Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
xm393ns0.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\jZQs-eo6N153d.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\xm393ns0.exe
|
"C:\Users\user\Desktop\xm393ns0.exe"
|
||
C:\Windows\SysWOW64\systeminfo.exe
|
systeminfo /fo csv
|
||
C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
|
C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c "del C:\Users\user\Desktop\xm393ns0.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://LjZQsnIZIOXO7P.db0.xyz/
|
64.225.4.76
|
||
http://historycmd.exefloat32float64UpgradeReferer
|
unknown
|
||
https://forms.office.com/r/i1h9pFXbKA
|
unknown
|
||
http://LjZQsnIZIOXO7P.db0.xyz
|
unknown
|
||
http://LjZQsnIZIOXO7P.db0.xyzLjZQsnIZIOXO7P.db0.xyz:80REQUEST_METHODtcpLjZQsnIZIOXO7P.db0.xyziphlpap
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
LjZQsnIZIOXO7P.db0.xyz
|
64.225.4.76
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
64.225.4.76
|
LjZQsnIZIOXO7P.db0.xyz
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\159\52C64B7E
|
@%SystemRoot%\system32\mlang.dll,-4386
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AD0A000
|
direct allocation
|
page read and write
|
||
ACB4000
|
direct allocation
|
page read and write
|
||
2B2D0000
|
heap
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
AC2E000
|
direct allocation
|
page read and write
|
||
AC16000
|
direct allocation
|
page read and write
|
||
ACA4000
|
direct allocation
|
page read and write
|
||
ACEE000
|
direct allocation
|
page read and write
|
||
AC35000
|
direct allocation
|
page read and write
|
||
ACEC000
|
direct allocation
|
page read and write
|
||
2FA000
|
heap
|
page read and write
|
||
2B4C0000
|
heap
|
page read and write
|
||
AC30000
|
direct allocation
|
page read and write
|
||
AC84000
|
direct allocation
|
page read and write
|
||
8FE000
|
unkown
|
page write copy
|
||
AC42000
|
direct allocation
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
573000
|
heap
|
page read and write
|
||
AC1A000
|
direct allocation
|
page read and write
|
||
AC92000
|
direct allocation
|
page read and write
|
||
223F000
|
stack
|
page read and write
|
||
ACE8000
|
direct allocation
|
page read and write
|
||
2B77E000
|
stack
|
page read and write
|
||
22B0000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
ACB2000
|
direct allocation
|
page read and write
|
||
2EC000
|
heap
|
page read and write
|
||
AC56000
|
direct allocation
|
page read and write
|
||
8D4000
|
unkown
|
page read and write
|
||
AC66000
|
direct allocation
|
page read and write
|
||
ACA4000
|
direct allocation
|
page read and write
|
||
AD82000
|
direct allocation
|
page read and write
|
||
AC70000
|
direct allocation
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
2ED000
|
heap
|
page read and write
|
||
AE08000
|
direct allocation
|
page read and write
|
||
20BE000
|
stack
|
page read and write
|
||
8C4000
|
unkown
|
page read and write
|
||
ACD4000
|
direct allocation
|
page read and write
|
||
AD02000
|
direct allocation
|
page read and write
|
||
AC1C000
|
direct allocation
|
page read and write
|
||
3E0000
|
direct allocation
|
page read and write
|
||
583000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
AC78000
|
direct allocation
|
page read and write
|
||
2FA000
|
heap
|
page read and write
|
||
AC18000
|
direct allocation
|
page read and write
|
||
AC4A000
|
direct allocation
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
AC9E000
|
direct allocation
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
ACB8000
|
direct allocation
|
page read and write
|
||
2EB000
|
heap
|
page read and write
|
||
2B111000
|
direct allocation
|
page read and write
|
||
AC2A000
|
direct allocation
|
page read and write
|
||
2FF000
|
heap
|
page read and write
|
||
2F8000
|
heap
|
page read and write
|
||
AC48000
|
direct allocation
|
page read and write
|
||
AE14000
|
direct allocation
|
page read and write
|
||
AE1E000
|
direct allocation
|
page read and write
|
||
ACD2000
|
direct allocation
|
page read and write
|
||
2B4D1000
|
heap
|
page read and write
|
||
AC22000
|
direct allocation
|
page read and write
|
||
ACFF000
|
direct allocation
|
page read and write
|
||
2B87F000
|
stack
|
page read and write
|
||
AC10000
|
direct allocation
|
page read and write
|
||
21FE000
|
stack
|
page read and write
|
||
ACAC000
|
direct allocation
|
page read and write
|
||
AE08000
|
direct allocation
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
2EB000
|
heap
|
page read and write
|
||
22F4000
|
direct allocation
|
page read and write
|
||
ACB0000
|
direct allocation
|
page read and write
|
||
278000
|
direct allocation
|
page read and write
|
||
2E9000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
270000
|
direct allocation
|
page read and write
|
||
ACAE000
|
direct allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
21CD000
|
stack
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
11C000
|
stack
|
page read and write
|
||
200000
|
heap
|
page read and write
|
||
AC46000
|
direct allocation
|
page read and write
|
||
301000
|
heap
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
ACF1000
|
direct allocation
|
page read and write
|
||
2B5FF000
|
stack
|
page read and write
|
||
ACDE000
|
direct allocation
|
page read and write
|
||
2210000
|
direct allocation
|
page read and write
|
||
A4D000
|
stack
|
page read and write
|
||
ACEC000
|
direct allocation
|
page read and write
|
||
2E3000
|
heap
|
page read and write
|
||
ACDE000
|
direct allocation
|
page read and write
|
||
2B7000
|
heap
|
page read and write
|
||
897000
|
unkown
|
page write copy
|
||
AC5C000
|
direct allocation
|
page read and write
|
||
547000
|
heap
|
page read and write
|
||
AC86000
|
direct allocation
|
page read and write
|
||
2E3000
|
heap
|
page read and write
|
||
896000
|
unkown
|
page read and write
|
||
ACAA000
|
direct allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
8D9000
|
unkown
|
page read and write
|
||
898000
|
unkown
|
page read and write
|
||
2315000
|
direct allocation
|
page read and write
|
||
AC12000
|
direct allocation
|
page read and write
|
||
ACA0000
|
direct allocation
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
20000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
AACF000
|
stack
|
page read and write
|
||
2ACFF000
|
stack
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
AC8E000
|
direct allocation
|
page read and write
|
||
21D0000
|
direct allocation
|
page read and write
|
||
213F000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
AD04000
|
direct allocation
|
page read and write
|
||
AC37000
|
direct allocation
|
page read and write
|
||
AE04000
|
direct allocation
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
2F7000
|
heap
|
page read and write
|
||
ACBA000
|
direct allocation
|
page read and write
|
||
893000
|
unkown
|
page read and write
|
||
AC6A000
|
direct allocation
|
page read and write
|
||
AC9E000
|
direct allocation
|
page read and write
|
||
2E1000
|
heap
|
page read and write
|
||
300000
|
heap
|
page read and write
|
||
ACD4000
|
direct allocation
|
page read and write
|
||
899000
|
unkown
|
page write copy
|
||
585000
|
heap
|
page read and write
|
||
AE80000
|
direct allocation
|
page read and write
|
||
AC52000
|
direct allocation
|
page read and write
|
||
ACA2000
|
direct allocation
|
page read and write
|
||
ACAE000
|
direct allocation
|
page read and write
|
||
B880000
|
direct allocation
|
page read and write
|
||
217F000
|
stack
|
page read and write
|
||
ACBA000
|
direct allocation
|
page read and write
|
||
2B10F000
|
stack
|
page read and write
|
||
676000
|
unkown
|
page readonly
|
||
AC92000
|
direct allocation
|
page read and write
|
||
ACE2000
|
direct allocation
|
page read and write
|
||
AC5E000
|
direct allocation
|
page read and write
|
||
8FF000
|
unkown
|
page readonly
|
||
676000
|
unkown
|
page readonly
|
||
AC90000
|
direct allocation
|
page read and write
|
||
895000
|
unkown
|
page write copy
|
||
2E2000
|
heap
|
page read and write
|
||
AC64000
|
direct allocation
|
page read and write
|
||
2D4000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
AE02000
|
direct allocation
|
page read and write
|
||
2FD000
|
heap
|
page read and write
|
||
2337000
|
direct allocation
|
page read and write
|
||
AD21000
|
direct allocation
|
page read and write
|
||
AD12000
|
direct allocation
|
page read and write
|
||
2DE000
|
stack
|
page read and write
|
||
ACB8000
|
direct allocation
|
page read and write
|
||
8CC000
|
unkown
|
page read and write
|
||
AE26000
|
direct allocation
|
page read and write
|
||
AC08000
|
direct allocation
|
page read and write
|
||
AC74000
|
direct allocation
|
page read and write
|
||
2B18F000
|
stack
|
page read and write
|
||
AC98000
|
direct allocation
|
page read and write
|
||
ACA2000
|
direct allocation
|
page read and write
|
||
AC0C000
|
direct allocation
|
page read and write
|
||
2B28F000
|
stack
|
page read and write
|
||
ABD0000
|
direct allocation
|
page read and write
|
||
8C000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A9CF000
|
stack
|
page read and write
|
||
AC90000
|
direct allocation
|
page read and write
|
||
AC40000
|
direct allocation
|
page read and write
|
||
AC00000
|
direct allocation
|
page read and write
|
||
2290000
|
direct allocation
|
page read and write
|
||
AD8C000
|
direct allocation
|
page read and write
|
||
AC3B000
|
direct allocation
|
page read and write
|
||
AC94000
|
direct allocation
|
page read and write
|
||
AC14000
|
direct allocation
|
page read and write
|
||
2B700000
|
heap
|
page read and write
|
||
2F5000
|
heap
|
page read and write
|
||
8F4000
|
unkown
|
page read and write
|
||
AE00000
|
direct allocation
|
page read and write
|
||
AC44000
|
direct allocation
|
page read and write
|
||
ABCF000
|
stack
|
page read and write
|
||
AC9C000
|
direct allocation
|
page read and write
|
||
AC7C000
|
direct allocation
|
page read and write
|
||
2B8BE000
|
stack
|
page read and write
|
||
ACE2000
|
direct allocation
|
page read and write
|
||
2B00D000
|
stack
|
page read and write
|
||
3D0000
|
direct allocation
|
page read and write
|
||
ACB0000
|
direct allocation
|
page read and write
|
||
AE24000
|
direct allocation
|
page read and write
|
||
2B6FD000
|
stack
|
page read and write
|
||
AE14000
|
direct allocation
|
page read and write
|
||
8CB000
|
unkown
|
page write copy
|
||
AC5A000
|
direct allocation
|
page read and write
|
||
AC98000
|
direct allocation
|
page read and write
|
||
2B9BF000
|
stack
|
page read and write
|
||
AD18000
|
direct allocation
|
page read and write
|
||
AE02000
|
direct allocation
|
page read and write
|
||
2B48D000
|
stack
|
page read and write
|
||
AC0A000
|
direct allocation
|
page read and write
|
||
301000
|
heap
|
page read and write
|
||
ACF1000
|
direct allocation
|
page read and write
|
||
AC4E000
|
direct allocation
|
page read and write
|
||
573000
|
heap
|
page read and write
|
||
ACCC000
|
direct allocation
|
page read and write
|
||
ACFD000
|
direct allocation
|
page read and write
|
||
ACB2000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
AC0E000
|
direct allocation
|
page read and write
|
||
AE26000
|
direct allocation
|
page read and write
|
||
18D000
|
stack
|
page read and write
|
||
7ED000
|
heap
|
page read and write
|
||
ACCC000
|
direct allocation
|
page read and write
|
||
ACEE000
|
direct allocation
|
page read and write
|
||
AC04000
|
direct allocation
|
page read and write
|
||
AC26000
|
direct allocation
|
page read and write
|
||
AD8C000
|
direct allocation
|
page read and write
|
||
1D4F000
|
stack
|
page read and write
|
||
AC72000
|
direct allocation
|
page read and write
|
||
2B2CE000
|
stack
|
page read and write
|
||
AE24000
|
direct allocation
|
page read and write
|
||
2E0000
|
heap
|
page read and write
|
||
AC6E000
|
direct allocation
|
page read and write
|
||
2B32D000
|
heap
|
page read and write
|
||
AC02000
|
direct allocation
|
page read and write
|
||
2FD000
|
heap
|
page read and write
|
||
ACD2000
|
direct allocation
|
page read and write
|
||
AC1E000
|
direct allocation
|
page read and write
|
||
ACF4000
|
direct allocation
|
page read and write
|
||
2B310000
|
heap
|
page read and write
|
||
2F6000
|
heap
|
page read and write
|
||
22D2000
|
direct allocation
|
page read and write
|
||
AC20000
|
direct allocation
|
page read and write
|
||
2EF000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
AC80000
|
direct allocation
|
page read and write
|
||
AC9A000
|
direct allocation
|
page read and write
|
||
AC96000
|
direct allocation
|
page read and write
|
||
8D000
|
stack
|
page read and write
|
||
893000
|
unkown
|
page write copy
|
||
257000
|
heap
|
page read and write
|
||
AC7E000
|
direct allocation
|
page read and write
|
||
8FB000
|
unkown
|
page read and write
|
||
AC7A000
|
direct allocation
|
page read and write
|
||
2F0000
|
heap
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
ACB4000
|
direct allocation
|
page read and write
|
||
AC28000
|
direct allocation
|
page read and write
|
||
8FF000
|
unkown
|
page readonly
|
||
8FE000
|
unkown
|
page write copy
|
There are 249 hidden memdumps, click here to show them.