IOC Report
InmateExport.exe

loading gif

Files

File Path
Type
Category
Malicious
InmateExport.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_drvsuh40.qpm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fompdd11.ili.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_joqzxdvv.fau.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xofmnhtt.wgh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:12:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:12:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:12:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:12:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 13:12:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 75
ASCII text, with very long lines (763)
downloaded
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\InmateExport.exe
"C:\Users\user\Desktop\InmateExport.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1984,i,17464596491835646964,8750892255793404579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://www.google.com/async/ddljson?async=ntp:2
142.251.35.228
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://crl.m
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.35.228
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGLnsrrEGIjB_vNXGEgS9wJOhWFsE_iSQf_VNStHm5XAaXmLVbZR8megKDZAIxcSH_CsuRT25tegyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.35.228
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://www.google.com/async/newtab_promos
142.251.35.228
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.35.228
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGLnsrrEGIjB1A5lMzAj7FM0IL6VyuLTZpbdu_xzXLz1UAK55X4ooHkpyrcCzZTXSkwTXgYW3TjQyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.35.228
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.251.35.228

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.251.35.228
www.google.com
United States
192.168.2.4
unknown
unknown
192.168.2.5
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF848E03000
trusted library allocation
page execute and read and write
7FF8492EB000
trusted library allocation
page read and write
7FF849470000
trusted library allocation
page read and write
820000
heap
page read and write
7FF848FE7000
trusted library allocation
page read and write
7FF849498000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
1C0D0000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF4721C7000
trusted library allocation
page execute read
1FBF0000
heap
page read and write
7FF4721C5000
trusted library allocation
page execute read
1FB61000
heap
page read and write
7FF849376000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
1FA47000
heap
page read and write
7FF849560000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
1BB4B000
heap
page read and write
7FF8494F0000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
1F990000
heap
page read and write
21650000
trusted library allocation
page read and write
520000
heap
page read and write
7FF849248000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF8495A0000
trusted library allocation
page read and write
1BB4D000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848FB6000
trusted library allocation
page read and write
7FF8492F7000
trusted library allocation
page read and write
1AEF0000
heap
page read and write
1BB35000
heap
page read and write
7FF8491D0000
trusted library allocation
page read and write
253C000
trusted library allocation
page read and write
1FB5C000
heap
page read and write
1FB43000
heap
page read and write
7FF8492D8000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF4721D2000
trusted library allocation
page readonly
7FF849330000
trusted library allocation
page read and write
1FB18000
heap
page read and write
1A500000
trusted library allocation
page read and write
12819000
trusted library allocation
page read and write
2237E000
stack
page read and write
7FF849296000
trusted library allocation
page read and write
7FF8495F0000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
1F9E4000
heap
page read and write
7FF849260000
trusted library allocation
page execute and read and write
7FF8495D0000
trusted library allocation
page read and write
124E6000
trusted library allocation
page read and write
170000
unkown
page readonly
1B22D000
heap
page read and write
1C120000
trusted library allocation
page read and write
7FF849370000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1BAB0000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
7FF4721D7000
trusted library allocation
page execute read
1F9CC000
heap
page read and write
1BA4F000
heap
page read and write
7FF84930B000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
1BF40000
trusted library allocation
page read and write
7FF849334000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
216A2000
trusted library allocation
page read and write
B20000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
1B39E000
stack
page read and write
21670000
trusted library allocation
page read and write
1BA8E000
heap
page read and write
7FF8492F9000
trusted library allocation
page read and write
7FF849361000
trusted library allocation
page read and write
21660000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
1BA31000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF4721F0000
trusted library allocation
page execute and read and write
1B242000
heap
page read and write
1FB2E000
heap
page read and write
1BA0B000
heap
page read and write
1B0DD000
heap
page read and write
7FF4721C9000
trusted library allocation
page execute read
7FF8490C0000
trusted library allocation
page read and write
68E000
heap
page read and write
1B9A4000
heap
page read and write
7FF8492C0000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
1BA71000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
24D1000
trusted library allocation
page read and write
1B79B000
stack
page read and write
1B101000
heap
page read and write
1AF93000
heap
page read and write
AC0000
trusted library allocation
page read and write
170000
unkown
page readonly
124E9000
trusted library allocation
page read and write
7FF8492CD000
trusted library allocation
page execute and read and write
1BA41000
heap
page read and write
7FF849448000
trusted library allocation
page read and write
1B298000
heap
page read and write
7FF8494CA000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
1FB8E000
heap
page read and write
1CFEF000
stack
page read and write
7FF849570000
trusted library allocation
page read and write
7FF8492E6000
trusted library allocation
page read and write
1FB45000
heap
page read and write
7FF849430000
trusted library allocation
page read and write
620000
heap
page read and write
7FF849620000
trusted library allocation
page read and write
7FF849420000
trusted library allocation
page read and write
1F9E2000
heap
page read and write
21630000
trusted library allocation
page read and write
7FF8492FD000
trusted library allocation
page read and write
286A000
trusted library allocation
page read and write
7FF849298000
trusted library allocation
page read and write
1B9C9000
heap
page read and write
1B0C0000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1B99A000
heap
page read and write
7FF4721CB000
trusted library allocation
page execute read
7FF8490E0000
trusted library allocation
page read and write
12802000
trusted library allocation
page read and write
1FB74000
heap
page read and write
1FBB2000
heap
page read and write
7FF849553000
trusted library allocation
page read and write
7FF849350000
trusted library allocation
page read and write
1FB5E000
heap
page read and write
1D97F000
stack
page read and write
1FCE5000
heap
page read and write
7FF849280000
trusted library allocation
page execute and read and write
7FF8493A0000
trusted library allocation
page execute and read and write
880000
heap
page read and write
7FF849610000
trusted library allocation
page read and write
1B20D000
heap
page read and write
1FBE3000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1C0E0000
trusted library allocation
page read and write
7FF848FA8000
trusted library allocation
page read and write
1B990000
heap
page read and write
1256A000
trusted library allocation
page read and write
24C0000
heap
page execute and read and write
7FF849110000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF8492D0000
trusted library allocation
page read and write
7FF4721CA000
trusted library allocation
page readonly
7FF849240000
trusted library allocation
page read and write
7FF848E1A000
trusted library allocation
page read and write
2340000
heap
page read and write
1FB7E000
heap
page read and write
7FF4721DC000
trusted library allocation
page readonly
7FF8492F0000
trusted library allocation
page read and write
1FBF9000
heap
page read and write
7FF849373000
trusted library allocation
page read and write
64A000
heap
page read and write
1BA1E000
heap
page read and write
1FB90000
heap
page read and write
26C2000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
1B0D2000
heap
page read and write
1BB49000
heap
page read and write
7FF4721D4000
trusted library allocation
page readonly
1B290000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF849580000
trusted library allocation
page read and write
7FF849510000
trusted library allocation
page read and write
2A2E000
trusted library allocation
page read and write
1AF13000
heap
page execute and read and write
124D1000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
1AE9E000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
1FC26000
heap
page read and write
1FB4F000
heap
page read and write
7FF4721C6000
trusted library allocation
page readonly
1BA35000
heap
page read and write
2160C000
stack
page read and write
1C110000
trusted library allocation
page read and write
1B28D000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF4721D6000
trusted library allocation
page readonly
7FF8490A0000
trusted library allocation
page read and write
7FF8492A0000
trusted library allocation
page read and write
7FF849390000
trusted library allocation
page read and write
7FF849312000
trusted library allocation
page read and write
7FF8494E0000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
7FF8495B0000
trusted library allocation
page read and write
7FF849198000
trusted library allocation
page read and write
1FB28000
heap
page read and write
1BA3B000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849590000
trusted library allocation
page read and write
1B9DE000
heap
page read and write
840000
heap
page read and write
AA0000
trusted library allocation
page read and write
21640000
trusted library allocation
page read and write
7FF8491C0000
trusted library allocation
page read and write
65F000
heap
page read and write
1B9CF000
heap
page read and write
7FF8490C8000
trusted library allocation
page read and write
1BAEF000
heap
page read and write
1FA8E000
heap
page read and write
885000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1F9A0000
heap
page read and write
7FF8492C5000
trusted library allocation
page read and write
1FCD7000
heap
page read and write
1BA75000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848E24000
trusted library allocation
page read and write
7FF8492D6000
trusted library allocation
page execute and read and write
7FF849445000
trusted library allocation
page read and write
2480000
trusted library allocation
page read and write
7FF4721D5000
trusted library allocation
page execute read
7FF848E02000
trusted library allocation
page read and write
7FF849307000
trusted library allocation
page read and write
7FF849434000
trusted library allocation
page read and write
7FF84945F000
trusted library allocation
page read and write
1FB52000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
7FF849302000
trusted library allocation
page read and write
7FF84961B000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
7FF8494D6000
trusted library allocation
page read and write
12809000
trusted library allocation
page read and write
1C030000
trusted library allocation
page read and write
7FF84932A000
trusted library allocation
page read and write
7FF84954C000
trusted library allocation
page read and write
1A854000
heap
page read and write
7FF849398000
trusted library allocation
page read and write
1B69E000
stack
page read and write
7FF849525000
trusted library allocation
page read and write
172000
unkown
page readonly
7FF849150000
trusted library allocation
page read and write
7FF849380000
trusted library allocation
page read and write
626000
heap
page read and write
7FF849618000
trusted library allocation
page read and write
1B99E000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
21610000
trusted library allocation
page read and write
1FBF5000
heap
page read and write
7FF4721C1000
trusted library allocation
page execute read
1FB76000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
1C0C0000
trusted library allocation
page read and write
1258A000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1C100000
trusted library allocation
page read and write
7FF8492E1000
trusted library allocation
page read and write
7FF472200000
trusted library allocation
page execute and read and write
600000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
1FA94000
heap
page read and write
1AF90000
heap
page read and write
1B9FF000
heap
page read and write
1BB20000
heap
page read and write
1BA85000
heap
page read and write
693000
heap
page read and write
1BB51000
heap
page read and write
7FF4721D1000
trusted library allocation
page execute read
7FF4721C3000
trusted library allocation
page execute read
2CF3000
trusted library allocation
page read and write
7FF8495FD000
trusted library allocation
page read and write
7FF4721D3000
trusted library allocation
page execute read
7FF8494E9000
trusted library allocation
page read and write
1B984000
stack
page read and write
7FF4721E0000
trusted library allocation
page execute and read and write
1FB80000
heap
page read and write
7FF84946C000
trusted library allocation
page read and write
1FADD000
heap
page read and write
1AF10000
heap
page execute and read and write
7FF849337000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
7FF849583000
trusted library allocation
page read and write
7FF8492C3000
trusted library allocation
page read and write
1C0F0000
trusted library allocation
page read and write
7FF4721C2000
trusted library allocation
page readonly
7FF848EE6000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
1FA58000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF4721C0000
trusted library allocation
page readonly
244F000
stack
page read and write
1258F000
trusted library allocation
page read and write
1BCEE000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
1BA0D000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF84934B000
trusted library allocation
page read and write
AD3000
trusted library allocation
page read and write
1B1A0000
heap
page read and write
7FF8492B0000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1FD1A000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
1B24A000
heap
page read and write
1BDEB000
stack
page read and write
1FB06000
heap
page read and write
1AA5A000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
1BA92000
heap
page read and write
B25000
heap
page read and write
7FF4721DD000
trusted library allocation
page execute read
2CED000
trusted library allocation
page read and write
4F4000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
1FC99000
heap
page read and write
7FF849500000
trusted library allocation
page read and write
1AF60000
heap
page execute and read and write
7FF4721C8000
trusted library allocation
page readonly
12527000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
68C000
heap
page read and write
7FF4721C4000
trusted library allocation
page readonly
7FF848EBC000
trusted library allocation
page execute and read and write
1BA04000
heap
page read and write
1FB82000
heap
page read and write
1BA6B000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
7FF8492D4000
trusted library allocation
page execute and read and write
1FB86000
heap
page read and write
1BA11000
heap
page read and write
7FF849630000
trusted library allocation
page read and write
7FF8495BB000
trusted library allocation
page read and write
662000
heap
page read and write
1FB08000
heap
page read and write
7FF84949C000
trusted library allocation
page read and write
7FF84930E000
trusted library allocation
page read and write
7FF848E18000
trusted library allocation
page read and write
7FF84932C000
trusted library allocation
page read and write
1BF30000
trusted library allocation
page read and write
There are 334 hidden memdumps, click here to show them.