IOC Report
XCS1lNZ26O.exe

loading gif

Files

File Path
Type
Category
Malicious
XCS1lNZ26O.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XCS1lNZ26O.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\MyApp.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\MyApp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MyApp.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AnyDesk.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XCS1lNZ26O.exe
"C:\Users\user\Desktop\XCS1lNZ26O.exe"
malicious
C:\Users\user\AppData\Local\Microsoft\MyApp.exe
"C:\Users\user\AppData\Local\Microsoft\MyApp.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
malicious

URLs

Name
IP
Malicious
dox2025.serveirc.com
malicious

Domains

Name
IP
Malicious
198.187.3.20.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\AnyDesk
AnyDesk

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2A3801BB000
trusted library allocation
page read and write
malicious
2A380001000
trusted library allocation
page read and write
malicious
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B773000
trusted library allocation
page execute and read and write
2A391033000
trusted library allocation
page read and write
2A391B75000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B806000
trusted library allocation
page read and write
F28B3FF000
stack
page read and write
28714D4E000
heap
page read and write
E0045FD000
stack
page read and write
496E000
stack
page read and write
28728110000
trusted library allocation
page read and write
28714B06000
unkown
page readonly
7FFD9B870000
trusted library allocation
page execute and read and write
2A39175F000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
E0065FF000
stack
page read and write
28716C2B000
trusted library allocation
page read and write
2A391342000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
7FFD9B8F0000
trusted library allocation
page read and write
28727AE7000
trusted library allocation
page read and write
E0049FE000
stack
page read and write
28726DCB000
trusted library allocation
page read and write
E0061FE000
stack
page read and write
2A39051E000
trusted library allocation
page read and write
2872F170000
heap
page read and write
2A3EB9E0000
heap
page read and write
10B0000
heap
page read and write
2A380549000
trusted library allocation
page read and write
28727EFE000
trusted library allocation
page read and write
28714C90000
heap
page read and write
2A391E7F000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
2A3EB890000
heap
page read and write
2872EFF0000
heap
page execute and read and write
2872EE70000
trusted library section
page read and write
F28B7FE000
stack
page read and write
4CEE000
stack
page read and write
28727DFF000
trusted library allocation
page read and write
2A391A70000
trusted library allocation
page read and write
2A390420000
trusted library allocation
page read and write
F28C3FF000
stack
page read and write
C40000
heap
page read and write
2A380567000
trusted library allocation
page read and write
2A390D27000
trusted library allocation
page read and write
F28CFFF000
stack
page read and write
7FFD9B92D000
trusted library allocation
page read and write
2872E6D0000
trusted library allocation
page read and write
287271BC000
trusted library allocation
page read and write
4E2E000
stack
page read and write
9E0000
heap
page read and write
28714AFE000
unkown
page readonly
287166A1000
trusted library allocation
page read and write
2A390464000
trusted library allocation
page read and write
F28BBFD000
stack
page read and write
28714CBD000
heap
page read and write
BF0000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page execute and read and write
28714E55000
heap
page read and write
2A3EDDC0000
heap
page read and write
BC0000
heap
page read and write
2A390001000
trusted library allocation
page read and write
B0E000
stack
page read and write
28726DC9000
trusted library allocation
page read and write
AC5000
heap
page read and write
28728210000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
2A3EBA95000
heap
page read and write
C19000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
28726FAA000
trusted library allocation
page read and write
2A3923A2000
trusted library allocation
page read and write
2A391D81000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
27D1000
trusted library allocation
page read and write
28716BF4000
trusted library allocation
page read and write
D7E000
stack
page read and write
2A391031000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
2A3924A1000
trusted library allocation
page read and write
28726AA3000
trusted library allocation
page read and write
DBD000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
28728256000
trusted library allocation
page read and write
28714CD0000
heap
page read and write
2A3801CF000
trusted library allocation
page read and write
2A390520000
trusted library allocation
page read and write
B84000
trusted library allocation
page read and write
2872EA24000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2871483A000
unkown
page readonly
2A3EB7B0000
heap
page read and write
2A3EBA20000
trusted library allocation
page read and write
2A390B1C000
trusted library allocation
page read and write
F28C7FF000
stack
page read and write
28714DD0000
heap
page read and write
7FFD9B943000
trusted library allocation
page read and write
28716BE4000
trusted library allocation
page read and write
28714DB0000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
2A3EB909000
heap
page read and write
28714702000
unkown
page readonly
2A3EB8B0000
heap
page read and write
2A392192000
trusted library allocation
page read and write
C91000
heap
page read and write
2A38050B000
trusted library allocation
page read and write
2A392190000
trusted library allocation
page read and write
28714CBB000
heap
page read and write
2A3EB922000
heap
page read and write
2A380509000
trusted library allocation
page read and write
2A3EB94F000
heap
page read and write
28727BEF000
trusted library allocation
page read and write
2A3EBB70000
heap
page execute and read and write
28716C1D000
trusted library allocation
page read and write
28714EF0000
heap
page read and write
2872EEEF000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
2A390423000
trusted library allocation
page read and write
2A3ED360000
trusted library allocation
page read and write
28714EE0000
heap
page read and write
28726AAB000
trusted library allocation
page read and write
2A390F32000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
28726EA9000
trusted library allocation
page read and write
4F4E000
stack
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
2A3EDE01000
heap
page read and write
F0F000
stack
page read and write
28714CC1000
heap
page read and write
B30000
heap
page read and write
B83000
trusted library allocation
page execute and read and write
28714700000
unkown
page readonly
C77000
heap
page read and write
2A3805A6000
trusted library allocation
page read and write
28714CFC000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
28714BB0000
heap
page read and write
4E40000
heap
page execute and read and write
2A3EB8E0000
heap
page read and write
2A390008000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
28726CCB000
trusted library allocation
page read and write
7FFD9B754000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
2A39080B000
trusted library allocation
page read and write
287279E9000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
2A380513000
trusted library allocation
page read and write
F28BFF7000
stack
page read and write
37D1000
trusted library allocation
page read and write
7FF444D00000
trusted library allocation
page execute and read and write
C20000
trusted library allocation
page read and write
E0039F2000
stack
page read and write
E0059FF000
stack
page read and write
2A3EBA90000
heap
page read and write
2A3EDCD0000
heap
page execute and read and write
287267DF000
trusted library allocation
page read and write
2A3EB91F000
heap
page read and write
28727AE9000
trusted library allocation
page read and write
2872820E000
trusted library allocation
page read and write
2A380530000
trusted library allocation
page read and write
28714CD3000
heap
page read and write
B94000
trusted library allocation
page read and write
2A3EDDFF000
heap
page read and write
28714B1C000
unkown
page readonly
2A3EB949000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
2A380520000
trusted library allocation
page read and write
2A380507000
trusted library allocation
page read and write
7FFD9B77B000
trusted library allocation
page execute and read and write
F28D3FD000
stack
page read and write
C5E000
heap
page read and write
287266A8000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B753000
trusted library allocation
page execute and read and write
2A380511000
trusted library allocation
page read and write
28714E20000
trusted library allocation
page read and write
28714E50000
heap
page read and write
28726E26000
trusted library allocation
page read and write
87C000
stack
page read and write
F28AFFD000
stack
page read and write
2A390C22000
trusted library allocation
page read and write
2A391E81000
trusted library allocation
page read and write
E005DFE000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
28714D90000
heap
page read and write
27CE000
stack
page read and write
28726FAC000
trusted library allocation
page read and write
2A391243000
trusted library allocation
page read and write
2A3EB94B000
heap
page read and write
DD0000
heap
page read and write
2A3EB8E6000
heap
page read and write
28726AC8000
trusted library allocation
page read and write
2A380515000
trusted library allocation
page read and write
287272BC000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
2A3EB902000
heap
page read and write
E003DFE000
stack
page read and write
7FFD9B752000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
C6A000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
2A3924A3000
trusted library allocation
page read and write
F28D7FE000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
E004DFD000
stack
page read and write
28714C9C000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
BBB000
trusted library allocation
page execute and read and write
2A380559000
trusted library allocation
page read and write
C63000
heap
page read and write
400000
remote allocation
page execute and read and write
28727BED000
trusted library allocation
page read and write
287272BA000
trusted library allocation
page read and write
97C000
stack
page read and write
28714CFA000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
2A38050D000
trusted library allocation
page read and write
2872EF04000
heap
page read and write
2872EEC9000
heap
page read and write
2A3EBB80000
heap
page read and write
2A391344000
trusted library allocation
page read and write
F28ABF3000
stack
page read and write
28714CC3000
heap
page read and write
28714EA0000
heap
page execute and read and write
2A38050F000
trusted library allocation
page read and write
AC0000
heap
page read and write
2A3EDDB0000
heap
page read and write
2A3EBA80000
heap
page read and write
28727F00000
trusted library allocation
page read and write
2A3ED6B8000
heap
page read and write
B70000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
28714D06000
heap
page read and write
2A392092000
trusted library allocation
page read and write
2A3801B2000
trusted library allocation
page read and write
2A390788000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
287273C0000
trusted library allocation
page read and write
E0055FE000
stack
page read and write
2872EF12000
heap
page read and write
E0069FB000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B949000
trusted library allocation
page read and write
B10000
heap
page read and write
2872EEB0000
trusted library section
page read and write
4DEF000
stack
page read and write
28714E40000
trusted library allocation
page read and write
28714CC5000
heap
page read and write
C00000
heap
page execute and read and write
2A390428000
trusted library allocation
page read and write
2872EEC5000
heap
page read and write
7FFD9B76A000
trusted library allocation
page read and write
287266A1000
trusted library allocation
page read and write
F28CBFE000
stack
page read and write
2A3EBA40000
trusted library allocation
page read and write
2A3EBB85000
heap
page read and write
28714EF5000
heap
page read and write
28714C96000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
E0051FD000
stack
page read and write
287273C2000
trusted library allocation
page read and write
C48000
heap
page read and write
2872EEC0000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
There are 263 hidden memdumps, click here to show them.