IOC Report
python-3.11.4-amd64.exe

loading gif

Files

File Path
Type
Category
Malicious
python-3.11.4-amd64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\Python 3.11.4 (64-bit)_20240426093700.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{63C45DCA-6831-4557-8A7A-DEEB494B92C5}\.cr\python-3.11.4-amd64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{CCA95E51-A09F-4242-B6EC-E83480F5CD87}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (676), with CRLF line terminators
dropped
C:\Windows\Temp\{CCA95E51-A09F-4242-B6EC-E83480F5CD87}\.ba\Default.thm
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{CCA95E51-A09F-4242-B6EC-E83480F5CD87}\.ba\Default.wxl
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (349), with CRLF line terminators
dropped
C:\Windows\Temp\{CCA95E51-A09F-4242-B6EC-E83480F5CD87}\.ba\PythonBA.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{CCA95E51-A09F-4242-B6EC-E83480F5CD87}\.ba\SideBar.png
PNG image data, 176 x 382, 8-bit/color RGB, non-interlaced
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\python-3.11.4-amd64.exe
"C:\Users\user\Desktop\python-3.11.4-amd64.exe"
C:\Windows\Temp\{63C45DCA-6831-4557-8A7A-DEEB494B92C5}\.cr\python-3.11.4-amd64.exe
"C:\Windows\Temp\{63C45DCA-6831-4557-8A7A-DEEB494B92C5}\.cr\python-3.11.4-amd64.exe" -burn.clean.room="C:\Users\user\Desktop\python-3.11.4-amd64.exe" -burn.filehandle.attached=684 -burn.filehandle.self=640

URLs

Name
IP
Malicious
https://www.python.org/downloads/
unknown
https://www.python.org/ftp/python/3.11.4/amd64/lib_d.msiz
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
https://www.python.org/ftp/python/3.11.4/amd64/test_pdb.msir
unknown
https://www.python.org/ftp/python/3.11.4/amd64/core_pdb.msiz
unknown
https://www.python.org/ftp/python/3.11.4/amd64/lib_pdb.msiz
unknown
https://www.python.org/ftp/python/3.11.4/amd64/test_d.msie
unknown
https://www.python.org/ftp/python/3.11.4/amd64/test_pdb.msit
unknown
https://www.python.org/ftp/python/3.11.4/amd64/tcltk_d.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/core_d.msia
unknown
https://www.python.org/ftp/python/3.11.4/amd64/exe_pdb.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/core_d.msie
unknown
https://www.python.org/ftp/python/3.11.4/amd64/test_d.msiv
unknown
https://discuss.python.org/c/users/7
unknown
https://www.python.org/ftp/python/3.11.4/amd64/core_pdb.msie
unknown
https://www.python.org/ftp/python/3.11.4/amd64/tcltk_pdb.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/lib_pdb.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/dev_d.msik_
unknown
https://www.python.org/ftp/python/3.11.4/amd64/tcltk_pdb.msit
unknown
https://www.python.org/ftp/python/3.11.4/amd64/dev_d.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/ucrt.msiz
unknown
http://appsyndication.org/2006/appsynapplicationc:
unknown
https://www.python.org/ftp/python/3.11.4/amd64/ucrt.msiy
unknown
https://docs.python.org/
unknown
https://www.python.org/ftp/python/3.11.4/amd64/test_pdb.msif
unknown
https://www.python.org/ftp/python/3.11.4/amd64/exe_d.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/core_d.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/dev_d.msie
unknown
https://www.python.org/ftp/python/3.11.4/amd64/ucrt.msia
unknown
https://www.python.org/ftp/python/3.11.4/amd64/ucrt.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/
unknown
https://www.python.org/ftp/python/3.11.4/amd64/core_pdb.msi
unknown
https://www.python.org/
unknown
https://www.python.org/ftp/python/3.11.4/amd64/dev_d.msiz
unknown
https://www.python.org/ftp/python/3.11.4/amd64/lib_d.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/ucrt.msi~
unknown
https://www.python.org/ftp/python/3.11.4/amd64/exe_d.msiz
unknown
https://www.python.org/ftp/python/3.11.4/amd64/exe_pdb.msie
unknown
https://www.python.org/ftp/python/3.11.4/amd64/tcltk_d.msif
unknown
http://docs.python.org/
unknown
https://www.python.org/ftp/python/3.11.4/amd64/lib_d.msie
unknown
https://www.python.org/ftp/python/3.11.4/amd64/core_d.msiz
unknown
https://www.python.org/ftp/python/3.11.4/amd64/exe_d.msie
unknown
http://crl3.digic
unknown
https://www.python.org/ftp/python/3.11.4/amd64/lib_pdb.msie
unknown
https://www.python.org/ftp/python/3.11.4/amd64/test_pdb.msi
unknown
https://www.python.org/ftp/python/3.11.4/amd64/exe_pdb.msiz
unknown
http://appsyndication.org/2006/appsyn
unknown
https://www.python.org/ftp/python/3.11.4/amd64/test_d.msi
unknown
There are 39 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4642000
heap
page read and write
F41000
unkown
page execute read
FAB000
unkown
page read and write
2FD6000
trusted library allocation
page read and write
4642000
heap
page read and write
13D0000
heap
page read and write
2CB0000
heap
page read and write
3817000
trusted library allocation
page read and write
EFC000
stack
page read and write
3815000
trusted library allocation
page read and write
A4D000
heap
page read and write
A1B000
heap
page read and write
A23000
heap
page read and write
3816000
trusted library allocation
page read and write
3248000
stack
page read and write
6CA90000
unkown
page readonly
3800000
trusted library allocation
page read and write
A21000
heap
page read and write
12ED000
heap
page read and write
12D6000
heap
page read and write
3821000
trusted library allocation
page read and write
FAB000
unkown
page write copy
4B10000
trusted library allocation
page read and write
12A1000
heap
page read and write
2FD5000
trusted library allocation
page read and write
FAE000
unkown
page readonly
12D5000
heap
page read and write
605F000
stack
page read and write
3382000
trusted library allocation
page read and write
9F3000
heap
page read and write
5BC000
stack
page read and write
A21000
heap
page read and write
380B000
trusted library allocation
page read and write
12BB000
heap
page read and write
12ED000
heap
page read and write
3814000
trusted library allocation
page read and write
A31000
heap
page read and write
A4F000
heap
page read and write
F8B000
unkown
page readonly
13B0000
heap
page read and write
2D80000
heap
page read and write
12EA000
heap
page read and write
A10000
unkown
page readonly
12EF000
heap
page read and write
A0A000
heap
page read and write
49D0000
trusted library allocation
page read and write
9D8000
heap
page read and write
33B0000
heap
page read and write
3823000
trusted library allocation
page read and write
F40000
unkown
page readonly
2FD3000
trusted library allocation
page read and write
37F0000
heap
page read and write
364E000
heap
page read and write
45EA000
stack
page read and write
382E000
trusted library allocation
page read and write
12BF000
heap
page read and write
4AC0000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
3420000
heap
page read and write
334C000
stack
page read and write
3C00000
trusted library allocation
page read and write
2B50000
heap
page read and write
4B60000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
3484000
stack
page read and write
3808000
trusted library allocation
page read and write
5F5E000
stack
page read and write
3370000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
34D0000
heap
page read and write
A7E000
unkown
page readonly
33B0000
unkown
page read and write
12BB000
heap
page read and write
A4D000
heap
page read and write
1293000
heap
page read and write
380C000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
12D4000
heap
page read and write
1248000
heap
page read and write
4740000
heap
page read and write
12D4000
heap
page read and write
A4B000
heap
page read and write
3813000
trusted library allocation
page read and write
37D0000
trusted library section
page read and write
3493000
heap
page read and write
382F000
trusted library allocation
page read and write
4640000
heap
page read and write
4642000
heap
page read and write
1360000
heap
page read and write
3490000
heap
page read and write
A23000
heap
page read and write
A11000
unkown
page execute read
2FA0000
heap
page read and write
12D8000
heap
page read and write
2FDB000
trusted library allocation
page read and write
12BB000
heap
page read and write
12DA000
heap
page read and write
12DA000
heap
page read and write
A31000
heap
page read and write
3824000
trusted library allocation
page read and write
970000
heap
page read and write
3818000
trusted library allocation
page read and write
A5B000
unkown
page readonly
4642000
heap
page read and write
4930000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
12A1000
heap
page read and write
4642000
heap
page read and write
2FDE000
trusted library allocation
page read and write
1312000
heap
page read and write
A21000
heap
page read and write
3630000
heap
page read and write
1170000
heap
page read and write
12EF000
heap
page read and write
3825000
trusted library allocation
page read and write
1293000
heap
page read and write
6CA98000
unkown
page execute read
990000
heap
page read and write
A31000
heap
page read and write
131D000
heap
page read and write
382C000
trusted library allocation
page read and write
6CB35000
unkown
page readonly
F20000
heap
page read and write
5F1F000
stack
page read and write
3370000
trusted library allocation
page read and write
6CB39000
unkown
page readonly
12D7000
heap
page read and write
381C000
trusted library allocation
page read and write
2C00000
heap
page read and write
380D000
trusted library allocation
page read and write
3440000
heap
page read and write
A11000
heap
page read and write
2FD7000
trusted library allocation
page read and write
8FB000
stack
page read and write
FAE000
unkown
page readonly
5E1E000
stack
page read and write
2FDC000
trusted library allocation
page read and write
A4B000
heap
page read and write
A4F000
heap
page read and write
4744000
heap
page read and write
381D000
trusted library allocation
page read and write
6CB16000
unkown
page execute read
2FDA000
trusted library allocation
page read and write
A4D000
heap
page read and write
12ED000
heap
page read and write
1264000
heap
page read and write
6CB18000
unkown
page readonly
12F5000
heap
page read and write
381E000
trusted library allocation
page read and write
6CA91000
unkown
page execute read
12EF000
heap
page read and write
382D000
trusted library allocation
page read and write
4642000
heap
page read and write
4890000
trusted library allocation
page read and write
1291000
heap
page read and write
3829000
trusted library allocation
page read and write
2DC0000
heap
page read and write
4980000
trusted library allocation
page read and write
A4F000
heap
page read and write
380A000
trusted library allocation
page read and write
9D0000
heap
page read and write
12A1000
heap
page read and write
381A000
trusted library allocation
page read and write
12A3000
heap
page read and write
37E0000
trusted library section
page read and write
380E000
trusted library allocation
page read and write
1293000
heap
page read and write
F40000
unkown
page readonly
127A000
heap
page read and write
3827000
trusted library allocation
page read and write
18A9000
heap
page read and write
2FD1000
trusted library allocation
page read and write
F41000
unkown
page execute read
48E0000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
381B000
trusted library allocation
page read and write
3807000
trusted library allocation
page read and write
6CA9B000
unkown
page execute read
2FB0000
trusted library allocation
page read and write
3831000
trusted library allocation
page read and write
4630000
heap
page read and write
37C0000
trusted library section
page read and write
2FD2000
trusted library allocation
page read and write
FFB000
stack
page read and write
A7B000
unkown
page write copy
A5B000
unkown
page readonly
3819000
trusted library allocation
page read and write
A10000
unkown
page readonly
1300000
heap
page read and write
4642000
heap
page read and write
12ED000
heap
page read and write
3410000
heap
page read and write
A23000
heap
page read and write
12D6000
heap
page read and write
A1B000
heap
page read and write
1291000
heap
page read and write
3830000
trusted library allocation
page read and write
18A6000
heap
page read and write
18A0000
heap
page read and write
A7E000
unkown
page readonly
382B000
trusted library allocation
page read and write
2FD4000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
12D4000
heap
page read and write
A11000
unkown
page execute read
6CB32000
unkown
page read and write
12BF000
heap
page read and write
4A70000
trusted library allocation
page read and write
3640000
heap
page read and write
4642000
heap
page read and write
3822000
trusted library allocation
page read and write
382A000
trusted library allocation
page read and write
380F000
trusted library allocation
page read and write
4642000
heap
page read and write
A33000
heap
page read and write
3828000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
A7B000
unkown
page read and write
12F0000
heap
page read and write
3390000
heap
page read and write
1240000
heap
page read and write
1291000
heap
page read and write
12D4000
heap
page read and write
33D0000
heap
page read and write
F8B000
unkown
page readonly
3360000
heap
page read and write
A4B000
heap
page read and write
920000
heap
page read and write
12F6000
heap
page read and write
12D5000
heap
page read and write
There are 220 hidden memdumps, click here to show them.