IOC Report
r8gcHFIf3x.exe

loading gif

Files

File Path
Type
Category
Malicious
r8gcHFIf3x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 18:08:58 2024, mtime=Thu Oct 31 18:08:58 2024, atime=Thu Oct 31 18:08:58 2024, length=334336, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\r8gcHFIf3x.exe
"C:\Users\user\Desktop\r8gcHFIf3x.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious

URLs

Name
IP
Malicious
23.ip.gl.ply.gg
malicious
127.0.0.1
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
23.ip.gl.ply.gg
147.185.221.23
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.23
23.ip.gl.ply.gg
United States
malicious
127.0.0.1
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost

Memdumps

Base Address
Regiontype
Protect
Malicious
13251000
trusted library allocation
page read and write
malicious
F22000
unkown
page readonly
malicious
2BAC000
trusted library allocation
page read and write
13241000
trusted library allocation
page read and write
12FF000
stack
page read and write
1610000
heap
page read and write
1326000
heap
page read and write
138E000
heap
page read and write
17BE000
stack
page read and write
160E000
stack
page read and write
9B0000
trusted library allocation
page read and write
14F0000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
FD0000
heap
page execute and read and write
1102000
heap
page read and write
E00000
heap
page read and write
1BC00000
heap
page execute and read and write
1C1AE000
stack
page read and write
1C7FF000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
AF4000
stack
page read and write
A41000
heap
page read and write
1329A000
trusted library allocation
page read and write
C2D000
heap
page read and write
A2D000
heap
page read and write
970000
heap
page read and write
C3F000
heap
page read and write
9F0000
heap
page execute and read and write
1C2B0000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
3444000
trusted library allocation
page read and write
3130000
heap
page read and write
12BA8000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
AC6000
heap
page read and write
F0F000
stack
page read and write
F74000
unkown
page readonly
2BB1000
trusted library allocation
page read and write
1CB9A000
stack
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9B793000
trusted library allocation
page execute and read and write
1C790000
heap
page read and write
3063000
trusted library allocation
page read and write
12BA1000
trusted library allocation
page read and write
B02000
heap
page read and write
1B5C6000
heap
page read and write
1360000
heap
page read and write
1CAFE000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1BEAE000
stack
page read and write
1002000
heap
page read and write
C41000
heap
page read and write
A0B000
heap
page read and write
F80000
heap
page read and write
1C6FF000
stack
page read and write
7FF414870000
trusted library allocation
page execute and read and write
129A8000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
1880000
heap
page read and write
1CA9C000
stack
page read and write
A4B000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
A13000
heap
page read and write
FCE000
stack
page read and write
1C72E000
stack
page read and write
138C000
heap
page read and write
29AC000
trusted library allocation
page read and write
1102000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
C24000
heap
page read and write
1B270000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
1300000
heap
page read and write
9D0000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
A28000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
7FFD9B912000
trusted library allocation
page read and write
1C53F000
stack
page read and write
1C9FE000
stack
page read and write
3060000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B7B0000
trusted library allocation
page read and write
1AE1D000
stack
page read and write
1352000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
A26000
heap
page read and write
C13000
heap
page read and write
12BA3000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
3050000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
CC3000
heap
page read and write
B00000
heap
page read and write
A46000
heap
page read and write
F10000
heap
page read and write
A38000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
1C5A4000
stack
page read and write
930000
heap
page read and write
1C8FE000
stack
page read and write
AD3000
heap
page read and write
2B9E000
stack
page read and write
560000
unkown
page readonly
A00000
heap
page read and write
3120000
heap
page execute and read and write
B20000
heap
page read and write
1BC10000
heap
page read and write
1320000
heap
page read and write
1885000
heap
page read and write
ECE000
stack
page read and write
2BA1000
trusted library allocation
page read and write
13E3000
heap
page read and write
2BAF000
trusted library allocation
page read and write
1C602000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1AF2E000
stack
page read and write
C77000
heap
page read and write
960000
heap
page read and write
1C0FD000
stack
page read and write
13E1000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
323E000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
AAC000
heap
page read and write
AA2000
heap
page read and write
950000
heap
page read and write
132C000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
1C362000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
C43000
heap
page read and write
C00000
heap
page read and write
9E0000
heap
page read and write
CC0000
heap
page read and write
C9A000
heap
page read and write
1C402000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1C0AE000
stack
page read and write
C38000
heap
page read and write
FD0000
heap
page read and write
1BFAE000
stack
page read and write
DCE000
stack
page read and write
7FFD9B932000
trusted library allocation
page read and write
1BC63000
heap
page read and write
A88000
heap
page read and write
F32000
unkown
page readonly
F70000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
C51000
heap
page read and write
F90000
heap
page execute and read and write
1AE20000
heap
page execute and read and write
129A3000
trusted library allocation
page read and write
A51000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
C11000
heap
page read and write
1393000
heap
page read and write
CB8000
heap
page read and write
FA0000
heap
page read and write
134B000
heap
page read and write
177C000
stack
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
29A1000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1C8FE000
stack
page read and write
13248000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
F20000
unkown
page readonly
1340000
heap
page read and write
1C99C000
stack
page read and write
C22000
heap
page read and write
1363000
heap
page read and write
C46000
heap
page read and write
C3C000
heap
page read and write
1BC60000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1002000
heap
page read and write
129A1000
trusted library allocation
page read and write
D02000
heap
page read and write
1665000
heap
page read and write
8F4000
stack
page read and write
1630000
heap
page read and write
1660000
heap
page read and write
1B7CD000
stack
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
1C2DF000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
12F4000
stack
page read and write
1C4AA000
stack
page read and write
A3E000
heap
page read and write
There are 189 hidden memdumps, click here to show them.