IOC Report
14posdLrGh.exe

loading gif

Files

File Path
Type
Category
Malicious
14posdLrGh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\14posdLrGh.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\fqs92o4p.default-release\cert9.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\fqs92o4p.default-release\key4.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp1A47.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp3F88.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp57A8.tmp.dat
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp5874.tmp.dat
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5884.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6564.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp8017.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp88DF.tmp.dat
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp8900.tmp.dat
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpA7A9.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpAB71.tmp.dat
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpCE60.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmpCEF8.tmp.dat
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpCF47.tmp.dat
SQLite 3.x database, last written using SQLite version 3035005, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpF10D.tmp.dat
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\14posdLrGh.exe
"C:\Users\user\Desktop\14posdLrGh.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
malicious
C:\Windows\SysWOW64\netsh.exe
netsh wlan show profile
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\findstr.exe
findstr All
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.office.com/Office
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://icanhazip.com/
104.16.184.241
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://support.mozilla.org/products/firefox
unknown
https://chrome.google.com/webstore?hl=enWeb
unknown
https://www.office.com/LR
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://whatismyipaddressnow.co/API/FETCH/getcountry.php
172.67.143.245
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://ip-api.com
unknown
http://icanhazip.com
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://whatismyipaddressnow.co/API/FETCH/filter.php?countryid=14&token=KdudHBIkdYW9
172.67.143.245
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://whatismyipaddressnow.co
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://support.micro
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
https://whatismyipaddressnow.co
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
whatismyipaddressnow.co
172.67.143.245
ip-api.com
208.95.112.1
icanhazip.com
104.16.184.241
114.82.9.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
172.67.143.245
whatismyipaddressnow.co
United States
104.16.184.241
icanhazip.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\14posdLrGh_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2919000
trusted library allocation
page read and write
malicious
4F8000
stack
page read and write
587E000
stack
page read and write
5548000
heap
page read and write
389E000
trusted library allocation
page read and write
34FF000
trusted library allocation
page read and write
900000
unkown
page readonly
2D2D000
heap
page read and write
2553000
trusted library allocation
page read and write
535E000
stack
page read and write
54AD000
heap
page read and write
399E000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
2F70000
heap
page read and write
545F000
stack
page read and write
567000
heap
page read and write
890000
heap
page read and write
653B000
trusted library allocation
page read and write
34FD000
trusted library allocation
page read and write
5778000
trusted library allocation
page read and write
617000
heap
page read and write
3540000
trusted library allocation
page read and write
290C000
trusted library allocation
page read and write
3524000
trusted library allocation
page read and write
2CFB000
heap
page read and write
902000
unkown
page execute read
B1E000
stack
page read and write
508F000
stack
page read and write
280F000
trusted library allocation
page read and write
259B000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
560000
heap
page read and write
4900000
heap
page execute and read and write
28E4000
trusted library allocation
page read and write
674000
heap
page read and write
2653000
trusted library allocation
page read and write
5F8E000
stack
page read and write
6558000
trusted library allocation
page read and write
2D2A000
heap
page read and write
1E0000
heap
page read and write
5AA0000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
2C90000
heap
page read and write
12D000
stack
page read and write
57E6000
trusted library allocation
page read and write
36FC000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
56C000
heap
page read and write
36F5000
trusted library allocation
page read and write
8B0000
heap
page read and write
3946000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
60D7000
trusted library allocation
page read and write
4F4E000
stack
page read and write
5CA0000
heap
page read and write
643E000
stack
page read and write
59CE000
stack
page read and write
387E000
trusted library allocation
page read and write
5ACA000
trusted library allocation
page read and write
370F000
trusted library allocation
page read and write
23C8000
trusted library allocation
page read and write
378D000
trusted library allocation
page read and write
510000
heap
page read and write
377A000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
390E000
trusted library allocation
page read and write
54CA000
heap
page read and write
5470000
trusted library allocation
page read and write
352A000
trusted library allocation
page read and write
6544000
trusted library allocation
page read and write
4E0F000
stack
page read and write
608E000
stack
page read and write
2D19000
heap
page read and write
350F000
trusted library allocation
page read and write
3516000
trusted library allocation
page read and write
2CE0000
heap
page read and write
6562000
trusted library allocation
page read and write
1DE000
stack
page read and write
35F0000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
2CDE000
unkown
page read and write
57B0000
heap
page read and write
5770000
trusted library allocation
page read and write
2491000
trusted library allocation
page read and write
870000
heap
page execute and read and write
685000
heap
page read and write
655F000
trusted library allocation
page read and write
530F000
stack
page read and write
6556000
trusted library allocation
page read and write
2894000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
4B0000
heap
page read and write
63B000
trusted library allocation
page execute and read and write
3790000
trusted library allocation
page read and write
3787000
trusted library allocation
page read and write
39D6000
trusted library allocation
page read and write
55E000
stack
page read and write
2EEF000
unkown
page read and write
3727000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page execute and read and write
600000
trusted library allocation
page read and write
8FC000
stack
page read and write
5E0000
trusted library allocation
page read and write
632000
trusted library allocation
page read and write
35FB000
trusted library allocation
page read and write
590000
heap
page read and write
5CD0000
trusted library allocation
page execute and read and write
626000
trusted library allocation
page execute and read and write
4D0D000
stack
page read and write
458D000
stack
page read and write
51CE000
stack
page read and write
4E4E000
stack
page read and write
24D3000
trusted library allocation
page read and write
3608000
trusted library allocation
page read and write
62A000
trusted library allocation
page execute and read and write
3738000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
28BF000
trusted library allocation
page read and write
67AE000
stack
page read and write
34D7000
trusted library allocation
page read and write
38BE000
trusted library allocation
page read and write
654E000
trusted library allocation
page read and write
2809000
trusted library allocation
page read and write
520E000
stack
page read and write
A1E000
stack
page read and write
254F000
trusted library allocation
page read and write
610000
heap
page read and write
622000
trusted library allocation
page read and write
2CF0000
heap
page read and write
5D10000
heap
page read and write
3602000
trusted library allocation
page read and write
3936000
trusted library allocation
page read and write
4FF000
stack
page read and write
4F8E000
stack
page read and write
5AB0000
heap
page read and write
2907000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
3774000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
595000
heap
page read and write
3498000
trusted library allocation
page read and write
653E000
trusted library allocation
page read and write
3886000
trusted library allocation
page read and write
19C000
stack
page read and write
5DE000
stack
page read and write
59D0000
trusted library allocation
page execute and read and write
2B5D000
stack
page read and write
67F000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
640000
heap
page read and write
5580000
trusted library section
page read and write
3711000
trusted library allocation
page read and write
655D000
trusted library allocation
page read and write
393E000
trusted library allocation
page read and write
2F2E000
stack
page read and write
63F0000
trusted library allocation
page read and write
5D00000
trusted library allocation
page execute and read and write
5830000
trusted library allocation
page read and write
2928000
trusted library allocation
page read and write
2D29000
heap
page read and write
2D3E000
heap
page read and write
6565000
trusted library allocation
page read and write
681000
heap
page read and write
2A5D000
stack
page read and write
24C7000
trusted library allocation
page read and write
4B8F000
stack
page read and write
648000
heap
page read and write
3926000
trusted library allocation
page read and write
28FA000
trusted library allocation
page read and write
86E000
stack
page read and write
2D11000
heap
page read and write
59F0000
trusted library allocation
page execute and read and write
5AE0000
trusted library allocation
page execute and read and write
8B7000
heap
page read and write
23BF000
stack
page read and write
620000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
2914000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
552A000
heap
page read and write
25A4000
trusted library allocation
page read and write
666E000
stack
page read and write
880000
trusted library allocation
page execute and read and write
5527000
heap
page read and write
598E000
stack
page read and write
2D3E000
heap
page read and write
60D000
trusted library allocation
page execute and read and write
635000
trusted library allocation
page execute and read and write
28E8000
trusted library allocation
page read and write
ED000
stack
page read and write
3536000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
5480000
heap
page read and write
2460000
trusted library allocation
page read and write
54EE000
heap
page read and write
500000
heap
page read and write
5B30000
trusted library allocation
page read and write
90E000
unkown
page readonly
6551000
trusted library allocation
page read and write
2480000
heap
page read and write
5670000
heap
page read and write
2BB0000
heap
page read and write
3781000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
392E000
trusted library allocation
page read and write
800000
heap
page read and write
72E000
heap
page read and write
6530000
trusted library allocation
page read and write
553D000
heap
page read and write
5F4000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
FFA40000
trusted library allocation
page execute and read and write
65F000
heap
page read and write
5828000
trusted library allocation
page read and write
3757000
trusted library allocation
page read and write
50CD000
stack
page read and write
3866000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
902000
unkown
page execute read
5AD0000
trusted library allocation
page execute and read and write
2916000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
3736000
trusted library allocation
page read and write
3491000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
190000
heap
page read and write
376F000
trusted library allocation
page read and write
64E000
heap
page read and write
2631000
trusted library allocation
page read and write
5FD000
trusted library allocation
page execute and read and write
5D20000
heap
page read and write
3701000
trusted library allocation
page read and write
4BCE000
stack
page read and write
4A8E000
stack
page read and write
667000
heap
page read and write
5820000
trusted library allocation
page read and write
6548000
trusted library allocation
page read and write
3715000
trusted library allocation
page read and write
5A25000
trusted library allocation
page read and write
5F4E000
stack
page read and write
3531000
trusted library allocation
page read and write
275F000
trusted library allocation
page read and write
290F000
trusted library allocation
page read and write
252A000
trusted library allocation
page read and write
351E000
trusted library allocation
page read and write
34BF000
stack
page read and write
5537000
heap
page read and write
637000
trusted library allocation
page execute and read and write
6534000
trusted library allocation
page read and write
3896000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
372E000
trusted library allocation
page read and write
25F0000
trusted library allocation
page read and write
35DF000
trusted library allocation
page read and write
5F3000
trusted library allocation
page execute and read and write
24C5000
trusted library allocation
page read and write
43F000
stack
page read and write
5AC4000
trusted library allocation
page read and write
47E000
stack
page read and write
594E000
stack
page read and write
4CCE000
stack
page read and write
35F5000
trusted library allocation
page read and write
There are 255 hidden memdumps, click here to show them.