IOC Report
CQPfRTSy7N.exe

loading gif

Files

File Path
Type
Category
Malicious
CQPfRTSy7N.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:30 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CQPfRTSy7N.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp64B0.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp64C1.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CQPfRTSy7N.exe
"C:\Users\user\Desktop\CQPfRTSy7N.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id15V
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
252000
unkown
page readonly
malicious
2728000
trusted library allocation
page read and write
malicious
725E000
heap
page read and write
5F90000
heap
page read and write
63FA000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
5D1E000
stack
page read and write
2515000
trusted library allocation
page read and write
80E000
stack
page read and write
9B6000
heap
page read and write
6530000
trusted library allocation
page execute and read and write
2842000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
3681000
trusted library allocation
page read and write
6405000
trusted library allocation
page read and write
6A1A000
trusted library allocation
page read and write
4AE6000
trusted library allocation
page read and write
3813000
trusted library allocation
page read and write
6A44000
trusted library allocation
page read and write
884000
trusted library allocation
page read and write
8BB000
trusted library allocation
page execute and read and write
62BE000
stack
page read and write
9A0000
trusted library allocation
page read and write
265E000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
4BB0000
heap
page execute and read and write
8E7000
heap
page read and write
66B0000
trusted library allocation
page read and write
5F6D000
heap
page read and write
2804000
trusted library allocation
page read and write
A9D000
heap
page read and write
37CF000
trusted library allocation
page read and write
29DC000
trusted library allocation
page read and write
507E000
stack
page read and write
7480000
trusted library allocation
page execute and read and write
263E000
stack
page read and write
5F9E000
heap
page read and write
4B20000
heap
page read and write
7298000
heap
page read and write
9D8000
heap
page read and write
4B30000
heap
page read and write
56CA000
heap
page read and write
607D000
stack
page read and write
64C0000
trusted library allocation
page read and write
5E90000
trusted library allocation
page execute and read and write
66D0000
trusted library allocation
page read and write
28BA000
trusted library allocation
page read and write
8B5000
trusted library allocation
page execute and read and write
63F8000
trusted library allocation
page read and write
3A1C000
trusted library allocation
page read and write
747E000
stack
page read and write
723C000
heap
page read and write
9F7000
heap
page read and write
4B50000
trusted library allocation
page execute and read and write
5F7C000
heap
page read and write
726F000
heap
page read and write
3B0000
heap
page read and write
718C000
heap
page read and write
71A5000
heap
page read and write
738A000
trusted library allocation
page read and write
71E8000
heap
page read and write
4BA0000
heap
page read and write
9B0000
heap
page read and write
5F86000
heap
page read and write
7195000
heap
page read and write
4B40000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
2681000
trusted library allocation
page read and write
5E1E000
stack
page read and write
73B0000
trusted library allocation
page read and write
589E000
stack
page read and write
29E4000
trusted library allocation
page read and write
4CFE000
stack
page read and write
7372000
trusted library allocation
page read and write
7170000
heap
page read and write
2837000
trusted library allocation
page read and write
6300000
heap
page read and write
2478000
trusted library allocation
page read and write
71E3000
heap
page read and write
883000
trusted library allocation
page execute and read and write
743D000
stack
page read and write
840000
heap
page read and write
6480000
trusted library allocation
page read and write
7388000
trusted library allocation
page read and write
9D0000
heap
page read and write
4AC4000
trusted library allocation
page read and write
7280000
heap
page read and write
750E000
stack
page read and write
845000
heap
page read and write
6580000
trusted library allocation
page execute and read and write
4ACB000
trusted library allocation
page read and write
7379000
trusted library allocation
page read and write
287000
unkown
page readonly
2801000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
71B6000
heap
page read and write
2810000
trusted library allocation
page read and write
6485000
trusted library allocation
page read and write
5E80000
trusted library allocation
page execute and read and write
89D000
trusted library allocation
page execute and read and write
27F9000
trusted library allocation
page read and write
6720000
trusted library allocation
page execute and read and write
789E000
stack
page read and write
2530000
heap
page read and write
6430000
trusted library allocation
page read and write
717A000
heap
page read and write
8A6000
trusted library allocation
page execute and read and write
8B7000
trusted library allocation
page execute and read and write
7A80000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
7208000
heap
page read and write
6461000
trusted library allocation
page read and write
7A1E000
stack
page read and write
7183000
heap
page read and write
721C000
heap
page read and write
727B000
heap
page read and write
63F5000
trusted library allocation
page read and write
8B2000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page read and write
7BAD000
stack
page read and write
4AE1000
trusted library allocation
page read and write
5BDF000
stack
page read and write
5F70000
heap
page read and write
7212000
heap
page read and write
7375000
trusted library allocation
page read and write
379E000
trusted library allocation
page read and write
4CBE000
stack
page read and write
2896000
trusted library allocation
page read and write
4B42000
trusted library allocation
page read and write
74BD000
trusted library allocation
page read and write
970000
trusted library allocation
page execute and read and write
3776000
trusted library allocation
page read and write
74C4000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
5F95000
heap
page read and write
50BE000
stack
page read and write
250000
unkown
page readonly
36A2000
trusted library allocation
page read and write
3FE000
stack
page read and write
716D000
stack
page read and write
64D0000
trusted library allocation
page read and write
71C9000
heap
page read and write
68AE000
stack
page read and write
CCE000
stack
page read and write
791E000
stack
page read and write
66F0000
trusted library allocation
page read and write
724E000
heap
page read and write
9BB000
heap
page read and write
6470000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
ABF000
heap
page read and write
4ADE000
trusted library allocation
page read and write
7220000
heap
page read and write
BCE000
stack
page read and write
74A0000
trusted library allocation
page execute and read and write
2510000
trusted library allocation
page read and write
7A20000
trusted library allocation
page execute and read and write
78DF000
stack
page read and write
7BEE000
stack
page read and write
9DE000
heap
page read and write
591E000
stack
page read and write
980000
trusted library allocation
page read and write
5F53000
heap
page read and write
8D0000
trusted library allocation
page read and write
4AF2000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
88D000
trusted library allocation
page execute and read and write
477C000
stack
page read and write
7A6B000
stack
page read and write
6500000
trusted library allocation
page read and write
648E000
trusted library allocation
page read and write
5EEF000
heap
page read and write
870000
trusted library allocation
page read and write
6446000
trusted library allocation
page read and write
A7F000
heap
page read and write
7F9A0000
trusted library allocation
page execute and read and write
686C000
stack
page read and write
5E70000
heap
page read and write
2520000
trusted library allocation
page read and write
AB0000
heap
page read and write
6A17000
trusted library allocation
page read and write
4AED000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
5F51000
heap
page read and write
785E000
stack
page read and write
33A000
stack
page read and write
4B33000
heap
page read and write
282C000
trusted library allocation
page read and write
92E000
stack
page read and write
69EE000
stack
page read and write
58DE000
stack
page read and write
73A0000
trusted library allocation
page read and write
69AC000
stack
page read and write
6700000
trusted library allocation
page execute and read and write
2850000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
820000
heap
page read and write
6409000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
56B1000
heap
page read and write
7AA0000
heap
page read and write
64A0000
trusted library allocation
page read and write
282F000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
4D10000
heap
page read and write
6590000
trusted library allocation
page execute and read and write
2858000
trusted library allocation
page read and write
5EA1000
heap
page read and write
71A3000
heap
page read and write
6510000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
72B3000
heap
page read and write
2A82000
trusted library allocation
page read and write
3913000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
296000
unkown
page readonly
6400000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
4F0F000
stack
page read and write
676C000
stack
page read and write
648B000
trusted library allocation
page read and write
5CDF000
stack
page read and write
4BC8000
trusted library allocation
page read and write
720E000
heap
page read and write
6490000
trusted library allocation
page read and write
8E0000
heap
page read and write
7395000
trusted library allocation
page read and write
3758000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
643B000
trusted library allocation
page read and write
62F0000
heap
page read and write
368F000
trusted library allocation
page read and write
6441000
trusted library allocation
page read and write
6520000
trusted library allocation
page execute and read and write
738F000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
6F7000
stack
page read and write
73A8000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
617E000
stack
page read and write
645E000
trusted library allocation
page read and write
4BD0000
trusted library allocation
page read and write
8C6E000
stack
page read and write
739F000
trusted library allocation
page read and write
A11000
heap
page read and write
2670000
heap
page execute and read and write
61BE000
stack
page read and write
71B9000
heap
page read and write
2812000
trusted library allocation
page read and write
96B000
stack
page read and write
8A2000
trusted library allocation
page read and write
71AB000
heap
page read and write
6407000
trusted library allocation
page read and write
27C8000
trusted library allocation
page read and write
739A000
trusted library allocation
page read and write
6452000
trusted library allocation
page read and write
5F48000
heap
page read and write
282000
unkown
page readonly
3764000
trusted library allocation
page read and write
73C0000
trusted library allocation
page execute and read and write
7174000
heap
page read and write
3A21000
trusted library allocation
page read and write
7188000
heap
page read and write
5EC1000
heap
page read and write
7370000
trusted library allocation
page read and write
3A0000
heap
page read and write
8AA000
trusted library allocation
page execute and read and write
There are 262 hidden memdumps, click here to show them.