IOC Report
172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe

loading gif

Files

File Path
Type
Category
Malicious
172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe
"C:\Users\user\Desktop\172771704470d2405c797286a7d66ed6085690f2346b0873f84a2d4bbbbfed17373d12cd4f758.dat-decoded.exe"
malicious

URLs

Name
IP
Malicious
)8"zc
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
dczas.duckdns.org
89.117.23.22
malicious

IPs

IP
Domain
Country
Malicious
89.117.23.22
dczas.duckdns.org
Lithuania
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
30D1000
trusted library allocation
page read and write
malicious
3156000
trusted library allocation
page read and write
malicious
DD2000
unkown
page readonly
malicious
1244000
heap
page read and write
1BCAE000
heap
page read and write
340C000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1790000
heap
page execute and read and write
7FFD9B773000
trusted library allocation
page execute and read and write
17B5000
heap
page read and write
314E000
trusted library allocation
page read and write
1C7AA000
stack
page read and write
1BA70000
heap
page read and write
1BBE1000
heap
page read and write
7FFD9B78C000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
33F5000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1BB57000
heap
page read and write
1350000
heap
page read and write
1BA1E000
stack
page read and write
1BB22000
heap
page read and write
1191000
heap
page read and write
1B65D000
stack
page read and write
313E000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B774000
trusted library allocation
page read and write
30C0000
heap
page read and write
3403000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
1134000
stack
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1BB85000
heap
page read and write
11CE000
heap
page read and write
1BB89000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1370000
heap
page read and write
1BC00000
heap
page read and write
340A000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1BBD1000
heap
page read and write
3407000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1183000
heap
page read and write
314A000
trusted library allocation
page read and write
13B5000
heap
page read and write
312D000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
3154000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
125B000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
DDE000
unkown
page readonly
7FF409470000
trusted library allocation
page execute and read and write
305E000
stack
page read and write
1720000
trusted library allocation
page read and write
130DE000
trusted library allocation
page read and write
116C000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1BBBC000
heap
page read and write
1BB70000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BB4D000
heap
page read and write
1BB55000
heap
page read and write
1BB6D000
heap
page read and write
1C06F000
stack
page read and write
DD0000
unkown
page readonly
3120000
trusted library allocation
page read and write
1175000
heap
page read and write
15BD000
stack
page read and write
1390000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
314C000
trusted library allocation
page read and write
1BB96000
heap
page read and write
1C8AD000
stack
page read and write
3146000
trusted library allocation
page read and write
1BBE5000
heap
page read and write
1B9DE000
stack
page read and write
1270000
heap
page read and write
1C6AB000
stack
page read and write
17B0000
heap
page read and write
DD0000
unkown
page readonly
130D1000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B100000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
1BA60000
heap
page execute and read and write
1BC05000
heap
page read and write
1CAAC000
stack
page read and write
1723000
trusted library allocation
page read and write
1160000
heap
page read and write
118A000
heap
page read and write
1BE6E000
stack
page read and write
11A1000
heap
page read and write
16BC000
stack
page read and write
1C36D000
stack
page read and write
1BB99000
heap
page read and write
13B0000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1BF6E000
stack
page read and write
1710000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
1BBB6000
heap
page read and write
16F0000
trusted library allocation
page read and write
11A4000
heap
page read and write
1C46D000
stack
page read and write
14BE000
stack
page read and write
1B458000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1C16E000
stack
page read and write
There are 106 hidden memdumps, click here to show them.