IOC Report
xmo4WvZPV3Q0.exe

loading gif

Files

File Path
Type
Category
Malicious
xmo4WvZPV3Q0.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xmo4WvZPV3Q0.exe
"C:\Users\user\Desktop\xmo4WvZPV3Q0.exe"
malicious

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
procesoexitos1.duckdns.org
179.13.0.175
malicious

IPs

IP
Domain
Country
Malicious
179.13.0.175
procesoexitos1.duckdns.org
Colombia
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
2CF1000
trusted library allocation
page read and write
malicious
2A01000
trusted library allocation
page read and write
malicious
452000
unkown
page readonly
malicious
2D1C000
trusted library allocation
page read and write
1BF2A000
stack
page read and write
450000
unkown
page readonly
271E000
stack
page read and write
1B393000
heap
page read and write
2D3C000
trusted library allocation
page read and write
1BAEC000
stack
page read and write
1B9EE000
stack
page read and write
2A70000
trusted library allocation
page read and write
1B39E000
heap
page read and write
7FFB4B26B000
trusted library allocation
page execute and read and write
7FFB4B24D000
trusted library allocation
page execute and read and write
920000
heap
page read and write
1B1D7000
heap
page read and write
2D35000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
7FFB4B2F6000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
8F0000
heap
page read and write
7FFB4B25C000
trusted library allocation
page read and write
1B8EF000
stack
page read and write
1B5EE000
stack
page read and write
7FFB4B253000
trusted library allocation
page read and write
A03000
heap
page read and write
7FFB4B400000
trusted library allocation
page execute and read and write
7FFB4B240000
trusted library allocation
page read and write
1B222000
heap
page read and write
1B1CD000
heap
page read and write
2A50000
trusted library allocation
page read and write
1C32E000
stack
page read and write
1B201000
heap
page read and write
1BBED000
stack
page read and write
7FFB4B243000
trusted library allocation
page execute and read and write
1C02C000
stack
page read and write
7FFB4B244000
trusted library allocation
page read and write
5F0000
heap
page read and write
2A77000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
275E000
stack
page read and write
A01000
heap
page read and write
7FF49A880000
trusted library allocation
page execute and read and write
7FFB4B250000
trusted library allocation
page read and write
1B2E0000
heap
page execute and read and write
1B3F0000
heap
page read and write
1B209000
heap
page read and write
29F0000
heap
page execute and read and write
D75000
heap
page read and write
7FFB4B3E0000
trusted library allocation
page read and write
2D4B000
trusted library allocation
page read and write
2A72000
trusted library allocation
page read and write
7FFB4B260000
trusted library allocation
page read and write
2D49000
trusted library allocation
page read and write
2A79000
trusted library allocation
page read and write
7FFB4B264000
trusted library allocation
page read and write
BBC000
stack
page read and write
1B237000
heap
page read and write
990000
trusted library allocation
page read and write
1B39C000
heap
page read and write
1B1F8000
heap
page read and write
2D50000
trusted library allocation
page read and write
2A74000
trusted library allocation
page read and write
7FFB4B360000
trusted library allocation
page execute and read and write
1B1C0000
heap
page read and write
970000
trusted library allocation
page read and write
1B3EC000
heap
page read and write
9EC000
heap
page read and write
5A4000
stack
page read and write
2A83000
trusted library allocation
page read and write
D70000
heap
page read and write
1AE7D000
stack
page read and write
1B3F9000
heap
page read and write
930000
heap
page read and write
A2D000
heap
page read and write
1B3CE000
heap
page read and write
1B250000
heap
page read and write
1B6EF000
stack
page read and write
9A3000
trusted library allocation
page read and write
CBD000
stack
page read and write
2812000
heap
page read and write
1B1E5000
heap
page read and write
1B244000
heap
page read and write
9C0000
heap
page read and write
9C6000
heap
page read and write
1B7EE000
stack
page read and write
925000
heap
page read and write
1AA30000
trusted library allocation
page read and write
DBE000
stack
page read and write
2D31000
trusted library allocation
page read and write
450000
unkown
page readonly
2D40000
trusted library allocation
page read and write
2A5F000
trusted library allocation
page read and write
1B24A000
heap
page read and write
7FFB4B25D000
trusted library allocation
page execute and read and write
7FFB4B2F0000
trusted library allocation
page read and write
1B2F0000
heap
page read and write
7FFB4B29C000
trusted library allocation
page execute and read and write
9CC000
heap
page read and write
2D52000
trusted library allocation
page read and write
1B455000
heap
page read and write
45E000
unkown
page readonly
1C42C000
stack
page read and write
12A0E000
trusted library allocation
page read and write
12A01000
trusted library allocation
page read and write
8D0000
heap
page read and write
2A65000
trusted library allocation
page read and write
7FFB4B2FC000
trusted library allocation
page execute and read and write
2A63000
trusted library allocation
page read and write
2A6E000
trusted library allocation
page read and write
7FFB4B26D000
trusted library allocation
page execute and read and write
7FFB4B300000
trusted library allocation
page execute and read and write
7FFB4B326000
trusted library allocation
page execute and read and write
1BCEE000
stack
page read and write
7FFB4B3F0000
trusted library allocation
page read and write
2A5D000
trusted library allocation
page read and write
2800000
heap
page read and write
1B3CC000
heap
page read and write
There are 109 hidden memdumps, click here to show them.