IOC Report
Xwl3DsNmN2.exe

loading gif

Files

File Path
Type
Category
Malicious
Xwl3DsNmN2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Xwl3DsNmN2.exe
"C:\Users\user\Desktop\Xwl3DsNmN2.exe"
malicious

URLs

Name
IP
Malicious
http://89.197.154.115:7700/6CqFEOIEZ-_A_cH8pgiUAgokwto4FovQaLCp7IwjfjFOHLmm4PXOb0KwnKkTc0c4DgsIXI1BeciyULKIi1BQYK5r_ag_pWihXw1viMYb3a4ebq8yKbFx_6C
malicious
89.197.154.115
malicious
https://89.197.154.115/
unknown
https://89.197.154.115:7700/ptjW
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://89.197.154.115:7700/ptjnnlsres.dll.muil
unknown
https://89.197.154.115:7700/ptjh
unknown
https://89.197.154.115:7700/hy
unknown
https://89.197.154.115:7700/ptj-
unknown
https://89.197.154.115:7700/ptj0
unknown
https://89.197.154.115:7700/
unknown
https://89.197.154.115:7700/ptjq
unknown
https://89.197.154.115:7700/ptjs
unknown
http://www.apache.org/
unknown
https://89.197.154.115:7700/oft
unknown
https://89.197.154.115:7700/ptj7
unknown
https://89.197.154.115:7700/ptjft
unknown
https://89.197.154.115:7700/ptj9
unknown
https://89.197.154.115:7700/ptj
unknown
https://89.197.154.115:7700/ptjm32
unknown
https://89.197.154.115:7700/My
unknown
https://89.197.154.115:7700/tjc
unknown
http://www.zeustech.net/
unknown
https://89.197.154.115:7700/ptjJ
unknown
https://89.197.154.115:7700/6CqFEOIEZ-_A_cH8pgiUAgokwto4FovQaLCp7IwjfjFOHLmm4PXOb0KwnKkTc0c4DgsIXI1B
unknown
https://89.197.154.115:7700/ptjP
unknown
http://127.0.0.1:%u/
unknown
https://89.197.154.115:7700/ptj476756634-1003
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172

IPs

IP
Domain
Country
Malicious
89.197.154.115
unknown
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
32D0000
direct allocation
page execute and read and write
malicious
401000
unkown
page execute read
malicious
401000
unkown
page execute read
malicious
2F70000
direct allocation
page execute and read and write
malicious
5B0000
direct allocation
page execute and read and write
malicious
5AA000
heap
page read and write
526000
heap
page read and write
4E4000
heap
page read and write
40D000
unkown
page write copy
2D20000
remote allocation
page read and write
2EB6000
heap
page read and write
2EA8000
heap
page read and write
2EAC000
heap
page read and write
505000
heap
page read and write
2EB6000
heap
page read and write
2EA9000
heap
page read and write
2ED3000
heap
page read and write
2E81000
heap
page read and write
4F9000
heap
page read and write
2CED000
stack
page read and write
280E000
stack
page read and write
5C6000
heap
page read and write
2F5B000
heap
page read and write
615000
heap
page read and write
51C000
heap
page read and write
40D000
unkown
page write copy
2EA8000
heap
page read and write
2F2E000
heap
page read and write
37E0000
heap
page read and write
5AA000
heap
page read and write
2EB6000
heap
page read and write
420000
heap
page read and write
2A9E000
stack
page read and write
523000
heap
page read and write
30E3000
heap
page read and write
2FB3000
direct allocation
page execute and read and write
523000
heap
page read and write
52A000
heap
page read and write
2EB8000
heap
page read and write
400000
unkown
page readonly
40C000
unkown
page readonly
5AA000
heap
page read and write
555000
heap
page read and write
2E71000
heap
page read and write
55A000
heap
page read and write
26AE000
stack
page read and write
2D20000
remote allocation
page read and write
23D0000
heap
page read and write
598000
heap
page read and write
2EA8000
heap
page read and write
415000
unkown
page readonly
310E000
heap
page read and write
59C000
heap
page read and write
2EB6000
heap
page read and write
40C000
unkown
page readonly
415000
unkown
page readonly
30D1000
heap
page read and write
610000
heap
page read and write
2A5D000
stack
page read and write
2EB1000
heap
page read and write
5C0000
heap
page read and write
590000
heap
page read and write
290F000
stack
page read and write
37E2000
heap
page read and write
2EB1000
heap
page read and write
2FA8000
direct allocation
page execute and read and write
4BE000
heap
page read and write
4BA000
heap
page read and write
30D1000
heap
page read and write
2FC0000
heap
page read and write
589000
heap
page read and write
2E5F000
stack
page read and write
310E000
heap
page read and write
2F01000
heap
page read and write
2EB6000
heap
page read and write
2D20000
remote allocation
page read and write
52A000
heap
page read and write
27AF000
stack
page read and write
30E3000
heap
page read and write
2ED3000
heap
page read and write
582000
heap
page read and write
37E4000
heap
page read and write
590000
heap
page read and write
2FE0000
heap
page read and write
2B9E000
stack
page read and write
9C000
stack
page read and write
2EB1000
heap
page read and write
3070000
heap
page read and write
2D5E000
stack
page read and write
2BEE000
stack
page read and write
2EB1000
heap
page read and write
2EB1000
heap
page read and write
19D000
stack
page read and write
1F0000
heap
page read and write
2FB5000
direct allocation
page execute and read and write
30D0000
heap
page read and write
5A0000
heap
page read and write
295D000
stack
page read and write
2E70000
heap
page read and write
2EEF000
heap
page read and write
503000
heap
page read and write
400000
unkown
page readonly
3077000
heap
page read and write
46E000
stack
page read and write
5AA000
heap
page read and write
2EC2000
heap
page read and write
2F2D000
heap
page read and write
7EF000
stack
page read and write
59F000
heap
page read and write
4B0000
heap
page read and write
There are 100 hidden memdumps, click here to show them.