IOC Report
msgde.exe

loading gif

Files

File Path
Type
Category
Malicious
msgde.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\msgde.exe.log
CSV text
dropped
malicious
C:\Windows\System32\SubDir\Client.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Client.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\msgde.exe
"C:\Users\user\Desktop\msgde.exe"
malicious
C:\Windows\System32\schtasks.exe
"schtasks" /create /tn "msgde" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
malicious
C:\Windows\System32\SubDir\Client.exe
"C:\Windows\system32\SubDir\Client.exe"
malicious
C:\Windows\System32\schtasks.exe
"schtasks" /create /tn "msgde" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
malicious
C:\Windows\System32\SubDir\Client.exe
C:\Windows\system32\SubDir\Client.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
185.228.82.21
malicious
https://api.ipify.org/
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://stackoverflow.com/q/2152978/23354sCannot
unknown
https://ipwho.is/
108.181.61.49
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ipwho.is
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://ipwho.is
unknown

Domains

Name
IP
Malicious
ipwho.is
108.181.61.49
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.58.99

IPs

IP
Domain
Country
Malicious
185.228.82.21
unknown
Netherlands
malicious
108.181.61.49
ipwho.is
Canada

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Client_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B2B2000
heap
page read and write
malicious
6B0000
unkown
page readonly
malicious
392000
unkown
page readonly
malicious
2EA3000
trusted library allocation
page read and write
malicious
7FFD9BA90000
trusted library allocation
page read and write
1B763000
heap
page read and write
129A1000
trusted library allocation
page read and write
390000
unkown
page readonly
1C00E000
stack
page read and write
1B665000
heap
page read and write
2E60000
trusted library allocation
page read and write
10F0000
heap
page read and write
1B98C000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
12EC4290000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
87C227E000
unkown
page read and write
7FFD9B965000
trusted library allocation
page read and write
1B5C4000
heap
page read and write
1BCE8900000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
2E3B000
trusted library allocation
page read and write
1B0C3000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
ACC000
heap
page read and write
9B0000
heap
page read and write
2E33000
trusted library allocation
page read and write
125F000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
2BDE000
stack
page read and write
F5B000
heap
page read and write
1B443000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
1B3DF000
heap
page read and write
1BCE86D8000
heap
page read and write
10B0000
heap
page execute and read and write
7FFD9BBF0000
trusted library allocation
page execute and read and write
1B6DF000
heap
page read and write
12EC4328000
heap
page read and write
1B3E0000
heap
page read and write
12D41000
trusted library allocation
page read and write
7F3000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
2C30000
heap
page read and write
1B270000
heap
page read and write
1C20A000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
D80000
heap
page read and write
1B8BE000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
12D55000
trusted library allocation
page read and write
1CCCD000
stack
page read and write
2AC1000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
F47000
heap
page read and write
2E54000
trusted library allocation
page read and write
D5E000
stack
page read and write
2A90000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1B9BE000
stack
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1B3CD000
heap
page read and write
2A70000
heap
page read and write
1BB37000
stack
page read and write
1C319000
heap
page read and write
30EC000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
2D3F000
stack
page read and write
12A8E000
trusted library allocation
page read and write
12EC45E0000
heap
page read and write
1007000
heap
page read and write
7FFD9B951000
trusted library allocation
page read and write
2AB6000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
F50000
trusted library allocation
page read and write
1B344000
heap
page read and write
EF4000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B925000
trusted library allocation
page read and write
E1D000
heap
page read and write
1C310000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B773000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
2A05BFF000
unkown
page read and write
7FFD9BC20000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
1BCE86DF000
heap
page read and write
1155000
heap
page read and write
7FFD9BB97000
trusted library allocation
page read and write
EE0000
heap
page read and write
1B610000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
E1B000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
2CCA000
trusted library allocation
page read and write
F20000
heap
page read and write
1C33C000
heap
page read and write
1BABE000
stack
page read and write
B54000
heap
page read and write
29E0000
heap
page execute and read and write
1AF29000
stack
page read and write
1B3F4000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
9C0000
heap
page read and write
7FFD9B96A000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1100000
heap
page read and write
2770000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
1B6EA000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
7FFD9B7A4000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page execute and read and write
1A9D0000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
10D5000
heap
page read and write
7FFD9B95B000
trusted library allocation
page read and write
F5D000
heap
page read and write
F28000
heap
page read and write
1C30E000
stack
page read and write
1BBBE000
stack
page read and write
1B3C9000
heap
page read and write
12EC4260000
heap
page read and write
F53000
trusted library allocation
page read and write
BF0000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2AD0000
heap
page execute and read and write
129A9000
trusted library allocation
page read and write
1B405000
heap
page read and write
7FFD9B92C000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
2D41000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
D60000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BC05000
trusted library allocation
page read and write
AF8000
heap
page read and write
F20000
trusted library allocation
page read and write
F89000
heap
page read and write
1BA3B000
stack
page read and write
7FFD9B816000
trusted library allocation
page read and write
F8F000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
A70000
heap
page read and write
2A05B79000
stack
page read and write
F70000
heap
page read and write
1AEFD000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1B61C000
heap
page read and write
3066000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1B760000
heap
page read and write
1150000
heap
page read and write
1CA4D000
stack
page read and write
1C94E000
stack
page read and write
2990000
heap
page execute and read and write
D85000
heap
page read and write
293E000
stack
page read and write
12EC45E5000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
ACE000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B941000
trusted library allocation
page read and write
FA5000
heap
page read and write
1B8E8000
heap
page read and write
1B5C0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
107E000
stack
page read and write
29B0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1BCE86A0000
heap
page read and write
F40000
trusted library allocation
page read and write
1BC5F000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2A81000
trusted library allocation
page read and write
1B5BB000
heap
page read and write
7FF484130000
trusted library allocation
page execute and read and write
FA0000
heap
page read and write
1B540000
heap
page read and write
1AD70000
trusted library allocation
page read and write
AB6000
heap
page read and write
1B382000
heap
page read and write
30F0000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2CC8000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
F87000
heap
page read and write
A99000
heap
page read and write
1B5B0000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1B860000
heap
page read and write
1BCE8905000
heap
page read and write
12EC4320000
heap
page read and write
E46000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
1BCE88A0000
heap
page read and write
F4C000
heap
page read and write
D0F000
stack
page read and write
7FFD9BB92000
trusted library allocation
page read and write
2A05E7F000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
7FFD9B955000
trusted library allocation
page read and write
B76000
heap
page read and write
2A4E000
stack
page read and write
30E8000
trusted library allocation
page read and write
10D0000
heap
page read and write
87C1FF9000
stack
page read and write
12D49000
trusted library allocation
page read and write
7FFD9BB72000
trusted library allocation
page read and write
129AE000
trusted library allocation
page read and write
12A98000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B915000
trusted library allocation
page read and write
1B284000
heap
page read and write
1B5E6000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1B83E000
stack
page read and write
1B440000
heap
page read and write
2E63000
trusted library allocation
page read and write
F59000
heap
page read and write
7FFD9B975000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B652000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
12D43000
trusted library allocation
page read and write
7FFD9B96B000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
2830000
heap
page read and write
2AB9000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
10F5000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
AFA000
heap
page read and write
1BCE86D0000
heap
page read and write
E48000
heap
page read and write
390000
unkown
page readonly
1BF05000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
1BB5E000
stack
page read and write
E05000
heap
page read and write
12D4E000
trusted library allocation
page read and write
1B354000
heap
page read and write
2883000
heap
page read and write
7FFD9B968000
trusted library allocation
page read and write
A50000
heap
page read and write
7FFD9B958000
trusted library allocation
page read and write
87C22FF000
stack
page read and write
1BD5E000
stack
page read and write
A90000
heap
page read and write
2940000
heap
page read and write
1B663000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1120000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
9E0000
heap
page read and write
1B93D000
stack
page read and write
12AAD000
trusted library allocation
page read and write
1BE5E000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
1B66E000
heap
page read and write
1AAB0000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1B63A000
heap
page read and write
12EC4270000
heap
page read and write
1AD23000
heap
page read and write
1BE06000
stack
page read and write
1B33E000
stack
page read and write
129B5000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
2A60000
heap
page execute and read and write
7FFD9BC00000
trusted library allocation
page read and write
2BF0000
heap
page read and write
1B3E3000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
12A81000
trusted library allocation
page read and write
961000
stack
page read and write
7FFD9BBB5000
trusted library allocation
page read and write
E8E000
stack
page read and write
129A3000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
F75000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1B98F000
heap
page read and write
7FFD9B948000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page execute and read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B794000
trusted library allocation
page read and write
A40000
heap
page read and write
DE8000
heap
page read and write
1B2C9000
stack
page read and write
2A20000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
12ACD000
trusted library allocation
page read and write
1B673000
heap
page read and write
1BCE8690000
heap
page read and write
7FFD9BBBC000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
F00000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
There are 331 hidden memdumps, click here to show them.