IOC Report
K2xdxHSWJK.exe

loading gif

Files

File Path
Type
Category
Malicious
K2xdxHSWJK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:32 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\K2xdxHSWJK.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp57C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp58D.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\K2xdxHSWJK.exe
"C:\Users\user\Desktop\K2xdxHSWJK.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
672000
unkown
page readonly
malicious
2A98000
trusted library allocation
page read and write
malicious
52AF000
stack
page read and write
73FA000
heap
page read and write
740D000
heap
page read and write
7E0000
heap
page read and write
4E7E000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
63BF000
heap
page read and write
63E5000
heap
page read and write
CF0000
heap
page read and write
75FF000
trusted library allocation
page read and write
671A000
trusted library allocation
page read and write
D3E000
stack
page read and write
4FA3000
heap
page read and write
2F40000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
EBD000
trusted library allocation
page execute and read and write
7E9E000
stack
page read and write
7D0000
heap
page read and write
5FCE000
stack
page read and write
7485000
heap
page read and write
3D69000
trusted library allocation
page read and write
2848000
trusted library allocation
page read and write
39FF000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
7E9000
heap
page read and write
2E0C000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
4ED5000
trusted library allocation
page read and write
ED2000
trusted library allocation
page read and write
675B000
trusted library allocation
page read and write
68A0000
trusted library allocation
page execute and read and write
4F60000
trusted library allocation
page execute and read and write
2B2B000
trusted library allocation
page read and write
6727000
trusted library allocation
page read and write
3D73000
trusted library allocation
page read and write
6B8C000
stack
page read and write
535E000
stack
page read and write
3D7F000
trusted library allocation
page read and write
75E2000
trusted library allocation
page read and write
4E96000
trusted library allocation
page read and write
3C71000
trusted library allocation
page read and write
C35000
heap
page read and write
75FA000
trusted library allocation
page read and write
3D5B000
trusted library allocation
page read and write
6437000
heap
page read and write
6290000
heap
page read and write
73E2000
heap
page read and write
2792000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
2F3A000
trusted library allocation
page read and write
6718000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
2795000
trusted library allocation
page execute and read and write
7E54000
trusted library allocation
page read and write
640B000
heap
page read and write
2790000
trusted library allocation
page read and write
620E000
stack
page read and write
2EEE000
trusted library allocation
page read and write
73F6000
heap
page read and write
39F1000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
67AE000
trusted library allocation
page read and write
6429000
heap
page read and write
76E0000
trusted library allocation
page read and write
659E000
stack
page read and write
760A000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
28E0000
heap
page read and write
279B000
trusted library allocation
page execute and read and write
4F90000
heap
page read and write
BF0000
heap
page read and write
7F270000
trusted library allocation
page execute and read and write
2D38000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
EB4000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
27C0000
trusted library allocation
page execute and read and write
6710000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
6725000
trusted library allocation
page read and write
4FA0000
heap
page read and write
76F0000
trusted library allocation
page execute and read and write
77A0000
trusted library allocation
page read and write
6B6000
unkown
page readonly
6840000
trusted library allocation
page execute and read and write
2D46000
trusted library allocation
page read and write
649E000
stack
page read and write
EDA000
trusted library allocation
page execute and read and write
2F03000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
6766000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
ED6000
trusted library allocation
page execute and read and write
62B0000
trusted library allocation
page execute and read and write
6772000
trusted library allocation
page read and write
67A5000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
ECD000
trusted library allocation
page execute and read and write
6360000
heap
page read and write
2E72000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
3D6B000
trusted library allocation
page read and write
4B2C000
stack
page read and write
69E0000
trusted library allocation
page read and write
2EE3000
trusted library allocation
page read and write
6715000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
EB3000
trusted library allocation
page execute and read and write
29F1000
trusted library allocation
page read and write
670000
unkown
page readonly
27B0000
trusted library allocation
page read and write
6A7000
unkown
page readonly
27F0000
heap
page execute and read and write
EE0000
heap
page read and write
75E5000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
6D59000
trusted library allocation
page read and write
3D27000
trusted library allocation
page read and write
4E74000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
4EA2000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
610E000
stack
page read and write
4F00000
trusted library allocation
page read and write
7AC0000
heap
page read and write
4E9D000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4F0E000
trusted library allocation
page read and write
62A0000
trusted library allocation
page execute and read and write
68B0000
trusted library allocation
page execute and read and write
2DFD000
trusted library allocation
page read and write
84DE000
stack
page read and write
CEC000
heap
page read and write
27E0000
trusted library allocation
page read and write
6373000
heap
page read and write
EE7000
heap
page read and write
5C50000
trusted library allocation
page read and write
3D56000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
74A2000
heap
page read and write
EA0000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
75E9000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
5C9E000
stack
page read and write
E3E000
stack
page read and write
75E0000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
7EE000
heap
page read and write
67C0000
trusted library allocation
page read and write
7BFB000
stack
page read and write
6413000
heap
page read and write
2F48000
trusted library allocation
page read and write
6449000
heap
page read and write
6453000
heap
page read and write
3A12000
trusted library allocation
page read and write
2E17000
trusted library allocation
page read and write
7AD0000
heap
page read and write
2E6F000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
29EF000
stack
page read and write
C63000
heap
page read and write
5CA8000
trusted library allocation
page read and write
2DBD000
trusted library allocation
page read and write
67E0000
trusted library allocation
page read and write
6720000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
6761000
trusted library allocation
page read and write
2F3D000
trusted library allocation
page read and write
3CFF000
trusted library allocation
page read and write
3D65000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
67AB000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
AF7000
stack
page read and write
759000
stack
page read and write
C0F000
heap
page read and write
760F000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
6BCE000
stack
page read and write
749E000
heap
page read and write
73E0000
heap
page read and write
5F8E000
stack
page read and write
7ABF000
stack
page read and write
5160000
heap
page execute and read and write
677E000
trusted library allocation
page read and write
4E7B000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
7E6000
heap
page read and write
6A8C000
stack
page read and write
774E000
stack
page read and write
7E4E000
stack
page read and write
2E22000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
6A2000
unkown
page readonly
3D3C000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
6443000
heap
page read and write
6D16000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
63A9000
heap
page read and write
7471000
heap
page read and write
7EA0000
heap
page read and write
6729000
trusted library allocation
page read and write
2ED8000
trusted library allocation
page read and write
BFE000
heap
page read and write
6781000
trusted library allocation
page read and write
6D64000
trusted library allocation
page read and write
74B0000
heap
page read and write
7D4E000
stack
page read and write
3D31000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
7610000
trusted library allocation
page read and write
768D000
stack
page read and write
66DF000
stack
page read and write
7430000
heap
page read and write
2D43000
trusted library allocation
page read and write
645A000
heap
page read and write
7700000
trusted library allocation
page execute and read and write
2E38000
trusted library allocation
page read and write
5B4E000
stack
page read and write
744A000
heap
page read and write
7424000
heap
page read and write
2EDB000
trusted library allocation
page read and write
75F8000
trusted library allocation
page read and write
60CE000
stack
page read and write
6D60000
trusted library allocation
page read and write
741D000
heap
page read and write
7E50000
trusted library allocation
page read and write
7C0000
heap
page read and write
65DE000
stack
page read and write
7605000
trusted library allocation
page read and write
5488000
heap
page read and write
7CFD000
stack
page read and write
CF5000
heap
page read and write
6D13000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
4F40000
heap
page read and write
2E7D000
trusted library allocation
page read and write
63BA000
heap
page read and write
51AE000
stack
page read and write
2D4F000
trusted library allocation
page read and write
6CCC000
stack
page read and write
4EC0000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
2797000
trusted library allocation
page execute and read and write
5CB0000
trusted library allocation
page read and write
E7E000
stack
page read and write
545E000
stack
page read and write
7A7E000
stack
page read and write
2DFF000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
C25000
heap
page read and write
76CE000
stack
page read and write
743B000
heap
page read and write
4E8E000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
283E000
stack
page read and write
7400000
heap
page read and write
6D00000
trusted library allocation
page execute and read and write
FEE000
stack
page read and write
67A0000
trusted library allocation
page read and write
778E000
stack
page read and write
3D4B000
trusted library allocation
page read and write
5471000
heap
page read and write
74A8000
heap
page read and write
745A000
heap
page read and write
69D0000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
4A2C000
stack
page read and write
7D00000
heap
page read and write
5C4F000
stack
page read and write
3D91000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
BD0000
heap
page read and write
73F1000
heap
page read and write
BF8000
heap
page read and write
6CD5000
trusted library allocation
page read and write
5483000
heap
page read and write
There are 287 hidden memdumps, click here to show them.