IOC Report
xyyDAUDPeYEH.exe

loading gif

Files

File Path
Type
Category
Malicious
xyyDAUDPeYEH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\xyyDAUDPeYEH.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xyyDAUDPeYEH.exe
"C:\Users\user\Desktop\xyyDAUDPeYEH.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\xyyDAUDPeYEH.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
rusia.duckdns.org
malicious
http://go.microsoft.
unknown
http://go.microsoft.LinkId=42127
unknown

Domains

Name
IP
Malicious
rusia.duckdns.org
46.246.6.20
malicious

IPs

IP
Domain
Country
Malicious
46.246.6.20
rusia.duckdns.org
Sweden
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di

Memdumps

Base Address
Regiontype
Protect
Malicious
A72000
unkown
page readonly
malicious
3091000
trusted library allocation
page read and write
malicious
1382000
heap
page read and write
6B90000
heap
page read and write
109A000
trusted library allocation
page execute and read and write
1386000
heap
page read and write
BBE000
stack
page read and write
106A000
trusted library allocation
page execute and read and write
10A7000
trusted library allocation
page execute and read and write
1010000
heap
page read and write
1046000
heap
page read and write
52A0000
heap
page read and write
1290000
heap
page read and write
EF9000
stack
page read and write
FF0000
heap
page read and write
A78000
unkown
page readonly
1092000
trusted library allocation
page execute and read and write
225D000
stack
page read and write
2621000
heap
page read and write
1087000
trusted library allocation
page execute and read and write
B70000
heap
page read and write
5A9C000
stack
page read and write
6B80000
heap
page read and write
27E0000
heap
page read and write
5290000
trusted library allocation
page read and write
55CE000
stack
page read and write
1090000
trusted library allocation
page read and write
235C000
stack
page read and write
108A000
trusted library allocation
page execute and read and write
10A0000
trusted library allocation
page read and write
7F180000
trusted library allocation
page execute and read and write
2600000
heap
page read and write
131B000
heap
page read and write
52A3000
heap
page read and write
1062000
trusted library allocation
page execute and read and write
3128000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
B60000
heap
page read and write
3122000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
296E000
stack
page read and write
1080000
trusted library allocation
page read and write
1072000
trusted library allocation
page execute and read and write
1040000
heap
page read and write
2C40000
heap
page read and write
2A6F000
stack
page read and write
11CE000
stack
page read and write
536C000
stack
page read and write
10C0000
heap
page read and write
1320000
heap
page read and write
5420000
trusted library allocation
page execute and read and write
10AB000
trusted library allocation
page execute and read and write
532B000
stack
page read and write
570E000
stack
page read and write
558E000
stack
page read and write
12B0000
heap
page read and write
10A2000
trusted library allocation
page read and write
580E000
stack
page read and write
282E000
unkown
page read and write
10C5000
heap
page read and write
5D6E000
stack
page read and write
23C0000
heap
page read and write
12BE000
heap
page read and write
A70000
unkown
page readonly
1389000
heap
page read and write
52EC000
stack
page read and write
56CE000
stack
page read and write
522C000
stack
page read and write
1333000
heap
page read and write
128C000
stack
page read and write
5DF0000
heap
page read and write
BFE000
stack
page read and write
260C000
heap
page read and write
59D0000
heap
page read and write
5990000
heap
page read and write
53A9000
stack
page read and write
1240000
heap
page execute and read and write
6A88000
heap
page read and write
12A0000
trusted library allocation
page execute and read and write
292F000
unkown
page read and write
5C6B000
stack
page read and write
1362000
heap
page read and write
14AE000
stack
page read and write
2631000
heap
page read and write
548E000
stack
page read and write
12EF000
heap
page read and write
EF6000
stack
page read and write
53B0000
trusted library allocation
page read and write
5ADD000
stack
page read and write
59A0000
heap
page read and write
5820000
trusted library allocation
page execute and read and write
2D4E000
stack
page read and write
120E000
stack
page read and write
1230000
trusted library allocation
page read and write
B09000
stack
page read and write
23D0000
heap
page read and write
107A000
trusted library allocation
page execute and read and write
4091000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
2A70000
heap
page read and write
There are 90 hidden memdumps, click here to show them.