IOC Report
XMx8r7SLZr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XMx8r7SLZr.exe
"C:\Users\user\Desktop\XMx8r7SLZr.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://login.microsoftonline.com/common/oauth2/v2.0/tokenI
unknown
https://login.microsoftonline.com/
unknown
https://login.microsoftonline.com/error?code=70000
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/token.dllk
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokenlll
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokenK
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokenllmL
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokenl
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/token0
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokeny
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/token~
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokenllljbin(
unknown
https://login.microsoftonline.com/icates
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/token
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokenmL
unknown
https://login.microsoftonline.com/common/oauth2/v2.0/tokenll
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
login.microsoftonline.com
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive
quent-application

Memdumps

Base Address
Regiontype
Protect
Malicious
4F8000
heap
page read and write
4F8000
heap
page read and write
49B000
heap
page read and write
2C4E000
stack
page read and write
4F8000
heap
page read and write
489000
heap
page read and write
4F8000
heap
page read and write
4D6000
heap
page read and write
2130000
heap
page read and write
5D0000
stack
page read and write
284E000
stack
page read and write
462000
heap
page read and write
4D4000
heap
page read and write
40C000
heap
page read and write
4F8000
heap
page read and write
4D8000
heap
page read and write
2D4F000
stack
page read and write
49B000
heap
page read and write
140000000
unkown
page readonly
4D6000
heap
page read and write
4D6000
heap
page read and write
14C000
stack
page read and write
49B000
heap
page read and write
4D9000
heap
page read and write
180000
heap
page read and write
4A3000
heap
page read and write
2B4D000
stack
page read and write
4D4000
heap
page read and write
4D6000
heap
page read and write
4D8000
heap
page read and write
5D0000
unkown
page execute read
492000
heap
page read and write
274F000
stack
page read and write
4F8000
heap
page read and write
4D4000
heap
page read and write
492000
heap
page read and write
2A4B000
stack
page read and write
14015C000
unkown
page readonly
2D51000
unkown
page read and write
4F2000
heap
page read and write
2240000
unkown
page execute read
4AA000
heap
page read and write
4F8000
heap
page read and write
4D9000
heap
page read and write
140000000
unkown
page read and write
4F8000
heap
page read and write
14016E000
unkown
page readonly
2135000
heap
page read and write
14013F000
unkown
page write copy
4AA000
heap
page read and write
4A3000
heap
page read and write
434000
heap
page read and write
2066000
stack
page read and write
4A3000
heap
page read and write
4AA000
heap
page read and write
4D4000
heap
page read and write
140001000
unkown
page execute read
4F1000
heap
page read and write
4D4000
heap
page read and write
462000
heap
page read and write
400000
heap
page read and write
14015C000
unkown
page readonly
4AA000
heap
page read and write
4D4000
heap
page read and write
4F8000
heap
page read and write
2260000
unkown
page execute read
14016E000
unkown
page readonly
4F1000
heap
page read and write
2240000
remote allocation
page read and write
190000
heap
page read and write
4D6000
heap
page read and write
409000
heap
page read and write
4D9000
heap
page read and write
2300000
heap
page read and write
444000
heap
page read and write
140110000
unkown
page readonly
294F000
stack
page read and write
2240000
remote allocation
page read and write
140158000
unkown
page read and write
2240000
remote allocation
page read and write
1E0000
heap
page read and write
14013F000
unkown
page read and write
4D6000
heap
page read and write
489000
heap
page read and write
4A3000
heap
page read and write
2240000
unkown
page read and write
140001000
unkown
page execute read
4F8000
heap
page read and write
1C0000
heap
page read and write
445000
heap
page read and write
4A7000
heap
page read and write
140110000
unkown
page readonly
There are 82 hidden memdumps, click here to show them.