IOC Report
W8Q1QyZc1j.exe

loading gif

Files

File Path
Type
Category
Malicious
W8Q1QyZc1j.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:29 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\W8Q1QyZc1j.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp5127.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp5138.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\W8Q1QyZc1j.exe
"C:\Users\user\Desktop\W8Q1QyZc1j.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
28F8000
trusted library allocation
page read and write
malicious
402000
unkown
page readonly
malicious
63CE000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
400000
unkown
page readonly
860000
heap
page read and write
63AB000
trusted library allocation
page read and write
B72000
trusted library allocation
page read and write
9E0000
heap
page read and write
BA0000
trusted library allocation
page execute and read and write
6480000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
7514000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
26B4000
trusted library allocation
page read and write
5E7000
stack
page read and write
635A000
heap
page read and write
64A0000
trusted library allocation
page execute and read and write
3879000
trusted library allocation
page read and write
2740000
heap
page read and write
293D000
trusted library allocation
page read and write
938000
heap
page read and write
723A000
heap
page read and write
2A62000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
92E000
heap
page read and write
71EA000
heap
page read and write
725A000
heap
page read and write
7440000
trusted library allocation
page read and write
2B1E000
trusted library allocation
page read and write
8DFE000
stack
page read and write
2E07000
trusted library allocation
page read and write
BD0000
heap
page read and write
A15000
heap
page read and write
6500000
trusted library allocation
page execute and read and write
B90000
trusted library allocation
page read and write
2715000
trusted library allocation
page read and write
7425000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
5EE0000
heap
page read and write
625E000
stack
page read and write
6490000
trusted library allocation
page execute and read and write
4CD0000
heap
page read and write
520E000
stack
page read and write
2DE0000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
63D1000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
4E03000
heap
page read and write
26F0000
trusted library allocation
page read and write
6990000
trusted library allocation
page read and write
7540000
trusted library allocation
page execute and read and write
2700000
trusted library allocation
page read and write
72C2000
heap
page read and write
723F000
heap
page read and write
63FB000
trusted library allocation
page read and write
6355000
heap
page read and write
727C000
heap
page read and write
2AC6000
trusted library allocation
page read and write
26B0000
trusted library allocation
page read and write
7402000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
5C2E000
stack
page read and write
2B51000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
9FB000
heap
page read and write
B7B000
trusted library allocation
page execute and read and write
6307000
heap
page read and write
66DC000
stack
page read and write
6470000
trusted library allocation
page read and write
63C2000
trusted library allocation
page read and write
635E000
heap
page read and write
B43000
trusted library allocation
page execute and read and write
388C000
trusted library allocation
page read and write
50F8000
heap
page read and write
AF0000
heap
page read and write
2B2E000
trusted library allocation
page read and write
71E0000
heap
page read and write
7235000
heap
page read and write
71FC000
heap
page read and write
697C000
trusted library allocation
page read and write
B5D000
trusted library allocation
page execute and read and write
B4D000
trusted library allocation
page execute and read and write
B60000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
2710000
trusted library allocation
page read and write
632B000
heap
page read and write
B10000
heap
page read and write
963000
heap
page read and write
2DFA000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
64F0000
trusted library allocation
page execute and read and write
3C2F000
trusted library allocation
page read and write
B75000
trusted library allocation
page execute and read and write
69A0000
trusted library allocation
page execute and read and write
50E1000
heap
page read and write
25C0000
trusted library allocation
page read and write
67DC000
stack
page read and write
5D6E000
stack
page read and write
3885000
trusted library allocation
page read and write
50F3000
heap
page read and write
93F000
heap
page read and write
4CE2000
trusted library allocation
page read and write
70E0000
heap
page read and write
691C000
stack
page read and write
6360000
trusted library allocation
page read and write
722C000
heap
page read and write
DDE000
stack
page read and write
538E000
stack
page read and write
2A08000
trusted library allocation
page read and write
63FE000
trusted library allocation
page read and write
75AC000
stack
page read and write
530E000
stack
page read and write
3851000
trusted library allocation
page read and write
2A5C000
trusted library allocation
page read and write
2B99000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
6670000
trusted library allocation
page execute and read and write
7214000
heap
page read and write
7430000
trusted library allocation
page read and write
928000
heap
page read and write
6335000
heap
page read and write
50CE000
stack
page read and write
9DD000
heap
page read and write
7206000
heap
page read and write
2A5F000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
494C000
stack
page read and write
B66000
trusted library allocation
page execute and read and write
4ED0000
heap
page execute and read and write
6620000
trusted library allocation
page read and write
B44000
trusted library allocation
page read and write
5F00000
trusted library allocation
page execute and read and write
270E000
trusted library allocation
page read and write
2660000
heap
page execute and read and write
6368000
trusted library allocation
page read and write
681E000
stack
page read and write
6992000
trusted library allocation
page read and write
7313000
heap
page read and write
7434000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
385F000
trusted library allocation
page read and write
26D1000
trusted library allocation
page read and write
60EE000
stack
page read and write
437000
unkown
page readonly
742A000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
697A000
trusted library allocation
page read and write
70DD000
stack
page read and write
3880000
trusted library allocation
page read and write
6379000
trusted library allocation
page read and write
2A83000
trusted library allocation
page read and write
630D000
heap
page read and write
7FC50000
trusted library allocation
page execute and read and write
75B0000
trusted library allocation
page read and write
63F5000
trusted library allocation
page read and write
6377000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
6260000
heap
page read and write
7289000
heap
page read and write
947000
heap
page read and write
2AEF000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
CDF000
stack
page read and write
26CE000
trusted library allocation
page read and write
4E00000
heap
page read and write
2DEE000
trusted library allocation
page read and write
695E000
stack
page read and write
7510000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page execute and read and write
534E000
stack
page read and write
870000
heap
page read and write
63B6000
trusted library allocation
page read and write
26DD000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page read and write
62BB000
heap
page read and write
2A13000
trusted library allocation
page read and write
850000
heap
page read and write
7409000
trusted library allocation
page read and write
82FD000
stack
page read and write
7244000
heap
page read and write
26E2000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
A19000
heap
page read and write
4EBE000
stack
page read and write
7550000
trusted library allocation
page execute and read and write
7273000
heap
page read and write
B16000
heap
page read and write
B1E000
heap
page read and write
446000
unkown
page readonly
2BB8000
trusted library allocation
page read and write
B19000
heap
page read and write
B6A000
trusted library allocation
page execute and read and write
728F000
heap
page read and write
782E000
stack
page read and write
7418000
trusted library allocation
page read and write
26AC000
stack
page read and write
B77000
trusted library allocation
page execute and read and write
63B1000
trusted library allocation
page read and write
741F000
trusted library allocation
page read and write
6365000
trusted library allocation
page read and write
5FEE000
stack
page read and write
2720000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
8BE000
stack
page read and write
71F5000
heap
page read and write
920000
heap
page read and write
634B000
heap
page read and write
7448000
trusted library allocation
page read and write
62A6000
heap
page read and write
7400000
trusted library allocation
page read and write
4C9E000
trusted library allocation
page read and write
3893000
trusted library allocation
page read and write
3A7D000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
69B0000
trusted library allocation
page execute and read and write
432000
unkown
page readonly
B70000
trusted library allocation
page read and write
B62000
trusted library allocation
page read and write
6274000
heap
page read and write
63E0000
trusted library allocation
page read and write
750E000
stack
page read and write
4D10000
heap
page read and write
741A000
trusted library allocation
page read and write
7268000
heap
page read and write
38D3000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
5D2E000
stack
page read and write
8FE000
stack
page read and write
7860000
heap
page read and write
615D000
stack
page read and write
62E7000
heap
page read and write
4EC8000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
5E6F000
stack
page read and write
298C000
trusted library allocation
page read and write
7405000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
726B000
heap
page read and write
4DF0000
trusted library allocation
page read and write
74CE000
stack
page read and write
725D000
heap
page read and write
284E000
stack
page read and write
6351000
heap
page read and write
9CD000
heap
page read and write
4CF0000
trusted library allocation
page execute and read and write
2AC3000
trusted library allocation
page read and write
742F000
trusted library allocation
page read and write
26BB000
trusted library allocation
page read and write
6690000
trusted library allocation
page execute and read and write
9E9000
heap
page read and write
636A000
trusted library allocation
page read and write
865000
heap
page read and write
6375000
trusted library allocation
page read and write
6430000
trusted library allocation
page read and write
25C8000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
2935000
trusted library allocation
page read and write
72D2000
heap
page read and write
7218000
heap
page read and write
2A50000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
26D6000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
388F000
trusted library allocation
page read and write
6410000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
4EA000
stack
page read and write
25BE000
stack
page read and write
6640000
trusted library allocation
page read and write
There are 274 hidden memdumps, click here to show them.