IOC Report
Kyuo21uNlG.exe

loading gif

Files

File Path
Type
Category
Malicious
Kyuo21uNlG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp1DFD.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp3E61.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp4338.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp44D3.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp5350.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp6B02.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp797A.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmp919.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmpC141.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmpE99F.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmpEA59.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmpEAB.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tmpF4BA.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Kyuo21uNlG.exe
"C:\Users\user\Desktop\Kyuo21uNlG.exe"
malicious

URLs

Name
IP
Malicious
http://45.141.84.168:9000/wbinjget?q=8587D7BC4236146899B093C1B42EFE08
45.141.84.168
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://45.141.84.168:9000
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://pastebin.com/raw/cLika3dt
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.141.84.168
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Kyuo21uNlG_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
422000
unkown
page readonly
malicious
5D1F000
trusted library allocation
page read and write
28EE000
trusted library allocation
page read and write
6BAE000
stack
page read and write
B5B000
trusted library allocation
page read and write
4DE4000
trusted library allocation
page read and write
2BB8000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
6F4C000
stack
page read and write
3A5C000
trusted library allocation
page read and write
708D000
stack
page read and write
2ADB000
trusted library allocation
page read and write
5DDA000
heap
page read and write
2D7C000
trusted library allocation
page read and write
ADB000
trusted library allocation
page execute and read and write
2A6A000
trusted library allocation
page read and write
2933000
trusted library allocation
page read and write
29DA000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
4CDE000
trusted library allocation
page read and write
7190000
heap
page read and write
D5E000
unkown
page read and write
3912000
trusted library allocation
page read and write
57B000
stack
page read and write
2A4A000
trusted library allocation
page read and write
6CAD000
stack
page read and write
7430000
trusted library allocation
page read and write
4CEA000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
2B6A000
trusted library allocation
page read and write
675E000
stack
page read and write
2D41000
trusted library allocation
page read and write
AA3000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
47F9000
trusted library allocation
page read and write
5D25000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
BF0000
heap
page read and write
BA3000
heap
page read and write
B50000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
4CF1000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
6F50000
heap
page read and write
B40000
heap
page read and write
2997000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
5DF5000
heap
page read and write
2897000
trusted library allocation
page read and write
CDE000
stack
page read and write
C9F000
stack
page read and write
2976000
trusted library allocation
page read and write
2AA3000
trusted library allocation
page read and write
718D000
stack
page read and write
4D23000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
6DE9000
stack
page read and write
DA0000
trusted library allocation
page read and write
5DA4000
heap
page read and write
5440000
trusted library allocation
page execute and read and write
4D3B000
trusted library allocation
page read and write
AC6000
trusted library allocation
page execute and read and write
BA7000
heap
page read and write
2D16000
trusted library allocation
page read and write
2B83000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
7EEB0000
trusted library allocation
page execute and read and write
4DC0000
heap
page execute and read and write
29FB000
trusted library allocation
page read and write
AD5000
trusted library allocation
page execute and read and write
AAD000
trusted library allocation
page execute and read and write
4D40000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
D9E000
stack
page read and write
BEA000
heap
page read and write
685F000
stack
page read and write
28F0000
trusted library allocation
page read and write
6A20000
trusted library allocation
page execute and read and write
C02000
heap
page read and write
2BF1000
trusted library allocation
page read and write
28B6000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
28A4000
trusted library allocation
page read and write
4CF6000
trusted library allocation
page read and write
2C54000
trusted library allocation
page read and write
2A8A000
trusted library allocation
page read and write
28C5000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
4D53000
heap
page read and write
8F8000
stack
page read and write
2A75000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
28D9000
trusted library allocation
page read and write
2D79000
trusted library allocation
page read and write
5D92000
heap
page read and write
AA0000
trusted library allocation
page read and write
B6E000
heap
page read and write
6B2E000
stack
page read and write
72ED000
stack
page read and write
5EE0000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
501E000
stack
page read and write
4FDF000
stack
page read and write
2C5A000
trusted library allocation
page read and write
29D2000
trusted library allocation
page read and write
2916000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
2892000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
2D6A000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
2D6C000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
5062000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
27EE000
stack
page read and write
93D000
stack
page read and write
2BC2000
trusted library allocation
page read and write
7590000
heap
page read and write
5D50000
heap
page read and write
6A00000
trusted library allocation
page read and write
420000
unkown
page readonly
6110000
trusted library allocation
page read and write
6CEA000
stack
page read and write
5F4E000
stack
page read and write
4DFB000
trusted library allocation
page read and write
AD7000
trusted library allocation
page execute and read and write
2909000
trusted library allocation
page read and write
B20000
heap
page read and write
B68000
heap
page read and write
5EC1000
trusted library allocation
page read and write
B00000
trusted library allocation
page execute and read and write
5D00000
trusted library allocation
page read and write
7AE0000
heap
page read and write
5EA0000
trusted library allocation
page execute and read and write
4D30000
trusted library allocation
page read and write
E28000
trusted library allocation
page read and write
4D45000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
296C000
trusted library allocation
page read and write
E1C000
stack
page read and write
28D3000
trusted library allocation
page read and write
2B5F000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
2919000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page execute and read and write
6870000
trusted library allocation
page execute and read and write
5E50000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
E47000
heap
page read and write
5D2F000
trusted library allocation
page read and write
ACA000
trusted library allocation
page execute and read and write
37F1000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
4D50000
heap
page read and write
B47000
heap
page read and write
71A0000
trusted library allocation
page execute and read and write
69C0000
trusted library section
page read and write
5ED0000
trusted library allocation
page execute and read and write
69F0000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page execute and read and write
29CF000
trusted library allocation
page read and write
795D000
stack
page read and write
68BB000
stack
page read and write
28DE000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
5D54000
heap
page read and write
2BB6000
trusted library allocation
page read and write
28A2000
trusted library allocation
page read and write
5F00000
trusted library allocation
page execute and read and write
5AFE000
stack
page read and write
AC0000
trusted library allocation
page read and write
AA4000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
9A5000
heap
page read and write
D1E000
stack
page read and write
2CDB000
trusted library allocation
page read and write
60FE000
stack
page read and write
DD0000
heap
page read and write
5DED000
heap
page read and write
AD0000
trusted library allocation
page read and write
5E0000
heap
page read and write
2BC5000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
B10000
heap
page execute and read and write
28A0000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
97E000
stack
page read and write
5E18000
heap
page read and write
ABD000
trusted library allocation
page execute and read and write
505E000
stack
page read and write
38F5000
trusted library allocation
page read and write
29F3000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
F4E000
stack
page read and write
5FB0000
trusted library allocation
page execute and read and write
4DE0000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
4CEE000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
4CFD000
trusted library allocation
page read and write
AD2000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
71ED000
stack
page read and write
537B000
stack
page read and write
6E4D000
stack
page read and write
7CEE000
stack
page read and write
4D26000
trusted library allocation
page read and write
5F0000
heap
page read and write
757E000
stack
page read and write
5E22000
heap
page read and write
9A0000
heap
page read and write
2B5C000
trusted library allocation
page read and write
B87000
heap
page read and write
38FE000
trusted library allocation
page read and write
4DBD000
stack
page read and write
2968000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
29C2000
trusted library allocation
page read and write
747E000
stack
page read and write
295D000
trusted library allocation
page read and write
6A10000
heap
page read and write
785E000
stack
page read and write
2B0A000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
498E000
stack
page read and write
29E5000
trusted library allocation
page read and write
4CDB000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
60BE000
stack
page read and write
2D19000
trusted library allocation
page read and write
4CD6000
trusted library allocation
page read and write
5E08000
heap
page read and write
5D18000
trusted library allocation
page read and write
296E000
trusted library allocation
page read and write
390F000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
2D84000
trusted library allocation
page read and write
2B1F000
trusted library allocation
page read and write
5CFF000
stack
page read and write
DC0000
trusted library allocation
page read and write
B60000
heap
page read and write
291C000
trusted library allocation
page read and write
527E000
unkown
page read and write
4EF0000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
38ED000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
2949000
trusted library allocation
page read and write
BA1000
heap
page read and write
69E0000
trusted library allocation
page execute and read and write
3916000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
4F10000
trusted library allocation
page execute and read and write
DC9000
trusted library allocation
page read and write
2CD6000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
AC2000
trusted library allocation
page read and write
69BD000
stack
page read and write
5D6C000
heap
page read and write
2B8B000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
There are 273 hidden memdumps, click here to show them.