IOC Report
SXQdCnmxiH.exe

loading gif

Files

File Path
Type
Category
Malicious
SXQdCnmxiH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
\Device\ConDrv
ISO-8859 text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SXQdCnmxiH.exe
"C:\Users\user\Desktop\SXQdCnmxiH.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
127.0.0.1
malicious
http://geoplugin.net/json.gp
unknown
http://geoplugin.net/json.gp/C
unknown

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-WSY52E
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-WSY52E
time

Memdumps

Base Address
Regiontype
Protect
Malicious
44D000
unkown
page readonly
malicious
44D000
unkown
page readonly
malicious
59E000
heap
page read and write
malicious
56C000
stack
page read and write
480000
heap
page read and write
9C000
stack
page read and write
19D000
stack
page read and write
85F000
stack
page read and write
52E000
stack
page read and write
23FF000
stack
page read and write
1F0000
heap
page read and write
464000
unkown
page read and write
400000
unkown
page readonly
4E5000
heap
page read and write
22FB000
stack
page read and write
401000
unkown
page execute read
2480000
heap
page read and write
213E000
stack
page read and write
4E0000
heap
page read and write
59A000
heap
page read and write
4CE000
stack
page read and write
28CF000
stack
page read and write
21F0000
heap
page read and write
464000
unkown
page write copy
870000
heap
page read and write
46B000
unkown
page readonly
570000
heap
page read and write
46B000
unkown
page readonly
5C0000
heap
page read and write
467000
unkown
page read and write
590000
heap
page read and write
400000
unkown
page readonly
860000
heap
page read and write
401000
unkown
page execute read
There are 24 hidden memdumps, click here to show them.