IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:30 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpFFB9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpFFCA.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
5.42.65.50:33080
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.50
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
2A88000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
B17000
unkown
page read and write
malicious
29E1000
trusted library allocation
page read and write
malicious
3D7C000
trusted library allocation
page read and write
6B33000
trusted library allocation
page read and write
CF0000
heap
page read and write
2C9C000
trusted library allocation
page read and write
752F000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
D46000
trusted library allocation
page execute and read and write
FE0000
trusted library allocation
page read and write
5BE2000
heap
page read and write
541F000
heap
page read and write
63B0000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
7229000
heap
page read and write
1020000
trusted library allocation
page execute and read and write
6640000
trusted library allocation
page read and write
4FF0000
heap
page read and write
72D9000
heap
page read and write
2EE0000
trusted library allocation
page read and write
720D000
heap
page read and write
5120000
heap
page read and write
75FF000
stack
page read and write
6B00000
trusted library allocation
page read and write
D42000
trusted library allocation
page read and write
E60000
heap
page read and write
7518000
trusted library allocation
page read and write
5471000
heap
page read and write
91FE000
stack
page read and write
CBD000
stack
page read and write
A51000
unkown
page execute read
752A000
trusted library allocation
page read and write
7296000
heap
page read and write
6820000
heap
page execute and read and write
6600000
trusted library allocation
page read and write
A50000
unkown
page readonly
2B30000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
79DE000
stack
page read and write
7509000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
7BBE000
stack
page read and write
6460000
trusted library allocation
page execute and read and write
B72000
unkown
page write copy
7244000
heap
page read and write
7EA000
stack
page read and write
767E000
stack
page read and write
D84000
heap
page read and write
6540000
trusted library allocation
page read and write
4FBE000
trusted library allocation
page read and write
7540000
trusted library allocation
page execute and read and write
6570000
trusted library allocation
page read and write
6592000
trusted library allocation
page read and write
72D7000
heap
page read and write
4FB0000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
72FC000
heap
page read and write
2B1E000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
119F000
stack
page read and write
614E000
stack
page read and write
69BC000
stack
page read and write
659E000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
6670000
trusted library allocation
page execute and read and write
6530000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
B77000
unkown
page readonly
7B1F000
stack
page read and write
7B5B000
stack
page read and write
4F3D000
trusted library allocation
page read and write
516E000
stack
page read and write
6610000
trusted library allocation
page read and write
3C72000
trusted library allocation
page read and write
543A000
heap
page read and write
3ABD000
trusted library allocation
page read and write
5E4E000
stack
page read and write
B50000
heap
page read and write
446000
remote allocation
page execute and read and write
6810000
trusted library allocation
page read and write
72B2000
heap
page read and write
A50000
unkown
page readonly
B79000
unkown
page readonly
7F2D0000
trusted library allocation
page execute and read and write
53A2000
heap
page read and write
E6E000
heap
page read and write
D40000
trusted library allocation
page read and write
CE0000
heap
page read and write
E47000
heap
page read and write
AFB000
unkown
page execute read
6390000
trusted library allocation
page read and write
FEB000
trusted library allocation
page execute and read and write
7CEE000
stack
page read and write
2870000
heap
page read and write
5D0E000
stack
page read and write
4F63000
heap
page read and write
6B36000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
6545000
trusted library allocation
page read and write
39E1000
trusted library allocation
page read and write
6586000
trusted library allocation
page read and write
2BDE000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
5397000
heap
page read and write
6538000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
3AB8000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
B5A000
unkown
page read and write
2BB6000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
4ABC000
stack
page read and write
72ED000
heap
page read and write
721D000
heap
page read and write
28D0000
heap
page execute and read and write
72E5000
heap
page read and write
39EF000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
5E8E000
stack
page read and write
A5B000
unkown
page execute read
5453000
heap
page read and write
6870000
trusted library allocation
page execute and read and write
4F00000
trusted library allocation
page read and write
D91000
heap
page read and write
3B2F000
trusted library allocation
page read and write
66C0000
trusted library allocation
page execute and read and write
6B80000
trusted library allocation
page read and write
FE2000
trusted library allocation
page read and write
5477000
heap
page read and write
65F0000
trusted library allocation
page read and write
B63000
unkown
page execute and read and write
4F36000
trusted library allocation
page read and write
7212000
heap
page read and write
65D0000
trusted library allocation
page read and write
1000000
heap
page read and write
4F1E000
trusted library allocation
page read and write
76BE000
stack
page read and write
E21000
heap
page read and write
4F10000
trusted library allocation
page read and write
751F000
trusted library allocation
page read and write
6B88000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
B17000
unkown
page write copy
8300000
heap
page read and write
2BC9000
trusted library allocation
page read and write
722F000
heap
page read and write
C40000
heap
page read and write
7530000
trusted library allocation
page read and write
DEB000
heap
page read and write
4BBB000
stack
page read and write
6660000
trusted library allocation
page execute and read and write
65E0000
trusted library allocation
page read and write
7231000
heap
page read and write
799E000
stack
page read and write
D5B000
heap
page read and write
2B59000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
7505000
trusted library allocation
page read and write
727E000
heap
page read and write
6AFC000
stack
page read and write
28C0000
trusted library allocation
page read and write
7200000
heap
page read and write
284E000
stack
page read and write
B03000
unkown
page readonly
3AC4000
trusted library allocation
page read and write
725C000
heap
page read and write
537E000
stack
page read and write
432000
remote allocation
page execute and read and write
65B0000
trusted library allocation
page read and write
2ED8000
trusted library allocation
page read and write
3B72000
trusted library allocation
page read and write
B03000
unkown
page readonly
2C1D000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
511E000
stack
page read and write
7502000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
FE5000
trusted library allocation
page execute and read and write
547E000
heap
page read and write
6547000
trusted library allocation
page read and write
A51000
unkown
page execute read
437000
remote allocation
page execute and read and write
109E000
stack
page read and write
3AFE000
trusted library allocation
page read and write
53AD000
heap
page read and write
A5B000
unkown
page execute read
4F42000
trusted library allocation
page read and write
624F000
stack
page read and write
1009000
heap
page read and write
7610000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
7BE0000
heap
page read and write
D3D000
trusted library allocation
page execute and read and write
1030000
heap
page read and write
7400000
heap
page read and write
5180000
heap
page execute and read and write
6535000
trusted library allocation
page read and write
BBD000
stack
page read and write
72CD000
heap
page read and write
28BE000
stack
page read and write
5002000
trusted library allocation
page read and write
2BA4000
trusted library allocation
page read and write
628E000
stack
page read and write
657B000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
72DD000
heap
page read and write
2BBE000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
FE7000
trusted library allocation
page execute and read and write
3A02000
trusted library allocation
page read and write
5BCF000
stack
page read and write
541C000
heap
page read and write
7377000
heap
page read and write
29DE000
stack
page read and write
4F14000
trusted library allocation
page read and write
4F60000
heap
page read and write
C45000
heap
page read and write
D70000
heap
page read and write
7319000
heap
page read and write
A5F000
unkown
page execute read
6B02000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
65CB000
trusted library allocation
page read and write
6549000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
B4B000
unkown
page read and write
6650000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
B77000
unkown
page readonly
2B3F000
trusted library allocation
page read and write
AF7000
stack
page read and write
4F2E000
trusted library allocation
page read and write
E6A000
heap
page read and write
2B24000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
49E8000
trusted library allocation
page read and write
7630000
trusted library allocation
page execute and read and write
5183000
heap
page execute and read and write
5380000
heap
page read and write
1005000
heap
page read and write
6B74000
trusted library allocation
page read and write
53C8000
heap
page read and write
AFB000
unkown
page execute read
7BD0000
trusted library allocation
page read and write
5010000
trusted library allocation
page execute and read and write
274E000
stack
page read and write
7410000
heap
page read and write
5BF3000
heap
page read and write
68BC000
stack
page read and write
1230000
heap
page read and write
2850000
heap
page read and write
7285000
heap
page read and write
6B40000
trusted library allocation
page execute and read and write
5500000
heap
page read and write
7A1E000
stack
page read and write
638E000
stack
page read and write
6440000
trusted library allocation
page execute and read and write
2B4B000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
545D000
heap
page read and write
D3E000
stack
page read and write
4F70000
trusted library allocation
page read and write
D4A000
trusted library allocation
page execute and read and write
100E000
heap
page read and write
6B30000
trusted library allocation
page read and write
D50000
heap
page read and write
A5F000
unkown
page execute read
3AD6000
trusted library allocation
page read and write
4F1B000
trusted library allocation
page read and write
65CE000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
7223000
heap
page read and write
2CDB000
trusted library allocation
page read and write
C30000
heap
page read and write
69FD000
stack
page read and write
7525000
trusted library allocation
page read and write
65A1000
trusted library allocation
page read and write
B72000
unkown
page read and write
76C0000
trusted library allocation
page execute and read and write
D20000
trusted library allocation
page read and write
65C5000
trusted library allocation
page read and write
B79000
unkown
page readonly
7500000
trusted library allocation
page read and write
66D0000
trusted library allocation
page execute and read and write
6581000
trusted library allocation
page read and write
CAE000
stack
page read and write
2BD7000
trusted library allocation
page read and write
D24000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
653A000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
7206000
heap
page read and write
751A000
trusted library allocation
page read and write
5BF8000
heap
page read and write
5E0F000
stack
page read and write
75BD000
stack
page read and write
7253000
heap
page read and write
2BB3000
trusted library allocation
page read and write
CEE000
stack
page read and write
65C0000
trusted library allocation
page read and write
6398000
trusted library allocation
page read and write
543D000
heap
page read and write
7262000
heap
page read and write
5391000
heap
page read and write
105F000
stack
page read and write
6850000
trusted library allocation
page execute and read and write
DEF000
heap
page read and write
D23000
trusted library allocation
page execute and read and write
There are 310 hidden memdumps, click here to show them.