicious
us2.smtp.mailhostbox.com
208.91.198.143
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
208.91.198.143
us2.smtp.mailhostbox.com
United States
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FVN001-230824_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2FAB000
trusted library allocation
page read and write
malicious
2F81000
trusted library allocation
page read and write
malicious
3A35000
trusted library allocation
page read and write
malicious
3AAF000
trusted library allocation
page read and write
malicious
2EC4000
trusted library allocation
page read and write
B83000
heap
page read and write
58BE000
stack
page read and write
6B07000
heap
page read and write
4F40000
trusted library allocation
page read and write
B18000
heap
page read and write
6F20000
trusted library section
page read and write
538A000
trusted library allocation
page read and write
103D000
heap
page read and write
6AEE000
stack
page read and write
F80000
heap
page read and write
5FCE000
stack
page read and write
2E70000
trusted library allocation
page execute and read and write
2672000
trusted library allocation
page read and write
2661000
trusted library allocation
page read and write
2EF3000
heap
page read and write
6A8F000
stack
page read and write
28B4000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
6F1E000
stack
page read and write
A43000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
37B1000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
6EDE000
stack
page read and write
14C3000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
4CD0000
heap
page read and write
7EEC0000
trusted library allocation
page execute and read and write
A62000
trusted library allocation
page read and write
1039000
heap
page read and write
502D000
stack
page read and write
D30000
trusted library allocation
page read and write
51F0000
trusted library section
page read and write
5220000
trusted library allocation
page read and write
96D000
stack
page read and write
5910000
heap
page read and write
2D20000
heap
page read and write
27AF000
stack
page read and write
6AFB000
heap
page read and write
65CF000
stack
page read and write
6616000
heap
page read and write
D2B000
stack
page read and write
537E000
trusted library allocation
page read and write
65D0000
heap
page read and write
68F0000
heap
page read and write
266D000
trusted library allocation
page read and write
2C0A000
trusted library allocation
page execute and read and write
2EB0000
trusted library allocation
page read and write
A3D000
trusted library allocation
page execute and read and write
2640000
trusted library allocation
page read and write
38A3000
trusted library allocation
page read and write
3B2000
unkown
page readonly
51A0000
heap
page read and write
A6B000
trusted library allocation
page execute and read and write
47EE000
stack
page read and write
F70000
heap
page read and write
680E000
stack
page read and write
3807000
trusted library allocation
page read and write
3B0000
unkown
page readonly
58FE000
stack
page read and write
57F0000
heap
page read and write
2ED0000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
4EA000
stack
page read and write
6657000
heap
page read and write
5391000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
4FA0000
trusted library section
page readonly
687E000
stack
page read and write
68FE000
heap
page read and write
2F7D000
trusted library allocation
page read and write
998E000
stack
page read and write
AFE000
heap
page read and write
14C4000
trusted library allocation
page read and write
624D000
stack
page read and write
2814000
trusted library allocation
page read and write
B31000
heap
page read and write
9F0000
heap
page read and write
A5A000
trusted library allocation
page execute and read and write
14C0000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
14D0000
heap
page read and write
D60000
heap
page read and write
5140000
heap
page read and write
2C00000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
2F66000
trusted library allocation
page read and write
5800000
heap
page read and write
6B1B000
heap
page read and write
14D7000
heap
page read and write
2615000
trusted library allocation
page read and write
1026000
heap
page read and write
5190000
trusted library allocation
page execute and read and write
FC9000
heap
page read and write
670E000
stack
page read and write
AFA000
heap
page read and write
2690000
trusted library allocation
page read and write
103F000
heap
page read and write
3F98000
trusted library allocation
page read and write
2E2E000
stack
page read and write
A30000
trusted library allocation
page read and write
9A8D000
stack
page read and write
FA8000
heap
page read and write
5150000
heap
page read and write
264B000
trusted library allocation
page read and write
2C7E000
stack
page read and write
265E000
trusted library allocation
page read and write
634E000
stack
page read and write
2C88000
trusted library allocation
page read and write
5E7000
stack
page read and write
47F0000
trusted library allocation
page read and write
6661000
heap
page read and write
BAA000
heap
page read and write
398E000
trusted library allocation
page read and write
2C06000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
2E90000
heap
page read and write
537B000
trusted library allocation
page read and write
37B9000
trusted library allocation
page read and write
6D60000
heap
page read and write
47F5000
trusted library allocation
page read and write
9AE000
stack
page read and write
4F30000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
494C000
stack
page read and write
B25000
heap
page read and write
6D30000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
9C0000
heap
page read and write
2F6F000
trusted library allocation
page read and write
5530000
heap
page execute and read and write
69AD000
trusted library allocation
page read and write
5180000
trusted library allocation
page execute and read and write
B0F000
heap
page read and write
9C8E000
stack
page read and write
9C7000
heap
page read and write
2666000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page execute and read and write
958D000
stack
page read and write
65E8000
heap
page read and write
AD0000
trusted library allocation
page execute and read and write
5396000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
2E6C000
stack
page read and write
4D00000
trusted library allocation
page read and write
E39000
stack
page read and write
FA0000
heap
page read and write
50BE000
stack
page read and write
4820000
trusted library allocation
page read and write
9CCD000
stack
page read and write
6B1E000
heap
page read and write
53B0000
heap
page read and write
2FA9000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
6839000
trusted library allocation
page read and write
26A0000
heap
page read and write
6D10000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
9A90000
heap
page read and write
D50000
heap
page execute and read and write
7FB6000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
51A5000
heap
page read and write
5382000
trusted library allocation
page read and write
6D70000
heap
page read and write
6D17000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
840000
heap
page read and write
2630000
heap
page read and write
978F000
stack
page read and write
28B2000
trusted library allocation
page read and write
2C17000
trusted library allocation
page execute and read and write
FD6000
heap
page read and write
4CB0000
heap
page read and write
BE7000
heap
page read and write
638D000
stack
page read and write
4CE0000
trusted library allocation
page execute and read and write
6AD0000
trusted library allocation
page read and write
648F000
stack
page read and write
697F000
stack
page read and write
A20000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
822F000
stack
page read and write
6AF2000
heap
page read and write
2EC0000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
51EE000
stack
page read and write
2C15000
trusted library allocation
page execute and read and write
A80000
trusted library allocation
page read and write
9D0000
heap
page read and write
6AE0000
trusted library allocation
page execute and read and write
5170000
trusted library section
page read and write
2FA7000
trusted library allocation
page read and write
95CD000
stack
page read and write
F39000
stack
page read and write
2BFD000
trusted library allocation
page execute and read and write
6C5E000
stack
page read and write
A56000
trusted library allocation
page execute and read and write
2C02000
trusted library allocation
page read and write
4D20000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
6AF0000
heap
page read and write
A40000
trusted library allocation
page read and write
6990000
trusted library allocation
page execute and read and write
9DCE000
stack
page read and write
69FE000
stack
page read and write
2644000
trusted library allocation
page read and write
FD3000
heap
page read and write
CEF000
stack
page read and write
BF5000
heap
page read and write
6655000
heap
page read and write
6AFE000
heap
page read and write
6830000
trusted library allocation
page read and write
54EC000
stack
page read and write
2C10000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
BD7000
heap
page read and write
4810000
trusted library allocation
page execute and read and write
587E000
stack
page read and write
9F5000
heap
page read and write
A4D000
trusted library allocation
page execute and read and write
4FB0000
heap
page execute and read and write
AF0000
heap
page read and write
5370000
trusted library allocation
page read and write
920000
heap
page read and write
E6F000
stack
page read and write
A33000
trusted library allocation
page execute and read and write
577C000
stack
page read and write
14CD000
trusted library allocation
page execute and read and write
4F9B000
stack
page read and write
A52000
trusted library allocation
page read and write
988F000
stack
page read and write
2C12000
trusted library allocation
page read and write
69B7000
trusted library allocation
page read and write
552E000
stack
page read and write
2633000
heap
page read and write
A67000
trusted library allocation
page execute and read and write
2EF0000
heap
page read and write
3F31000
trusted library allocation
page read and write
60CE000
stack
page read and write
2FBB000
trusted library allocation
page read and write
ACE000
stack
page read and write
6D80000
trusted library allocation
page execute and read and write
6B00000
heap
page read and write
64CE000
stack
page read and write
2F20000
heap
page execute and read and write
2BF0000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
B2F000
heap
page read and write
5200000
trusted library allocation
page read and write
There are 250 hidden memdumps, click here to show them.