IOC Report
998_popxinv_Installer.exe

loading gif

Files

File Path
Type
Category
Malicious
998_popxinv_Installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Downloads\ind.jpg
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\998[1].ccp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\998_popxinv_Installer.exe
"C:\Users\user\Desktop\998_popxinv_Installer.exe"
malicious

URLs

Name
IP
Malicious
134.122.174.169
malicious
http://guanlix.cn:881/998.ccpS
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://guanlix.cn:881/998.ccp
91.208.240.157

Domains

Name
IP
Malicious
guanlix.cn
91.208.240.157

IPs

IP
Domain
Country
Malicious
134.122.174.169
unknown
United States
malicious
91.208.240.157
guanlix.cn
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3D51000
trusted library allocation
page read and write
malicious
5F90000
trusted library section
page read and write
malicious
3D89000
trusted library allocation
page read and write
6020000
heap
page read and write
16CE000
stack
page read and write
1137000
stack
page read and write
13DF000
heap
page read and write
33FE000
stack
page read and write
A33000
unkown
page readonly
A2F000
unkown
page write copy
60B1000
trusted library allocation
page read and write
1407000
heap
page read and write
5FD0000
trusted library allocation
page read and write
147A000
heap
page read and write
65D0000
trusted library allocation
page read and write
1428000
heap
page read and write
60A0000
trusted library allocation
page read and write
A29000
unkown
page readonly
11A0000
heap
page read and write
38A0000
heap
page read and write
4D51000
trusted library allocation
page read and write
5EED000
stack
page read and write
A10000
unkown
page readonly
60A0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
3B23000
trusted library allocation
page execute and read and write
3C3C000
stack
page read and write
1462000
heap
page read and write
3AF0000
trusted library section
page read and write
158D000
stack
page read and write
5FD0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
3BFE000
stack
page read and write
122E000
stack
page read and write
69EC000
stack
page read and write
388F000
unkown
page read and write
3B2D000
trusted library allocation
page execute and read and write
6010000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
A10000
unkown
page readonly
5D58000
trusted library allocation
page read and write
3AD0000
direct allocation
page execute and read and write
6010000
trusted library allocation
page read and write
6388000
stack
page read and write
60B0000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
1310000
direct allocation
page read and write
3B70000
trusted library allocation
page read and write
A2F000
unkown
page read and write
5FA0000
trusted library allocation
page execute and read and write
1390000
heap
page read and write
1460000
heap
page read and write
68AC000
stack
page read and write
66EE000
stack
page read and write
3400000
heap
page read and write
13F9000
heap
page read and write
5FC0000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
168E000
stack
page read and write
349E000
stack
page read and write
1235000
heap
page read and write
3BA0000
trusted library allocation
page read and write
139A000
heap
page read and write
3B80000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
141C000
heap
page read and write
5FE0000
trusted library allocation
page read and write
686D000
stack
page read and write
3B00000
trusted library section
page read and write
1190000
heap
page read and write
7F6E8000
trusted library allocation
page execute and read and write
3B50000
trusted library allocation
page read and write
608C000
stack
page read and write
13C7000
heap
page read and write
A29000
unkown
page readonly
60A0000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
600E000
stack
page read and write
A11000
unkown
page execute read
3BA3000
trusted library allocation
page read and write
5F6E000
stack
page read and write
368F000
stack
page read and write
1330000
heap
page read and write
5FD0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
34DE000
stack
page read and write
3B5B000
trusted library allocation
page execute and read and write
5FE0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
180E000
stack
page read and write
5FD0000
trusted library allocation
page read and write
1456000
heap
page read and write
5FB0000
trusted library allocation
page read and write
3890000
heap
page read and write
5FC0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
3B24000
trusted library allocation
page read and write
345E000
stack
page read and write
378E000
stack
page read and write
139E000
heap
page read and write
69AD000
stack
page read and write
60B0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
1817000
heap
page read and write
60A0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
3B10000
trusted library allocation
page read and write
A11000
unkown
page execute read
1405000
heap
page read and write
3BA6000
trusted library allocation
page execute and read and write
65E0000
heap
page read and write
6010000
trusted library allocation
page read and write
65CE000
stack
page read and write
60B0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
13C9000
heap
page read and write
6010000
trusted library allocation
page read and write
672F000
stack
page read and write
5FD0000
trusted library allocation
page read and write
1426000
heap
page read and write
3BB0000
heap
page read and write
103C000
stack
page read and write
658E000
stack
page read and write
6010000
trusted library allocation
page read and write
3C40000
heap
page read and write
1230000
heap
page read and write
3BA9000
trusted library allocation
page execute and read and write
60B0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
3BAC000
trusted library allocation
page execute and read and write
60B0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
6040000
heap
page execute and read and write
1810000
heap
page read and write
17CE000
stack
page read and write
11EC000
stack
page read and write
3D4E000
stack
page read and write
63C1000
heap
page read and write
6010000
trusted library allocation
page read and write
3B57000
trusted library allocation
page execute and read and write
6390000
heap
page read and write
676C000
stack
page read and write
3540000
trusted library allocation
page read and write
358E000
stack
page read and write
4D55000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
A33000
unkown
page readonly
6010000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
628D000
stack
page read and write
5F70000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
654E000
stack
page read and write
1476000
heap
page read and write
6010000
trusted library allocation
page read and write
3B90000
heap
page execute and read and write
1468000
heap
page read and write
6AEE000
stack
page read and write
5F2E000
stack
page read and write
6010000
trusted library allocation
page read and write
7F6D0000
trusted library allocation
page execute and read and write
6010000
trusted library allocation
page read and write
3B60000
trusted library allocation
page execute and read and write
There are 167 hidden memdumps, click here to show them.