IOC Report
Axactor Microsoft - Introduksjonsm#U00f8te.msg

loading gif

Files

File Path
Type
Category
Malicious
Axactor Microsoft - Introduksjonsm#U00f8te.msg
CDFV2 Microsoft Outlook Message
initial sample
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Users\user\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db
SQLite 3.x database, last written using SQLite version 3023002, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-shm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Office\OTele\outlook.exe.db-wal
SQLite Write-Ahead Log, version 3007000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\76DF1C90.dat
PNG image data, 198 x 54, 8-bit/color RGBA, non-interlaced
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{A9BB4B62-BBC2-43A5-B3D2-F0C035A29A75}.tmp
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{C7B35FF6-2FB1-4C61-A99B-1FFDD9ABAB76}.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1727865202285952900_ECBF2CD6-77CF-44CF-87E6-ACE9D4696033.log
ASCII text, with very long lines (857), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1727865202286786400_ECBF2CD6-77CF-44CF-87E6-ACE9D4696033.log
data
dropped
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241002T0633220054-2668.etl
data
modified
C:\Users\user\AppData\Local\Temp\msoA95A.tmp
GIF image data, version 89a, 15 x 15
dropped
C:\Users\user\AppData\Local\Temp\~DF346A1D5244262A90.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\MSO3072.acl
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Outlook\NoEmail.srs
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\Documents\Outlook Files\Outlook Data File - NoEmail.pst
Microsoft Outlook email folder (>=2003)
dropped
C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
data
dropped
There are 11 hidden files, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
52.113.194.132
unknown
United States
2.19.126.151
unknown
European Union
52.109.28.47
unknown
United States
51.105.71.137
unknown
United Kingdom
199.232.214.172
bg.microsoft.map.fastly.net
United States