IOC Report
fg}.exe

loading gif

Files

File Path
Type
Category
Malicious
fg}.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jul 1 21:32:03 2024, mtime=Mon Jul 1 21:32:03 2024, atime=Mon Jul 1 21:32:03 2024, length=59392, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fg}.exe
"C:\Users\user\Desktop\fg}.exe"
malicious

URLs

Name
IP
Malicious
people-climbing.gl.at.ply.gg
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
people-climbing.gl.at.ply.gg
147.185.221.20
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.20
people-climbing.gl.at.ply.gg
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4D2000
unkown
page readonly
malicious
AEF000
heap
page read and write
1AE6D000
stack
page read and write
7FF886D24000
trusted library allocation
page read and write
A63000
heap
page read and write
4D0000
unkown
page readonly
7FF886D1D000
trusted library allocation
page execute and read and write
9F0000
trusted library allocation
page read and write
7FF886D20000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
B43000
heap
page read and write
1B67F000
stack
page read and write
27B0000
heap
page read and write
7FF886DBC000
trusted library allocation
page execute and read and write
29E0000
heap
page execute and read and write
5D0000
heap
page read and write
A80000
heap
page read and write
B7C000
heap
page read and write
7FF886D10000
trusted library allocation
page read and write
1B47F000
stack
page read and write
570000
heap
page read and write
B3D000
heap
page read and write
1B8CC000
heap
page read and write
29AE000
stack
page read and write
1C16A000
stack
page read and write
7FF886D03000
trusted library allocation
page execute and read and write
7FF886DB6000
trusted library allocation
page read and write
4D0000
unkown
page readonly
7FF886D04000
trusted library allocation
page read and write
1B8DD000
heap
page read and write
DF0000
heap
page read and write
E05000
heap
page read and write
129F1000
trusted library allocation
page read and write
7FF886DE6000
trusted library allocation
page execute and read and write
1B901000
heap
page read and write
7FF886EA2000
trusted library allocation
page read and write
AF7000
heap
page read and write
1BB74000
stack
page read and write
7FF886D2D000
trusted library allocation
page execute and read and write
AC1000
heap
page read and write
B6B000
heap
page read and write
27AE000
stack
page read and write
7FF886E20000
trusted library allocation
page execute and read and write
A10000
trusted library allocation
page read and write
7FF886DC0000
trusted library allocation
page execute and read and write
E00000
heap
page read and write
AAF000
heap
page read and write
A23000
trusted library allocation
page read and write
8F4000
stack
page read and write
1B880000
heap
page read and write
7FF886DB0000
trusted library allocation
page read and write
A86000
heap
page read and write
1C06B000
stack
page read and write
5A5000
heap
page read and write
303E000
trusted library allocation
page read and write
5A0000
heap
page read and write
1AA20000
trusted library allocation
page read and write
7FF4C9090000
trusted library allocation
page execute and read and write
F0C000
stack
page read and write
1B57E000
stack
page read and write
129F8000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
1BF6C000
stack
page read and write
AAB000
heap
page read and write
7FF886D13000
trusted library allocation
page read and write
7FF886EB0000
trusted library allocation
page execute and read and write
2CE5000
trusted library allocation
page read and write
C7E000
stack
page read and write
1B370000
heap
page execute and read and write
7FF886D0D000
trusted library allocation
page execute and read and write
D7E000
stack
page read and write
7FF886D00000
trusted library allocation
page read and write
1B8CE000
heap
page read and write
A9E000
heap
page read and write
A8C000
heap
page read and write
5B0000
heap
page read and write
AC4000
heap
page read and write
7FF886D5C000
trusted library allocation
page execute and read and write
580000
heap
page read and write
2810000
heap
page read and write
296F000
stack
page read and write
1BA7A000
stack
page read and write
A60000
heap
page read and write
There are 73 hidden memdumps, click here to show them.