IOC Report
17304785458593769886a354fbce7baa74763cdd4a7b5002da27c7b9fc27af676129226c18112.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
17304785458593769886a354fbce7baa74763cdd4a7b5002da27c7b9fc27af676129226c18112.dat-decoded.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\x-manager.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x-manager.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Nov 1 15:30:59 2024, mtime=Fri Nov 1 15:30:59 2024, atime=Fri Nov 1 15:30:59 2024, length=154624, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\17304785458593769886a354fbce7baa74763cdd4a7b5002da27c7b9fc27af676129226c18112.dat-decoded.exe
"C:\Users\user\Desktop\17304785458593769886a354fbce7baa74763cdd4a7b5002da27c7b9fc27af676129226c18112.dat-decoded.exe"
malicious

URLs

Name
IP
Malicious
browser-hazard.gl.at.ply.gg
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
browser-hazard.gl.at.ply.gg
147.185.221.23
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.23
browser-hazard.gl.at.ply.gg
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C52000
unkown
page readonly
malicious
13048000
trusted library allocation
page read and write
malicious
104C000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B764000
trusted library allocation
page read and write
1063000
heap
page read and write
7FF4C8DF0000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B5CC000
stack
page read and write
DB1000
stack
page read and write
10B5000
heap
page read and write
C5C000
unkown
page readonly
1C25A000
stack
page read and write
10CD000
heap
page read and write
1C420000
heap
page read and write
1BABF000
heap
page read and write
1255000
heap
page read and write
13074000
trusted library allocation
page read and write
1BD5E000
stack
page read and write
7FFD9B920000
trusted library allocation
page read and write
C50000
unkown
page readonly
1250000
heap
page read and write
1BA50000
heap
page execute and read and write
1BAE0000
heap
page read and write
1123000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
1C155000
stack
page read and write
13071000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
2E60000
heap
page read and write
1BAEA000
heap
page read and write
1230000
heap
page read and write
2FBE000
stack
page read and write
1B3C7000
heap
page read and write
14B3000
trusted library allocation
page read and write
1CA1A000
stack
page read and write
2E63000
heap
page read and write
1480000
trusted library allocation
page read and write
1080000
heap
page read and write
10D4000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1BE5E000
stack
page read and write
1C354000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
1BACD000
heap
page read and write
3041000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
2E10000
heap
page read and write
1C91B000
stack
page read and write
1BA60000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1010000
heap
page read and write
1C81C000
stack
page read and write
1210000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
2F7E000
stack
page read and write
1BF5F000
stack
page read and write
1055000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
1000000
heap
page read and write
135E000
stack
page read and write
C50000
unkown
page readonly
1505000
heap
page read and write
3030000
heap
page execute and read and write
1083000
heap
page read and write
160F000
stack
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1500000
heap
page read and write
2FFE000
stack
page read and write
1040000
heap
page read and write
10BB000
heap
page read and write
10AD000
heap
page read and write
145C000
stack
page read and write
1B070000
trusted library allocation
page read and write
2E70000
heap
page read and write
13077000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BC5E000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
106A000
heap
page read and write
13041000
trusted library allocation
page read and write
111D000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1BB0B000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
There are 80 hidden memdumps, click here to show them.