IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:30 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MsBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\TmpDA31.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpDA41.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://api.ip.sb/ip
unknown
https://sectigo.com/CPS0
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://ocsp.sectigo.com0
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.ip.s
unknown
https://www.google.com/accounts/ClientLogin
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://android.apis.google.com/c2dm/send
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.security.us.panasonic.com
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://discord.com/api/v9/users/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
fp2e7a.wpc.phicdn.net
192.229.211.108

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3D4A000
trusted library allocation
page read and write
malicious
3CAA000
trusted library allocation
page read and write
malicious
3F2000
unkown
page readonly
malicious
402000
remote allocation
page execute and read and write
malicious
C69000
heap
page read and write
337B000
trusted library allocation
page read and write
6CF93000
unkown
page write copy
116E000
stack
page read and write
34AF000
trusted library allocation
page read and write
59F0000
heap
page execute and read and write
2B99000
trusted library allocation
page read and write
5A00000
heap
page read and write
5840000
heap
page read and write
5110000
heap
page read and write
955E000
stack
page read and write
358D000
trusted library allocation
page read and write
306E000
stack
page read and write
34E1000
trusted library allocation
page read and write
59F3000
heap
page execute and read and write
7D7E000
stack
page read and write
33A2000
trusted library allocation
page read and write
5800000
heap
page read and write
5A50000
trusted library allocation
page execute and read and write
3494000
trusted library allocation
page read and write
3567000
trusted library allocation
page read and write
355F000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
7A00000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
972E000
stack
page read and write
33BF000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
3387000
trusted library allocation
page read and write
77B0000
heap
page read and write
444D000
trusted library allocation
page read and write
7E52000
heap
page read and write
34CA000
trusted library allocation
page read and write
41F4000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
5B90000
heap
page read and write
7DF2000
heap
page read and write
7D90000
trusted library allocation
page read and write
3487000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
53DE000
stack
page read and write
437F000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
340A000
trusted library allocation
page read and write
58F1000
heap
page read and write
3354000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
34CE000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
336C000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
1780000
heap
page read and write
1622000
heap
page read and write
3498000
trusted library allocation
page read and write
350F000
trusted library allocation
page read and write
163F000
heap
page read and write
2B8E000
trusted library allocation
page read and write
15E5000
heap
page read and write
33D6000
trusted library allocation
page read and write
7E0B000
heap
page read and write
30B0000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
16FD000
trusted library allocation
page execute and read and write
C2E000
heap
page read and write
142E000
stack
page read and write
7A7E000
stack
page read and write
10C5000
trusted library allocation
page execute and read and write
57C0000
trusted library allocation
page execute and read and write
56E0000
trusted library allocation
page read and write
349C000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
79FE000
stack
page read and write
559A000
trusted library section
page read and write
1470000
heap
page read and write
5050000
heap
page execute and read and write
5706000
trusted library allocation
page read and write
6CF9E000
unkown
page readonly
5BA9000
heap
page read and write
1725000
trusted library allocation
page execute and read and write
33AF000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
1712000
trusted library allocation
page read and write
1680000
heap
page read and write
3485000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
16F3000
trusted library allocation
page execute and read and write
5BA0000
heap
page execute and read and write
5A46000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page execute and read and write
2BC1000
trusted library allocation
page read and write
7DB8000
heap
page read and write
10AD000
trusted library allocation
page execute and read and write
5030000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
91D0000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
5027000
trusted library allocation
page read and write
34CC000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
35D8000
trusted library allocation
page read and write
355D000
trusted library allocation
page read and write
3517000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
5A7F000
trusted library allocation
page read and write
344D000
trusted library allocation
page read and write
3466000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
7E0E000
heap
page read and write
162C000
heap
page read and write
34BC000
trusted library allocation
page read and write
1310000
heap
page read and write
33A7000
trusted library allocation
page read and write
5BB5000
heap
page read and write
CC1000
heap
page read and write
5B8E000
stack
page read and write
3462000
trusted library allocation
page read and write
109D000
trusted library allocation
page execute and read and write
34AD000
trusted library allocation
page read and write
3531000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
1580000
heap
page read and write
56AE000
stack
page read and write
2A0B000
heap
page read and write
6CEF0000
unkown
page readonly
1626000
heap
page read and write
1080000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
10CB000
trusted library allocation
page execute and read and write
3464000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
1475000
heap
page read and write
10A3000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
E2E000
stack
page read and write
340E000
trusted library allocation
page read and write
34DB000
trusted library allocation
page read and write
4A2000
remote allocation
page execute and read and write
5A85000
heap
page read and write
7D3F000
stack
page read and write
56FE000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
351B000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
5A16000
heap
page read and write
5BA0000
heap
page read and write
5290000
trusted library allocation
page execute and read and write
B38000
stack
page read and write
34E7000
trusted library allocation
page read and write
3576000
trusted library allocation
page read and write
BC0000
heap
page read and write
3460000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
346A000
trusted library allocation
page read and write
170D000
trusted library allocation
page execute and read and write
157E000
stack
page read and write
5CEE000
stack
page read and write
501E000
stack
page read and write
354F000
trusted library allocation
page read and write
6CF9A000
unkown
page read and write
5725000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
15B8000
heap
page read and write
1740000
heap
page read and write
523F000
stack
page read and write
931E000
stack
page read and write
6CF9C000
unkown
page read and write
56EB000
trusted library allocation
page read and write
112E000
stack
page read and write
10E0000
trusted library allocation
page read and write
34FA000
trusted library allocation
page read and write
3389000
trusted library allocation
page read and write
7E6B000
heap
page read and write
941E000
stack
page read and write
5A3B000
stack
page read and write
346F000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
BF0000
heap
page read and write
3569000
trusted library allocation
page read and write
5668000
trusted library section
page read and write
338B000
trusted library allocation
page read and write
30C0000
heap
page read and write
34E5000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
7E5B000
heap
page read and write
527E000
stack
page read and write
5AA0000
heap
page read and write
336E000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
1747000
heap
page read and write
354C000
trusted library allocation
page read and write
5120000
heap
page execute and read and write
7E21000
heap
page read and write
6CF91000
unkown
page read and write
7E08000
heap
page read and write
57F0000
trusted library allocation
page read and write
16A0000
heap
page read and write
2B20000
heap
page execute and read and write
56EE000
trusted library allocation
page read and write
31CE000
stack
page read and write
351E000
trusted library allocation
page read and write
C55000
heap
page read and write
7E18000
heap
page read and write
F2F000
stack
page read and write
33F5000
trusted library allocation
page read and write
33E7000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
57AF000
stack
page read and write
96C0000
trusted library allocation
page execute and read and write
3F0000
unkown
page readonly
78FE000
stack
page read and write
33BB000
trusted library allocation
page read and write
3591000
trusted library allocation
page read and write
171A000
trusted library allocation
page execute and read and write
3E08000
trusted library allocation
page read and write
34C4000
trusted library allocation
page read and write
57EE000
stack
page read and write
34C6000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
1631000
heap
page read and write
34A0000
trusted library allocation
page read and write
3533000
trusted library allocation
page read and write
792000
unkown
page readonly
1608000
heap
page read and write
16E0000
trusted library allocation
page read and write
3364000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
3505000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
5820000
trusted library section
page readonly
1703000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
34DF000
trusted library allocation
page read and write
106E000
stack
page read and write
5712000
trusted library allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
30AB000
stack
page read and write
BB0000
heap
page read and write
15FA000
heap
page read and write
34E9000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
15AB000
heap
page read and write
352F000
trusted library allocation
page read and write
10C2000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
350B000
trusted library allocation
page read and write
33A4000
trusted library allocation
page read and write
5830000
heap
page read and write
33BD000
trusted library allocation
page read and write
C28000
heap
page read and write
73B0000
trusted library allocation
page read and write
34A3000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
12F7000
stack
page read and write
3572000
trusted library allocation
page read and write
54E0000
trusted library section
page read and write
172B000
trusted library allocation
page execute and read and write
15F6000
heap
page read and write
6CF8E000
unkown
page read and write
F6E000
stack
page read and write
347D000
trusted library allocation
page read and write
5843000
heap
page read and write
539E000
stack
page read and write
5040000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
34FC000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
57B0000
heap
page read and write
34B1000
trusted library allocation
page read and write
54DE000
stack
page read and write
6CEF1000
unkown
page execute read
9120000
heap
page execute and read and write
29C0000
trusted library allocation
page execute and read and write
357E000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
BA0000
heap
page read and write
5A10000
heap
page read and write
10B6000
trusted library allocation
page execute and read and write
146E000
stack
page read and write
3492000
trusted library allocation
page read and write
33F3000
trusted library allocation
page read and write
344F000
trusted library allocation
page read and write
3373000
trusted library allocation
page read and write
3408000
trusted library allocation
page read and write
29D3000
trusted library allocation
page read and write
59E0000
heap
page read and write
354A000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
33D4000
trusted library allocation
page read and write
1093000
trusted library allocation
page execute and read and write
3406000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
C00000
heap
page read and write
5020000
trusted library allocation
page read and write
7DCC000
heap
page read and write
33A0000
trusted library allocation
page read and write
945E000
stack
page read and write
400000
remote allocation
page execute and read and write
C48000
heap
page read and write
339C000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
57E0000
trusted library allocation
page execute and read and write
3559000
trusted library allocation
page read and write
5280000
trusted library section
page read and write
163C000
heap
page read and write
347B000
trusted library allocation
page read and write
C20000
heap
page read and write
358F000
trusted library allocation
page read and write
2B0E000
stack
page read and write
1727000
trusted library allocation
page execute and read and write
3500000
trusted library allocation
page read and write
921E000
stack
page read and write
6CF74000
unkown
page readonly
3546000
trusted library allocation
page read and write
1722000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
3B31000
trusted library allocation
page read and write
188E000
stack
page read and write
33D8000
trusted library allocation
page read and write
982E000
stack
page read and write
29D0000
trusted library allocation
page read and write
7DC8000
heap
page read and write
1760000
trusted library allocation
page execute and read and write
328E000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
BA5000
heap
page read and write
A3B000
stack
page read and write
3513000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
31F0000
heap
page execute and read and write
357A000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
7DC4000
heap
page read and write
1619000
heap
page read and write
34AB000
trusted library allocation
page read and write
4C2D000
stack
page read and write
1610000
heap
page read and write
1603000
heap
page read and write
357C000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
2A00000
heap
page read and write
338E000
trusted library allocation
page read and write
539D000
stack
page read and write
7E39000
heap
page read and write
505A000
heap
page execute and read and write
10BA000
trusted library allocation
page execute and read and write
3468000
trusted library allocation
page read and write
34EC000
trusted library allocation
page read and write
42C2000
trusted library allocation
page read and write
3548000
trusted library allocation
page read and write
C63000
heap
page read and write
16F0000
trusted library allocation
page read and write
5750000
trusted library allocation
page execute and read and write
33ED000
trusted library allocation
page read and write
1170000
heap
page read and write
58EE000
stack
page read and write
33DE000
trusted library allocation
page read and write
16F4000
trusted library allocation
page read and write
352B000
trusted library allocation
page read and write
5BCE000
heap
page read and write
3496000
trusted library allocation
page read and write
6CF90000
unkown
page write copy
347F000
trusted library allocation
page read and write
5130000
heap
page read and write
5DEE000
stack
page read and write
3589000
trusted library allocation
page read and write
3515000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
5BE0000
heap
page read and write
33EF000
trusted library allocation
page read and write
D1D000
heap
page read and write
1090000
trusted library allocation
page read and write
3544000
trusted library allocation
page read and write
5A80000
heap
page read and write
349E000
trusted library allocation
page read and write
1094000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
2BED000
trusted library allocation
page read and write
73D2000
trusted library allocation
page read and write
1588000
heap
page read and write
FA9000
stack
page read and write
3385000
trusted library allocation
page read and write
1716000
trusted library allocation
page execute and read and write
3483000
trusted library allocation
page read and write
There are 394 hidden memdumps, click here to show them.