IOC Report
lLX6Po7hFJ.exe

loading gif

Files

File Path
Type
Category
Malicious
lLX6Po7hFJ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpC905.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
data
dropped
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lLX6Po7hFJ.exe_52236c2e729429a1e3187843149972c92a6f610_00000000_229a7c85-0bb3-4dc3-8de8-e15575f19acb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C5C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C7C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dnshost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\lLX6Po7hFJ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC9F1.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\task.dat
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lLX6Po7hFJ.exe
"C:\Users\user\Desktop\lLX6Po7hFJ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmpC905.tmp"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC9F1.tmp"
malicious
C:\Users\user\Desktop\lLX6Po7hFJ.exe
C:\Users\user\Desktop\lLX6Po7hFJ.exe 0
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe" 0
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
dw20.exe -x -s 1468

URLs

Name
IP
Malicious
malicious
0.tcp.eu.ngrok.io
malicious
http://upx.sf.net
unknown

Domains

Name
IP
Malicious
0.tcp.eu.ngrok.io
3.125.223.134
malicious

IPs

IP
Domain
Country
Malicious
3.125.223.134
0.tcp.eu.ngrok.io
United States
malicious
18.192.31.165
unknown
United States
malicious
18.158.249.75
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
DNS Host
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
ProgramId
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
FileId
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
LowerCaseLongPath
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
LongPathHash
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
Name
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
OriginalFileName
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
Publisher
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
Version
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
BinFileVersion
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
BinaryType
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
ProductName
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
ProductVersion
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
LinkDate
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
BinProductVersion
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
AppxPackageFullName
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
AppxPackageRelativeId
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
Size
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
Language
\REGISTRY\A\{9ff4db4a-28bb-838b-de8e-17b4eb7570cc}\Root\InventoryApplicationFile\llx6po7hfj.exe|8bf56e97b234ef88
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E52000
unkown
page readonly
malicious
29D1000
trusted library allocation
page read and write
malicious
6190000
trusted library section
page read and write
malicious
39D1000
trusted library allocation
page read and write
malicious
2921000
trusted library allocation
page read and write
malicious
21A8000
heap
page read and write
4DA6000
heap
page execute and read and write
73C000
heap
page read and write
4AF0000
trusted library allocation
page execute and read and write
5920000
trusted library allocation
page execute and read and write
A3C000
trusted library allocation
page execute and read and write
3601000
trusted library allocation
page read and write
910000
heap
page read and write
178A000
trusted library allocation
page execute and read and write
63D000
stack
page read and write
1380000
heap
page read and write
3714000
trusted library allocation
page read and write
9DD000
stack
page read and write
4ABE000
stack
page read and write
53E000
unkown
page read and write
5DEF000
stack
page read and write
1780000
trusted library allocation
page read and write
157A000
trusted library allocation
page execute and read and write
1450000
heap
page read and write
98E000
stack
page read and write
742000
heap
page read and write
876000
heap
page read and write
400000
heap
page read and write
4667000
trusted library allocation
page read and write
4B34000
heap
page read and write
57A0000
heap
page read and write
61E0000
unclassified section
page read and write
2BE0000
heap
page read and write
5ACE000
stack
page read and write
750000
heap
page read and write
21AC000
heap
page read and write
1F6E000
stack
page read and write
2B40000
heap
page read and write
6DD000
heap
page read and write
327F000
stack
page read and write
1792000
trusted library allocation
page execute and read and write
1BCF000
stack
page read and write
378F000
trusted library allocation
page read and write
85E000
stack
page read and write
2E3F000
stack
page read and write
1370000
heap
page read and write
5790000
heap
page read and write
6F6000
stack
page read and write
8F0000
trusted library allocation
page read and write
144A000
trusted library allocation
page execute and read and write
292F000
stack
page read and write
159B000
trusted library allocation
page execute and read and write
1560000
trusted library allocation
page read and write
5A8E000
stack
page read and write
5F4D000
stack
page read and write
C47000
trusted library allocation
page execute and read and write
930000
heap
page read and write
1800000
heap
page read and write
4F8E000
stack
page read and write
C2F000
stack
page read and write
992000
heap
page read and write
8B0000
heap
page read and write
B2F000
stack
page read and write
7F320000
trusted library allocation
page execute and read and write
AA0000
heap
page read and write
160E000
heap
page read and write
A2A000
trusted library allocation
page execute and read and write
723000
heap
page read and write
710000
heap
page read and write
624E000
stack
page read and write
474E000
trusted library allocation
page read and write
301F000
stack
page read and write
7F0000
heap
page read and write
17EE000
stack
page read and write
4CA0000
heap
page execute and read and write
6200000
heap
page execute and read and write
2B0E000
unkown
page read and write
363B000
trusted library allocation
page read and write
902000
trusted library allocation
page execute and read and write
15E1000
heap
page read and write
C4B000
trusted library allocation
page execute and read and write
723000
heap
page read and write
61B0000
trusted library section
page read and write
300E000
stack
page read and write
2AC0000
heap
page read and write
4CC0000
trusted library allocation
page execute and read and write
3110000
remote allocation
page read and write
916000
heap
page read and write
638E000
stack
page read and write
790000
heap
page read and write
65CC000
stack
page read and write
4E0000
heap
page read and write
268F000
stack
page read and write
1623000
heap
page read and write
1562000
trusted library allocation
page execute and read and write
4680000
trusted library allocation
page read and write
1980000
trusted library allocation
page read and write
29EE000
stack
page read and write
376B000
trusted library allocation
page read and write
740000
heap
page read and write
598E000
stack
page read and write
A32000
trusted library allocation
page execute and read and write
3773000
trusted library allocation
page read and write
648E000
stack
page read and write
1770000
trusted library allocation
page read and write
723000
heap
page read and write
58EE000
stack
page read and write
2D3E000
stack
page read and write
4527000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
5800000
trusted library allocation
page execute and read and write
4AE0000
trusted library allocation
page read and write
2B30000
heap
page read and write
5956000
heap
page execute and read and write
660000
heap
page read and write
35C0000
trusted library allocation
page read and write
2A8A000
stack
page read and write
81E000
unkown
page read and write
1430000
trusted library allocation
page read and write
158C000
trusted library allocation
page execute and read and write
720000
heap
page read and write
604F000
stack
page read and write
A30000
trusted library allocation
page read and write
89E000
stack
page read and write
F70000
heap
page read and write
91C000
trusted library allocation
page execute and read and write
196000
stack
page read and write
175E000
stack
page read and write
179A000
trusted library allocation
page execute and read and write
123A000
stack
page read and write
510E000
stack
page read and write
46F6000
trusted library allocation
page read and write
90A000
trusted library allocation
page execute and read and write
1550000
trusted library allocation
page read and write
365C000
trusted library allocation
page read and write
4C70000
heap
page read and write
2BCE000
stack
page read and write
5C5E000
stack
page read and write
20D0000
heap
page read and write
912000
trusted library allocation
page execute and read and write
4E8E000
stack
page read and write
6FA000
heap
page read and write
573E000
stack
page read and write
19C0000
trusted library allocation
page execute and read and write
A62000
trusted library allocation
page execute and read and write
3953000
trusted library allocation
page read and write
149E000
stack
page read and write
4FCE000
stack
page read and write
910000
trusted library allocation
page read and write
5C0E000
stack
page read and write
4CD0000
heap
page execute and read and write
D30000
heap
page read and write
6FA000
heap
page read and write
563C000
stack
page read and write
700000
heap
page read and write
3632000
trusted library allocation
page read and write
6D0000
heap
page read and write
522F000
stack
page read and write
A6A000
trusted library allocation
page execute and read and write
742000
heap
page read and write
29AE000
stack
page read and write
374C000
trusted library allocation
page read and write
E72000
unkown
page readonly
180E000
stack
page read and write
6860000
heap
page read and write
50EF000
stack
page read and write
1580000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
618B000
stack
page read and write
1625000
heap
page read and write
520E000
stack
page read and write
4D0D000
stack
page read and write
63F000
unkown
page read and write
6C0000
heap
page read and write
317E000
stack
page read and write
592E000
stack
page read and write
469E000
trusted library allocation
page read and write
D2C000
stack
page read and write
17A0000
trusted library allocation
page read and write
4CB4000
heap
page read and write
F20000
heap
page read and write
92A000
trusted library allocation
page execute and read and write
5BCE000
stack
page read and write
F80000
heap
page read and write
CEE000
stack
page read and write
5960000
heap
page execute and read and write
FB0000
heap
page read and write
C8E000
stack
page read and write
1660000
heap
page read and write
39A0000
trusted library allocation
page read and write
6F1000
heap
page read and write
BAF000
stack
page read and write
19D0000
heap
page read and write
5946000
heap
page execute and read and write
6FA000
heap
page read and write
6EF000
heap
page read and write
6D3000
heap
page read and write
2B10000
heap
page read and write
1336000
stack
page read and write
1455000
heap
page read and write
378D000
trusted library allocation
page read and write
5810000
heap
page execute and read and write
A7B000
trusted library allocation
page execute and read and write
35C6000
trusted library allocation
page read and write
1AC0000
heap
page read and write
6A1000
heap
page read and write
F19000
stack
page read and write
5D0E000
stack
page read and write
190F000
stack
page read and write
1854000
heap
page execute and read and write
700000
heap
page read and write
177C000
trusted library allocation
page execute and read and write
1C70000
trusted library allocation
page read and write
4647000
trusted library allocation
page read and write
870000
heap
page read and write
47FE000
trusted library allocation
page read and write
742000
heap
page read and write
378B000
trusted library allocation
page read and write
565E000
stack
page read and write
660E000
stack
page read and write
6E2000
heap
page read and write
6CDD000
stack
page read and write
20C0000
heap
page read and write
73C000
heap
page read and write
5F00000
trusted library section
page read and write
1510000
heap
page read and write
2B8F000
unkown
page read and write
3969000
trusted library allocation
page read and write
6F6000
stack
page read and write
25DF000
stack
page read and write
927000
trusted library allocation
page execute and read and write
1375000
heap
page read and write
3B9000
stack
page read and write
1576000
trusted library allocation
page execute and read and write
4CC0000
trusted library allocation
page execute and read and write
1860000
heap
page read and write
C3A000
trusted library allocation
page execute and read and write
82F000
heap
page read and write
7F280000
trusted library allocation
page execute and read and write
196E000
stack
page read and write
874000
heap
page read and write
4B30000
heap
page read and write
4508000
trusted library allocation
page read and write
705000
heap
page read and write
5B5E000
stack
page read and write
12F6000
stack
page read and write
9CF000
stack
page read and write
29F0000
heap
page read and write
6DD000
heap
page read and write
6E0000
heap
page read and write
15D9000
heap
page read and write
A22000
trusted library allocation
page execute and read and write
780000
heap
page execute and read and write
376D000
trusted library allocation
page read and write
4D86000
heap
page execute and read and write
3110000
remote allocation
page read and write
4601000
trusted library allocation
page read and write
2EE0000
heap
page read and write
64CC000
stack
page read and write
5940000
heap
page execute and read and write
3775000
trusted library allocation
page read and write
4D6E000
stack
page read and write
363A000
trusted library allocation
page read and write
4D80000
heap
page execute and read and write
2A2C000
trusted library allocation
page read and write
155E000
stack
page read and write
6DB000
heap
page read and write
57A4000
heap
page read and write
1597000
trusted library allocation
page execute and read and write
9B1000
heap
page read and write
214E000
stack
page read and write
162D000
heap
page read and write
393D000
trusted library allocation
page read and write
1772000
trusted library allocation
page execute and read and write
15D0000
heap
page read and write
4F0000
heap
page read and write
A4A000
trusted library allocation
page execute and read and write
57D0000
heap
page read and write
680000
heap
page read and write
6E1E000
stack
page read and write
14DE000
stack
page read and write
1568000
heap
page read and write
5820000
heap
page read and write
1AA0000
heap
page execute and read and write
206F000
stack
page read and write
5824000
heap
page read and write
705000
heap
page read and write
351A000
trusted library allocation
page read and write
C32000
trusted library allocation
page execute and read and write
461D000
trusted library allocation
page read and write
1850000
heap
page execute and read and write
1582000
trusted library allocation
page execute and read and write
54C8000
trusted library allocation
page read and write
7DE000
stack
page read and write
4597000
trusted library allocation
page read and write
4633000
trusted library allocation
page read and write
85F000
unkown
page read and write
F70000
heap
page read and write
512E000
stack
page read and write
670E000
stack
page read and write
634E000
stack
page read and write
34C1000
trusted library allocation
page read and write
5950000
heap
page execute and read and write
A10000
trusted library allocation
page read and write
3987000
trusted library allocation
page read and write
6E1000
heap
page read and write
376F000
trusted library allocation
page read and write
745000
heap
page read and write
3645000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute and read and write
73C000
heap
page read and write
9AF000
heap
page read and write
6E1000
heap
page read and write
A77000
trusted library allocation
page execute and read and write
6EF000
heap
page read and write
4C90000
heap
page read and write
700000
heap
page read and write
1572000
trusted library allocation
page read and write
4CB0000
heap
page read and write
1CA0000
heap
page read and write
4AC0000
trusted library allocation
page read and write
310D000
stack
page read and write
1442000
trusted library allocation
page execute and read and write
9C000
stack
page read and write
61D0000
trusted library allocation
page read and write
67A000
stack
page read and write
A47000
trusted library allocation
page execute and read and write
3110000
remote allocation
page read and write
5910000
heap
page execute and read and write
1570000
trusted library allocation
page read and write
4FAF000
stack
page read and write
1590000
trusted library allocation
page read and write
670000
heap
page read and write
6C7000
heap
page read and write
14E0000
heap
page read and write
21A0000
heap
page read and write
19D000
stack
page read and write
2BFF000
stack
page read and write
730000
heap
page read and write
3E9000
stack
page read and write
50CE000
stack
page read and write
15D8000
heap
page read and write
362B000
trusted library allocation
page read and write
667000
heap
page read and write
4B00000
trusted library allocation
page execute and read and write
688000
heap
page read and write
20E0000
heap
page read and write
4FEE000
stack
page read and write
6EB000
heap
page read and write
2EEA000
heap
page read and write
45EF000
trusted library allocation
page read and write
161F000
heap
page read and write
5DDC000
stack
page read and write
6960000
heap
page read and write
1560000
heap
page read and write
1594000
heap
page read and write
CAF000
stack
page read and write
13D0000
trusted library section
page read and write
1762000
trusted library allocation
page execute and read and write
4DA0000
heap
page execute and read and write
4EAE000
stack
page read and write
705000
heap
page read and write
7FE000
heap
page read and write
184E000
stack
page read and write
296E000
stack
page read and write
A50000
heap
page read and write
E50000
unkown
page readonly
176A000
trusted library allocation
page execute and read and write
2AFE000
stack
page read and write
15B0000
heap
page read and write
54C0000
trusted library allocation
page read and write
D80000
heap
page execute and read and write
1592000
trusted library allocation
page read and write
4D1E000
stack
page read and write
6BDC000
stack
page read and write
15DB000
heap
page read and write
6A3000
heap
page read and write
47A6000
trusted library allocation
page read and write
2CFF000
stack
page read and write
608C000
stack
page read and write
19A0000
trusted library allocation
page read and write
19D5000
heap
page read and write
297C000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
69D000
heap
page read and write
5750000
trusted library allocation
page execute and read and write
3921000
trusted library allocation
page read and write
FFE000
stack
page read and write
15DE000
heap
page read and write
7FA000
heap
page read and write
1C90000
trusted library allocation
page read and write
61C1000
trusted library allocation
page read and write
19B000
stack
page read and write
17AB000
trusted library allocation
page execute and read and write
2730000
heap
page read and write
9FE000
stack
page read and write
158A000
trusted library allocation
page execute and read and write
4F5000
heap
page read and write
69D000
heap
page read and write
964000
heap
page read and write
44C1000
trusted library allocation
page read and write
1787000
trusted library allocation
page execute and read and write
17A7000
trusted library allocation
page execute and read and write
4ACE000
stack
page read and write
7F9E0000
trusted library allocation
page execute and read and write
740000
heap
page read and write
6A1000
heap
page read and write
35FE000
trusted library allocation
page read and write
7EE80000
trusted library allocation
page execute and read and write
58A0000
heap
page read and write
6D1E000
stack
page read and write
D7B000
stack
page read and write
4649000
trusted library allocation
page read and write
4540000
trusted library allocation
page read and write
4D5E000
stack
page read and write
5EF0000
trusted library allocation
page execute and read and write
938000
heap
page read and write
There are 407 hidden memdumps, click here to show them.