IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:17 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp5C55.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp5C65.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
136.244.88.135:17615
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
136.244.88.135
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3975000
trusted library allocation
page read and write
malicious
53DE000
stack
page read and write
6740000
trusted library allocation
page execute and read and write
D2F000
heap
page read and write
908B000
heap
page read and write
E97000
trusted library allocation
page execute and read and write
64D0000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
8F6F000
heap
page read and write
6AF0000
trusted library allocation
page execute and read and write
528C000
heap
page read and write
CA4000
trusted library allocation
page read and write
6BB5000
trusted library allocation
page read and write
85CE000
stack
page read and write
8FB4000
heap
page read and write
2A1B000
trusted library allocation
page read and write
28FE000
trusted library allocation
page read and write
6B6E000
stack
page read and write
2D07000
trusted library allocation
page read and write
5A2E000
heap
page read and write
6A69000
trusted library allocation
page read and write
1000000
heap
page read and write
61E0000
trusted library allocation
page execute and read and write
2D61000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
37F2000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
8FF9000
heap
page read and write
690E000
stack
page read and write
E82000
trusted library allocation
page read and write
8F9B000
heap
page read and write
C94000
heap
page read and write
4CD6000
trusted library allocation
page read and write
6A94000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
8FA6000
heap
page read and write
2D82000
trusted library allocation
page read and write
6671000
trusted library allocation
page read and write
6B90000
trusted library allocation
page execute and read and write
446000
remote allocation
page execute and read and write
51BC000
heap
page read and write
6AC0000
trusted library allocation
page read and write
BF5000
heap
page read and write
9023000
heap
page read and write
53F0000
heap
page read and write
A20000
heap
page read and write
2CF6000
trusted library allocation
page read and write
4D90000
heap
page read and write
6720000
trusted library allocation
page read and write
E9B000
trusted library allocation
page execute and read and write
2D1F000
trusted library allocation
page read and write
9066000
heap
page read and write
670000
unkown
page readonly
2D02000
trusted library allocation
page read and write
539E000
stack
page read and write
7C0000
heap
page read and write
6A7F000
trusted library allocation
page read and write
8F81000
heap
page read and write
8560000
trusted library allocation
page read and write
4FCE000
stack
page read and write
6A3A000
trusted library allocation
page read and write
6200000
trusted library allocation
page execute and read and write
47D8000
trusted library allocation
page read and write
C6E000
stack
page read and write
2A26000
trusted library allocation
page read and write
9060000
heap
page read and write
53E0000
heap
page read and write
2973000
trusted library allocation
page read and write
6BB7000
trusted library allocation
page read and write
D15000
heap
page read and write
907C000
heap
page read and write
4CF0000
trusted library allocation
page read and write
D6B000
heap
page read and write
529E000
heap
page read and write
F3C000
stack
page read and write
5BFE000
stack
page read and write
9088000
heap
page read and write
CB9000
heap
page read and write
6730000
trusted library allocation
page read and write
C40000
heap
page read and write
8F7E000
heap
page read and write
519F000
stack
page read and write
E7D000
trusted library allocation
page execute and read and write
CCB000
trusted library allocation
page execute and read and write
4CB4000
trusted library allocation
page read and write
6C6E000
trusted library allocation
page read and write
8F90000
heap
page read and write
F50000
heap
page execute and read and write
5220000
heap
page read and write
5F3F000
stack
page read and write
67A0000
heap
page execute and read and write
6C70000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
4D15000
trusted library allocation
page read and write
2879000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
4CE2000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
853F000
stack
page read and write
6B70000
trusted library allocation
page read and write
8F79000
heap
page read and write
298C000
trusted library allocation
page read and write
A84000
trusted library allocation
page read and write
4E93000
heap
page read and write
EB0000
trusted library allocation
page read and write
D0E000
heap
page read and write
6A90000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
902A000
heap
page read and write
2A0C000
trusted library allocation
page read and write
4D0E000
trusted library allocation
page read and write
6A8F000
trusted library allocation
page read and write
51A8000
heap
page read and write
962E000
stack
page read and write
CF0000
trusted library allocation
page execute and read and write
2CEC000
trusted library allocation
page read and write
267E000
stack
page read and write
39B8000
trusted library allocation
page read and write
D42000
heap
page read and write
27C0000
heap
page read and write
BF0000
heap
page read and write
A2A000
heap
page read and write
2971000
trusted library allocation
page execute and read and write
E86000
trusted library allocation
page execute and read and write
2DA9000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
C94000
trusted library allocation
page read and write
6A7A000
trusted library allocation
page read and write
4D4E000
trusted library allocation
page read and write
7D0000
heap
page read and write
A90000
heap
page read and write
37D1000
trusted library allocation
page read and write
4CD1000
trusted library allocation
page read and write
C70000
heap
page read and write
6A0C000
stack
page read and write
5093000
heap
page execute and read and write
6790000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
A95000
heap
page read and write
2D99000
trusted library allocation
page read and write
5090000
heap
page execute and read and write
2D55000
trusted library allocation
page read and write
649C000
stack
page read and write
6760000
trusted library allocation
page execute and read and write
9190000
heap
page read and write
6C6A000
trusted library allocation
page read and write
D34000
heap
page read and write
9017000
heap
page read and write
62D0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
972E000
stack
page read and write
6C65000
trusted library allocation
page read and write
7FBA0000
trusted library allocation
page execute and read and write
2D42000
trusted library allocation
page read and write
F40000
trusted library allocation
page execute and read and write
D26000
heap
page read and write
400000
remote allocation
page execute and read and write
2906000
trusted library allocation
page read and write
6A62000
trusted library allocation
page read and write
CA6000
trusted library allocation
page read and write
5230000
heap
page read and write
2940000
heap
page read and write
27EE000
stack
page read and write
8FAC000
heap
page read and write
28F0000
heap
page execute and read and write
D1D000
heap
page read and write
4E90000
heap
page read and write
D00000
heap
page read and write
67C0000
trusted library allocation
page read and write
51F8000
heap
page read and write
CA0000
trusted library allocation
page read and write
2D4B000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
666B000
trusted library allocation
page read and write
6B74000
trusted library allocation
page read and write
64C0000
trusted library allocation
page execute and read and write
2780000
heap
page read and write
4CDD000
trusted library allocation
page read and write
2D7B000
trusted library allocation
page read and write
F60000
heap
page read and write
6B20000
trusted library allocation
page execute and read and write
BE0000
trusted library allocation
page read and write
75C000
stack
page read and write
543E000
stack
page read and write
E80000
trusted library allocation
page read and write
E92000
trusted library allocation
page read and write
EFE000
stack
page read and write
5212000
heap
page read and write
507E000
stack
page read and write
E8A000
trusted library allocation
page execute and read and write
9072000
heap
page read and write
F67000
heap
page read and write
6A8A000
trusted library allocation
page read and write
8F63000
heap
page read and write
E6F000
stack
page read and write
665E000
stack
page read and write
496C000
stack
page read and write
4E50000
trusted library allocation
page execute and read and write
986E000
stack
page read and write
2D94000
trusted library allocation
page read and write
5F0000
heap
page read and write
2A12000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
A6E000
stack
page read and write
D4E000
heap
page read and write
95ED000
stack
page read and write
66A0000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
37DF000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
68CC000
stack
page read and write
67B0000
trusted library allocation
page execute and read and write
D5E000
heap
page read and write
432000
remote allocation
page execute and read and write
27B0000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
FFF000
stack
page read and write
C93000
trusted library allocation
page execute and read and write
EFF000
stack
page read and write
6140000
trusted library allocation
page read and write
2902000
trusted library allocation
page read and write
92CB000
stack
page read and write
4D10000
trusted library allocation
page read and write
C7B000
heap
page read and write
5440000
trusted library allocation
page read and write
6750000
trusted library allocation
page execute and read and write
603E000
stack
page read and write
6AA8000
trusted library allocation
page read and write
8F99000
heap
page read and write
5A26000
heap
page read and write
8FCC000
heap
page read and write
28EE000
stack
page read and write
6A65000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
918E000
stack
page read and write
8F8D000
heap
page read and write
8F50000
heap
page read and write
668E000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
4CBB000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
51E2000
heap
page read and write
62E5000
trusted library allocation
page read and write
A25000
heap
page read and write
2D8D000
trusted library allocation
page read and write
4B0D000
stack
page read and write
8F7000
stack
page read and write
613E000
stack
page read and write
6676000
trusted library allocation
page read and write
51B0000
heap
page read and write
8F53000
heap
page read and write
A8D000
trusted library allocation
page execute and read and write
27D1000
trusted library allocation
page read and write
9300000
heap
page read and write
66C0000
trusted library allocation
page execute and read and write
8540000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
A83000
trusted library allocation
page execute and read and write
C8E000
stack
page read and write
6150000
trusted library allocation
page read and write
58A000
stack
page read and write
64A0000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
D2C000
heap
page read and write
3971000
trusted library allocation
page read and write
3913000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
E95000
trusted library allocation
page execute and read and write
4E50000
trusted library allocation
page read and write
8F77000
heap
page read and write
4D80000
heap
page read and write
E90000
trusted library allocation
page read and write
6682000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2A08000
trusted library allocation
page read and write
639A000
stack
page read and write
5A12000
heap
page read and write
5448000
trusted library allocation
page read and write
6B00000
trusted library allocation
page execute and read and write
4DA2000
trusted library allocation
page read and write
6A85000
trusted library allocation
page read and write
6B1D000
trusted library allocation
page read and write
6BB9000
trusted library allocation
page read and write
5C3E000
stack
page read and write
2A34000
trusted library allocation
page read and write
3950000
trusted library allocation
page read and write
2A0E000
trusted library allocation
page read and write
277E000
stack
page read and write
9050000
heap
page read and write
2DE4000
trusted library allocation
page read and write
655E000
stack
page read and write
5C7E000
stack
page read and write
29F8000
trusted library allocation
page read and write
D51000
heap
page read and write
5269000
heap
page read and write
C3E000
stack
page read and write
672000
unkown
page readonly
2D12000
trusted library allocation
page read and write
8F59000
heap
page read and write
2A32000
trusted library allocation
page read and write
91A0000
heap
page read and write
8750000
trusted library allocation
page read and write
976E000
stack
page read and write
4CCE000
trusted library allocation
page read and write
2A23000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
9D0000
heap
page read and write
6A30000
trusted library allocation
page read and write
AF8000
stack
page read and write
4DA0000
trusted library allocation
page read and write
293D000
stack
page read and write
51A0000
heap
page read and write
2960000
heap
page read and write
4D40000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
6A37000
trusted library allocation
page read and write
62E8000
trusted library allocation
page read and write
CA8000
heap
page read and write
D08000
heap
page read and write
6A78000
trusted library allocation
page read and write
651C000
stack
page read and write
There are 320 hidden memdumps, click here to show them.