IOC Report
un78exGoa4.exe

loading gif

Files

File Path
Type
Category
Malicious
un78exGoa4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\BGDAAKJJDAAKFHJKJKFCAEHDAF
SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
dropped
C:\ProgramData\BYIMNPJCRL.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CZQKSDDMWR.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DUKNXICOZT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DUKNXICOZT.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\FCFIJEBF
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GIGIYTFFYT.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GLTYDMDUST.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\GNLQNHOLWB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\HDHCGHDHIDHCBGCBGCAE
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 2, database pages 23, cookie 0x19, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HVLFEFMHHB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JDDHMPCDUJ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KLIZUSIQEN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KLIZUSIQEN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\QCOILOQIKC.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\QCOILOQIKC.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\SNIPGPPREP.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\TQDFJHPUIU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\ZIPXYXWIOY.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\un78exGoa4.exe
C:\Users\user\Desktop\un78exGoa4.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\un78exGoa4.exe" & del "C:\ProgramData\*.dll"" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 5

URLs

Name
IP
Malicious
http://ronaldlitt.top/25d4fc7fb0cb6b78.php
193.106.175.215
malicious
http://ronaldlitt.top/3abdf8b5527012d0/sqlite3.dll
193.106.175.215
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://search.yahoo.com?fr=crmas_sfp
unknown
http://ronaldlitt.top/3abdf8b5527012d0/sqlite3.dllY
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://ronaldlitt.top/25d4fc7fb0cb6b78.phption:
unknown
https://duckduckgo.com/ac/?q=
unknown
http://ronaldlitt.top/25d4fc7fb0cb6b78.php89c6ee431893fde88e49579e17ef5
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://search.yahoo.com?fr=crmas_sfpf
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://ronaldlitt.top
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
unknown
http://ronaldlitt.top/3abdf8b5527012d0/sqlite3.dll5
unknown
http://www.sqlite.org/copyright.html.
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ronaldlitt.top
193.106.175.215
malicious

IPs

IP
Domain
Country
Malicious
193.106.175.215
ronaldlitt.top
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files (x86)\Common Files\Microsoft Shared\Office16\oregres.dll,-301
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files (x86)\Common Files\Microsoft Shared\Office16\oregres.dll,-305

Memdumps

Base Address
Regiontype
Protect
Malicious
6B5000
heap
page read and write
malicious
2567000
heap
page read and write
3FF77000
heap
page read and write
26BE000
stack
page read and write
1F0000
heap
page read and write
66F000
unkown
page readonly
38B7E000
heap
page read and write
61E01000
direct allocation
page execute read
2567000
heap
page read and write
2583000
heap
page read and write
7BB000
heap
page read and write
307C000
stack
page read and write
2555000
heap
page read and write
4E5000
unkown
page execute and read and write
32B30000
trusted library allocation
page read and write
6CA000
heap
page read and write
4D80000
heap
page read and write
38B2C000
heap
page read and write
3EB20000
heap
page read and write
6A0000
heap
page read and write
30000
heap
page read and write
257B000
heap
page read and write
B6E000
stack
page read and write
3EE8F000
heap
page read and write
424000
unkown
page execute and read and write
2DD0000
heap
page read and write
61ED4000
direct allocation
page readonly
26FD000
stack
page read and write
3ECCC000
heap
page read and write
329BE000
stack
page read and write
2573000
heap
page read and write
429000
unkown
page execute and read and write
3ECD8000
heap
page read and write
3EC80000
heap
page read and write
2567000
heap
page read and write
2700000
heap
page read and write
3220000
heap
page read and write
7B7000
heap
page read and write
6C0000
heap
page read and write
254D000
heap
page read and write
3F960000
heap
page read and write
255F000
heap
page read and write
337F000
stack
page read and write
61ED0000
direct allocation
page read and write
38B0C000
heap
page read and write
41D000
unkown
page execute and read and write
30E0000
heap
page read and write
3266F000
stack
page read and write
38B39000
heap
page read and write
627000
unkown
page execute and read and write
61EB7000
direct allocation
page readonly
83E000
stack
page read and write
303C000
stack
page read and write
6B0000
heap
page read and write
7BD000
heap
page read and write
70A000
heap
page read and write
3F9EA000
stack
page read and write
3FA2E000
stack
page read and write
3EC84000
heap
page read and write
2410000
direct allocation
page execute and read and write
429000
unkown
page write copy
2565000
heap
page read and write
2583000
heap
page read and write
61E00000
direct allocation
page execute and read and write
A2F000
stack
page read and write
30F0000
heap
page read and write
7AD000
heap
page read and write
3F86C000
stack
page read and write
857000
heap
page read and write
3256F000
stack
page read and write
7B3000
heap
page read and write
267E000
stack
page read and write
2510000
heap
page read and write
3246F000
stack
page read and write
5B6000
unkown
page execute and read and write
38B82000
heap
page read and write
38AA0000
heap
page read and write
255B000
heap
page read and write
2564000
heap
page read and write
61ECC000
direct allocation
page read and write
38B1A000
heap
page read and write
4B9F000
stack
page read and write
32B34000
heap
page read and write
7FE000
stack
page read and write
61ECD000
direct allocation
page readonly
328BE000
stack
page read and write
850000
heap
page read and write
24BE000
stack
page read and write
2540000
heap
page read and write
32A31000
heap
page read and write
32A30000
heap
page read and write
61EB4000
direct allocation
page read and write
734000
heap
page read and write
6D9000
heap
page execute and read and write
3276F000
stack
page read and write
38B41000
heap
page read and write
2530000
heap
page read and write
615000
unkown
page execute and read and write
198000
stack
page read and write
3ECA0000
heap
page read and write
2567000
heap
page read and write
855000
heap
page read and write
3FB2C000
stack
page read and write
400000
unkown
page readonly
2559000
heap
page read and write
401000
unkown
page execute read
38B34000
heap
page read and write
66F000
unkown
page readonly
C6F000
stack
page read and write
2584000
heap
page read and write
30F7000
heap
page read and write
333E000
stack
page read and write
2430000
direct allocation
page read and write
3ECD2000
heap
page read and write
4B5E000
stack
page read and write
254A000
heap
page read and write
9C000
stack
page read and write
38B14000
heap
page read and write
3286A000
stack
page read and write
192000
stack
page read and write
B2F000
stack
page read and write
38B22000
heap
page read and write
257B000
heap
page read and write
6EF000
heap
page read and write
2566000
heap
page read and write
400000
unkown
page execute and read and write
3ED83000
heap
page read and write
61ED3000
direct allocation
page read and write
24FE000
stack
page read and write
2566000
heap
page read and write
3F96A000
heap
page read and write
2573000
heap
page read and write
There are 122 hidden memdumps, click here to show them.