IOC Report
http://hans.uniformeslaamistad.com/yuop/66e6ea133c92f_crypted.exe#xin

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\66e6ea133c92f_crypted.exe (copy)
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Downloads\Unconfirmed 929433.crdownload
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
Chrome Cache Entry: 62
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\66e6ea133c92f_crypted.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 21:49:52 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 21:49:52 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:56:51 2023, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 21:49:52 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 21:49:52 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 21:49:52 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Downloads\66e6ea133c92f_crypted.exe
"C:\Users\user\Downloads\66e6ea133c92f_crypted.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=2112,i,2653958895561753599,15018511285306853254,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://hans.uniformeslaamistad.com/yuop/66e6ea133c92f_crypted.exe#xin"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5556 --field-trial-handle=2112,i,2653958895561753599,15018511285306853254,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://hans.uniformeslaamistad.com/yuop/66e6ea133c92f_crypted.exe#xin
malicious
http://hans.uniformeslaamistad.com/yuop/66e6ea133c92f_crypted.exe
147.45.44.104
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Domains

Name
IP
Malicious
s-part-0036.t-0009.t-msedge.net
13.107.246.64
www.google.com
142.250.185.164
hans.uniformeslaamistad.com
147.45.44.104

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.250.185.164
www.google.com
United States
147.45.44.104
hans.uniformeslaamistad.com
Russian Federation
192.168.2.9
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
4105000
trusted library allocation
page read and write
malicious
33DD000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
2E1F000
stack
page read and write
33B3000
trusted library allocation
page read and write
1430000
heap
page read and write
11C8000
heap
page read and write
3140000
trusted library allocation
page execute and read and write
335E000
trusted library allocation
page read and write
1190000
heap
page read and write
FD0000
heap
page read and write
332A000
trusted library allocation
page read and write
12F7000
stack
page read and write
338A000
trusted library allocation
page read and write
30EE000
stack
page read and write
33DF000
trusted library allocation
page read and write
30F0000
heap
page execute and read and write
FA0000
heap
page read and write
5810000
heap
page read and write
1380000
heap
page read and write
75DE000
stack
page read and write
56B0000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
7982000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
1414000
trusted library allocation
page read and write
5B52000
heap
page read and write
58F0000
heap
page read and write
3337000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
103C000
stack
page read and write
568D000
trusted library allocation
page read and write
589B000
stack
page read and write
113A000
stack
page read and write
3390000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
133E000
stack
page read and write
33F2000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
2F76000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page read and write
2F5E000
stack
page read and write
13F0000
heap
page read and write
33CD000
trusted library allocation
page read and write
D88000
unkown
page readonly
3103000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
566E000
trusted library allocation
page read and write
567E000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
3360000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
2E5E000
stack
page read and write
330D000
trusted library allocation
page read and write
7D9E000
stack
page read and write
73BF000
heap
page read and write
5740000
trusted library allocation
page execute and read and write
3394000
trusted library allocation
page read and write
11F5000
heap
page read and write
1203000
heap
page read and write
2F70000
trusted library allocation
page read and write
5813000
heap
page read and write
334B000
trusted library allocation
page read and write
1730000
heap
page read and write
33A5000
trusted library allocation
page read and write
58C0000
heap
page read and write
330F000
trusted library allocation
page read and write
2EF0000
heap
page execute and read and write
2F80000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
14A2000
heap
page read and write
58A0000
trusted library section
page readonly
3101000
trusted library allocation
page execute and read and write
2F72000
trusted library allocation
page read and write
11E8000
heap
page read and write
3311000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
74DE000
stack
page read and write
338E000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
5B1D000
stack
page read and write
5910000
trusted library allocation
page read and write
323C000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
D32000
unkown
page readonly
33B1000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
332E000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page execute and read and write
1160000
heap
page read and write
2FEE000
stack
page read and write
330B000
trusted library allocation
page read and write
1723000
trusted library allocation
page execute and read and write
1491000
heap
page read and write
14AE000
heap
page read and write
531C000
stack
page read and write
3160000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
33AD000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
5B30000
heap
page read and write
56D0000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
58D0000
heap
page read and write
4181000
trusted library allocation
page read and write
58B0000
heap
page read and write
5750000
trusted library allocation
page read and write
73E5000
heap
page read and write
5920000
heap
page execute and read and write
5730000
heap
page read and write
D30000
unkown
page readonly
73B5000
heap
page read and write
2F87000
trusted library allocation
page execute and read and write
761E000
stack
page read and write
56BF000
trusted library allocation
page read and write
7E9E000
stack
page read and write
2E9E000
stack
page read and write
13CE000
stack
page read and write
11A0000
heap
page read and write
5DC0000
trusted library allocation
page execute and read and write
11ED000
heap
page read and write
5840000
trusted library allocation
page execute and read and write
33C4000
trusted library allocation
page read and write
13F3000
heap
page read and write
33F6000
trusted library allocation
page read and write
11CE000
heap
page read and write
14B8000
heap
page read and write
3373000
trusted library allocation
page read and write
137E000
stack
page read and write
1737000
heap
page read and write
2EE0000
trusted library allocation
page execute and read and write
56F0000
trusted library allocation
page read and write
771E000
stack
page read and write
58B5000
heap
page read and write
2F6D000
trusted library allocation
page execute and read and write
3335000
trusted library allocation
page read and write
2FBE000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
2FF0000
heap
page read and write
3315000
trusted library allocation
page read and write
1740000
heap
page read and write
2FE5000
trusted library allocation
page read and write
338C000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
2F82000
trusted library allocation
page read and write
13CB000
heap
page read and write
1413000
trusted library allocation
page execute and read and write
3332000
trusted library allocation
page read and write
14B5000
heap
page read and write
32E3000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
11C0000
heap
page read and write
13C0000
heap
page read and write
5B55000
heap
page read and write
340F000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3349000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
332C000
trusted library allocation
page read and write
5800000
trusted library allocation
page execute and read and write
3364000
trusted library allocation
page read and write
33E5000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
2E37000
trusted library allocation
page execute and read and write
3217000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
FD5000
heap
page read and write
73AD000
heap
page read and write
785E000
stack
page read and write
3328000
trusted library allocation
page read and write
456000
remote allocation
page execute and read and write
F39000
stack
page read and write
3313000
trusted library allocation
page read and write
3170000
heap
page read and write
2EDD000
stack
page read and write
334D000
trusted library allocation
page read and write
51FD000
stack
page read and write
324C000
trusted library allocation
page read and write
153F000
stack
page read and write
33F8000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
140F000
heap
page read and write
73C3000
heap
page read and write
4101000
trusted library allocation
page read and write
73D1000
heap
page read and write
3367000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
146B000
heap
page read and write
3397000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
33A7000
trusted library allocation
page read and write
172D000
trusted library allocation
page execute and read and write
1453000
heap
page read and write
1720000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
145B000
heap
page read and write
3384000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
5B20000
heap
page read and write
775E000
stack
page read and write
3324000
trusted library allocation
page read and write
3392000
trusted library allocation
page read and write
73CA000
heap
page read and write
13FF000
heap
page read and write
30FF000
stack
page read and write
2D1E000
stack
page read and write
14A6000
heap
page read and write
5550000
trusted library allocation
page read and write
5CA0000
heap
page read and write
3150000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
73A0000
heap
page read and write
2F7A000
trusted library allocation
page execute and read and write
5540000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
5546000
trusted library allocation
page read and write
14AA000
heap
page read and write
FB0000
heap
page read and write
2F8B000
trusted library allocation
page execute and read and write
313B000
stack
page read and write
566B000
trusted library allocation
page read and write
73DA000
heap
page read and write
1424000
trusted library allocation
page read and write
1724000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
There are 231 hidden memdumps, click here to show them.