IOC Report
6medsM68NX.exe

loading gif

Files

File Path
Type
Category
Malicious
6medsM68NX.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\zero\xapp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xapp.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\ageless
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6medsM68NX.exe
"C:\Users\user\Desktop\6medsM68NX.exe"
malicious
C:\Users\user\AppData\Local\zero\xapp.exe
"C:\Users\user\Desktop\6medsM68NX.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\6medsM68NX.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xapp.vbs"
malicious
C:\Users\user\AppData\Local\zero\xapp.exe
"C:\Users\user\AppData\Local\zero\xapp.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\zero\xapp.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org/bot1749457201:AAGWIY2QPzrHZIumAIUsWjyRAEWcJrauccY/
unknown
malicious
http://127.0.0.1:HTTP/1.1
unknown
https://api.ipify.org%GETMozilla/5.0
unknown
http://DynDns.comDynDNS
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
unknown
http://mbKXcZ.com
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
unknown
https://api.ipify.org%4
unknown
https://api.telegram.org/bot1749457201:AAGWIY2QPzrHZIumAIUsWjyRAEWcJrauccY/sendDocumentdocument-----
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2AD0000
direct allocation
page read and write
malicious
A40000
direct allocation
page read and write
malicious
2441000
trusted library allocation
page read and write
malicious
2621000
trusted library allocation
page read and write
malicious
702000
system
page execute and read and write
malicious
700000
system
page execute and read and write
4015000
heap
page read and write
5C2D000
stack
page read and write
85E000
heap
page read and write
46E0000
direct allocation
page read and write
5ABE000
stack
page read and write
42FA000
heap
page read and write
23F3000
trusted library allocation
page read and write
A5F000
heap
page read and write
4B64000
trusted library allocation
page read and write
2402000
trusted library allocation
page read and write
3AF0000
heap
page read and write
7A0000
heap
page read and write
5C50000
heap
page read and write
4089000
heap
page read and write
3FB5000
heap
page read and write
4663000
direct allocation
page read and write
9A000
stack
page read and write
4A7000
unkown
page read and write
4AF000
unkown
page readonly
3441000
trusted library allocation
page read and write
41FF000
heap
page read and write
4AF000
unkown
page readonly
2412000
trusted library allocation
page read and write
4F90000
heap
page read and write
A30000
heap
page read and write
807000
heap
page read and write
400000
unkown
page readonly
252DA744000
heap
page read and write
3D90000
heap
page read and write
9A5000
heap
page read and write
4AB000
unkown
page readonly
4061000
heap
page read and write
400000
unkown
page readonly
5423000
heap
page read and write
4663000
direct allocation
page read and write
38D7000
heap
page read and write
608000
trusted library allocation
page read and write
2B60000
heap
page read and write
7D8000
heap
page read and write
40B0000
heap
page read and write
3F8E000
heap
page read and write
2412000
trusted library allocation
page read and write
482000
unkown
page readonly
C80000
heap
page read and write
7445FFE000
stack
page read and write
846000
trusted library allocation
page execute and read and write
A90000
heap
page read and write
401000
unkown
page execute read
8AF000
stack
page read and write
490000
unkown
page read and write
5E7F000
unkown
page read and write
46E0000
direct allocation
page read and write
6E8000
heap
page read and write
3EE0000
heap
page read and write
4663000
direct allocation
page read and write
44AB000
heap
page read and write
38DF000
heap
page read and write
27D5000
trusted library allocation
page read and write
4DE0000
heap
page read and write
9A8000
heap
page read and write
3FA4000
heap
page read and write
100000
heap
page read and write
4AFE000
stack
page read and write
488E000
trusted library allocation
page read and write
74459FF000
stack
page read and write
187F000
stack
page read and write
4809000
direct allocation
page read and write
6F7000
stack
page read and write
23ED000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
3FD4000
heap
page read and write
1F0000
heap
page read and write
252DA6C0000
heap
page read and write
490000
unkown
page write copy
487E000
direct allocation
page read and write
492000
unkown
page read and write
5FDD000
stack
page read and write
44A0000
direct allocation
page read and write
453E000
stack
page read and write
4AF000
unkown
page readonly
3FC5000
heap
page read and write
4071000
heap
page read and write
5E3D000
stack
page read and write
491000
unkown
page write copy
3621000
trusted library allocation
page read and write
414E000
heap
page read and write
487E000
direct allocation
page read and write
4540000
direct allocation
page read and write
400000
unkown
page readonly
4663000
direct allocation
page read and write
4663000
direct allocation
page read and write
490000
unkown
page write copy
283F000
trusted library allocation
page read and write
24A0000
heap
page execute and read and write
8AF000
stack
page read and write
9C7000
heap
page read and write
482000
unkown
page readonly
4663000
direct allocation
page read and write
26CA000
trusted library allocation
page read and write
93E000
stack
page read and write
4B74000
trusted library allocation
page read and write
4B3E000
trusted library allocation
page read and write
4B78000
trusted library allocation
page read and write
44B0000
heap
page read and write
2260000
heap
page read and write
58BF000
stack
page read and write
46E0000
direct allocation
page read and write
855000
trusted library allocation
page execute and read and write
9A000
stack
page read and write
845000
heap
page read and write
4540000
direct allocation
page read and write
46E0000
direct allocation
page read and write
4AF000
unkown
page readonly
26D2000
trusted library allocation
page read and write
4B66000
trusted library allocation
page read and write
252DA6A0000
heap
page read and write
2250000
trusted library allocation
page execute and read and write
4192000
heap
page read and write
810000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
23FE000
trusted library allocation
page read and write
150000
heap
page read and write
ADE000
stack
page read and write
74461FB000
stack
page read and write
48A0000
trusted library allocation
page read and write
122E000
stack
page read and write
307F000
stack
page read and write
5EDE000
stack
page read and write
4809000
direct allocation
page read and write
240A000
trusted library allocation
page execute and read and write
247E000
stack
page read and write
772000
heap
page read and write
48E0000
trusted library allocation
page read and write
3EB5000
heap
page read and write
2FF0000
heap
page read and write
4540000
direct allocation
page read and write
38D6000
heap
page read and write
823000
trusted library allocation
page execute and read and write
4E40000
heap
page execute and read and write
480D000
direct allocation
page read and write
350E000
stack
page read and write
4408000
heap
page read and write
4070000
heap
page read and write
252DA885000
heap
page read and write
487E000
direct allocation
page read and write
4060000
heap
page execute and read and write
100000
heap
page read and write
742000
heap
page read and write
5A40000
trusted library allocation
page execute and read and write
3DDF000
heap
page read and write
74460FF000
stack
page read and write
56DE000
stack
page read and write
4E00000
trusted library allocation
page execute and read and write
4809000
direct allocation
page read and write
4663000
direct allocation
page read and write
3BF0000
heap
page read and write
4540000
direct allocation
page read and write
5436000
heap
page read and write
3E4B000
heap
page read and write
480D000
direct allocation
page read and write
603E000
stack
page read and write
4540000
direct allocation
page read and write
46E0000
direct allocation
page read and write
8C0000
heap
page read and write
5C9E000
stack
page read and write
5E1E000
stack
page read and write
4186000
heap
page read and write
3FC0000
heap
page read and write
46E0000
direct allocation
page read and write
487E000
direct allocation
page read and write
23E3000
trusted library allocation
page execute and read and write
8FE000
stack
page read and write
4C60000
heap
page read and write
4BA0000
trusted library allocation
page read and write
2839000
trusted library allocation
page read and write
4AB000
unkown
page readonly
4182000
heap
page execute and read and write
3F13000
heap
page read and write
490000
unkown
page read and write
487E000
direct allocation
page read and write
4663000
direct allocation
page read and write
9DE000
stack
page read and write
100000
heap
page read and write
2401000
trusted library allocation
page read and write
5FBF000
stack
page read and write
6E5000
heap
page read and write
3994000
heap
page read and write
480D000
direct allocation
page read and write
2420000
trusted library allocation
page read and write
2837000
trusted library allocation
page read and write
397C000
heap
page read and write
4663000
direct allocation
page read and write
23B0000
trusted library allocation
page read and write
4043000
heap
page read and write
7EE000
heap
page read and write
4028000
heap
page read and write
4A8000
unkown
page read and write
9A0000
heap
page read and write
85B000
trusted library allocation
page execute and read and write
5FFE000
stack
page read and write
9C6000
heap
page read and write
492000
unkown
page read and write
4B3F000
stack
page read and write
4062000
heap
page read and write
4B20000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
4540000
direct allocation
page read and write
5F0000
trusted library allocation
page read and write
147F000
stack
page read and write
129E000
stack
page read and write
4AF000
unkown
page readonly
3510000
heap
page read and write
4809000
direct allocation
page read and write
487E000
direct allocation
page read and write
3E89000
heap
page read and write
401000
unkown
page execute read
4B29000
trusted library allocation
page read and write
4014000
heap
page read and write
4809000
direct allocation
page read and write
770000
heap
page read and write
7FA000
heap
page read and write
5EBE000
unkown
page read and write
3E80000
heap
page read and write
1B7000
stack
page read and write
4B95000
trusted library allocation
page read and write
1320000
heap
page read and write
480D000
direct allocation
page read and write
3BBF000
stack
page read and write
26C7000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
8B9000
stack
page read and write
56C0000
heap
page read and write
37BE000
stack
page read and write
7445EFE000
stack
page read and write
356E000
stack
page read and write
4A7000
unkown
page read and write
40BA000
heap
page read and write
3E74000
heap
page read and write
4B38000
trusted library allocation
page read and write
3EC9000
heap
page read and write
26EE000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
780000
heap
page read and write
4540000
direct allocation
page read and write
46E0000
direct allocation
page read and write
480D000
direct allocation
page read and write
93E000
stack
page read and write
236E000
stack
page read and write
46E0000
direct allocation
page read and write
396F000
stack
page read and write
8B0000
heap
page read and write
4183000
heap
page read and write
482000
unkown
page readonly
735000
heap
page read and write
9F0000
heap
page read and write
9A000
stack
page read and write
5A5000
heap
page read and write
890000
heap
page read and write
400000
unkown
page readonly
A30000
heap
page read and write
401000
unkown
page execute read
46E0000
direct allocation
page read and write
4B50000
heap
page read and write
3EA1000
heap
page read and write
C1E000
stack
page read and write
482000
unkown
page readonly
3F77000
heap
page read and write
4809000
direct allocation
page read and write
A80000
direct allocation
page read and write
4880000
trusted library allocation
page read and write
403A000
heap
page read and write
490000
unkown
page read and write
4809000
direct allocation
page read and write
41D2000
heap
page read and write
3F98000
heap
page read and write
4B86000
trusted library allocation
page read and write
4BB0000
heap
page execute and read and write
880000
trusted library allocation
page read and write
241B000
trusted library allocation
page execute and read and write
3B0C000
heap
page read and write
7B0000
heap
page read and write
8B4000
stack
page read and write
874000
heap
page read and write
2417000
trusted library allocation
page execute and read and write
23EB000
trusted library allocation
page read and write
2C70000
heap
page read and write
400000
unkown
page readonly
2410000
trusted library allocation
page read and write
27DC000
trusted library allocation
page read and write
1E0000
heap
page read and write
487E000
direct allocation
page read and write
482000
unkown
page readonly
4B6E000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
9EE000
stack
page read and write
2430000
trusted library allocation
page read and write
6EE000
heap
page read and write
9D0000
heap
page read and write
252DC170000
heap
page read and write
4E0E000
stack
page read and write
4EC0000
trusted library allocation
page execute and read and write
480D000
direct allocation
page read and write
23FD000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
6B0000
heap
page read and write
3FDD000
heap
page read and write
3F90000
heap
page read and write
A6F000
heap
page read and write
8B4000
stack
page read and write
3DEB000
heap
page read and write
4890000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
59BF000
stack
page read and write
3CF0000
heap
page read and write
5A0000
heap
page read and write
BA000
stack
page read and write
7AB000
heap
page read and write
492000
unkown
page read and write
57E000
stack
page read and write
840000
trusted library allocation
page read and write
2510000
heap
page read and write
252DA794000
heap
page read and write
4075000
heap
page read and write
4535000
direct allocation
page read and write
4809000
direct allocation
page read and write
252DA70F000
heap
page read and write
4809000
direct allocation
page read and write
162F000
stack
page read and write
437000
system
page execute and read and write
23E0000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
4540000
direct allocation
page read and write
950000
heap
page read and write
2429000
trusted library allocation
page read and write
3E1C000
heap
page read and write
580000
heap
page read and write
6A0000
trusted library allocation
page read and write
A3A000
heap
page read and write
4540000
direct allocation
page read and write
170000
heap
page read and write
2E90000
heap
page read and write
B1E000
stack
page read and write
9D0000
heap
page read and write
4539000
direct allocation
page read and write
3F69000
heap
page read and write
4B7E000
trusted library allocation
page read and write
26E8000
trusted library allocation
page read and write
4AB000
unkown
page readonly
23F2000
trusted library allocation
page read and write
24F0000
trusted library allocation
page execute and read and write
A3E000
heap
page read and write
4809000
direct allocation
page read and write
3B00000
direct allocation
page read and write
4B70000
heap
page read and write
4540000
direct allocation
page read and write
4B00000
trusted library allocation
page read and write
3B07000
heap
page read and write
492E000
stack
page read and write
C6E000
stack
page read and write
2500000
trusted library allocation
page read and write
5D1E000
unkown
page read and write
1C0000
heap
page read and write
252DA77B000
heap
page read and write
480D000
direct allocation
page read and write
8B9000
stack
page read and write
3BA000
stack
page read and write
607E000
stack
page read and write
82D000
trusted library allocation
page execute and read and write
4540000
direct allocation
page read and write
4AB000
unkown
page readonly
4BA0000
trusted library allocation
page execute and read and write
4183000
heap
page read and write
9BE000
stack
page read and write
3E29000
heap
page read and write
6B8000
heap
page read and write
2AD2000
heap
page read and write
4117000
heap
page read and write
4061000
heap
page read and write
4540000
direct allocation
page read and write
510E000
stack
page read and write
8A1000
heap
page read and write
401000
unkown
page execute read
26DB000
trusted library allocation
page read and write
3FD5000
heap
page read and write
4663000
direct allocation
page read and write
C8E000
heap
page read and write
5CFE000
stack
page read and write
1230000
heap
page read and write
460000
heap
page read and write
3E96000
heap
page read and write
46E0000
direct allocation
page read and write
4183000
heap
page read and write
4395000
heap
page read and write
2406000
trusted library allocation
page read and write
2480000
heap
page read and write
617F000
stack
page read and write
50CC000
stack
page read and write
21AE000
stack
page read and write
7445BFE000
stack
page read and write
1255000
heap
page read and write
852000
trusted library allocation
page read and write
9A0000
heap
page read and write
3FC4000
heap
page execute and read and write
3E12000
heap
page read and write
490000
unkown
page write copy
A15000
heap
page read and write
401000
unkown
page execute read
3DD6000
heap
page read and write
34A4000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
26D8000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
620000
trusted library allocation
page execute and read and write
5A20000
trusted library allocation
page execute and read and write
950000
heap
page read and write
9CE000
stack
page read and write
5A1D000
stack
page read and write
3BC3000
heap
page read and write
252DA5C0000
heap
page read and write
4B81000
trusted library allocation
page read and write
491000
unkown
page write copy
3469000
trusted library allocation
page read and write
3CB4000
heap
page read and write
47BE000
stack
page read and write
8B9000
stack
page read and write
4B30000
trusted library allocation
page read and write
252DA88E000
heap
page read and write
9F4000
heap
page read and write
2406000
trusted library allocation
page execute and read and write
24EE000
stack
page read and write
4AB000
unkown
page readonly
4E8E000
stack
page read and write
3DF5000
heap
page read and write
14E000
stack
page read and write
4041000
heap
page read and write
4B92000
trusted library allocation
page read and write
1E0000
heap
page read and write
46E0000
direct allocation
page read and write
862000
heap
page read and write
830000
trusted library allocation
page read and write
8FE000
stack
page read and write
252DA880000
heap
page read and write
46E0000
direct allocation
page read and write
480D000
direct allocation
page read and write
870000
heap
page read and write
3F43000
heap
page read and write
1C5000
heap
page read and write
3DE4000
heap
page read and write
857000
trusted library allocation
page execute and read and write
480D000
direct allocation
page read and write
8B4000
heap
page read and write
4AB000
unkown
page readonly
55DF000
stack
page read and write
4AF000
unkown
page readonly
7445CFF000
stack
page read and write
261F000
stack
page read and write
3EF0000
heap
page read and write
4809000
direct allocation
page read and write
119F000
stack
page read and write
7FAF0000
trusted library allocation
page execute and read and write
6EC000
heap
page read and write
23AC000
stack
page read and write
480D000
direct allocation
page read and write
842000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
11DE000
stack
page read and write
4064000
heap
page read and write
5CDE000
unkown
page read and write
2C74000
heap
page read and write
3B5C000
heap
page read and write
23E4000
trusted library allocation
page read and write
38CE000
stack
page read and write
4E10000
trusted library allocation
page read and write
824000
trusted library allocation
page read and write
756000
heap
page read and write
775000
heap
page read and write
3EAF000
stack
page read and write
4006000
heap
page read and write
3CB0000
heap
page read and write
21B8000
trusted library allocation
page read and write
491000
unkown
page write copy
84A000
trusted library allocation
page execute and read and write
487E000
direct allocation
page read and write
8B4000
stack
page read and write
46E0000
direct allocation
page read and write
A95000
heap
page read and write
487E000
direct allocation
page read and write
252DA715000
heap
page read and write
3F30000
heap
page read and write
2400000
trusted library allocation
page read and write
240D000
trusted library allocation
page read and write
A62000
heap
page read and write
121E000
stack
page read and write
760000
heap
page read and write
4C2E000
stack
page read and write
4193000
heap
page read and write
4B8D000
trusted library allocation
page read and write
3EB0000
heap
page read and write
940000
heap
page read and write
48D0000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
6DA000
heap
page read and write
9D0000
heap
page read and write
83D000
trusted library allocation
page execute and read and write
74458FE000
stack
page read and write
4DF0000
trusted library allocation
page execute and read and write
1D0000
heap
page read and write
3184000
heap
page read and write
252DA6E0000
heap
page read and write
7EE000
stack
page read and write
2430000
heap
page execute and read and write
3180000
heap
page read and write
480D000
direct allocation
page read and write
3DE9000
heap
page read and write
4B60000
trusted library allocation
page read and write
610000
trusted library allocation
page read and write
488B000
trusted library allocation
page read and write
4809000
direct allocation
page read and write
4061000
heap
page read and write
3FC8000
heap
page read and write
3FCA000
heap
page read and write
4663000
direct allocation
page read and write
3FC5000
heap
page read and write
400000
unkown
page readonly
4540000
direct allocation
page read and write
23E0000
trusted library allocation
page read and write
744555A000
stack
page read and write
5DFC000
stack
page read and write
1250000
heap
page read and write
4EB0000
trusted library allocation
page execute and read and write
3FE4000
heap
page read and write
C8A000
heap
page read and write
480D000
direct allocation
page read and write
9FB000
heap
page read and write
23EE000
trusted library allocation
page read and write
2FF5000
heap
page read and write
4809000
direct allocation
page read and write
3F1F000
heap
page read and write
4DBC000
stack
page read and write
4D60000
trusted library allocation
page execute and read and write
8AF000
stack
page read and write
5463000
heap
page read and write
820000
trusted library allocation
page read and write
73C000
heap
page read and write
283D000
trusted library allocation
page read and write
CB7000
heap
page read and write
23D0000
trusted library allocation
page read and write
60DE000
stack
page read and write
4BD0000
trusted library allocation
page read and write
482000
unkown
page readonly
480D000
direct allocation
page read and write
487E000
direct allocation
page read and write
7F8D0000
trusted library allocation
page execute and read and write
40FF000
heap
page read and write
4B89000
trusted library allocation
page read and write
3FC5000
heap
page read and write
600000
trusted library allocation
page read and write
252DA71C000
heap
page read and write
401000
unkown
page execute read
5702000
heap
page read and write
There are 557 hidden memdumps, click here to show them.