IOC Report
T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe

loading gif

Files

File Path
Type
Category
Malicious
T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe
"C:\Users\user\Desktop\T#U00dcB#U0130TAK SAGE TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130 sxlx..exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidX
unknown
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidY
unknown
https://sectigo.com/CPS0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
unknown
https://account.dyn.com/
unknown
https://aka.ms/dotnet-warnings/
unknown
http://ocsp.sectigo.com0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://cp8nl.hyperhost.ua
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameX
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cp8nl.hyperhost.ua
185.174.175.187
malicious

IPs

IP
Domain
Country
Malicious
185.174.175.187
cp8nl.hyperhost.ua
Ukraine
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
7FF77C48D000
unkown
page readonly
malicious
7FF77C48D000
unkown
page readonly
malicious
7FF77C43D000
unkown
page read and write
malicious
328E000
trusted library allocation
page read and write
malicious
286E183A000
direct allocation
page read and write
malicious
32B9000
trusted library allocation
page read and write
malicious
3241000
trusted library allocation
page read and write
malicious
1325000
heap
page read and write
1710000
trusted library allocation
page read and write
1704000
trusted library allocation
page read and write
1703000
trusted library allocation
page execute and read and write
286DD230000
heap
page read and write
6500000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
157E000
heap
page read and write
573E000
stack
page read and write
5D0C000
trusted library allocation
page read and write
FB9000
stack
page read and write
7FF77C50A000
unkown
page read and write
EBA000
stack
page read and write
32A9000
trusted library allocation
page read and write
31F3000
heap
page read and write
8E611FF000
stack
page read and write
32B5000
trusted library allocation
page read and write
286E1000000
direct allocation
page read and write
8E612FE000
stack
page read and write
3186000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
5B5E000
stack
page read and write
286DCEA0000
heap
page read and write
4269000
trusted library allocation
page read and write
1220000
heap
page read and write
1726000
trusted library allocation
page execute and read and write
286DCFA0000
heap
page read and write
154D000
heap
page read and write
286DD006000
heap
page read and write
2C773380000
heap
page read and write
7FF77C311000
unkown
page execute read
5D00000
trusted library allocation
page read and write
32A7000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
17D0000
heap
page read and write
1700000
trusted library allocation
page read and write
328C000
trusted library allocation
page read and write
7FF77C311000
unkown
page execute read
173B000
trusted library allocation
page execute and read and write
7FF77C310000
unkown
page readonly
6520000
trusted library allocation
page execute and read and write
677D000
stack
page read and write
56BC000
stack
page read and write
286DCEC0000
heap
page read and write
6680000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
6C7E000
stack
page read and write
7F820000
trusted library allocation
page execute and read and write
595C000
stack
page read and write
286E1400000
direct allocation
page read and write
15C5000
heap
page read and write
2C6F287F000
direct allocation
page read and write
56FE000
stack
page read and write
14E8000
heap
page read and write
1760000
trusted library allocation
page execute and read and write
6620000
trusted library allocation
page read and write
1737000
trusted library allocation
page execute and read and write
31C0000
trusted library allocation
page read and write
5760000
heap
page read and write
31AD000
trusted library allocation
page read and write
286DCFAC000
heap
page read and write
656E000
stack
page read and write
31A6000
trusted library allocation
page read and write
6640000
heap
page read and write
8E610F9000
stack
page read and write
1300000
heap
page read and write
31B2000
trusted library allocation
page read and write
7FF77C518000
unkown
page readonly
286DCDC0000
heap
page read and write
6D7E000
stack
page read and write
286DCFA6000
heap
page read and write
6EC0000
heap
page read and write
6516000
trusted library allocation
page read and write
317C000
stack
page read and write
14E0000
heap
page read and write
42A7000
trusted library allocation
page read and write
5B9D000
stack
page read and write
30A8000
trusted library allocation
page read and write
286DCFBA000
heap
page read and write
319A000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
1732000
trusted library allocation
page read and write
1770000
heap
page read and write
400000
remote allocation
page execute and read and write
4241000
trusted library allocation
page read and write
286DCEF0000
direct allocation
page read and write
6570000
trusted library allocation
page execute and read and write
16F0000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1515000
heap
page read and write
1735000
trusted library allocation
page execute and read and write
660E000
stack
page read and write
14B0000
heap
page read and write
17C0000
trusted library allocation
page read and write
172A000
trusted library allocation
page execute and read and write
7FF77C310000
unkown
page readonly
6510000
trusted library allocation
page read and write
1561000
heap
page read and write
5A5E000
stack
page read and write
5748000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
5C9E000
stack
page read and write
7FF77C518000
unkown
page readonly
318B000
trusted library allocation
page read and write
18F0000
heap
page read and write
286E416B000
direct allocation
page read and write
31F0000
heap
page read and write
6F10000
heap
page read and write
533D000
stack
page read and write
32C1000
trusted library allocation
page read and write
1320000
heap
page read and write
1722000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
147E000
stack
page read and write
2C6E685A000
direct allocation
page read and write
7FF77C510000
unkown
page read and write
3192000
trusted library allocation
page read and write
3230000
heap
page execute and read and write
286DEC00000
direct allocation
page read and write
318E000
trusted library allocation
page read and write
137E000
unkown
page read and write
17BE000
stack
page read and write
1518000
heap
page read and write
286E4B6B000
direct allocation
page read and write
150B000
heap
page read and write
8E613FF000
stack
page read and write
319E000
trusted library allocation
page read and write
286E0C00000
direct allocation
page read and write
18DE000
stack
page read and write
286E3800000
direct allocation
page read and write
1750000
trusted library allocation
page read and write
2C773449000
heap
page read and write
286DCF00000
direct allocation
page read and write
697D000
stack
page read and write
6617000
trusted library allocation
page read and write
15B4000
heap
page read and write
5750000
heap
page execute and read and write
7FF77C50A000
unkown
page write copy
6ED0000
trusted library allocation
page execute and read and write
286DCFFE000
heap
page read and write
6656000
heap
page read and write
2C773470000
heap
page read and write
6610000
trusted library allocation
page read and write
170D000
trusted library allocation
page execute and read and write
There are 143 hidden memdumps, click here to show them.