IOC Report
o8uKhd6peZ.exe

loading gif

Files

File Path
Type
Category
Malicious
o8uKhd6peZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:52 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\o8uKhd6peZ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpFD55.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpFD66.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\o8uKhd6peZ.exe
"C:\Users\user\Desktop\o8uKhd6peZ.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
D62000
unkown
page readonly
malicious
3158000
trusted library allocation
page read and write
malicious
7B1F000
heap
page read and write
6E10000
trusted library allocation
page read and write
7A93000
heap
page read and write
3361000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page execute and read and write
2E53000
trusted library allocation
page execute and read and write
42F5000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
7A80000
heap
page read and write
6E95000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
6E05000
trusted library allocation
page read and write
1157000
stack
page read and write
2E70000
trusted library allocation
page read and write
3329000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
7AB0000
heap
page read and write
7DE0000
trusted library allocation
page read and write
30A0000
heap
page read and write
34EF000
trusted library allocation
page read and write
5B9E000
stack
page read and write
7D99000
trusted library allocation
page read and write
DA6000
unkown
page readonly
34F3000
trusted library allocation
page read and write
1404000
heap
page read and write
3744000
trusted library allocation
page read and write
2FEF000
stack
page read and write
5660000
trusted library allocation
page execute and read and write
2E72000
trusted library allocation
page read and write
5840000
heap
page read and write
11F5000
heap
page read and write
56CE000
stack
page read and write
7AEE000
heap
page read and write
5BDE000
stack
page read and write
55C2000
trusted library allocation
page read and write
7B69000
heap
page read and write
5818000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
907D000
stack
page read and write
11F0000
heap
page read and write
55FE000
trusted library allocation
page read and write
2E76000
trusted library allocation
page execute and read and write
344D000
trusted library allocation
page read and write
6AAE000
heap
page read and write
63BF000
stack
page read and write
34E6000
trusted library allocation
page read and write
6A92000
heap
page read and write
D97000
unkown
page readonly
7D80000
trusted library allocation
page read and write
55B6000
trusted library allocation
page read and write
6CFD000
stack
page read and write
7DA8000
trusted library allocation
page read and write
7AD6000
heap
page read and write
5820000
trusted library allocation
page read and write
4286000
trusted library allocation
page read and write
1347000
heap
page read and write
7AF9000
heap
page read and write
6E40000
trusted library allocation
page read and write
6E71000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
7B1D000
heap
page read and write
132E000
heap
page read and write
73C3000
trusted library allocation
page read and write
105A000
stack
page read and write
331F000
trusted library allocation
page read and write
7AE7000
heap
page read and write
69B9000
heap
page read and write
3240000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
61EA000
heap
page read and write
334F000
trusted library allocation
page read and write
693E000
stack
page read and write
6A9C000
heap
page read and write
3316000
trusted library allocation
page read and write
2E8B000
trusted library allocation
page execute and read and write
7130000
trusted library allocation
page execute and read and write
3327000
trusted library allocation
page read and write
7D92000
trusted library allocation
page read and write
6F90000
trusted library allocation
page execute and read and write
2E80000
trusted library allocation
page read and write
55B1000
trusted library allocation
page read and write
7C90000
heap
page read and write
7A8D000
heap
page read and write
70D0000
trusted library allocation
page read and write
524C000
stack
page read and write
3356000
trusted library allocation
page read and write
825E000
stack
page read and write
5653000
heap
page read and write
7B36000
heap
page read and write
3000000
heap
page execute and read and write
33F2000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
3754000
trusted library allocation
page read and write
7DE8000
trusted library allocation
page read and write
6E15000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
69A0000
trusted library allocation
page execute and read and write
5594000
trusted library allocation
page read and write
2E82000
trusted library allocation
page read and write
6E0A000
trusted library allocation
page read and write
1820000
heap
page read and write
55AE000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
3726000
trusted library allocation
page read and write
34DE000
trusted library allocation
page read and write
66FF000
stack
page read and write
7E6E000
stack
page read and write
7EC0000
trusted library allocation
page execute and read and write
11B0000
heap
page read and write
3289000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page execute and read and write
6A81000
heap
page read and write
40B1000
trusted library allocation
page read and write
6E19000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
69D0000
heap
page read and write
2E6D000
trusted library allocation
page execute and read and write
41D3000
trusted library allocation
page read and write
2E85000
trusted library allocation
page execute and read and write
440E000
trusted library allocation
page read and write
6A8C000
heap
page read and write
85A0000
heap
page read and write
8B80000
heap
page read and write
7B46000
heap
page read and write
61D1000
heap
page read and write
7B18000
heap
page read and write
6A5B000
heap
page read and write
337E000
trusted library allocation
page read and write
7ADC000
heap
page read and write
370F000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page execute and read and write
559B000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
3060000
trusted library allocation
page read and write
7DAA000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
69C3000
heap
page read and write
6E80000
trusted library allocation
page read and write
7EAF000
stack
page read and write
6E90000
trusted library allocation
page read and write
304B000
stack
page read and write
7DBA000
trusted library allocation
page read and write
7C80000
heap
page read and write
7EFE0000
trusted library allocation
page execute and read and write
130E000
stack
page read and write
85F0000
trusted library allocation
page read and write
165E000
stack
page read and write
56F0000
heap
page read and write
2E60000
trusted library allocation
page read and write
55BD000
trusted library allocation
page read and write
7DD4000
trusted library allocation
page read and write
7B7F000
heap
page read and write
683E000
stack
page read and write
6E4B000
trusted library allocation
page read and write
D92000
unkown
page readonly
9B7E000
stack
page read and write
597E000
stack
page read and write
1406000
heap
page read and write
6990000
trusted library allocation
page execute and read and write
3342000
trusted library allocation
page read and write
372D000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
69B0000
heap
page read and write
13B7000
heap
page read and write
3368000
trusted library allocation
page read and write
3512000
trusted library allocation
page read and write
851E000
stack
page read and write
6F40000
trusted library allocation
page execute and read and write
6E51000
trusted library allocation
page read and write
841E000
stack
page read and write
3095000
trusted library allocation
page read and write
717C000
stack
page read and write
329A000
trusted library allocation
page read and write
7D95000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
6E56000
trusted library allocation
page read and write
3719000
trusted library allocation
page read and write
50B8000
trusted library allocation
page read and write
5A9E000
stack
page read and write
7B00000
heap
page read and write
5650000
heap
page read and write
42B6000
trusted library allocation
page read and write
7B65000
heap
page read and write
8575000
trusted library allocation
page read and write
1826000
heap
page read and write
5990000
heap
page execute and read and write
7AA1000
heap
page read and write
378F000
trusted library allocation
page read and write
7110000
trusted library allocation
page execute and read and write
2FF0000
trusted library allocation
page execute and read and write
2E40000
trusted library allocation
page read and write
6A62000
heap
page read and write
6AAB000
heap
page read and write
7AC0000
heap
page read and write
72BE000
stack
page read and write
5590000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
7B05000
heap
page read and write
323A000
trusted library allocation
page read and write
2EEE000
stack
page read and write
6E9B000
trusted library allocation
page read and write
3372000
trusted library allocation
page read and write
1320000
heap
page read and write
3050000
trusted library allocation
page read and write
D60000
unkown
page readonly
3080000
trusted library allocation
page read and write
3749000
trusted library allocation
page read and write
155E000
stack
page read and write
6DFE000
stack
page read and write
7D86000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
7EB0000
trusted library allocation
page read and write
40BF000
trusted library allocation
page read and write
63FE000
stack
page read and write
11E7000
heap
page read and write
856B000
stack
page read and write
43F5000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
6A7C000
heap
page read and write
829E000
stack
page read and write
5642000
trusted library allocation
page read and write
82DE000
stack
page read and write
6E6E000
trusted library allocation
page read and write
67FE000
stack
page read and write
1361000
heap
page read and write
2E87000
trusted library allocation
page execute and read and write
70F0000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
7DB5000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
7B4C000
heap
page read and write
7DD0000
trusted library allocation
page read and write
5630000
heap
page read and write
32B1000
trusted library allocation
page read and write
7AC5000
heap
page read and write
643E000
stack
page read and write
2E7A000
trusted library allocation
page execute and read and write
3705000
trusted library allocation
page read and write
373F000
trusted library allocation
page read and write
40D2000
trusted library allocation
page read and write
13CB000
heap
page read and write
55D0000
trusted library allocation
page read and write
6A74000
heap
page read and write
4405000
trusted library allocation
page read and write
821E000
stack
page read and write
43FA000
trusted library allocation
page read and write
6E62000
trusted library allocation
page read and write
6B8D000
stack
page read and write
3389000
trusted library allocation
page read and write
7A9A000
heap
page read and write
6EE0000
trusted library allocation
page read and write
3760000
trusted library allocation
page read and write
6A85000
heap
page read and write
5810000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
182B000
heap
page read and write
727C000
stack
page read and write
151E000
stack
page read and write
324C000
trusted library allocation
page read and write
83DE000
stack
page read and write
32DF000
trusted library allocation
page read and write
11C0000
heap
page read and write
7DAF000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page execute and read and write
31D9000
trusted library allocation
page read and write
7F40000
trusted library allocation
page execute and read and write
7F2E000
stack
page read and write
6C8E000
stack
page read and write
7ED0000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
1354000
heap
page read and write
3449000
trusted library allocation
page read and write
85EE000
stack
page read and write
3463000
trusted library allocation
page read and write
3738000
trusted library allocation
page read and write
6E9E000
trusted library allocation
page read and write
17F0000
heap
page read and write
7D83000
trusted library allocation
page read and write
13B9000
heap
page read and write
3335000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
7AB5000
heap
page read and write
6A0E000
heap
page read and write
6E17000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
7EE0000
trusted library allocation
page execute and read and write
55F0000
trusted library allocation
page read and write
11E0000
heap
page read and write
3245000
trusted library allocation
page read and write
7DBF000
trusted library allocation
page read and write
13AD000
heap
page read and write
33CF000
trusted library allocation
page read and write
7B5A000
heap
page read and write
73BC000
stack
page read and write
3443000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
5C00000
heap
page read and write
There are 304 hidden memdumps, click here to show them.