Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
xuI8pQHlxExL.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\xuI8pQHlxExL.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\xuI8pQHlxExL.exe
|
"C:\Users\user\Desktop\xuI8pQHlxExL.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xuI8pQHlxExL.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
resilencia2023.duckdns.org
|
|||
http://go.microsoft.
|
unknown
|
||
http://go.microsoft.LinkId=42127
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
resilencia2023.duckdns.org
|
179.14.8.182
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
179.14.8.182
|
resilencia2023.duckdns.org
|
Colombia
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\SOFTWARE\8abd92e56969
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9C2000
|
unkown
|
page readonly
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
heap
|
page read and write
|
||
1302000
|
trusted library allocation
|
page read and write
|
||
69C0000
|
heap
|
page read and write
|
||
1368000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
heap
|
page read and write
|
||
5D30000
|
heap
|
page read and write
|
||
52AC000
|
stack
|
page read and write
|
||
10DA000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page execute and read and write
|
||
F85000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
3075000
|
trusted library allocation
|
page read and write
|
||
1307000
|
trusted library allocation
|
page execute and read and write
|
||
5770000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
heap
|
page read and write
|
||
10BA000
|
trusted library allocation
|
page execute and read and write
|
||
358A000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
5CBD000
|
stack
|
page read and write
|
||
5BBB000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
10B2000
|
trusted library allocation
|
page execute and read and write
|
||
134E000
|
stack
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
D56000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
6AC0000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
5329000
|
stack
|
page read and write
|
||
5170000
|
trusted library allocation
|
page execute and read and write
|
||
F7A000
|
heap
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
7FC40000
|
trusted library allocation
|
page execute and read and write
|
||
552E000
|
stack
|
page read and write
|
||
30BE000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
2BBD000
|
stack
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
10C2000
|
trusted library allocation
|
page execute and read and write
|
||
C5A000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
F6A000
|
heap
|
page read and write
|
||
10CA000
|
trusted library allocation
|
page execute and read and write
|
||
35B0000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
10D7000
|
trusted library allocation
|
page execute and read and write
|
||
9C8000
|
unkown
|
page readonly
|
||
525B000
|
stack
|
page read and write
|
||
5800000
|
heap
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
D59000
|
stack
|
page read and write
|
||
5D35000
|
heap
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
130B000
|
trusted library allocation
|
page execute and read and write
|
||
F6E000
|
heap
|
page read and write
|
||
2ABD000
|
stack
|
page read and write
|
||
515D000
|
stack
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page execute and read and write
|
||
309E000
|
unkown
|
page read and write
|
||
309A000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
310C000
|
heap
|
page read and write
|
||
10EA000
|
trusted library allocation
|
page execute and read and write
|
||
521C000
|
stack
|
page read and write
|
||
10E2000
|
trusted library allocation
|
page execute and read and write
|
||
F48000
|
heap
|
page read and write
|
||
F11000
|
heap
|
page read and write
|
||
2F3E000
|
unkown
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
4021000
|
trusted library allocation
|
page read and write
|
||
35B8000
|
trusted library allocation
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
E8C000
|
stack
|
page read and write
|
||
52E3000
|
heap
|
page read and write
|
||
505B000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
There are 95 hidden memdumps, click here to show them.