IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:13 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MsBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Tmp7B9B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp7BEA.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://namespace.google.com/openid/xmlns
unknown
http://www.idmanagement.gov/schema/2009/05/icam/no-pii.pdf
unknown
https://api.ip.sb/ip
unknown
https://sectigo.com/CPS0
unknown
http://ocsp.sectigo.com0
unknown
http://openid.net/extensions/sreg/1.1
unknown
http://axschema.org/person/genderFhttp://axschema.org/media/biographyBhttp://axschema.org/pref/langu
unknown
http://specs.openid.net/extensions/ui/icon
unknown
http://axschema.org/namePersonJhttp://axschema.org/namePerson/prefixHhttp://axschema.org/namePerson/
unknown
http://openid.net/xmlns/1.09http://openid.net/signon/1.0
unknown
https://api.ip.s
unknown
http://www.idmanagement.gov/schema/2009/05/icam/openid-trust-level1.pdfthttp://www.idmanagement.gov/
unknown
http://axschema.org/company/nameBhttp://axschema.org/company/title:http://axschema.org/birthDateNhtt
unknown
http://schemas.openid.net/pape/policies/2007/06/phishing-resistantxhttp://schemas.openid.net/pape/po
unknown
http://schemas.openid.net/pape/policies/2007/06/multi-factor-physical
unknown
http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf
unknown
http://specs.openid.net/extensions/ui/1.0ghttp://specs.openid.net/extensions/ui/1.0/lang-prefihttp:/
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://openid.net/srv/ax/1.0
unknown
http://specs.openid.net/auth/2.0
unknown
http://axschema.org/contact/postalCode/businessDhttp://axschema.org/contact/IM/AIMDhttp://axschema.o
unknown
http://openid.net/sreg/1.05http://openid.net/sreg/1.1
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://specs.openid.net/extensions/oauth/1.0
unknown
https://discord.com/api/v9/users/
unknown
http://axschema.org/contact/postalAddress/homephttp://axschema.org/contact/postalAddressAdditional/h
unknown
http://axschema.org/3http://schema.openid.net/3http://openid.net/schema/
unknown
http://openid.net/signon/1.1
unknown
http://schemas.openid.net/pape/policies/2007/06/none
unknown
http://specs.openid.net/extensions/pape/1.0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier
unknown
http://specs.openid.net/auth/2.0/signonOhttp://specs.openid.net/auth/2.0/serverehttp://specs.openid.
unknown
http://specs.openid.net/extensions/ui/1.0/icon
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fp2e7a.wpc.phicdn.net
192.229.211.108

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
42BF000
trusted library allocation
page read and write
malicious
4364000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3116000
trusted library allocation
page read and write
2F6E000
trusted library allocation
page read and write
12D0000
heap
page read and write
6E580000
unkown
page readonly
57BA000
heap
page execute and read and write
5740000
heap
page read and write
1216000
trusted library allocation
page execute and read and write
6130000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1450000
trusted library allocation
page read and write
74D0000
trusted library allocation
page execute and read and write
4A4000
remote allocation
page execute and read and write
543E000
trusted library allocation
page read and write
14A0000
heap
page read and write
5550000
heap
page execute and read and write
5B4E000
stack
page read and write
31C1000
trusted library allocation
page read and write
11C5000
heap
page read and write
31F6000
trusted library allocation
page read and write
2F7E000
stack
page read and write
5F90000
heap
page read and write
54FE000
stack
page read and write
320A000
trusted library allocation
page read and write
144A000
trusted library allocation
page execute and read and write
32E3000
trusted library allocation
page read and write
5490000
trusted library allocation
page execute and read and write
118E000
stack
page read and write
5560000
heap
page read and write
30E6000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
13B1000
heap
page read and write
122E000
heap
page read and write
7BCA000
heap
page read and write
3060000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
3130000
heap
page execute and read and write
3105000
trusted library allocation
page read and write
4998000
trusted library allocation
page read and write
115E000
stack
page read and write
5855000
heap
page read and write
3290000
trusted library allocation
page read and write
1390000
heap
page read and write
6020000
heap
page execute and read and write
1440000
trusted library allocation
page read and write
43E5000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
5850000
heap
page read and write
58BE000
stack
page read and write
31A4000
trusted library allocation
page read and write
5640000
heap
page execute and read and write
3252000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
12D1000
heap
page read and write
30BB000
trusted library allocation
page read and write
13A7000
heap
page read and write
1480000
heap
page read and write
31BD000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
CD9000
stack
page read and write
6E62A000
unkown
page read and write
2F11000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
468000
remote allocation
page execute and read and write
CAB000
stack
page read and write
1040000
heap
page read and write
3212000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
114D000
stack
page read and write
3107000
trusted library allocation
page read and write
7792000
trusted library allocation
page read and write
5F20000
heap
page read and write
31DE000
trusted library allocation
page read and write
6E620000
unkown
page write copy
30BF000
trusted library allocation
page read and write
5A48000
trusted library section
page read and write
11E0000
trusted library allocation
page read and write
6E581000
unkown
page execute read
1025000
heap
page read and write
30D1000
trusted library allocation
page read and write
30EC000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
30E4000
trusted library allocation
page read and write
5D8E000
stack
page read and write
1220000
heap
page read and write
30FB000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
1450000
trusted library allocation
page execute and read and write
3197000
trusted library allocation
page read and write
48DB000
trusted library allocation
page read and write
2DDF000
trusted library allocation
page read and write
31F7000
trusted library allocation
page read and write
322E000
trusted library allocation
page read and write
30AA000
trusted library allocation
page read and write
147F000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
3174000
trusted library allocation
page read and write
13D2000
heap
page read and write
4FEB000
stack
page read and write
2DC0000
trusted library allocation
page read and write
545D000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
11FD000
trusted library allocation
page execute and read and write
142B000
trusted library allocation
page execute and read and write
133E000
heap
page read and write
143D000
trusted library allocation
page execute and read and write
145B000
trusted library allocation
page execute and read and write
544E000
trusted library allocation
page read and write
2F1E000
trusted library allocation
page read and write
DD7000
stack
page read and write
595E000
stack
page read and write
2F3E000
stack
page read and write
15D0000
heap
page read and write
311C000
trusted library allocation
page read and write
12CF000
stack
page read and write
DA8000
stack
page read and write
309D000
stack
page read and write
121A000
trusted library allocation
page execute and read and write
30E2000
trusted library allocation
page read and write
31AE000
trusted library allocation
page read and write
13DD000
heap
page read and write
30FD000
trusted library allocation
page read and write
1442000
trusted library allocation
page read and write
13CD000
heap
page read and write
31EF000
trusted library allocation
page read and write
3097000
trusted library allocation
page read and write
5E21000
heap
page read and write
5750000
heap
page read and write
1670000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
733E000
stack
page read and write
955E000
stack
page read and write
5470000
trusted library allocation
page read and write
134A000
heap
page read and write
3258000
trusted library allocation
page read and write
2F9B000
heap
page read and write
307E000
trusted library allocation
page read and write
582F000
trusted library allocation
page read and write
914E000
stack
page read and write
5451000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
709E000
heap
page read and write
3080000
trusted library allocation
page read and write
141E000
stack
page read and write
1452000
trusted library allocation
page read and write
1320000
heap
page read and write
1480000
heap
page read and write
30E8000
trusted library allocation
page read and write
31FC000
trusted library allocation
page read and write
3286000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
578E000
stack
page read and write
32A1000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
30F7000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
562C000
stack
page read and write
15CE000
stack
page read and write
904E000
stack
page read and write
720000
unkown
page readonly
30FF000
trusted library allocation
page read and write
13B8000
heap
page read and write
3178000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
574E000
stack
page read and write
4A67000
trusted library allocation
page read and write
93F0000
trusted library allocation
page execute and read and write
2EEE000
stack
page read and write
3277000
trusted library allocation
page read and write
325A000
trusted library allocation
page read and write
3225000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
309E000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
301A000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
5C4E000
stack
page read and write
15B0000
trusted library allocation
page read and write
1010000
heap
page read and write
3210000
trusted library allocation
page read and write
5800000
trusted library allocation
page execute and read and write
945E000
stack
page read and write
6E623000
unkown
page write copy
4206000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
31AA000
trusted library allocation
page read and write
5960000
heap
page execute and read and write
7BC4000
heap
page read and write
3282000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
13D7000
heap
page read and write
3243000
trusted library allocation
page read and write
1255000
heap
page read and write
13C1000
heap
page read and write
5643000
heap
page execute and read and write
3F11000
trusted library allocation
page read and write
54BE000
stack
page read and write
1427000
trusted library allocation
page execute and read and write
1479000
trusted library allocation
page read and write
4A7000
remote allocation
page execute and read and write
326D000
trusted library allocation
page read and write
158E000
stack
page read and write
315D000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
4361000
trusted library allocation
page read and write
7B88000
heap
page read and write
320C000
trusted library allocation
page read and write
328C000
trusted library allocation
page read and write
5630000
trusted library section
page readonly
11F3000
trusted library allocation
page execute and read and write
3256000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
2F9E000
trusted library allocation
page read and write
14A7000
heap
page read and write
5766000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
918E000
stack
page read and write
1455000
trusted library allocation
page execute and read and write
5FC0000
heap
page read and write
5456000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
309B000
trusted library allocation
page read and write
74CE000
stack
page read and write
3118000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
7BF4000
heap
page read and write
31B0000
trusted library allocation
page read and write
1356000
heap
page read and write
31A6000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7BC2000
heap
page read and write
31F9000
trusted library allocation
page read and write
1020000
heap
page read and write
31D8000
trusted library allocation
page read and write
31BF000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
3082000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
5770000
heap
page read and write
31F1000
trusted library allocation
page read and write
2DE0000
heap
page execute and read and write
307A000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
5E16000
heap
page read and write
140B000
heap
page read and write
54F0000
heap
page read and write
5430000
trusted library allocation
page read and write
5E10000
heap
page read and write
6E61E000
unkown
page read and write
3091000
trusted library allocation
page read and write
50EC000
stack
page read and write
311A000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1685000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
57B0000
heap
page execute and read and write
543B000
trusted library allocation
page read and write
6E604000
unkown
page readonly
6E621000
unkown
page read and write
30B0000
trusted library allocation
page read and write
30B2000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
3172000
trusted library allocation
page read and write
318B000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
737E000
stack
page read and write
3215000
trusted library allocation
page read and write
1422000
trusted library allocation
page read and write
325C000
trusted library allocation
page read and write
13E1000
heap
page read and write
4421000
trusted library allocation
page read and write
1100000
heap
page read and write
7C16000
heap
page read and write
6140000
trusted library allocation
page execute and read and write
31BB000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
11A0000
heap
page read and write
5520000
trusted library allocation
page read and write
767E000
stack
page read and write
7BC7000
heap
page read and write
1483000
heap
page read and write
328E000
trusted library allocation
page read and write
1264000
heap
page read and write
1690000
heap
page read and write
31A8000
trusted library allocation
page read and write
31DC000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
2F00000
heap
page read and write
328A000
trusted library allocation
page read and write
7B78000
heap
page read and write
3227000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
570F000
stack
page read and write
1328000
heap
page read and write
1433000
trusted library allocation
page read and write
13C6000
heap
page read and write
3288000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
1457000
trusted library allocation
page execute and read and write
58C0000
trusted library section
page read and write
325F000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
2F90000
heap
page read and write
7BB6000
heap
page read and write
7BB2000
heap
page read and write
3229000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
5790000
trusted library section
page read and write
1423000
trusted library allocation
page execute and read and write
3275000
trusted library allocation
page read and write
7090000
heap
page read and write
5C8E000
stack
page read and write
13A1000
heap
page read and write
30C9000
trusted library allocation
page read and write
723E000
stack
page read and write
30EE000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
11AE000
stack
page read and write
480D000
trusted library allocation
page read and write
6E62E000
unkown
page readonly
1203000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
3193000
trusted library allocation
page read and write
5540000
heap
page read and write
31F5000
trusted library allocation
page read and write
4144000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
3269000
trusted library allocation
page read and write
3299000
trusted library allocation
page read and write
15AF000
stack
page read and write
1425000
trusted library allocation
page execute and read and write
3101000
trusted library allocation
page read and write
7B8C000
heap
page read and write
3271000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
55C0000
trusted library allocation
page execute and read and write
11F0000
trusted library allocation
page read and write
318D000
trusted library allocation
page read and write
1490000
trusted library allocation
page execute and read and write
928E000
stack
page read and write
722000
unkown
page readonly
5434000
trusted library allocation
page read and write
2DBE000
stack
page read and write
597A000
trusted library section
page read and write
3076000
trusted library allocation
page read and write
57A0000
heap
page read and write
142D000
trusted library allocation
page execute and read and write
628E000
stack
page read and write
3114000
trusted library allocation
page read and write
31EB000
trusted library allocation
page read and write
3161000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
11C0000
heap
page read and write
7C0A000
heap
page read and write
11F4000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
120D000
trusted library allocation
page execute and read and write
30CD000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
6E62C000
unkown
page read and write
5500000
trusted library allocation
page execute and read and write
618E000
stack
page read and write
1420000
trusted library allocation
page read and write
1160000
heap
page read and write
31B3000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
168E000
trusted library allocation
page read and write
30EA000
trusted library allocation
page read and write
7B70000
heap
page read and write
323D000
trusted library allocation
page read and write
321F000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
4325000
trusted library allocation
page read and write
6120000
trusted library allocation
page execute and read and write
317A000
trusted library allocation
page read and write
31D6000
trusted library allocation
page read and write
3197000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
120A000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
747E000
stack
page read and write
1446000
trusted library allocation
page execute and read and write
1462000
trusted library allocation
page read and write
5FA0000
heap
page read and write
1399000
heap
page read and write
31D4000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
1424000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
120C000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
1228000
heap
page read and write
13A4000
heap
page read and write
31FC000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
There are 404 hidden memdumps, click here to show them.