IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:54 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Temp\Tmp583D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp584E.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9~
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.9
unknown
Portugal
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
7C2000
unkown
page readonly
malicious
2C18000
trusted library allocation
page read and write
malicious
31C3000
trusted library allocation
page read and write
3BEE000
trusted library allocation
page read and write
6782000
trusted library allocation
page read and write
F67000
heap
page read and write
50A0000
heap
page read and write
C51000
heap
page read and write
10E3000
trusted library allocation
page execute and read and write
5011000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
2D2E000
trusted library allocation
page read and write
CEF000
heap
page read and write
6392000
heap
page read and write
54BF000
stack
page read and write
7EA0000
heap
page read and write
2B6E000
stack
page read and write
50C0000
trusted library allocation
page execute and read and write
6760000
trusted library allocation
page read and write
3012000
trusted library allocation
page read and write
68B0000
trusted library allocation
page execute and read and write
63A4000
heap
page read and write
3B9A000
trusted library allocation
page read and write
6BDE000
stack
page read and write
7E9B000
stack
page read and write
76B0000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
318C000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
6376000
heap
page read and write
77B0000
trusted library allocation
page execute and read and write
67B5000
trusted library allocation
page read and write
637C000
heap
page read and write
62D0000
heap
page read and write
30DF000
trusted library allocation
page read and write
7B3E000
stack
page read and write
6840000
trusted library allocation
page read and write
538E000
stack
page read and write
50A3000
heap
page read and write
84A0000
heap
page read and write
7F00000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
D6E000
stack
page read and write
74CF000
heap
page read and write
5130000
trusted library allocation
page read and write
62C0000
trusted library allocation
page execute and read and write
6739000
trusted library allocation
page read and write
76D0000
trusted library allocation
page execute and read and write
31AE000
trusted library allocation
page read and write
63A9000
heap
page read and write
7522000
heap
page read and write
54EA000
heap
page read and write
6CEC000
trusted library allocation
page read and write
8AA000
stack
page read and write
30C9000
trusted library allocation
page read and write
75BB000
heap
page read and write
62A0000
heap
page read and write
672A000
trusted library allocation
page read and write
4FF4000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
3BB3000
trusted library allocation
page read and write
5D4E000
stack
page read and write
75CC000
heap
page read and write
899E000
stack
page read and write
64AE000
stack
page read and write
6B9C000
stack
page read and write
2FDF000
trusted library allocation
page read and write
3EEF000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
54D1000
heap
page read and write
54D4000
heap
page read and write
2FF6000
trusted library allocation
page read and write
FAE000
stack
page read and write
63CE000
heap
page read and write
314C000
trusted library allocation
page read and write
5016000
trusted library allocation
page read and write
7E3E000
stack
page read and write
30D3000
trusted library allocation
page read and write
1106000
trusted library allocation
page execute and read and write
30B7000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
53B0000
heap
page execute and read and write
2FFB000
trusted library allocation
page read and write
10FD000
trusted library allocation
page execute and read and write
2FCB000
trusted library allocation
page read and write
7EFD000
stack
page read and write
63C0000
heap
page read and write
74E2000
heap
page read and write
3E2E000
trusted library allocation
page read and write
6728000
trusted library allocation
page read and write
F60000
heap
page read and write
110A000
trusted library allocation
page execute and read and write
30C2000
trusted library allocation
page read and write
6771000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
2D6B000
trusted library allocation
page read and write
6737000
trusted library allocation
page read and write
614F000
stack
page read and write
6D6F000
trusted library allocation
page read and write
7F2000
unkown
page readonly
6730000
trusted library allocation
page read and write
785C000
trusted library allocation
page read and write
2A55000
trusted library allocation
page read and write
77FE000
stack
page read and write
1100000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
6CE9000
trusted library allocation
page read and write
7579000
heap
page read and write
62EA000
heap
page read and write
2960000
trusted library allocation
page read and write
74C0000
heap
page read and write
661E000
stack
page read and write
111B000
trusted library allocation
page execute and read and write
D20000
heap
page read and write
C37000
heap
page read and write
7F7000
unkown
page readonly
2A60000
heap
page read and write
6D30000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
7CFF000
stack
page read and write
3B71000
trusted library allocation
page read and write
74A7000
heap
page read and write
6735000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
7588000
heap
page read and write
3040000
trusted library allocation
page read and write
74DC000
heap
page read and write
6D75000
trusted library allocation
page read and write
74F1000
heap
page read and write
6725000
trusted library allocation
page read and write
67BB000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
76B8000
trusted library allocation
page read and write
5120000
heap
page read and write
31D0000
trusted library allocation
page read and write
1115000
trusted library allocation
page execute and read and write
C44000
heap
page read and write
1110000
trusted library allocation
page read and write
806000
unkown
page readonly
55FE000
stack
page read and write
676B000
trusted library allocation
page read and write
6D55000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
3BAB000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
63B1000
heap
page read and write
67BE000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
7B7E000
stack
page read and write
2D24000
trusted library allocation
page read and write
74EE000
heap
page read and write
756B000
heap
page read and write
10AF000
stack
page read and write
6A30000
trusted library allocation
page execute and read and write
3088000
trusted library allocation
page read and write
89E0000
heap
page read and write
7E40000
trusted library allocation
page execute and read and write
D85000
heap
page read and write
1117000
trusted library allocation
page execute and read and write
10E4000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
63BC000
heap
page read and write
308A000
trusted library allocation
page read and write
7CBE000
stack
page read and write
10ED000
trusted library allocation
page execute and read and write
7860000
trusted library allocation
page read and write
5022000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
1170000
heap
page read and write
7F640000
trusted library allocation
page execute and read and write
6D59000
trusted library allocation
page read and write
50B2000
trusted library allocation
page read and write
D80000
heap
page read and write
7504000
heap
page read and write
67D0000
trusted library allocation
page read and write
3B7F000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
74CA000
heap
page read and write
1112000
trusted library allocation
page read and write
3EF6000
trusted library allocation
page read and write
1176000
heap
page read and write
5140000
trusted library allocation
page read and write
9A7000
stack
page read and write
7586000
heap
page read and write
6A50000
trusted library allocation
page execute and read and write
6D68000
trusted library allocation
page read and write
C18000
heap
page read and write
6D6A000
trusted library allocation
page read and write
7582000
heap
page read and write
67C0000
trusted library allocation
page read and write
117B000
heap
page read and write
778F000
stack
page read and write
C10000
heap
page read and write
29A8000
trusted library allocation
page read and write
7D3E000
stack
page read and write
31BC000
trusted library allocation
page read and write
30FC000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
671F000
stack
page read and write
2B71000
trusted library allocation
page read and write
756D000
heap
page read and write
C1E000
heap
page read and write
2970000
trusted library allocation
page read and write
62B0000
trusted library allocation
page execute and read and write
7C7F000
stack
page read and write
67A0000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
4BAC000
stack
page read and write
75FB000
heap
page read and write
604F000
stack
page read and write
68C0000
trusted library allocation
page execute and read and write
6860000
trusted library allocation
page execute and read and write
1140000
heap
page read and write
2D22000
trusted library allocation
page read and write
63C7000
heap
page read and write
6791000
trusted library allocation
page read and write
6324000
heap
page read and write
62D8000
heap
page read and write
30B0000
trusted library allocation
page read and write
7794000
trusted library allocation
page read and write
75A2000
heap
page read and write
50B0000
trusted library allocation
page read and write
5138000
trusted library allocation
page read and write
6D7A000
trusted library allocation
page read and write
2D2B000
trusted library allocation
page read and write
74AD000
heap
page read and write
67B0000
trusted library allocation
page read and write
3EE2000
trusted library allocation
page read and write
563E000
stack
page read and write
1130000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
F5E000
stack
page read and write
4CAC000
stack
page read and write
7850000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
7C0000
unkown
page readonly
D10000
heap
page read and write
7542000
heap
page read and write
7548000
heap
page read and write
4FF0000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
758C000
heap
page read and write
CBD000
heap
page read and write
75E9000
heap
page read and write
74BA000
heap
page read and write
501D000
trusted library allocation
page read and write
500E000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
6776000
trusted library allocation
page read and write
75C5000
heap
page read and write
4FFB000
trusted library allocation
page read and write
750A000
heap
page read and write
2D1C000
trusted library allocation
page read and write
73A0000
heap
page read and write
6800000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
3CEE000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
295E000
stack
page read and write
76A0000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
54E5000
heap
page read and write
74A0000
heap
page read and write
6D40000
trusted library allocation
page execute and read and write
C2F000
heap
page read and write
30A3000
trusted library allocation
page read and write
5090000
heap
page read and write
5D0E000
stack
page read and write
77A0000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
6D7F000
trusted library allocation
page read and write
8AEE000
stack
page read and write
3101000
trusted library allocation
page read and write
84AB000
heap
page read and write
3007000
trusted library allocation
page read and write
CDA000
heap
page read and write
505E000
trusted library allocation
page read and write
624E000
stack
page read and write
1102000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
1160000
trusted library allocation
page execute and read and write
74DA000
heap
page read and write
7530000
heap
page read and write
29A0000
trusted library allocation
page read and write
6A9C000
stack
page read and write
5D8E000
stack
page read and write
10E0000
trusted library allocation
page read and write
774D000
stack
page read and write
6D52000
trusted library allocation
page read and write
6CDC000
stack
page read and write
76A4000
trusted library allocation
page read and write
678E000
trusted library allocation
page read and write
30CE000
trusted library allocation
page read and write
2FEA000
trusted library allocation
page read and write
65AE000
stack
page read and write
3B92000
trusted library allocation
page read and write
3077000
trusted library allocation
page read and write
There are 299 hidden memdumps, click here to show them.