IOC Report
xXQ39a5f9EJP.exe

loading gif

Files

File Path
Type
Category
Malicious
xXQ39a5f9EJP.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xXQ39a5f9EJP.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\tmp679F.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xXQ39a5f9EJP.exe
"C:\Users\user\Desktop\xXQ39a5f9EJP.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp679F.tmp.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 3

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
liverpool777.duckdns.org
179.13.0.175
malicious

IPs

IP
Domain
Country
Malicious
179.13.0.175
liverpool777.duckdns.org
Colombia
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
HKEY_CURRENT_USER\SOFTWARE\F723E1B88FDFE54EEC0E
F7A2CF016280A5E7A24A46D6E81A704BFCCD6486B35AFEFC4601A8330895F85F

Memdumps

Base Address
Regiontype
Protect
Malicious
472000
unkown
page readonly
malicious
2A44000
trusted library allocation
page read and write
malicious
2751000
trusted library allocation
page read and write
malicious
7FFD9B76D000
trusted library allocation
page execute and read and write
1B202000
heap
page read and write
1A633130000
heap
page read and write
3FA0DEC000
stack
page read and write
1A634CF5000
heap
page read and write
8F6000
heap
page read and write
29B1000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
19A1E540000
heap
page read and write
1B054000
heap
page read and write
A60000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
2849000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
635EBFF000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
19A1E660000
heap
page read and write
D70000
heap
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FF4AC300000
trusted library allocation
page execute and read and write
1BC5A000
stack
page read and write
1B30A000
heap
page read and write
1BD5C000
stack
page read and write
1B81D000
stack
page read and write
1B61F000
stack
page read and write
19A1E653000
heap
page read and write
635EAFF000
unkown
page read and write
1BE55000
stack
page read and write
26BF000
stack
page read and write
1A750000
trusted library allocation
page read and write
2974000
trusted library allocation
page read and write
292B000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1C15C000
stack
page read and write
1B120000
heap
page read and write
95D000
heap
page read and write
19A1E620000
heap
page read and write
2740000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B41E000
stack
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
D20000
heap
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
635E73B000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
1B91C000
stack
page read and write
B6D000
stack
page read and write
2954000
trusted library allocation
page read and write
19A1E7A0000
heap
page read and write
A65000
heap
page read and write
1B51E000
stack
page read and write
19A1E661000
heap
page read and write
2A90000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
19A1E661000
heap
page read and write
963000
heap
page read and write
DD0000
heap
page read and write
1B71F000
stack
page read and write
2A8E000
trusted library allocation
page read and write
7FFD9B947000
trusted library allocation
page read and write
19A1E62A000
heap
page read and write
1B036000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
29BC000
trusted library allocation
page read and write
1A6332E0000
heap
page read and write
19A1E661000
heap
page read and write
930000
heap
page read and write
1B1FC000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1A633250000
heap
page read and write
2A73000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
19A1E7B0000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
19A1E650000
heap
page read and write
1B113000
heap
page read and write
19A1E720000
heap
page read and write
1BF57000
stack
page read and write
2A40000
trusted library allocation
page read and write
1A634CF0000
heap
page read and write
12751000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1B1C3000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1A633210000
heap
page read and write
1275E000
trusted library allocation
page read and write
19A1E661000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
2886000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
2A6C000
trusted library allocation
page read and write
1AAD5000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
1C257000
stack
page read and write
1B020000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B967000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
470000
unkown
page readonly
7FFD9B940000
trusted library allocation
page read and write
A30000
heap
page read and write
2889000
trusted library allocation
page read and write
9F0000
heap
page read and write
19A1E652000
heap
page read and write
470000
unkown
page readonly
810000
heap
page read and write
3FA107E000
stack
page read and write
7FFD9B949000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
5C4000
stack
page read and write
19A1E663000
heap
page read and write
19A1E740000
heap
page read and write
933000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
BB0000
trusted library section
page read and write
267F000
stack
page read and write
27AA000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
19A1E661000
heap
page read and write
BAF000
unkown
page read and write
7FFD9B773000
trusted library allocation
page read and write
DD5000
heap
page read and write
1A6332E8000
heap
page read and write
95F000
heap
page read and write
A10000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1ACDD000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
91B000
heap
page read and write
3FA10FE000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B94E000
trusted library allocation
page read and write
1B04B000
heap
page read and write
1BA1D000
stack
page read and write
1A780000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
12761000
trusted library allocation
page read and write
8F0000
heap
page read and write
19A1E650000
heap
page read and write
47E000
unkown
page readonly
There are 138 hidden memdumps, click here to show them.