IOC Report
V6363OW8Rh.exe

loading gif

Files

File Path
Type
Category
Malicious
V6363OW8Rh.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\V6363OW8Rh.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\tmpAD99.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jul 1 13:32:56 2024, mtime=Mon Jul 1 13:32:56 2024, atime=Mon Jul 1 13:32:56 2024, length=74240, window=hide
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\V6363OW8Rh.exe
"C:\Users\user\Desktop\V6363OW8Rh.exe"
malicious
C:\Users\user\AppData\Roaming\XClient.exe
"C:\Users\user\AppData\Roaming\XClient.exe"
malicious
C:\Users\user\AppData\Roaming\XClient.exe
"C:\Users\user\AppData\Roaming\XClient.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpAD99.tmp.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 3

URLs

Name
IP
Malicious
price-slow.gl.at.ply.gg
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
price-slow.gl.at.ply.gg
147.185.221.18
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.18
price-slow.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
XClient
HKEY_CURRENT_USER\SOFTWARE\F89E52B49AA08D9BF38E
CC52384910CEE944DDBCC575A8E0177BFA6B16E3032438B207797164D5C94B34

Memdumps

Base Address
Regiontype
Protect
Malicious
31D1000
trusted library allocation
page read and write
malicious
E62000
unkown
page readonly
malicious
1480000
trusted library allocation
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
1790000
heap
page read and write
7FFD34856000
trusted library allocation
page read and write
9C1000
heap
page read and write
1450000
heap
page read and write
249C000
trusted library allocation
page read and write
940000
heap
page read and write
1C135000
heap
page read and write
15CA000
stack
page read and write
335F000
trusted library allocation
page read and write
1444FEE1000
heap
page read and write
1AA2D000
stack
page read and write
7FFD34880000
trusted library allocation
page execute and read and write
1BBF0000
heap
page read and write
1C4F4000
stack
page read and write
1794000
heap
page read and write
135B000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
1E844FF000
unkown
page read and write
1B24F000
stack
page read and write
7FFD34764000
trusted library allocation
page read and write
990000
heap
page read and write
7FFD34902000
trusted library allocation
page read and write
32AD000
trusted library allocation
page read and write
743000
heap
page read and write
7FFD347CB000
trusted library allocation
page execute and read and write
900000
heap
page read and write
D4E000
stack
page read and write
3349000
trusted library allocation
page read and write
A5A000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
26EE000
stack
page read and write
1B34E000
stack
page read and write
7A38B6E000
stack
page read and write
23752970000
heap
page read and write
1C1DF000
heap
page read and write
7FFD347BC000
trusted library allocation
page execute and read and write
1C100000
heap
page read and write
900000
heap
page read and write
2480000
heap
page read and write
127C1000
trusted library allocation
page read and write
1444FEF2000
heap
page read and write
7FFD347B3000
trusted library allocation
page read and write
C40000
heap
page read and write
1D273000
heap
page read and write
1E8412C000
stack
page read and write
139F000
heap
page read and write
131D1000
trusted library allocation
page read and write
1C7ED000
stack
page read and write
7FFD34983000
trusted library allocation
page read and write
1C161000
heap
page read and write
127C8000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7FFD347A2000
trusted library allocation
page read and write
1D585000
heap
page read and write
1C96E000
stack
page read and write
7FFD34820000
trusted library allocation
page execute and read and write
7FFD34773000
trusted library allocation
page execute and read and write
1BFFD000
stack
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
1E845FE000
stack
page read and write
30C0000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
1444FFB0000
heap
page read and write
1C19D000
heap
page read and write
127C3000
trusted library allocation
page read and write
179E000
heap
page read and write
9D0000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
B25000
heap
page read and write
1444FEBB000
heap
page read and write
23752A50000
heap
page read and write
7A38BEE000
stack
page read and write
706000
heap
page read and write
1BCFE000
stack
page read and write
1C0FE000
stack
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
3000000
heap
page execute and read and write
14C0000
heap
page read and write
3468000
trusted library allocation
page read and write
7FFD3476D000
trusted library allocation
page execute and read and write
3430000
trusted library allocation
page read and write
1C3FA000
stack
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
131E2000
trusted library allocation
page read and write
E4F000
stack
page read and write
3070000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
5F5000
heap
page read and write
13F6000
heap
page read and write
9F8000
heap
page read and write
14450105000
heap
page read and write
3277000
trusted library allocation
page read and write
23754485000
heap
page read and write
1440000
heap
page read and write
735000
heap
page read and write
B20000
heap
page read and write
23754480000
heap
page read and write
1AE40000
heap
page read and write
27CF000
trusted library allocation
page read and write
12498000
trusted library allocation
page read and write
6D0000
heap
page read and write
12E0000
heap
page read and write
5F0000
heap
page read and write
7A38AEC000
stack
page read and write
1B54E000
stack
page read and write
3350000
trusted library allocation
page read and write
1D570000
heap
page read and write
945000
heap
page read and write
7FF47B7B0000
trusted library allocation
page execute and read and write
32FF000
trusted library allocation
page read and write
9CC000
heap
page read and write
1CF6E000
stack
page read and write
8FF000
stack
page read and write
7FFD34974000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page execute and read and write
1C2FC000
stack
page read and write
7FFD34763000
trusted library allocation
page execute and read and write
960000
trusted library allocation
page read and write
1CB6C000
stack
page read and write
1CA6A000
stack
page read and write
3414000
trusted library allocation
page read and write
1AD4D000
stack
page read and write
1B14E000
stack
page read and write
3363000
trusted library allocation
page read and write
1B18E000
stack
page read and write
27A0000
heap
page execute and read and write
3412000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
C45000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
930000
trusted library allocation
page read and write
7FFD3497E000
trusted library allocation
page read and write
7FFD34942000
trusted library allocation
page read and write
1C17B000
heap
page read and write
3361000
trusted library allocation
page read and write
748000
heap
page read and write
999000
heap
page read and write
1710000
trusted library allocation
page read and write
1444FFD0000
heap
page read and write
14450100000
heap
page read and write
1BEFF000
stack
page read and write
7FFD34846000
trusted library allocation
page execute and read and write
B90000
heap
page execute and read and write
1D270000
heap
page read and write
1B200000
trusted library allocation
page read and write
72D000
heap
page read and write
31CE000
stack
page read and write
23CE000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
1C1BB000
heap
page read and write
1445000
heap
page read and write
27B0000
heap
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
5C0000
heap
page read and write
131DE000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
1336000
heap
page read and write
1E171000
heap
page read and write
23752B30000
heap
page read and write
1CD6B000
stack
page read and write
1C82E000
stack
page read and write
72B000
heap
page read and write
1D291000
heap
page read and write
1444FDD0000
heap
page read and write
7FFD3494F000
trusted library allocation
page read and write
E60000
unkown
page readonly
8F4000
stack
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
3C0000
heap
page read and write
1AF4E000
stack
page read and write
1444FEE1000
heap
page read and write
2491000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
374000
stack
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
1B34E000
stack
page read and write
23752A90000
heap
page read and write
1444FFF0000
heap
page read and write
9F6000
heap
page read and write
3323000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
1300000
heap
page read and write
7FFD347C4000
trusted library allocation
page read and write
FB4000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
220000
unkown
page readonly
2FC0000
heap
page read and write
16CB000
stack
page read and write
7FFD34912000
trusted library allocation
page read and write
16D0000
trusted library section
page read and write
13A7000
heap
page read and write
700000
heap
page read and write
134F000
heap
page read and write
76E000
heap
page read and write
1371000
heap
page read and write
1B75C000
stack
page read and write
774000
heap
page read and write
27CC000
trusted library allocation
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
33B8000
trusted library allocation
page read and write
1BBF3000
heap
page read and write
33BA000
trusted library allocation
page read and write
23752B39000
heap
page read and write
B10000
heap
page execute and read and write
1444FEE1000
heap
page read and write
12493000
trusted library allocation
page read and write
70C000
heap
page read and write
1B240000
heap
page read and write
1CC6E000
stack
page read and write
5A0000
heap
page read and write
590000
heap
page read and write
1C1BD000
heap
page read and write
32C1000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
13A4000
heap
page read and write
9B9000
heap
page read and write
1B040000
heap
page execute and read and write
1C92A000
stack
page read and write
1D26B000
stack
page read and write
7CE000
heap
page read and write
1330000
heap
page read and write
A60000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
7FFD347A3000
trusted library allocation
page execute and read and write
A4E000
stack
page read and write
1BDFF000
stack
page read and write
1C185000
heap
page read and write
344A000
trusted library allocation
page read and write
1444FEF2000
heap
page read and write
1374000
heap
page read and write
741000
heap
page read and write
16F0000
heap
page read and write
1C177000
heap
page read and write
7FFD347CD000
trusted library allocation
page execute and read and write
7C3000
heap
page read and write
3392000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
7D5000
heap
page read and write
3D0000
heap
page read and write
9CA000
heap
page read and write
7FFD34979000
trusted library allocation
page read and write
14C5000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
13CA000
heap
page read and write
1444FEF1000
heap
page read and write
1B44E000
stack
page read and write
12491000
trusted library allocation
page read and write
723000
heap
page read and write
7FFD34774000
trusted library allocation
page read and write
30B0000
heap
page execute and read and write
1444FEB0000
heap
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
There are 256 hidden memdumps, click here to show them.