IOC Report
n3GMxqBnUE.exe

loading gif

Files

File Path
Type
Category
Malicious
n3GMxqBnUE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\n3GMxqBnUE.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\n3GMxqBnUE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_acplhtyx.yi4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q3eptnp4.uig.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\n3GMxqBnUE.exe
"C:\Users\user\Desktop\n3GMxqBnUE.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'n3GMxqBnUE';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'n3GMxqBnUE' -Value '"C:\Users\user\AppData\Roaming\n3GMxqBnUE.exe"' -PropertyType 'String'
malicious
C:\Users\user\AppData\Roaming\n3GMxqBnUE.exe
"C:\Users\user\AppData\Roaming\n3GMxqBnUE.exe"
malicious
C:\Users\user\AppData\Roaming\n3GMxqBnUE.exe
"C:\Users\user\AppData\Roaming\n3GMxqBnUE.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://stackoverflow.com/q/2152978/23354rCannot
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll
unknown
https://contoso.com/Icon
unknown
http://crl.micro3T
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe
unknown
https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
xen1.indiasupaclean.com
172.86.80.42
malicious

IPs

IP
Domain
Country
Malicious
172.86.80.42
xen1.indiasupaclean.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
n3GMxqBnUE

Memdumps

Base Address
Regiontype
Protect
Malicious
FFE000
stack
page read and write
10B3000
trusted library allocation
page execute and read and write
7C30000
trusted library allocation
page read and write
5C30000
trusted library allocation
page execute and read and write
EAC000
stack
page read and write
4109000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
887E000
trusted library allocation
page read and write
5527000
heap
page read and write
2660000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
2A76000
trusted library allocation
page read and write
2D1E000
stack
page read and write
BB7000
heap
page read and write
2C91000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
A30000
heap
page read and write
119D000
heap
page read and write
2CB9000
trusted library allocation
page read and write
582E000
stack
page read and write
5030000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
741E000
stack
page read and write
88EE000
stack
page read and write
5000000
trusted library allocation
page read and write
5560000
trusted library allocation
page execute and read and write
4FD0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
4FC1000
trusted library allocation
page read and write
106E000
stack
page read and write
3251000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
2A8C000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
7A00000
heap
page read and write
72EE000
stack
page read and write
432D000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
5440000
trusted library allocation
page execute and read and write
57A0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5538000
heap
page read and write
2BF1000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
3A15000
trusted library allocation
page read and write
10BD000
trusted library allocation
page execute and read and write
1690000
heap
page read and write
57E0000
trusted library allocation
page read and write
18B0000
heap
page read and write
766E000
stack
page read and write
3865000
trusted library allocation
page read and write
5D00000
trusted library allocation
page execute and read and write
4FB0000
trusted library allocation
page read and write
42E5000
trusted library allocation
page read and write
313C000
stack
page read and write
3250000
heap
page read and write
32CB000
heap
page read and write
3090000
trusted library allocation
page read and write
B13000
trusted library allocation
page execute and read and write
4FA0000
trusted library allocation
page read and write
5167000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page execute and read and write
2ADB000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
33B0000
heap
page read and write
7E50000
trusted library allocation
page read and write
C79000
heap
page read and write
5FA0000
heap
page read and write
56EE000
stack
page read and write
2AB3000
trusted library allocation
page read and write
5FBB000
trusted library allocation
page read and write
7F5B0000
trusted library allocation
page execute and read and write
642E000
stack
page read and write
139E000
stack
page read and write
2B01000
trusted library allocation
page read and write
13A7000
trusted library allocation
page execute and read and write
531D000
stack
page read and write
2B51000
trusted library allocation
page read and write
7E30000
trusted library allocation
page read and write
6A5E000
stack
page read and write
13F0000
trusted library allocation
page read and write
B14000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
552B000
heap
page read and write
5050000
trusted library allocation
page read and write
4E80000
heap
page execute and read and write
2C1B000
trusted library allocation
page read and write
4D83000
trusted library allocation
page execute and read and write
4E98000
trusted library allocation
page read and write
B42000
trusted library allocation
page read and write
7F5F0000
trusted library allocation
page execute and read and write
887A000
trusted library allocation
page read and write
2E1E000
stack
page read and write
7E70000
trusted library allocation
page read and write
7A7D000
heap
page read and write
4100000
trusted library allocation
page read and write
10DE000
heap
page read and write
330D000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
2C43000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
745E000
stack
page read and write
7A32000
heap
page read and write
4F33000
trusted library allocation
page read and write
1104000
heap
page read and write
5452000
heap
page read and write
13B7000
trusted library allocation
page execute and read and write
7AAC000
heap
page read and write
13AA000
trusted library allocation
page execute and read and write
5F51000
trusted library allocation
page read and write
4DB5000
trusted library allocation
page execute and read and write
4F30000
trusted library allocation
page execute and read and write
1210000
heap
page read and write
2CF7000
trusted library allocation
page read and write
554F000
stack
page read and write
138E000
stack
page read and write
3119000
trusted library allocation
page read and write
7A96000
heap
page read and write
140B000
trusted library allocation
page execute and read and write
2BA3000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page read and write
4E6F000
stack
page read and write
2CBB000
trusted library allocation
page read and write
1430000
heap
page read and write
2B03000
trusted library allocation
page read and write
31C0000
heap
page execute and read and write
7A04000
heap
page read and write
8870000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
33C6000
heap
page read and write
14AF000
heap
page read and write
950000
heap
page read and write
2C45000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
5F79000
trusted library allocation
page read and write
75AF000
stack
page read and write
2A02000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
26EE000
stack
page read and write
4D5E000
stack
page read and write
75ED000
stack
page read and write
2A74000
trusted library allocation
page read and write
B90000
heap
page read and write
27F1000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
4E20000
heap
page execute and read and write
1345000
heap
page read and write
B47000
trusted library allocation
page execute and read and write
13E0000
trusted library allocation
page execute and read and write
79F0000
heap
page execute and read and write
4DB2000
trusted library allocation
page read and write
50A6000
trusted library allocation
page read and write
3210000
heap
page read and write
49CE000
stack
page read and write
2BEF000
trusted library allocation
page read and write
39B1000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
5440000
heap
page execute and read and write
8985000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
B98000
heap
page read and write
11B6000
heap
page read and write
57EE000
stack
page read and write
502000
unkown
page readonly
30F1000
trusted library allocation
page read and write
33C0000
heap
page read and write
792E000
stack
page read and write
13F7000
trusted library allocation
page execute and read and write
163F000
stack
page read and write
7A11000
heap
page read and write
2B57000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
3840000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
5550000
trusted library section
page read and write
79AE000
stack
page read and write
5221000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
8930000
heap
page read and write
7CCE000
stack
page read and write
7DD0000
trusted library allocation
page read and write
739E000
stack
page read and write
6600000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
2B2B000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
76AB000
stack
page read and write
167E000
stack
page read and write
4D8D000
trusted library allocation
page execute and read and write
8940000
trusted library allocation
page execute and read and write
8F8000
stack
page read and write
691D000
stack
page read and write
13C0000
trusted library allocation
page read and write
CCE000
stack
page read and write
5A9E000
stack
page read and write
351D000
stack
page read and write
7AAF000
heap
page read and write
AB0000
heap
page read and write
48CC000
stack
page read and write
7DF0000
trusted library allocation
page read and write
592E000
stack
page read and write
B10000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
114C000
heap
page read and write
1420000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
2BC9000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
58FF000
trusted library allocation
page read and write
E90000
heap
page read and write
3253000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
2B4F000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
4D84000
trusted library allocation
page read and write
735E000
stack
page read and write
47F0000
trusted library allocation
page read and write
151F000
heap
page read and write
2E5C000
stack
page read and write
2C93000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
575E000
stack
page read and write
308E000
stack
page read and write
30B1000
trusted library allocation
page read and write
1070000
heap
page read and write
B57000
heap
page read and write
2CB7000
trusted library allocation
page read and write
5383000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
2AFF000
trusted library allocation
page read and write
1111000
heap
page read and write
B20000
trusted library allocation
page read and write
383D000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
13DD000
trusted library allocation
page execute and read and write
7D0E000
stack
page read and write
5EF7000
heap
page read and write
13FA000
trusted library allocation
page execute and read and write
B36000
trusted library allocation
page execute and read and write
C77000
heap
page read and write
31BE000
stack
page read and write
5650000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
1025000
heap
page read and write
FA0000
heap
page read and write
5A90000
trusted library allocation
page execute and read and write
AB5000
heap
page read and write
796E000
stack
page read and write
3200000
trusted library allocation
page read and write
7AD6000
heap
page read and write
13F2000
trusted library allocation
page read and write
76EE000
stack
page read and write
13F0000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
1340000
heap
page read and write
332F000
trusted library allocation
page read and write
7AB2000
heap
page read and write
4445000
trusted library allocation
page read and write
5450000
heap
page read and write
37F1000
trusted library allocation
page read and write
5EC000
stack
page read and write
2EB8000
trusted library allocation
page read and write
4279000
trusted library allocation
page read and write
1477000
heap
page read and write
EB0000
heap
page read and write
500000
unkown
page readonly
27EF000
stack
page read and write
7DC0000
trusted library allocation
page read and write
63ED000
stack
page read and write
4F2E000
stack
page read and write
5430000
trusted library allocation
page read and write
13BB000
trusted library allocation
page execute and read and write
304D000
stack
page read and write
5547000
heap
page read and write
73DE000
stack
page read and write
1448000
heap
page read and write
1410000
heap
page read and write
355E000
stack
page read and write
5900000
trusted library allocation
page read and write
2CF3000
trusted library allocation
page read and write
179E000
stack
page read and write
2680000
trusted library allocation
page read and write
5E0A000
heap
page read and write
324F000
trusted library allocation
page read and write
657C000
stack
page read and write
35C7000
heap
page read and write
595E000
stack
page read and write
2A6E000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
2FE8000
stack
page read and write
2C67000
trusted library allocation
page read and write
7D4E000
stack
page read and write
2BA7000
trusted library allocation
page read and write
596E000
stack
page read and write
89A0000
trusted library allocation
page read and write
2AB6000
trusted library allocation
page read and write
7A3B000
heap
page read and write
26A0000
heap
page read and write
772B000
stack
page read and write
3257000
trusted library allocation
page read and write
5DC8000
heap
page read and write
8860000
trusted library allocation
page execute and read and write
2B2F000
trusted library allocation
page read and write
330F000
heap
page read and write
43E1000
trusted library allocation
page read and write
F38000
stack
page read and write
576E000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
3237000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
BD7000
heap
page read and write
5910000
trusted library allocation
page read and write
5E77000
heap
page read and write
3342000
heap
page read and write
7A7F000
heap
page read and write
2CDB000
trusted library allocation
page read and write
10D0000
heap
page read and write
77B0000
heap
page read and write
332D000
trusted library allocation
page read and write
5670000
trusted library allocation
page execute and read and write
2C8F000
trusted library allocation
page read and write
5BDE000
stack
page read and write
30A0000
heap
page execute and read and write
3334000
trusted library allocation
page read and write
B50000
heap
page read and write
32BE000
heap
page read and write
5CDE000
stack
page read and write
4D70000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
5800000
heap
page execute and read and write
DCE000
stack
page read and write
2BF7000
trusted library allocation
page read and write
3849000
trusted library allocation
page read and write
2B7B000
trusted library allocation
page read and write
C10000
heap
page read and write
892E000
stack
page read and write
2E70000
trusted library allocation
page read and write
B80000
trusted library allocation
page execute and read and write
79E0000
trusted library allocation
page read and write
756E000
stack
page read and write
EB6000
heap
page read and write
4FE0000
trusted library allocation
page read and write
1430000
trusted library allocation
page execute and read and write
3289000
trusted library allocation
page read and write
10B4000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
5A6F000
stack
page read and write
2C6B000
trusted library allocation
page read and write
5A5F000
stack
page read and write
7D90000
trusted library allocation
page read and write
5B9E000
stack
page read and write
5EFC000
heap
page read and write
3317000
trusted library allocation
page read and write
74ED000
stack
page read and write
426D000
trusted library allocation
page read and write
3258000
heap
page read and write
40B1000
trusted library allocation
page read and write
3580000
heap
page read and write
2C23000
trusted library allocation
page read and write
79E7000
trusted library allocation
page read and write
762A000
stack
page read and write
B3A000
trusted library allocation
page execute and read and write
68DC000
stack
page read and write
58D0000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
4E70000
heap
page readonly
2C47000
trusted library allocation
page read and write
35C0000
heap
page read and write
2CC1000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
2C6F000
trusted library allocation
page read and write
146A000
heap
page read and write
2EA0000
heap
page read and write
E3C000
stack
page read and write
549C000
heap
page read and write
38FD000
trusted library allocation
page read and write
4295000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
2ADE000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
C72000
heap
page read and write
4270000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
752B000
stack
page read and write
7F630000
trusted library allocation
page execute and read and write
10C0000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
7A89000
heap
page read and write
4F51000
trusted library allocation
page read and write
2BCF000
trusted library allocation
page read and write
7B11000
heap
page read and write
5010000
trusted library allocation
page read and write
3140000
heap
page read and write
67DD000
stack
page read and write
53FE000
trusted library allocation
page read and write
3360000
heap
page read and write
2CC4000
trusted library allocation
page read and write
47F8000
trusted library allocation
page read and write
11A6000
heap
page read and write
2CBE000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
78EE000
stack
page read and write
AFF000
stack
page read and write
1020000
heap
page read and write
2FAC000
stack
page read and write
B70000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
5C00000
trusted library allocation
page execute and read and write
7AD1000
heap
page read and write
2B7F000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
33AE000
stack
page read and write
1407000
trusted library allocation
page execute and read and write
A7E000
stack
page read and write
3228000
trusted library allocation
page read and write
1330000
heap
page read and write
5DA0000
heap
page read and write
31D0000
trusted library allocation
page read and write
4175000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
4F40000
heap
page read and write
2CDD000
trusted library allocation
page read and write
4DAA000
trusted library allocation
page execute and read and write
4EEC000
stack
page read and write
324C000
trusted library allocation
page read and write
8850000
heap
page read and write
2BA1000
trusted library allocation
page read and write
B4B000
trusted library allocation
page execute and read and write
7AD3000
heap
page read and write
7C00000
trusted library allocation
page read and write
6660000
heap
page read and write
B45000
trusted library allocation
page execute and read and write
7315000
heap
page execute and read and write
2B29000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
B1D000
trusted library allocation
page execute and read and write
2B77000
trusted library allocation
page read and write
58E0000
trusted library allocation
page execute and read and write
13D3000
trusted library allocation
page execute and read and write
2C97000
trusted library allocation
page read and write
327D000
heap
page read and write
7E00000
trusted library allocation
page read and write
2AAB000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
6A1D000
stack
page read and write
2B27000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
2D03000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
7310000
heap
page execute and read and write
57C0000
trusted library allocation
page read and write
FB0000
heap
page read and write
B00000
trusted library allocation
page read and write
4F2E000
stack
page read and write
647C000
stack
page read and write
1440000
heap
page read and write
10B0000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
319D000
trusted library allocation
page read and write
145E000
heap
page read and write
2E9B000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
7A8D000
heap
page read and write
6430000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
5020000
trusted library allocation
page execute and read and write
1516000
heap
page read and write
4E1E000
stack
page read and write
3261000
trusted library allocation
page read and write
3312000
heap
page read and write
5511000
heap
page read and write
3319000
trusted library allocation
page read and write
34DE000
stack
page read and write
38B5000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
8990000
heap
page read and write
5D90000
trusted library allocation
page execute and read and write
13D4000
trusted library allocation
page read and write
2C69000
trusted library allocation
page read and write
2690000
heap
page execute and read and write
189E000
stack
page read and write
4E20000
heap
page read and write
10A0000
trusted library allocation
page read and write
7ABE000
heap
page read and write
FA8000
stack
page read and write
153F000
stack
page read and write
5640000
trusted library allocation
page read and write
7D8D000
stack
page read and write
B9E000
heap
page read and write
57B1000
trusted library allocation
page read and write
328A000
heap
page read and write
132E000
stack
page read and write
B32000
trusted library allocation
page read and write
4D99000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
3235000
trusted library allocation
page read and write
6B5E000
stack
page read and write
There are 510 hidden memdumps, click here to show them.