IOC Report
xm393ns0.exe

loading gif

Files

File Path
Type
Category
Malicious
xm393ns0.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\jZQs-eo6N153d.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xm393ns0.exe
"C:\Users\user\Desktop\xm393ns0.exe"
malicious
C:\Windows\SysWOW64\systeminfo.exe
systeminfo /fo csv
malicious
C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c "del C:\Users\user\Desktop\xm393ns0.exe"

URLs

Name
IP
Malicious
http://LjZQsnIZIOXO7P.db0.xyz/
64.225.4.76
http://historycmd.exefloat32float64UpgradeReferer
unknown
https://forms.office.com/r/i1h9pFXbKA
unknown
http://LjZQsnIZIOXO7P.db0.xyz
unknown
http://LjZQsnIZIOXO7P.db0.xyzLjZQsnIZIOXO7P.db0.xyz:80REQUEST_METHODtcpLjZQsnIZIOXO7P.db0.xyziphlpap
unknown

Domains

Name
IP
Malicious
LjZQsnIZIOXO7P.db0.xyz
64.225.4.76
malicious

IPs

IP
Domain
Country
Malicious
64.225.4.76
LjZQsnIZIOXO7P.db0.xyz
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_CLASSES\Local Settings\MuiCache\159\52C64B7E
@%SystemRoot%\system32\mlang.dll,-4386

Memdumps

Base Address
Regiontype
Protect
Malicious
AD0A000
direct allocation
page read and write
ACB4000
direct allocation
page read and write
2B2D0000
heap
page read and write
588000
heap
page read and write
2E4000
heap
page read and write
AC2E000
direct allocation
page read and write
AC16000
direct allocation
page read and write
ACA4000
direct allocation
page read and write
ACEE000
direct allocation
page read and write
AC35000
direct allocation
page read and write
ACEC000
direct allocation
page read and write
2FA000
heap
page read and write
2B4C0000
heap
page read and write
AC30000
direct allocation
page read and write
AC84000
direct allocation
page read and write
8FE000
unkown
page write copy
AC42000
direct allocation
page read and write
20000
heap
page read and write
573000
heap
page read and write
AC1A000
direct allocation
page read and write
AC92000
direct allocation
page read and write
223F000
stack
page read and write
ACE8000
direct allocation
page read and write
2B77E000
stack
page read and write
22B0000
direct allocation
page read and write
10000
heap
page read and write
ACB2000
direct allocation
page read and write
2EC000
heap
page read and write
AC56000
direct allocation
page read and write
8D4000
unkown
page read and write
AC66000
direct allocation
page read and write
ACA4000
direct allocation
page read and write
AD82000
direct allocation
page read and write
AC70000
direct allocation
page read and write
2E0000
heap
page read and write
2ED000
heap
page read and write
AE08000
direct allocation
page read and write
20BE000
stack
page read and write
8C4000
unkown
page read and write
ACD4000
direct allocation
page read and write
AD02000
direct allocation
page read and write
AC1C000
direct allocation
page read and write
3E0000
direct allocation
page read and write
583000
heap
page read and write
400000
unkown
page readonly
AC78000
direct allocation
page read and write
2FA000
heap
page read and write
AC18000
direct allocation
page read and write
AC4A000
direct allocation
page read and write
9CE000
stack
page read and write
AC9E000
direct allocation
page read and write
A67000
heap
page read and write
ACB8000
direct allocation
page read and write
2EB000
heap
page read and write
2B111000
direct allocation
page read and write
AC2A000
direct allocation
page read and write
2FF000
heap
page read and write
2F8000
heap
page read and write
AC48000
direct allocation
page read and write
AE14000
direct allocation
page read and write
AE1E000
direct allocation
page read and write
ACD2000
direct allocation
page read and write
2B4D1000
heap
page read and write
AC22000
direct allocation
page read and write
ACFF000
direct allocation
page read and write
2B87F000
stack
page read and write
AC10000
direct allocation
page read and write
21FE000
stack
page read and write
ACAC000
direct allocation
page read and write
AE08000
direct allocation
page read and write
2E4000
heap
page read and write
2EB000
heap
page read and write
22F4000
direct allocation
page read and write
ACB0000
direct allocation
page read and write
278000
direct allocation
page read and write
2E9000
heap
page read and write
10000
heap
page read and write
53E000
stack
page read and write
270000
direct allocation
page read and write
ACAE000
direct allocation
page read and write
A0E000
stack
page read and write
21CD000
stack
page read and write
300000
heap
page read and write
11C000
stack
page read and write
200000
heap
page read and write
AC46000
direct allocation
page read and write
301000
heap
page read and write
585000
heap
page read and write
ACF1000
direct allocation
page read and write
2B5FF000
stack
page read and write
ACDE000
direct allocation
page read and write
2210000
direct allocation
page read and write
A4D000
stack
page read and write
ACEC000
direct allocation
page read and write
2E3000
heap
page read and write
ACDE000
direct allocation
page read and write
2B7000
heap
page read and write
897000
unkown
page write copy
AC5C000
direct allocation
page read and write
547000
heap
page read and write
AC86000
direct allocation
page read and write
2E3000
heap
page read and write
896000
unkown
page read and write
ACAA000
direct allocation
page read and write
540000
heap
page read and write
8D9000
unkown
page read and write
898000
unkown
page read and write
2315000
direct allocation
page read and write
AC12000
direct allocation
page read and write
ACA0000
direct allocation
page read and write
2B0000
heap
page read and write
250000
heap
page read and write
20000
heap
page read and write
401000
unkown
page execute read
AACF000
stack
page read and write
2ACFF000
stack
page read and write
2E4000
heap
page read and write
AC8E000
direct allocation
page read and write
21D0000
direct allocation
page read and write
213F000
stack
page read and write
7D0000
heap
page read and write
AD04000
direct allocation
page read and write
AC37000
direct allocation
page read and write
AE04000
direct allocation
page read and write
59A000
heap
page read and write
2250000
heap
page read and write
2F7000
heap
page read and write
ACBA000
direct allocation
page read and write
893000
unkown
page read and write
AC6A000
direct allocation
page read and write
AC9E000
direct allocation
page read and write
2E1000
heap
page read and write
300000
heap
page read and write
ACD4000
direct allocation
page read and write
899000
unkown
page write copy
585000
heap
page read and write
AE80000
direct allocation
page read and write
AC52000
direct allocation
page read and write
ACA2000
direct allocation
page read and write
ACAE000
direct allocation
page read and write
B880000
direct allocation
page read and write
217F000
stack
page read and write
ACBA000
direct allocation
page read and write
2B10F000
stack
page read and write
676000
unkown
page readonly
AC92000
direct allocation
page read and write
ACE2000
direct allocation
page read and write
AC5E000
direct allocation
page read and write
8FF000
unkown
page readonly
676000
unkown
page readonly
AC90000
direct allocation
page read and write
895000
unkown
page write copy
2E2000
heap
page read and write
AC64000
direct allocation
page read and write
2D4000
heap
page read and write
A60000
heap
page read and write
AE02000
direct allocation
page read and write
2FD000
heap
page read and write
2337000
direct allocation
page read and write
AD21000
direct allocation
page read and write
AD12000
direct allocation
page read and write
2DE000
stack
page read and write
ACB8000
direct allocation
page read and write
8CC000
unkown
page read and write
AE26000
direct allocation
page read and write
AC08000
direct allocation
page read and write
AC74000
direct allocation
page read and write
2B18F000
stack
page read and write
AC98000
direct allocation
page read and write
ACA2000
direct allocation
page read and write
AC0C000
direct allocation
page read and write
2B28F000
stack
page read and write
ABD0000
direct allocation
page read and write
8C000
stack
page read and write
564000
heap
page read and write
A9CF000
stack
page read and write
AC90000
direct allocation
page read and write
AC40000
direct allocation
page read and write
AC00000
direct allocation
page read and write
2290000
direct allocation
page read and write
AD8C000
direct allocation
page read and write
AC3B000
direct allocation
page read and write
AC94000
direct allocation
page read and write
AC14000
direct allocation
page read and write
2B700000
heap
page read and write
2F5000
heap
page read and write
8F4000
unkown
page read and write
AE00000
direct allocation
page read and write
AC44000
direct allocation
page read and write
ABCF000
stack
page read and write
AC9C000
direct allocation
page read and write
AC7C000
direct allocation
page read and write
2B8BE000
stack
page read and write
ACE2000
direct allocation
page read and write
2B00D000
stack
page read and write
3D0000
direct allocation
page read and write
ACB0000
direct allocation
page read and write
AE24000
direct allocation
page read and write
2B6FD000
stack
page read and write
AE14000
direct allocation
page read and write
8CB000
unkown
page write copy
AC5A000
direct allocation
page read and write
AC98000
direct allocation
page read and write
2B9BF000
stack
page read and write
AD18000
direct allocation
page read and write
AE02000
direct allocation
page read and write
2B48D000
stack
page read and write
AC0A000
direct allocation
page read and write
301000
heap
page read and write
ACF1000
direct allocation
page read and write
AC4E000
direct allocation
page read and write
573000
heap
page read and write
ACCC000
direct allocation
page read and write
ACFD000
direct allocation
page read and write
ACB2000
direct allocation
page read and write
401000
unkown
page execute read
AC0E000
direct allocation
page read and write
AE26000
direct allocation
page read and write
18D000
stack
page read and write
7ED000
heap
page read and write
ACCC000
direct allocation
page read and write
ACEE000
direct allocation
page read and write
AC04000
direct allocation
page read and write
AC26000
direct allocation
page read and write
AD8C000
direct allocation
page read and write
1D4F000
stack
page read and write
AC72000
direct allocation
page read and write
2B2CE000
stack
page read and write
AE24000
direct allocation
page read and write
2E0000
heap
page read and write
AC6E000
direct allocation
page read and write
2B32D000
heap
page read and write
AC02000
direct allocation
page read and write
2FD000
heap
page read and write
ACD2000
direct allocation
page read and write
AC1E000
direct allocation
page read and write
ACF4000
direct allocation
page read and write
2B310000
heap
page read and write
2F6000
heap
page read and write
22D2000
direct allocation
page read and write
AC20000
direct allocation
page read and write
2EF000
heap
page read and write
400000
unkown
page readonly
1F0000
heap
page read and write
AC80000
direct allocation
page read and write
AC9A000
direct allocation
page read and write
AC96000
direct allocation
page read and write
8D000
stack
page read and write
893000
unkown
page write copy
257000
heap
page read and write
AC7E000
direct allocation
page read and write
8FB000
unkown
page read and write
AC7A000
direct allocation
page read and write
2F0000
heap
page read and write
588000
heap
page read and write
ACB4000
direct allocation
page read and write
AC28000
direct allocation
page read and write
8FF000
unkown
page readonly
8FE000
unkown
page write copy
There are 249 hidden memdumps, click here to show them.