IOC Report
XCN5xgaiac.exe

loading gif

Files

File Path
Type
Category
Malicious
XCN5xgaiac.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XCN5xgaiac.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XCN5xgaiac.exe
"C:\Users\user\Desktop\XCN5xgaiac.exe"
malicious
C:\Users\user\Desktop\XCN5xgaiac.exe
C:\Users\user\Desktop\XCN5xgaiac.exe
malicious
C:\Users\user\Desktop\XCN5xgaiac.exe
C:\Users\user\Desktop\XCN5xgaiac.exe
malicious
C:\Users\user\Desktop\XCN5xgaiac.exe
C:\Users\user\Desktop\XCN5xgaiac.exe
malicious
C:\Users\user\Desktop\XCN5xgaiac.exe
C:\Users\user\Desktop\XCN5xgaiac.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7368 -s 80

URLs

Name
IP
Malicious
http://94.156.65.182/tomthf/cvghx/five/fre.php
94.156.65.182
malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://94.156.65.182/
unknown
malicious
http://www.ibsensoftware.com/
unknown

IPs

IP
Domain
Country
Malicious
94.156.65.182
unknown
Bulgaria
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
26A8000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
F08000
heap
page read and write
malicious
4119000
trusted library allocation
page read and write
malicious
268C000
trusted library allocation
page read and write
malicious
26E0000
trusted library allocation
page read and write
malicious
26C3000
trusted library allocation
page read and write
malicious
4A0000
remote allocation
page execute and read and write
3601000
trusted library allocation
page read and write
3040000
heap
page read and write
7FE000
heap
page read and write
9F0000
trusted library allocation
page read and write
4049000
trusted library allocation
page read and write
919E000
stack
page read and write
2E82000
heap
page read and write
D7A9000
trusted library allocation
page read and write
7A3000
trusted library allocation
page execute and read and write
A7C000
stack
page read and write
25F0000
heap
page read and write
700E000
stack
page read and write
AFD000
stack
page read and write
4B80000
heap
page execute and read and write
89B000
heap
page read and write
1390000
heap
page read and write
57C000
stack
page read and write
26A6000
trusted library allocation
page read and write
3FAD000
trusted library allocation
page read and write
943E000
stack
page read and write
7B0000
trusted library allocation
page read and write
8D1000
heap
page read and write
7A4000
trusted library allocation
page read and write
26FE000
trusted library allocation
page read and write
837000
heap
page read and write
578000
stack
page read and write
AC0000
trusted library allocation
page read and write
46FE000
stack
page read and write
251E000
stack
page read and write
2A30000
heap
page read and write
7DB000
trusted library allocation
page execute and read and write
1D0000
unkown
page readonly
D79C000
trusted library allocation
page read and write
ECD000
stack
page read and write
3EEF000
trusted library allocation
page read and write
4B7E000
stack
page read and write
897000
heap
page read and write
D73D000
trusted library section
page read and write
DBFE000
stack
page read and write
D760000
trusted library allocation
page read and write
9440000
heap
page read and write
D799000
trusted library allocation
page read and write
D75B000
trusted library allocation
page read and write
E15000
heap
page read and write
B290000
trusted library allocation
page read and write
C5E000
stack
page read and write
1400000
heap
page read and write
81D000
heap
page read and write
1408000
heap
page read and write
299F000
stack
page read and write
C7E000
stack
page read and write
A90000
heap
page read and write
F2F000
heap
page read and write
2540000
trusted library allocation
page read and write
A3E000
stack
page read and write
7CA000
trusted library allocation
page execute and read and write
92F0000
trusted library allocation
page read and write
9D0000
heap
page read and write
3E82000
trusted library allocation
page read and write
D8BE000
stack
page read and write
2688000
trusted library allocation
page read and write
C10000
heap
page read and write
B00000
heap
page read and write
92B0000
trusted library allocation
page execute and read and write
5F0000
heap
page read and write
D88000
heap
page read and write
B70000
heap
page read and write
4B3E000
stack
page read and write
4A0000
remote allocation
page execute and read and write
DABE000
stack
page read and write
8C3000
heap
page read and write
2520000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
C15000
heap
page read and write
A80000
trusted library allocation
page execute and read and write
864000
heap
page read and write
96C000
stack
page read and write
79C000
stack
page read and write
2E70000
heap
page read and write
DCFE000
stack
page read and write
7C6000
trusted library allocation
page execute and read and write
A24E000
stack
page read and write
6A0000
heap
page read and write
D5F000
stack
page read and write
905E000
stack
page read and write
B40000
heap
page execute and read and write
E10000
heap
page read and write
CFC000
stack
page read and write
7AD000
trusted library allocation
page execute and read and write
180000
unkown
page readonly
123C000
stack
page read and write
9E0000
heap
page read and write
D7A0000
trusted library allocation
page read and write
1370000
heap
page read and write
25E0000
trusted library section
page read and write
40B1000
trusted library allocation
page read and write
933E000
stack
page read and write
E60000
heap
page read and write
E0E000
stack
page read and write
D60000
heap
page read and write
BE0000
heap
page read and write
47B000
stack
page read and write
D771000
trusted library allocation
page read and write
2E7E000
stack
page read and write
182000
unkown
page readonly
1395000
heap
page read and write
7D7000
trusted library allocation
page execute and read and write
D785000
trusted library allocation
page read and write
D790000
trusted library allocation
page read and write
63E000
stack
page read and write
10FE000
stack
page read and write
929F000
stack
page read and write
D6E0000
trusted library section
page read and write
8FD000
stack
page read and write
67D000
stack
page read and write
822000
heap
page read and write
7A0000
trusted library allocation
page read and write
7B4000
trusted library allocation
page read and write
133C000
stack
page read and write
9F0000
heap
page read and write
DBBE000
stack
page read and write
AA0000
trusted library allocation
page execute and read and write
9EF000
stack
page read and write
182000
unkown
page execute and read and write
3F79000
trusted library allocation
page read and write
F00000
heap
page read and write
25CE000
stack
page read and write
E5E000
stack
page read and write
7010000
trusted library section
page read and write
A14E000
stack
page read and write
790000
trusted library allocation
page read and write
7F0000
heap
page read and write
B50000
heap
page read and write
D76E000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
2870000
heap
page read and write
25D0000
heap
page read and write
258E000
stack
page read and write
8CB000
heap
page read and write
7F8000
heap
page read and write
915E000
stack
page read and write
2601000
trusted library allocation
page read and write
A10E000
stack
page read and write
3FE1000
trusted library allocation
page read and write
5E0000
heap
page read and write
D740000
trusted library allocation
page read and write
D80000
heap
page read and write
D8FE000
stack
page read and write
3605000
trusted library allocation
page read and write
1380000
heap
page read and write
3E4E000
trusted library allocation
page read and write
D756000
trusted library allocation
page read and write
F6D000
heap
page read and write
6A5000
heap
page read and write
820000
heap
page read and write
There are 153 hidden memdumps, click here to show them.