IOC Report
1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe

loading gif

Files

File Path
Type
Category
Malicious
1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:53 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp63A5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp63B6.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe
"C:\Users\user\Desktop\1692db4e522605d93551ddcabeffa92a2cd43e764a134833644808319784b955_dump.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.115
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
6B2000
unkown
page readonly
malicious
74E7000
heap
page read and write
75FA000
trusted library allocation
page read and write
C90000
heap
page read and write
30D2000
trusted library allocation
page read and write
3BD8000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
3B7E000
trusted library allocation
page read and write
3C59000
trusted library allocation
page read and write
2F39000
trusted library allocation
page read and write
530E000
stack
page read and write
51C0000
trusted library allocation
page read and write
3C12000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
7498000
heap
page read and write
4F90000
trusted library allocation
page read and write
6281000
heap
page read and write
3011000
trusted library allocation
page read and write
3E58000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
75F8000
trusted library allocation
page read and write
1179000
heap
page read and write
117E000
heap
page read and write
115D000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
661A000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
7412000
heap
page read and write
650E000
stack
page read and write
6C19000
trusted library allocation
page read and write
3B93000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
30B3000
trusted library allocation
page read and write
6615000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
7605000
trusted library allocation
page read and write
7ABF000
stack
page read and write
61A0000
trusted library allocation
page execute and read and write
111E000
trusted library allocation
page read and write
B9E000
stack
page read and write
10F0000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
75FF000
trusted library allocation
page read and write
3BA2000
trusted library allocation
page read and write
5330000
heap
page read and write
6672000
trusted library allocation
page read and write
76CE000
stack
page read and write
75E9000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
1151000
trusted library allocation
page read and write
7BFE000
stack
page read and write
6618000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
746A000
heap
page read and write
760A000
trusted library allocation
page read and write
563F000
stack
page read and write
DD1000
heap
page read and write
2C08000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
6625000
trusted library allocation
page read and write
6247000
heap
page read and write
D55000
heap
page read and write
7C70000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
3E3E000
trusted library allocation
page read and write
2B88000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
3B6F000
trusted library allocation
page read and write
83E0000
heap
page read and write
6C3A000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
3E27000
trusted library allocation
page read and write
52CE000
stack
page read and write
10DC000
stack
page read and write
30FA000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
50A0000
heap
page read and write
75E2000
trusted library allocation
page read and write
E06000
heap
page read and write
3BD3000
trusted library allocation
page read and write
114E000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
3B9F000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
3018000
trusted library allocation
page read and write
6273000
heap
page read and write
89DE000
stack
page read and write
4F20000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
3E4E000
trusted library allocation
page read and write
614E000
stack
page read and write
667E000
trusted library allocation
page read and write
2E87000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
73E0000
heap
page read and write
D62000
heap
page read and write
6C30000
trusted library allocation
page read and write
67B0000
trusted library allocation
page execute and read and write
3091000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
2CB0000
trusted library allocation
page read and write
3B87000
trusted library allocation
page read and write
66AB000
trusted library allocation
page read and write
3022000
trusted library allocation
page read and write
6629000
trusted library allocation
page read and write
D12000
trusted library allocation
page read and write
72E0000
heap
page read and write
7FD90000
trusted library allocation
page execute and read and write
2FD7000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
F90000
heap
page read and write
D06000
trusted library allocation
page execute and read and write
6666000
trusted library allocation
page read and write
62AC000
heap
page read and write
3C14000
trusted library allocation
page read and write
CE3000
trusted library allocation
page execute and read and write
5F4E000
stack
page read and write
6BCC000
stack
page read and write
113B000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
62A2000
heap
page read and write
2F4A000
trusted library allocation
page read and write
3B1B000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
30E4000
trusted library allocation
page read and write
3BCC000
trusted library allocation
page read and write
6ACE000
stack
page read and write
CED000
trusted library allocation
page execute and read and write
2D29000
trusted library allocation
page read and write
3BF8000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
748F000
heap
page read and write
3C69000
trusted library allocation
page read and write
D15000
trusted library allocation
page execute and read and write
6C34000
trusted library allocation
page read and write
2FCF000
trusted library allocation
page read and write
626F000
heap
page read and write
D47000
heap
page read and write
2CBB000
trusted library allocation
page read and write
73EE000
heap
page read and write
749B000
heap
page read and write
2F8F000
trusted library allocation
page read and write
F97000
heap
page read and write
6720000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
621A000
heap
page read and write
7DCE000
stack
page read and write
3E39000
trusted library allocation
page read and write
74B0000
heap
page read and write
3C09000
trusted library allocation
page read and write
F7E000
stack
page read and write
629E000
heap
page read and write
799000
stack
page read and write
66AE000
trusted library allocation
page read and write
CE4000
trusted library allocation
page read and write
D20000
heap
page read and write
30DF000
trusted library allocation
page read and write
3B8D000
trusted library allocation
page read and write
62BE000
heap
page read and write
3099000
trusted library allocation
page read and write
3BAC000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
3BF2000
trusted library allocation
page read and write
760F000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
3C05000
trusted library allocation
page read and write
2FC6000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
B00000
heap
page read and write
6E2000
unkown
page readonly
D10000
trusted library allocation
page read and write
528E000
stack
page read and write
4BDB000
stack
page read and write
73E3000
heap
page read and write
6627000
trusted library allocation
page read and write
CFD000
trusted library allocation
page execute and read and write
2CA9000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
3C0E000
trusted library allocation
page read and write
3AE1000
trusted library allocation
page read and write
5C8E000
stack
page read and write
2EEE000
trusted library allocation
page read and write
7E0E000
stack
page read and write
2C9C000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
740D000
heap
page read and write
7422000
heap
page read and write
5650000
heap
page read and write
3BDD000
trusted library allocation
page read and write
D0A000
trusted library allocation
page execute and read and write
3E13000
trusted library allocation
page read and write
3BC1000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
D2B000
heap
page read and write
2CCD000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page execute and read and write
7610000
trusted library allocation
page read and write
7C80000
heap
page read and write
AF7000
stack
page read and write
D02000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
6B0000
unkown
page readonly
7C4B000
stack
page read and write
3B23000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
6661000
trusted library allocation
page read and write
6C20000
trusted library allocation
page execute and read and write
3006000
trusted library allocation
page read and write
3C17000
trusted library allocation
page read and write
2EB7000
trusted library allocation
page read and write
2AD0000
heap
page read and write
698C000
stack
page read and write
6C00000
trusted library allocation
page execute and read and write
D00000
trusted library allocation
page read and write
F1F000
stack
page read and write
6A8C000
stack
page read and write
768D000
stack
page read and write
74D1000
heap
page read and write
74DB000
heap
page read and write
7C50000
heap
page read and write
7487000
heap
page read and write
61CD000
heap
page read and write
B10000
heap
page read and write
109E000
stack
page read and write
7A7E000
stack
page read and write
51A8000
trusted library allocation
page read and write
73F1000
heap
page read and write
3B68000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
6940000
trusted library allocation
page execute and read and write
DF6000
heap
page read and write
6C64000
trusted library allocation
page read and write
6E7000
unkown
page readonly
66C0000
trusted library allocation
page read and write
543E000
stack
page read and write
3E20000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
3E43000
trusted library allocation
page read and write
1156000
trusted library allocation
page read and write
3087000
trusted library allocation
page read and write
6681000
trusted library allocation
page read and write
7AFE000
stack
page read and write
745F000
heap
page read and write
5468000
heap
page read and write
7D8D000
stack
page read and write
74A4000
heap
page read and write
76F0000
trusted library allocation
page execute and read and write
1176000
heap
page read and write
62AA000
heap
page read and write
665B000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
744E000
heap
page read and write
6F6000
unkown
page readonly
2F45000
trusted library allocation
page read and write
74C0000
heap
page read and write
3BE8000
trusted library allocation
page read and write
BB0000
heap
page read and write
649E000
stack
page read and write
3B02000
trusted library allocation
page read and write
3E06000
trusted library allocation
page read and write
604E000
stack
page read and write
66F0000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
74ED000
heap
page read and write
50A3000
heap
page read and write
73FB000
heap
page read and write
5451000
heap
page read and write
30A6000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
7458000
heap
page read and write
73E8000
heap
page read and write
1120000
heap
page execute and read and write
74CA000
heap
page read and write
3C1D000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
83EC000
heap
page read and write
66B0000
trusted library allocation
page read and write
D1B000
trusted library allocation
page execute and read and write
2F27000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
4F80000
heap
page read and write
83F6000
heap
page read and write
779E000
stack
page read and write
67A0000
trusted library allocation
page execute and read and write
775E000
stack
page read and write
D2E000
heap
page read and write
3BFF000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
66A5000
trusted library allocation
page read and write
61E4000
heap
page read and write
3BB9000
trusted library allocation
page read and write
2F01000
trusted library allocation
page read and write
2FFF000
trusted library allocation
page read and write
660E000
stack
page read and write
BB6000
heap
page read and write
2C0C000
trusted library allocation
page read and write
3B84000
trusted library allocation
page read and write
6620000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
5C4E000
stack
page read and write
51D0000
heap
page execute and read and write
61C0000
heap
page read and write
3F58000
trusted library allocation
page read and write
6920000
trusted library allocation
page execute and read and write
7473000
heap
page read and write
3C31000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
88DE000
stack
page read and write
62B0000
heap
page read and write
6C37000
trusted library allocation
page read and write
639D000
stack
page read and write
3B62000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
6740000
trusted library allocation
page execute and read and write
2A1F000
stack
page read and write
61B0000
trusted library allocation
page execute and read and write
2F2E000
trusted library allocation
page read and write
B5E000
stack
page read and write
2FF2000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
1170000
heap
page read and write
76D0000
trusted library allocation
page read and write
D17000
trusted library allocation
page execute and read and write
F80000
trusted library allocation
page execute and read and write
3E32000
trusted library allocation
page read and write
4058000
trusted library allocation
page read and write
6BE3000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
7C00000
trusted library allocation
page execute and read and write
75E5000
trusted library allocation
page read and write
3B75000
trusted library allocation
page read and write
There are 343 hidden memdumps, click here to show them.