IOC Report
1714456685abe8dacd9647979ca6f07fce954d21483995c56b392e9993fc4dbb806aaf5610733.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
1714456685abe8dacd9647979ca6f07fce954d21483995c56b392e9993fc4dbb806aaf5610733.dat-decoded.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\places.raw
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp140C.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp141D.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp741D.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp742E.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp742F.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp743F.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
modified
C:\Users\user\AppData\Local\Temp\tmp895D.tmp.dat
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp896E.tmp.dat
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp9EE9.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp9F09.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp9F0A.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1714456685abe8dacd9647979ca6f07fce954d21483995c56b392e9993fc4dbb806aaf5610733.dat-decoded.exe
"C:\Users\user\Desktop\1714456685abe8dacd9647979ca6f07fce954d21483995c56b392e9993fc4dbb806aaf5610733.dat-decoded.exe"
malicious

URLs

Name
IP
Malicious
91.92.242.85
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/LimerBoy/StormKitty
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.mozilla.org
unknown
https://urn.to/r/sds_see
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://urn.to/r/sds_seeaCould
unknown
http://james.newtonking.com/projects/json
unknown
There are 10 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
91.92.242.85
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\E0E9EDAC3F171A9E5946
5C34AEE5196E0F8615B8D1D9017DD710EA28D2B7AC99295D46046D12EEA58D78
HKEY_CURRENT_USER\SOFTWARE\E0E9EDAC3F171A9E5946
66DBE3B90371FE58CAA957E83C1C1F0ACCE941A36CF140A0F07E64403DD13303

Memdumps

Base Address
Regiontype
Protect
Malicious
2751000
trusted library allocation
page read and write
malicious
1C070000
trusted library section
page read and write
malicious
3A2000
unkown
page readonly
malicious
7FF8490BE000
trusted library allocation
page read and write
7F3000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
127A9000
trusted library allocation
page read and write
A50000
heap
page read and write
12751000
trusted library allocation
page read and write
1B0F0000
heap
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
1276F000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
760000
heap
page read and write
127B7000
trusted library allocation
page read and write
1B6AF000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
1B1A3000
heap
page read and write
1B744000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
260E000
stack
page read and write
79E000
heap
page read and write
1C06C000
stack
page read and write
D2C000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
780000
heap
page read and write
128F8000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
12787000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7EC000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
127B5000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
12779000
trusted library allocation
page read and write
6F4000
stack
page read and write
1BE6A000
stack
page read and write
B6B000
stack
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
98E000
stack
page read and write
1B3A4000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
1279F000
trusted library allocation
page read and write
1BB6C000
stack
page read and write
2640000
heap
page execute and read and write
12792000
trusted library allocation
page read and write
128E8000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
12785000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
12769000
trusted library allocation
page read and write
7EA000
heap
page read and write
7FF848FAB000
trusted library allocation
page read and write
2560000
trusted library section
page read and write
3A0000
unkown
page readonly
1B1A0000
heap
page read and write
3A0000
unkown
page readonly
7FF848FB1000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
127BD000
trusted library allocation
page read and write
1B714000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
7A9000
heap
page read and write
7FF848FEC000
trusted library allocation
page read and write
127AF000
trusted library allocation
page read and write
1B71B000
heap
page read and write
128CA000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
128D8000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
1275E000
trusted library allocation
page read and write
127B2000
trusted library allocation
page read and write
127C4000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
1ACDD000
stack
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1BF6C000
stack
page read and write
765000
heap
page read and write
1A780000
trusted library allocation
page read and write
B70000
heap
page read and write
1BD6C000
stack
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
C25000
heap
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
128DE000
trusted library allocation
page read and write
12776000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1C490000
heap
page read and write
841000
heap
page read and write
1B5AE000
stack
page read and write
1277F000
trusted library allocation
page read and write
1278D000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF41B950000
trusted library allocation
page execute and read and write
7FF848EB0000
trusted library allocation
page read and write
274F000
stack
page read and write
1B2AA000
stack
page read and write
BE0000
trusted library allocation
page read and write
2510000
heap
page read and write
128F0000
trusted library allocation
page read and write
730000
heap
page read and write
2580000
heap
page read and write
127E8000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B6B0000
heap
page read and write
BE3000
trusted library allocation
page read and write
1B736000
heap
page read and write
127D9000
trusted library allocation
page read and write
7BF000
heap
page read and write
12799000
trusted library allocation
page read and write
1B6BC000
heap
page read and write
12782000
trusted library allocation
page read and write
127A6000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
C20000
heap
page read and write
1B960000
heap
page read and write
78C000
heap
page read and write
7C2000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
1BC6E000
stack
page read and write
1B4AE000
stack
page read and write
7FF849040000
trusted library allocation
page execute and read and write
740000
heap
page read and write
1AAD7000
heap
page read and write
7FF8490F0000
trusted library allocation
page execute and read and write
There are 126 hidden memdumps, click here to show them.