IOC Report
SKGOzZRZGX.exe

loading gif

Files

File Path
Type
Category
Malicious
SKGOzZRZGX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SKGOzZRZGX.exe_e684d2ca82731b98552a3bb17475e5bde46424c_43b18d07_41c4bfc4-9f02-41b8-a05b-620d2eae153a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_faac6578d9eb4145cf24c623c8a7076a595e99_473dd2bc_25526f99-51e3-4fed-be84-a8b4399a509e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER54A4.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 03:03:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5512.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5571.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFB25.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 8 03:04:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC00.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFC21.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SKGOzZRZGX.exe
"C:\Users\user\Desktop\SKGOzZRZGX.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5636 -s 268
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6544 -s 1232

URLs

Name
IP
Malicious
http://46.8.231.109/7
unknown
malicious
http://46.8.231.109/T
unknown
malicious
http://46.8.231.109/c4754d4f680ead72.php
malicious
http://46.8.231.109/o
unknown
malicious
http://46.8.231.109/nOXu
unknown
malicious
http://46.8.231.109=
unknown
malicious
http://46.8.231.109
unknown
malicious
http://46.8.231.109/
46.8.231.109
malicious
http://upx.sf.net
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
46.8.231.109
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
ProgramId
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
FileId
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
LowerCaseLongPath
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
LongPathHash
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
Name
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
OriginalFileName
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
Publisher
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
Version
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
BinFileVersion
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
BinaryType
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
ProductName
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
ProductVersion
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
LinkDate
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
BinProductVersion
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
AppxPackageFullName
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
AppxPackageRelativeId
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
Size
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
Language
\REGISTRY\A\{61facea1-e180-7705-2817-f1e18bbaa5ed}\Root\InventoryApplicationFile\skgozzrzgx.exe|793af623aeb141bc
Usn
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{0b7c1f39-b519-fe41-5251-8c1b04fba2f9}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00188010B2996B7E
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
49A000
remote allocation
page execute and read and write
malicious
462000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
488000
remote allocation
page execute and read and write
malicious
D57000
heap
page read and write
malicious
96D000
unkown
page read and write
malicious
9F0000
heap
page read and write
140E000
stack
page read and write
EDE000
stack
page read and write
147E000
stack
page read and write
1AE3F000
stack
page read and write
485000
remote allocation
page execute and read and write
D97000
heap
page read and write
14F0000
heap
page read and write
64A000
remote allocation
page execute and read and write
CFF000
stack
page read and write
EE0000
heap
page read and write
CF5000
stack
page read and write
FD0000
heap
page read and write
E80000
heap
page read and write
16EF000
stack
page read and write
11D0000
heap
page read and write
9A0000
heap
page read and write
17EF000
stack
page read and write
10BF000
stack
page read and write
F7C000
stack
page read and write
1AB8E000
stack
page read and write
9BC000
unkown
page readonly
941000
unkown
page execute read
940000
unkown
page readonly
1AA8E000
stack
page read and write
1430000
heap
page read and write
963000
unkown
page readonly
DB2000
heap
page read and write
941000
unkown
page execute read
9BA000
unkown
page execute and read and write
14FE000
heap
page read and write
EE5000
heap
page read and write
1AF9E000
stack
page read and write
93C000
stack
page read and write
940000
unkown
page readonly
1ABCD000
stack
page read and write
96D000
unkown
page write copy
12FD000
stack
page read and write
1508000
heap
page read and write
14FA000
heap
page read and write
D9E000
heap
page read and write
11BF000
stack
page read and write
48F000
remote allocation
page execute and read and write
D50000
heap
page read and write
963000
unkown
page readonly
1AE50000
heap
page read and write
9EE000
stack
page read and write
1AA4F000
stack
page read and write
65C000
remote allocation
page execute and read and write
11D3000
heap
page read and write
9BC000
unkown
page readonly
45A000
remote allocation
page execute and read and write
1AD3E000
stack
page read and write
9BB000
unkown
page read and write
FE0000
heap
page read and write
1B09C000
stack
page read and write
1ACCD000
stack
page read and write
D3E000
stack
page read and write
There are 54 hidden memdumps, click here to show them.