IOC Report
KBDFW9FTsq.exe

loading gif

Files

File Path
Type
Category
Malicious
KBDFW9FTsq.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KBDFW9FTsq.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:56 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Temp\Tmp396C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp397D.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KBDFW9FTsq.exe
"C:\Users\user\Desktop\KBDFW9FTsq.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
95.179.250.45
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
382000
unkown
page readonly
malicious
3B48000
trusted library allocation
page read and write
6C9F000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
4CEE000
stack
page read and write
59AF000
stack
page read and write
57DE000
heap
page read and write
2CAB000
trusted library allocation
page read and write
3838000
trusted library allocation
page read and write
8890000
trusted library allocation
page read and write
2B84000
trusted library allocation
page read and write
60A8000
heap
page read and write
381E000
trusted library allocation
page read and write
921E000
heap
page read and write
97B0000
heap
page read and write
3B15000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page execute and read and write
3782000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
38D8000
trusted library allocation
page read and write
4F20000
heap
page execute and read and write
6C88000
trusted library allocation
page read and write
9223000
heap
page read and write
2761000
trusted library allocation
page read and write
5EF8000
trusted library allocation
page read and write
B57000
heap
page read and write
AD2000
heap
page read and write
86B0000
trusted library allocation
page read and write
6C8A000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
602C000
heap
page read and write
9110000
trusted library allocation
page execute and read and write
6CB0000
trusted library allocation
page read and write
6C95000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
289D000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
6B17000
trusted library allocation
page read and write
6045000
heap
page read and write
6C79000
trusted library allocation
page read and write
8680000
trusted library allocation
page execute and read and write
91A6000
heap
page read and write
6435000
trusted library allocation
page read and write
82E000
stack
page read and write
2CB7000
trusted library allocation
page read and write
92A1000
heap
page read and write
607A000
heap
page read and write
5FA0000
heap
page read and write
6420000
trusted library allocation
page read and write
4BAB000
trusted library allocation
page read and write
62AE000
stack
page read and write
A90000
heap
page read and write
CB6000
trusted library allocation
page execute and read and write
5A2E000
stack
page read and write
6830000
trusted library allocation
page read and write
273C000
stack
page read and write
3803000
trusted library allocation
page read and write
67AF000
stack
page read and write
2B86000
trusted library allocation
page read and write
3ACF000
trusted library allocation
page read and write
9288000
heap
page read and write
385C000
trusted library allocation
page read and write
90CF000
stack
page read and write
A28D000
stack
page read and write
59EE000
stack
page read and write
4BCD000
trusted library allocation
page read and write
6CB8000
trusted library allocation
page read and write
AE8E000
stack
page read and write
8665000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page execute and read and write
3896000
trusted library allocation
page read and write
950E000
stack
page read and write
6B20000
heap
page read and write
37EE000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
4C43000
heap
page read and write
8760000
trusted library allocation
page read and write
CF0000
heap
page read and write
910E000
stack
page read and write
3AE7000
trusted library allocation
page read and write
387E000
trusted library allocation
page read and write
380000
unkown
page readonly
380C000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
940E000
stack
page read and write
2892000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
91B5000
heap
page read and write
93CE000
stack
page read and write
91F8000
heap
page read and write
6610000
trusted library allocation
page execute and read and write
3B52000
trusted library allocation
page read and write
608E000
heap
page read and write
6D07000
trusted library allocation
page read and write
37F8000
trusted library allocation
page read and write
51AE000
stack
page read and write
AC4000
heap
page read and write
3891000
trusted library allocation
page read and write
A6E000
stack
page read and write
4BE5000
trusted library allocation
page read and write
285F000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page execute and read and write
60BE000
heap
page read and write
3AC8000
trusted library allocation
page read and write
9190000
heap
page read and write
2C8E000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
2548000
trusted library allocation
page read and write
516F000
stack
page read and write
6810000
trusted library allocation
page execute and read and write
631E000
stack
page read and write
6D05000
trusted library allocation
page read and write
3877000
trusted library allocation
page read and write
3AD9000
trusted library allocation
page read and write
6B1A000
trusted library allocation
page read and write
4C1E000
trusted library allocation
page read and write
6C75000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page execute and read and write
3812000
trusted library allocation
page read and write
64E9000
stack
page read and write
485C000
stack
page read and write
3D10000
trusted library allocation
page read and write
86B4000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
6A0D000
stack
page read and write
3AEC000
trusted library allocation
page read and write
25E0000
trusted library allocation
page read and write
866E000
trusted library allocation
page read and write
A9E000
heap
page read and write
86AD000
trusted library allocation
page read and write
2C4A000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
3AD5000
trusted library allocation
page read and write
28A7000
trusted library allocation
page read and write
92C0000
heap
page read and write
2809000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
91C8000
heap
page read and write
3C6000
unkown
page readonly
6CA4000
trusted library allocation
page read and write
28EE000
trusted library allocation
page read and write
384A000
trusted library allocation
page read and write
3884000
trusted library allocation
page read and write
4BD2000
trusted library allocation
page read and write
57D5000
heap
page read and write
5FEE000
heap
page read and write
502E000
stack
page read and write
3ADE000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
37E7000
trusted library allocation
page read and write
895000
heap
page read and write
253E000
stack
page read and write
288F000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
3B09000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
66AE000
stack
page read and write
2C54000
trusted library allocation
page read and write
389C000
trusted library allocation
page read and write
C9D000
trusted library allocation
page execute and read and write
CBA000
trusted library allocation
page execute and read and write
8690000
trusted library allocation
page read and write
38B0000
trusted library allocation
page read and write
C93000
trusted library allocation
page execute and read and write
296A000
trusted library allocation
page read and write
CC2000
trusted library allocation
page read and write
6C72000
trusted library allocation
page read and write
3761000
trusted library allocation
page read and write
B72000
heap
page read and write
6D00000
trusted library allocation
page read and write
609A000
heap
page read and write
3857000
trusted library allocation
page read and write
506E000
stack
page read and write
37E1000
trusted library allocation
page read and write
5FDF000
heap
page read and write
D2A000
heap
page read and write
2C7C000
trusted library allocation
page read and write
69CC000
stack
page read and write
4BC1000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
D10000
trusted library allocation
page execute and read and write
92AC000
heap
page read and write
9250000
heap
page read and write
3B36000
trusted library allocation
page read and write
D57000
heap
page read and write
2D8D000
trusted library allocation
page read and write
67C1000
trusted library allocation
page read and write
91DB000
heap
page read and write
3867000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
925E000
heap
page read and write
4EF0000
heap
page read and write
86E000
stack
page read and write
A38D000
stack
page read and write
289A000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
91CE000
heap
page read and write
67D2000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
5FFA000
heap
page read and write
6B0C000
stack
page read and write
296E000
trusted library allocation
page read and write
6C8F000
trusted library allocation
page read and write
B85000
heap
page read and write
91B9000
heap
page read and write
2740000
trusted library allocation
page read and write
67C6000
trusted library allocation
page read and write
D20000
heap
page read and write
7D0000
heap
page read and write
67DE000
trusted library allocation
page read and write
2750000
heap
page execute and read and write
4BBE000
trusted library allocation
page read and write
9800000
heap
page read and write
3B22000
trusted library allocation
page read and write
4C72000
trusted library allocation
page read and write
91A0000
heap
page read and write
D26000
heap
page read and write
2C9F000
trusted library allocation
page read and write
3B2F000
trusted library allocation
page read and write
5EEE000
stack
page read and write
3B67000
trusted library allocation
page read and write
67BB000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
6880000
trusted library allocation
page read and write
8650000
trusted library allocation
page read and write
4BA4000
trusted library allocation
page read and write
9248000
heap
page read and write
28BB000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
6430000
trusted library allocation
page read and write
37FD000
trusted library allocation
page read and write
2C6F000
trusted library allocation
page read and write
65EC000
stack
page read and write
2964000
trusted library allocation
page read and write
97AE000
stack
page read and write
9205000
heap
page read and write
6B10000
trusted library allocation
page read and write
3AE4000
trusted library allocation
page read and write
376F000
trusted library allocation
page read and write
51FE000
stack
page read and write
CAD000
trusted library allocation
page execute and read and write
8660000
trusted library allocation
page read and write
2962000
trusted library allocation
page read and write
9229000
heap
page read and write
CC0000
trusted library allocation
page read and write
37A3000
trusted library allocation
page read and write
929C000
heap
page read and write
6860000
trusted library allocation
page execute and read and write
4C80000
trusted library allocation
page execute and read and write
68A0000
trusted library allocation
page read and write
923A000
heap
page read and write
4C10000
trusted library allocation
page read and write
7E0000
heap
page read and write
382B000
trusted library allocation
page read and write
6620000
trusted library allocation
page read and write
920F000
heap
page read and write
D30000
trusted library allocation
page read and write
4C40000
heap
page read and write
D50000
heap
page read and write
67B0000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
CC7000
trusted library allocation
page execute and read and write
91D7000
heap
page read and write
5EF0000
trusted library allocation
page read and write
3B2000
unkown
page readonly
3806000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
CB2000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
643A000
trusted library allocation
page read and write
3B7000
unkown
page readonly
2D6A000
trusted library allocation
page read and write
61AD000
stack
page read and write
6C60000
trusted library allocation
page read and write
871D000
stack
page read and write
3801000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
3B41000
trusted library allocation
page read and write
976B000
stack
page read and write
26FF000
stack
page read and write
3AE2000
trusted library allocation
page read and write
388D000
trusted library allocation
page read and write
890000
heap
page read and write
6006000
heap
page read and write
CA0000
trusted library allocation
page read and write
2C83000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
3893000
trusted library allocation
page read and write
7F470000
trusted library allocation
page execute and read and write
6D09000
trusted library allocation
page read and write
866B000
trusted library allocation
page read and write
5CEF000
stack
page read and write
9170000
trusted library allocation
page read and write
2857000
trusted library allocation
page read and write
666C000
stack
page read and write
5FD0000
heap
page read and write
6438000
trusted library allocation
page read and write
5FD6000
heap
page read and write
4C60000
heap
page read and write
383F000
trusted library allocation
page read and write
CCB000
trusted library allocation
page execute and read and write
28CA000
trusted library allocation
page read and write
91EB000
heap
page read and write
91E7000
heap
page read and write
2968000
trusted library allocation
page read and write
8670000
trusted library allocation
page read and write
5DEE000
stack
page read and write
954E000
stack
page read and write
9285000
heap
page read and write
2B10000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
920C000
heap
page read and write
51B0000
heap
page read and write
91F0000
heap
page read and write
2C95000
trusted library allocation
page read and write
3B5D000
trusted library allocation
page read and write
603F000
heap
page read and write
57C1000
heap
page read and write
6890000
trusted library allocation
page read and write
B3D000
heap
page read and write
CC5000
trusted library allocation
page execute and read and write
669000
stack
page read and write
60CE000
heap
page read and write
3888000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
4BC6000
trusted library allocation
page read and write
9279000
heap
page read and write
767000
stack
page read and write
2B88000
trusted library allocation
page read and write
C94000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
68B0000
trusted library allocation
page execute and read and write
92A3000
heap
page read and write
C8E000
stack
page read and write
6870000
trusted library allocation
page execute and read and write
2C56000
trusted library allocation
page read and write
6C9A000
trusted library allocation
page read and write
641E000
stack
page read and write
6CC0000
trusted library allocation
page read and write
9198000
heap
page read and write
25F0000
heap
page read and write
There are 339 hidden memdumps, click here to show them.