IOC Report
UrfBRh4Hs5.exe

loading gif

Files

File Path
Type
Category
Malicious
UrfBRh4Hs5.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 64
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 65
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 66
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 67
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 68
JSON data
dropped
Chrome Cache Entry: 69
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 71
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1300x300, components 3
downloaded
Chrome Cache Entry: 72
JSON data
dropped
Chrome Cache Entry: 73
HTML document, ASCII text, with very long lines (516), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 74
JSON data
downloaded
Chrome Cache Entry: 75
Web Open Font Format (Version 2), TrueType, length 18768, version 1.0
downloaded
Chrome Cache Entry: 76
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 78
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 79
JSON data
dropped
Chrome Cache Entry: 80
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 81
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 82
JSON data
dropped
Chrome Cache Entry: 83
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 84
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 85
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (31813), with no line terminators
dropped
Chrome Cache Entry: 87
JSON data
downloaded
Chrome Cache Entry: 88
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 89
JSON data
downloaded
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (31813), with no line terminators
downloaded
Chrome Cache Entry: 93
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 94
ASCII text, with very long lines (46318), with CRLF line terminators
downloaded
Chrome Cache Entry: 95
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 96
JSON data
dropped
Chrome Cache Entry: 97
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1300x300, components 3
dropped
Chrome Cache Entry: 98
ASCII text, with very long lines (65409)
downloaded
Chrome Cache Entry: 99
JSON data
downloaded
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UrfBRh4Hs5.exe
"C:\Users\user\Desktop\UrfBRh4Hs5.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=UrfBRh4Hs5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=2012,i,16626534676944360032,494382791983905283,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=UrfBRh4Hs5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1136,i,8612438543401160126,1337872098488627056,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-3.min.js
13.107.213.61
https://github.com/Thraka
unknown
https://aka.ms/MSBuildChallenge/T1?ocid=build24_csc_learnpromo_T1_cnl
unknown
https://github.com/dotnet/docs/issues
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://aka.ms/ContentUserFeedback
unknown
https://github.com/mairaw
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://github.com/Youssef1313
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://aka.ms/banner_mslearn_tier1?wt.mc_id=build24_t1_learnpromotion_events
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://github.com/nschonni
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/adegeo
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2017-0
unknown
https://github.com/js-cookie/js-cookie
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/$
unknown
https://github.com/gewarren
unknown
http://schema.org/Organization
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://channel9.msdn.com/
unknown
https://www.linkedin.com/profile/add?startTask=CERTIFICATION_NAME&name=$
unknown
https://learn-video.azurefd.net/
unknown
https://github.com/dotnet/try
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
part-0033.t-0009.t-msedge.net
13.107.213.61
part-0014.t-0009.t-msedge.net
13.107.246.42
www.google.com
216.58.206.68
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
13.107.246.42
part-0014.t-0009.t-msedge.net
United States
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown
216.58.206.68
www.google.com
United States
239.255.255.250
unknown
Reserved
13.107.213.61
part-0033.t-0009.t-msedge.net
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
EA2000
unkown
page readonly
malicious
268E000
stack
page read and write
1BF7000
stack
page read and write
58A0000
heap
page read and write
70AE000
stack
page read and write
64AE000
stack
page read and write
7CAB000
stack
page read and write
EA0000
unkown
page readonly
1E3D000
heap
page read and write
58A3000
heap
page read and write
1C30000
heap
page read and write
1C00000
heap
page read and write
68AC000
stack
page read and write
1DBF000
heap
page read and write
1C35000
heap
page read and write
74AF000
stack
page read and write
1D10000
heap
page read and write
1500000
heap
page read and write
1D15000
heap
page read and write
1C40000
heap
page read and write
1D1A000
heap
page read and write
58B0000
trusted library allocation
page read and write
1DB7000
heap
page read and write
1CB0000
heap
page read and write
3F80000
heap
page read and write
56F0000
heap
page read and write
1D96000
heap
page read and write
78AE000
stack
page read and write
80AE000
stack
page read and write
1D9C000
heap
page read and write
228E000
stack
page read and write
1D90000
heap
page read and write
15E0000
heap
page read and write
6CAB000
stack
page read and write
There are 24 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=UrfBRh4Hs5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=UrfBRh4Hs5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=UrfBRh4Hs5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=UrfBRh4Hs5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0