IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3217000
trusted library allocation
page read and write
2F5F000
trusted library allocation
page read and write
920000
unkown
page readonly
3244000
trusted library allocation
page read and write
EB2000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
3268000
trusted library allocation
page read and write
55E1000
heap
page read and write
F82000
heap
page read and write
57F0000
trusted library allocation
page read and write
2E57000
trusted library allocation
page read and write
2DFB000
trusted library allocation
page read and write
3138000
trusted library allocation
page read and write
E83000
trusted library allocation
page execute and read and write
55E5000
heap
page read and write
F08000
heap
page read and write
2CCB000
stack
page read and write
57F5000
trusted library allocation
page read and write
53A0000
heap
page read and write
31C4000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
F42000
heap
page read and write
3234000
trusted library allocation
page read and write
31A3000
trusted library allocation
page read and write
31AD000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
F00000
heap
page read and write
3186000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
F0E000
heap
page read and write
E98000
heap
page read and write
3E05000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
52FD000
stack
page read and write
3276000
trusted library allocation
page read and write
5AA5000
heap
page read and write
3261000
trusted library allocation
page read and write
5BFD000
heap
page read and write
EF0000
trusted library allocation
page execute and read and write
3DA5000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page execute and read and write
EA0000
trusted library allocation
page read and write
5C04000
heap
page read and write
3263000
trusted library allocation
page read and write
FF3000
heap
page read and write
FC4000
heap
page read and write
31C8000
trusted library allocation
page read and write
318C000
trusted library allocation
page read and write
318A000
trusted library allocation
page read and write
55E9000
heap
page read and write
757E000
stack
page read and write
57A4000
trusted library allocation
page read and write
767E000
stack
page read and write
324A000
trusted library allocation
page read and write
5340000
trusted library allocation
page execute and read and write
57C1000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2D50000
trusted library section
page read and write
31A7000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
E2E000
stack
page read and write
EBA000
trusted library allocation
page execute and read and write
3190000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
F79000
heap
page read and write
52B9000
stack
page read and write
31F4000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
31C2000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
3231000
trusted library allocation
page read and write
743D000
stack
page read and write
31E5000
trusted library allocation
page read and write
EB6000
trusted library allocation
page execute and read and write
322B000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
E55000
heap
page read and write
31A5000
trusted library allocation
page read and write
77CF000
stack
page read and write
2D40000
heap
page read and write
ECB000
trusted library allocation
page execute and read and write
5880000
trusted library allocation
page read and write
5A80000
trusted library section
page readonly
327E000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
922000
unkown
page readonly
2AAE000
stack
page read and write
55BA000
heap
page read and write
5870000
trusted library allocation
page execute and read and write
2B80000
heap
page read and write
579E000
stack
page read and write
5360000
trusted library allocation
page read and write
55D9000
heap
page read and write
5BD0000
heap
page read and write
5636000
heap
page read and write
5840000
heap
page read and write
5A20000
trusted library allocation
page execute and read and write
55A9000
heap
page read and write
3214000
trusted library allocation
page read and write
D90000
heap
page read and write
D37000
stack
page read and write
3067000
trusted library allocation
page read and write
2C8E000
stack
page read and write
324F000
trusted library allocation
page read and write
E50000
heap
page read and write
EAD000
trusted library allocation
page execute and read and write
12CF000
stack
page read and write
31C0000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
5370000
trusted library allocation
page execute and read and write
31E1000
trusted library allocation
page read and write
5AB0000
heap
page read and write
31C6000
trusted library allocation
page read and write
31AB000
trusted library allocation
page read and write
FF7000
heap
page read and write
30C0000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
2D70000
heap
page execute and read and write
E8D000
trusted library allocation
page execute and read and write
7DE0000
trusted library allocation
page read and write
E90000
heap
page read and write
2E05000
trusted library allocation
page read and write
559D000
stack
page read and write
E84000
trusted library allocation
page read and write
F28000
heap
page read and write
2E01000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
55ED000
heap
page read and write
76CE000
stack
page read and write
560F000
heap
page read and write
3175000
trusted library allocation
page read and write
5AC0000
heap
page read and write
5810000
trusted library allocation
page read and write
5A90000
heap
page read and write
EC7000
trusted library allocation
page execute and read and write
FE2000
heap
page read and write
EB0000
trusted library allocation
page read and write
FEC000
heap
page read and write
312C000
trusted library allocation
page read and write
3EC3000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
7300000
heap
page read and write
FE5000
heap
page read and write
EE0000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
EC2000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
533E000
stack
page read and write
FBF000
heap
page read and write
5AA0000
heap
page read and write
11CF000
stack
page read and write
7F90000
trusted library allocation
page read and write
5A7B000
stack
page read and write
D80000
heap
page read and write
57C6000
trusted library allocation
page read and write
C39000
stack
page read and write
31DF000
trusted library allocation
page read and write
2B50000
heap
page read and write
3188000
trusted library allocation
page read and write
2E03000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2D1D000
stack
page read and write
536F000
trusted library allocation
page read and write
31D9000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
7A02000
trusted library allocation
page read and write
3EBF000
trusted library allocation
page read and write
5390000
heap
page execute and read and write
753E000
stack
page read and write
5BCD000
stack
page read and write
31B0000
trusted library allocation
page read and write
DA0000
heap
page read and write
2B70000
trusted library allocation
page read and write
3E2D000
trusted library allocation
page read and write
780E000
stack
page read and write
57CD000
trusted library allocation
page read and write
730E000
heap
page read and write
3DE5000
trusted library allocation
page read and write
563A000
heap
page read and write
325B000
trusted library allocation
page read and write
55A0000
heap
page read and write
3192000
trusted library allocation
page read and write
4E7D000
stack
page read and write
318E000
trusted library allocation
page read and write
5625000
heap
page read and write
DEE000
stack
page read and write
5BE0000
heap
page read and write
322F000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
2D43000
heap
page read and write
31DD000
trusted library allocation
page read and write
F62000
heap
page read and write
FFD000
heap
page read and write
31FA000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
325F000
trusted library allocation
page read and write
FD7000
heap
page read and write
3229000
trusted library allocation
page read and write
7F3F000
stack
page read and write
2AB8000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
55DD000
heap
page read and write
There are 203 hidden memdumps, click here to show them.