IOC Report
xKBLVUHoY6

loading gif

Files

File Path
Type
Category
Malicious
xKBLVUHoY6.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nskE115.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Lagerhals\Territorially\Tygnings\systemless\Modregnings.Xen
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Lagerhals\Territorially\Tygnings\systemless\battery-caution-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Lagerhals\Territorially\Tygnings\systemless\go-first-rtl.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xKBLVUHoY6.exe
"C:\Users\user\Desktop\xKBLVUHoY6.exe"
malicious

URLs

Name
IP
Malicious
http://212.193.0.40/redi_oXifXcNSpB69.bin
malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
31B0000
direct allocation
page execute and read and write
malicious
1583F323000
trusted library allocation
page read and write
5B64879000
stack
page read and write
27E4000
trusted library allocation
page read and write
1583E427000
heap
page read and write
15843B90000
remote allocation
page read and write
1C98EFE000
stack
page read and write
2494BA63000
heap
page read and write
16E3C2E0000
trusted library allocation
page read and write
26919DE0000
remote allocation
page read and write
1C987CF000
stack
page read and write
2494BA5F000
heap
page read and write
26919E74000
heap
page read and write
EECC7F000
stack
page read and write
16E3D3E0000
trusted library allocation
page read and write
2023E5F0000
trusted library allocation
page read and write
2494BA29000
heap
page read and write
7382AFB000
stack
page read and write
1583ED00000
heap
page read and write
26919E89000
heap
page read and write
1E124E29000
heap
page read and write
1A7D5413000
heap
page read and write
422000
unkown
page read and write
27E8000
trusted library allocation
page read and write
53036FF000
stack
page read and write
5B6448B000
stack
page read and write
2494BA61000
heap
page read and write
D6A87FE000
stack
page read and write
1A7D5429000
heap
page read and write
2494BA13000
heap
page read and write
1583E457000
heap
page read and write
2494BA4E000
heap
page read and write
530000
heap
page read and write
27DF000
stack
page read and write
1DDF84A0000
heap
page read and write
2023EE90000
remote allocation
page read and write
386B000
stack
page read and write
99000
stack
page read and write
1E124CA0000
heap
page read and write
2494BA5A000
heap
page read and write
2023E602000
heap
page read and write
F671C7E000
stack
page read and write
51E000
heap
page read and write
8DCCF7F000
stack
page read and write
2494BA5C000
heap
page read and write
1C5EC400000
heap
page read and write
52A000
heap
page read and write
2023E640000
heap
page read and write
40A000
unkown
page read and write
51E000
heap
page read and write
26919E02000
heap
page read and write
6EB84000
unkown
page readonly
1C5EC45A000
heap
page read and write
26919E3D000
heap
page read and write
2023E613000
heap
page read and write
1DDF8700000
heap
page read and write
30000
heap
page read and write
16E3C52D000
heap
page read and write
534000
heap
page read and write
EECCFF000
stack
page read and write
16E3C527000
heap
page read and write
2494BB02000
heap
page read and write
1C5EC513000
heap
page read and write
15843C65000
heap
page read and write
26919C30000
heap
page read and write
2494BA48000
heap
page read and write
15843B40000
trusted library allocation
page read and write
16E3D380000
trusted library allocation
page read and write
1A7D545D000
heap
page read and write
8DCD57D000
stack
page read and write
D6A89FF000
stack
page read and write
2494BA5E000
heap
page read and write
530000
heap
page read and write
1DDF8500000
heap
page read and write
1A7D5350000
remote allocation
page read and write
2494BA00000
heap
page read and write
1DDF8490000
heap
page read and write
1C5EC468000
heap
page read and write
2494BA32000
heap
page read and write
26919E57000
heap
page read and write
1C5EC476000
heap
page read and write
1E124E87000
heap
page read and write
15843EA0000
trusted library allocation
page read and write
16E3C4B0000
trusted library allocation
page read and write
1DDF8668000
heap
page read and write
8DCD37D000
stack
page read and write
51C000
heap
page read and write
408000
unkown
page readonly
1C5EC402000
heap
page read and write
1E124EC3000
heap
page read and write
F671A7E000
stack
page read and write
534000
heap
page read and write
2494B880000
heap
page read and write
1E125602000
heap
page read and write
1583E473000
heap
page read and write
1C5EC502000
heap
page read and write
738327F000
stack
page read and write
1583EC15000
heap
page read and write
1583E220000
heap
page read and write
1DDF8600000
heap
page read and write
1DDF8664000
heap
page read and write
15843D00000
heap
page read and write
2691B802000
trusted library allocation
page read and write
40A000
unkown
page write copy
1A7D5470000
heap
page read and write
8DCCDFC000
stack
page read and write
2294000
heap
page read and write
6EB86000
unkown
page readonly
1A7D5350000
remote allocation
page read and write
26919C90000
heap
page read and write
F671AFE000
stack
page read and write
1583E48E000
heap
page read and write
1583E500000
heap
page read and write
16E3C479000
heap
page read and write
16E3C475000
heap
page read and write
2023E636000
heap
page read and write
15843A54000
trusted library allocation
page read and write
F671E7F000
stack
page read and write
1583E390000
trusted library allocation
page read and write
1583E4A4000
heap
page read and write
1C9874C000
stack
page read and write
53033FB000
stack
page read and write
15843920000
trusted library allocation
page read and write
427000
unkown
page read and write
16E3C52D000
heap
page read and write
1583F320000
trusted library allocation
page read and write
1C5EC429000
heap
page read and write
15843B70000
trusted library allocation
page read and write
15843C2C000
heap
page read and write
2023E5C0000
heap
page read and write
73831FD000
stack
page read and write
534000
heap
page read and write
1583E502000
heap
page read and write
26919DB0000
trusted library allocation
page read and write
2494BA42000
heap
page read and write
1583ED04000
heap
page read and write
2494BA57000
heap
page read and write
2023E550000
heap
page read and write
1C994FA000
stack
page read and write
1A7D5330000
trusted library allocation
page read and write
15843C40000
heap
page read and write
26919E48000
heap
page read and write
2494BA25000
heap
page read and write
1583E46D000
heap
page read and write
26919E58000
heap
page read and write
19A000
stack
page read and write
1583E400000
heap
page read and write
2494BA02000
heap
page read and write
15843CB0000
heap
page read and write
1C5EC413000
heap
page read and write
2023E629000
heap
page read and write
6F00BFD000
stack
page read and write
5B649F9000
stack
page read and write
2494C202000
trusted library allocation
page read and write
26919C20000
heap
page read and write
1583E290000
heap
page read and write
26919E26000
heap
page read and write
2290000
heap
page read and write
1A7D51C0000
heap
page read and write
2494BA41000
heap
page read and write
1A7D5400000
heap
page read and write
2691B7A0000
trusted library allocation
page read and write
1583E42A000
heap
page read and write
2023E560000
heap
page read and write
15843C00000
heap
page read and write
5302E8B000
stack
page read and write
1583E494000
heap
page read and write
53034FB000
stack
page read and write
1E125700000
heap
page read and write
26919F00000
heap
page read and write
2494BA58000
heap
page read and write
15843B00000
trusted library allocation
page read and write
26919E13000
heap
page read and write
1E124C40000
heap
page read and write
1583EC00000
heap
page read and write
1E124E13000
heap
page read and write
1DDF8679000
heap
page read and write
1C5EC43D000
heap
page read and write
1583F420000
trusted library allocation
page read and write
1583E507000
heap
page read and write
1583ED18000
heap
page read and write
15843C4D000
heap
page read and write
1A7D542F000
heap
page read and write
450000
unkown
page readonly
1583E4B6000
heap
page read and write
51E000
heap
page read and write
D6A8AFC000
stack
page read and write
26919D90000
trusted library allocation
page read and write
534000
heap
page read and write
1A7D5461000
heap
page read and write
2023E65C000
heap
page read and write
530000
heap
page read and write
5B6497E000
stack
page read and write
2494BA45000
heap
page read and write
1A7D5350000
remote allocation
page read and write
1E124C30000
heap
page read and write
5B648F9000
stack
page read and write
2494BA56000
heap
page read and write
15843C15000
heap
page read and write
1E124ECB000
heap
page read and write
6F008FF000
stack
page read and write
16E3C470000
heap
page read and write
EED0FE000
stack
page read and write
15843CF0000
heap
page read and write
2494BA6C000
heap
page read and write
1583E514000
heap
page read and write
2691BA00000
trusted library allocation
page read and write
2023E600000
heap
page read and write
26919DE0000
remote allocation
page read and write
1DDF8602000
heap
page read and write
1DDF8713000
heap
page read and write
7382E7E000
stack
page read and write
4F8000
heap
page read and write
2494BA7C000
heap
page read and write
435000
unkown
page read and write
1E124E6E000
heap
page read and write
1A7D5C02000
trusted library allocation
page read and write
1E124DA0000
trusted library allocation
page read and write
1C5EC46F000
heap
page read and write
2494BA40000
heap
page read and write
26919E58000
heap
page read and write
8DCC9DC000
stack
page read and write
1C996FF000
stack
page read and write
2494BA73000
heap
page read and write
6F009FC000
stack
page read and write
1DDF8702000
heap
page read and write
96E000
stack
page read and write
2494BA67000
heap
page read and write
1DDF8E02000
trusted library allocation
page read and write
5F0000
heap
page read and write
1583E4A6000
heap
page read and write
26919F02000
heap
page read and write
1583E500000
heap
page read and write
1C5ECE02000
trusted library allocation
page read and write
26DF000
stack
page read and write
401000
unkown
page execute read
2494BA6A000
heap
page read and write
16E3C430000
heap
page read and write
16E3C4F0000
heap
page read and write
15843B10000
trusted library allocation
page read and write
15843B00000
trusted library allocation
page read and write
2494BA3B000
heap
page read and write
544000
heap
page read and write
6EB80000
unkown
page readonly
1A7D544A000
heap
page read and write
15843CF3000
heap
page read and write
15843B00000
trusted library allocation
page read and write
16E3D360000
trusted library allocation
page read and write
2494BA79000
heap
page read and write
1DDF8613000
heap
page read and write
15843A51000
trusted library allocation
page read and write
4D0000
trusted library allocation
page read and write
7382FFC000
stack
page read and write
15843D07000
heap
page read and write
7382F7C000
stack
page read and write
EECDFE000
stack
page read and write
2494B820000
heap
page read and write
1C98B77000
stack
page read and write
1C5EC310000
heap
page read and write
2494BA7A000
heap
page read and write
2023E702000
heap
page read and write
15843CFC000
heap
page read and write
EECEFA000
stack
page read and write
1DDF863C000
heap
page read and write
15843A30000
trusted library allocation
page read and write
15843910000
trusted library allocation
page read and write
6F00EFF000
stack
page read and write
15843B60000
trusted library allocation
page read and write
738337D000
stack
page read and write
1C990FB000
stack
page read and write
6F010FF000
stack
page read and write
16E3C4D0000
trusted library allocation
page read and write
F671F7E000
stack
page read and write
F6717CC000
stack
page read and write
1583EC02000
heap
page read and write
15843CF8000
heap
page read and write
16E3D370000
heap
page readonly
27ED000
trusted library allocation
page read and write
15843B90000
remote allocation
page read and write
16E3D120000
trusted library allocation
page read and write
15843A38000
trusted library allocation
page read and write
2494BA76000
heap
page read and write
6F007FA000
stack
page read and write
15844000000
heap
page read and write
400000
unkown
page readonly
1A7D5402000
heap
page read and write
15843E80000
trusted library allocation
page read and write
520000
heap
page read and write
15843B90000
remote allocation
page read and write
2023EE90000
remote allocation
page read and write
1A7D5463000
heap
page read and write
1E124E23000
heap
page read and write
15843B80000
trusted library allocation
page read and write
2494BA59000
heap
page read and write
2494BA44000
heap
page read and write
2494BA64000
heap
page read and write
425000
unkown
page read and write
15843C11000
heap
page read and write
2023E657000
heap
page read and write
1E124E00000
heap
page read and write
15843C9D000
heap
page read and write
26919E2A000
heap
page read and write
EED2FE000
stack
page read and write
450000
unkown
page readonly
2023F002000
trusted library allocation
page read and write
1C5EC300000
heap
page read and write
1E124EE3000
heap
page read and write
2494BA74000
heap
page read and write
16E3C410000
heap
page read and write
15843C59000
heap
page read and write
1583E499000
heap
page read and write
16E3D390000
trusted library allocation
page read and write
53035FB000
stack
page read and write
16E3C526000
heap
page read and write
26919DE0000
remote allocation
page read and write
6F00CFF000
stack
page read and write
8DCD0FC000
stack
page read and write
D6A847C000
stack
page read and write
D6A8BFC000
stack
page read and write
36B0000
trusted library allocation
page read and write
2494BA60000
heap
page read and write
1C5EC3A0000
trusted library allocation
page read and write
15843A60000
trusted library allocation
page read and write
15843D02000
heap
page read and write
530000
heap
page read and write
1583F8A0000
trusted library allocation
page read and write
1C98DFA000
stack
page read and write
15843A70000
trusted library allocation
page read and write
2494BA35000
heap
page read and write
16E3C52E000
heap
page read and write
8DCD47E000
stack
page read and write
1E124E3E000
heap
page read and write
26919F18000
heap
page read and write
2494BA83000
heap
page read and write
A30000
heap
page read and write
1583ED13000
heap
page read and write
26919F13000
heap
page read and write
2240000
trusted library allocation
page read and write
EEC9DB000
stack
page read and write
A36000
heap
page read and write
1E124F02000
heap
page read and write
15843C9B000
heap
page read and write
16E3C2D0000
heap
page read and write
1583E4AE000
heap
page read and write
6F00DFF000
stack
page read and write
1583E492000
heap
page read and write
52A000
heap
page read and write
158438A0000
trusted library allocation
page read and write
1A7D51D0000
heap
page read and write
4B4F000
trusted library allocation
page read and write
2494B810000
heap
page read and write
1DDF8656000
heap
page read and write
2494BA69000
heap
page read and write
26919E00000
heap
page read and write
6EB81000
unkown
page execute read
1C98FFB000
stack
page read and write
8DCD67F000
stack
page read and write
EED1FD000
stack
page read and write
15843A74000
trusted library allocation
page read and write
52A000
heap
page read and write
1583F330000
trusted library allocation
page read and write
16E3C4E8000
heap
page read and write
16E3C4C0000
trusted library allocation
page read and write
1583E43D000
heap
page read and write
1583E502000
heap
page read and write
26919E48000
heap
page read and write
376D000
stack
page read and write
9DE000
stack
page read and write
1C98CF9000
stack
page read and write
15843C19000
heap
page read and write
2494B980000
trusted library allocation
page read and write
52A000
heap
page read and write
EECFFA000
stack
page read and write
1A7D543E000
heap
page read and write
1583ED02000
heap
page read and write
1C5EC462000
heap
page read and write
1DDF8DA0000
trusted library allocation
page read and write
15843A3E000
trusted library allocation
page read and write
2494BA62000
heap
page read and write
1E124F13000
heap
page read and write
15843B90000
trusted library allocation
page read and write
1583E413000
heap
page read and write
D6A8DFE000
stack
page read and write
6F00FFE000
stack
page read and write
408000
unkown
page readonly
15843A50000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
8DCD27B000
stack
page read and write
1583ED18000
heap
page read and write
D6A88FE000
stack
page read and write
1A7D5502000
heap
page read and write
1583E230000
heap
page read and write
16E3C5E0000
trusted library allocation
page read and write
1E124EBA000
heap
page read and write
2494BA3D000
heap
page read and write
401000
unkown
page execute read
6F003CC000
stack
page read and write
15843C37000
heap
page read and write
8DCD1FD000
stack
page read and write
2023E633000
heap
page read and write
8DCD07E000
stack
page read and write
2023EE90000
remote allocation
page read and write
16E3C4E0000
heap
page read and write
1DDF8628000
heap
page read and write
400000
unkown
page readonly
980000
heap
page read and write
1583E4B6000
heap
page read and write
15843B50000
trusted library allocation
page read and write
F671D7E000
stack
page read and write
1C5EC370000
heap
page read and write
5B64A7C000
stack
page read and write
15843A60000
trusted library allocation
page read and write
26919E47000
heap
page read and write
1A7D545A000
heap
page read and write
1583E475000
heap
page read and write
15843A30000
trusted library allocation
page read and write
26919E62000
heap
page read and write
1A7D5230000
heap
page read and write
4F0000
heap
page read and write
There are 409 hidden memdumps, click here to show them.