IOC Report
z158xIuvhauCQiddTe.exe

loading gif

Files

File Path
Type
Category
Malicious
z158xIuvhauCQiddTe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z158xIuvhauCQiddTe.exe.log
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z158xIuvhauCQiddTe.exe
"C:\Users\user\Desktop\z158xIuvhauCQiddTe.exe"
malicious
C:\Users\user\Desktop\z158xIuvhauCQiddTe.exe
"C:\Users\user\Desktop\z158xIuvhauCQiddTe.exe"
malicious

URLs

Name
IP
Malicious
https://discord.com
unknown
malicious
https://discord.com/api/webhooks/1227209886782328933/lf2FJykqNaO8-7mFVKnvSLY61VW8wLCP8wff1tbXhDTXQti
unknown
malicious
https://discord.com/api/webhooks/1227209886782328933/lf2FJykqNaO8-7mFVKnvSLY61VW8wLCP8wff1tbXhDTXQtiSfiF1rnTRNJ0B15pF_Nje
162.159.136.232
malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
http://discord.com
unknown
https://media.discordapp.net/attachments/1222063682037481505/1229897324684378213/user-721680_202
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.discordapp.com/attachments/1222063682037481505/1229897324684378213/user-721680_2024-
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.com
162.159.136.232
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
162.159.136.232
discord.com
United States
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z158xIuvhauCQiddTe_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3A4B000
trusted library allocation
page read and write
malicious
2E01000
trusted library allocation
page read and write
malicious
2E3A000
trusted library allocation
page read and write
malicious
2E34000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2E2C000
trusted library allocation
page read and write
malicious
26CE000
stack
page read and write
6CFD000
stack
page read and write
A66000
trusted library allocation
page execute and read and write
2800000
heap
page execute and read and write
4B76000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
4EA0000
heap
page read and write
108D000
trusted library allocation
page execute and read and write
1410000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
4FD0000
heap
page read and write
63A000
stack
page read and write
A4D000
trusted library allocation
page execute and read and write
9FE000
stack
page read and write
13B0000
trusted library allocation
page read and write
4F80000
trusted library section
page read and write
4C23000
heap
page read and write
1380000
trusted library allocation
page read and write
70FE000
stack
page read and write
10A0000
heap
page read and write
588F000
stack
page read and write
1083000
trusted library allocation
page execute and read and write
53A2000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
3A0E000
trusted library allocation
page read and write
13A0000
heap
page read and write
A7E000
heap
page read and write
6B1E000
stack
page read and write
4B7D000
trusted library allocation
page read and write
4EE0000
heap
page execute and read and write
67F1000
heap
page read and write
6780000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
27F0000
trusted library allocation
page read and write
C77000
trusted library allocation
page execute and read and write
A50000
trusted library allocation
page read and write
5A10000
trusted library section
page read and write
2E2A000
trusted library allocation
page read and write
2620000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
1075000
heap
page read and write
68BE000
stack
page read and write
5391000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
2D9E000
stack
page read and write
FD0000
heap
page read and write
4C80000
trusted library section
page read and write
D1C000
stack
page read and write
5430000
heap
page read and write
6D67000
trusted library allocation
page read and write
5890000
heap
page read and write
6DF0000
heap
page read and write
69E0000
trusted library allocation
page execute and read and write
6D3D000
stack
page read and write
6ADF000
stack
page read and write
9BE000
stack
page read and write
13FE000
stack
page read and write
58A4000
heap
page read and write
1427000
heap
page read and write
1090000
trusted library allocation
page read and write
870000
heap
page read and write
63BE000
stack
page read and write
4C6B000
stack
page read and write
A62000
trusted library allocation
page read and write
2E0000
unkown
page readonly
A43000
trusted library allocation
page execute and read and write
4E6E000
stack
page read and write
101E000
stack
page read and write
137A000
trusted library allocation
page execute and read and write
3DD9000
trusted library allocation
page read and write
52EE000
stack
page read and write
71FD000
stack
page read and write
6B30000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
2E52000
trusted library allocation
page read and write
850000
heap
page read and write
681B000
heap
page read and write
1134000
heap
page read and write
4B71000
trusted library allocation
page read and write
6790000
heap
page read and write
1372000
trusted library allocation
page read and write
28FA000
trusted library allocation
page read and write
136E000
stack
page read and write
AB1000
heap
page read and write
6FFE000
stack
page read and write
B68000
heap
page read and write
43E000
remote allocation
page execute and read and write
6A00000
trusted library allocation
page read and write
B15000
heap
page read and write
581F000
stack
page read and write
D5F000
trusted library allocation
page read and write
8BE000
stack
page read and write
400000
remote allocation
page execute and read and write
69D8000
trusted library allocation
page read and write
5BC0000
heap
page read and write
13A7000
heap
page read and write
10C9000
heap
page read and write
5420000
heap
page read and write
7200000
heap
page read and write
A44000
trusted library allocation
page read and write
AE5000
heap
page read and write
1382000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
B0C000
heap
page read and write
5B9D000
stack
page read and write
1376000
trusted library allocation
page execute and read and write
4B5B000
trusted library allocation
page read and write
4B54000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
4F00000
trusted library allocation
page execute and read and write
4F4E000
stack
page read and write
6DB0000
heap
page read and write
2863000
trusted library allocation
page read and write
10D3000
heap
page read and write
D50000
trusted library allocation
page read and write
5423000
heap
page read and write
A78000
heap
page read and write
10A8000
heap
page read and write
6EFE000
stack
page read and write
2C90000
heap
page execute and read and write
2C84000
trusted library allocation
page read and write
109D000
trusted library allocation
page execute and read and write
6DC0000
heap
page read and write
69FD000
trusted library allocation
page read and write
A5D000
trusted library allocation
page execute and read and write
6D70000
trusted library allocation
page read and write
1084000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
4DEC000
stack
page read and write
4EF0000
trusted library section
page read and write
4B6E000
trusted library allocation
page read and write
6829000
heap
page read and write
C90000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
D20000
trusted library allocation
page execute and read and write
E79000
stack
page read and write
526E000
stack
page read and write
67FC000
heap
page read and write
4C20000
heap
page read and write
C7B000
trusted library allocation
page execute and read and write
2DA0000
heap
page read and write
38B5000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
70EE000
stack
page read and write
50D0000
heap
page read and write
AB3000
heap
page read and write
4FC0000
trusted library allocation
page read and write
2DB1000
trusted library allocation
page read and write
69BE000
stack
page read and write
A6A000
trusted library allocation
page execute and read and write
3867000
trusted library allocation
page read and write
3E16000
trusted library allocation
page read and write
1385000
trusted library allocation
page execute and read and write
4FB0000
trusted library allocation
page execute and read and write
69D0000
trusted library allocation
page read and write
6CDE000
stack
page read and write
1060000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
28F8000
trusted library allocation
page read and write
860000
heap
page read and write
268E000
stack
page read and write
2811000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
5610000
heap
page execute and read and write
6A07000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
260F000
stack
page read and write
1400000
trusted library allocation
page execute and read and write
2C70000
trusted library allocation
page read and write
6FEE000
stack
page read and write
743D000
stack
page read and write
10D6000
heap
page read and write
5A0E000
stack
page read and write
4FA0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
3819000
trusted library allocation
page read and write
753E000
stack
page read and write
73FF000
stack
page read and write
6FA0000
trusted library allocation
page execute and read and write
571C000
stack
page read and write
2E2000
unkown
page readonly
1070000
heap
page read and write
67C2000
heap
page read and write
1387000
trusted library allocation
page execute and read and write
1370000
trusted library allocation
page read and write
59CE000
stack
page read and write
2640000
heap
page read and write
6D60000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
6B20000
trusted library allocation
page execute and read and write
2BD8000
trusted library allocation
page read and write
770000
heap
page read and write
1020000
heap
page read and write
2615000
trusted library allocation
page read and write
51D7000
trusted library allocation
page read and write
7F8B0000
trusted library allocation
page execute and read and write
4EEE000
stack
page read and write
4F90000
trusted library allocation
page execute and read and write
1420000
heap
page read and write
2DEF000
trusted library allocation
page read and write
C6E000
stack
page read and write
540C000
stack
page read and write
D30000
trusted library allocation
page read and write
F78000
stack
page read and write
58B3000
heap
page read and write
4B82000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
7FC00000
trusted library allocation
page execute and read and write
3903000
trusted library allocation
page read and write
A70000
heap
page read and write
6CBE000
stack
page read and write
C72000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
52AE000
stack
page read and write
A30000
trusted library allocation
page read and write
4F70000
trusted library section
page read and write
AA6000
heap
page read and write
AF3000
heap
page read and write
2610000
trusted library allocation
page read and write
A97000
heap
page read and write
4E90000
trusted library allocation
page read and write
737000
stack
page read and write
10BD000
heap
page read and write
2E30000
trusted library allocation
page read and write
4E80000
heap
page read and write
6A4E000
stack
page read and write
388000
unkown
page readonly
138B000
trusted library allocation
page execute and read and write
CDE000
stack
page read and write
3811000
trusted library allocation
page read and write
27EC000
stack
page read and write
58A7000
heap
page read and write
67F3000
heap
page read and write
D60000
heap
page read and write
There are 240 hidden memdumps, click here to show them.