IOC Report
EKSTRE_1022.exe

loading gif

Files

File Path
Type
Category
Malicious
EKSTRE_1022.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\ageless\pteropod.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_fd9f1425-13b6-4093-b395-f2ed7ed28e50\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3D1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA401.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER9401.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut4C87.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut5467.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut8A0D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\selectee
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EKSTRE_1022.exe
"C:\Users\user\Desktop\EKSTRE_1022.exe"
malicious
C:\Users\user\AppData\Local\ageless\pteropod.exe
"C:\Users\user\Desktop\EKSTRE_1022.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\EKSTRE_1022.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pteropod.vbs"
malicious
C:\Users\user\AppData\Local\ageless\pteropod.exe
"C:\Users\user\AppData\Local\ageless\pteropod.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\ageless\pteropod.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 12

URLs

Name
IP
Malicious
http://zqamcx.com
unknown
https://account.dyn.com/
unknown
http://r11.i.lenc
unknown
http://r11.o.lencr.org0#
unknown
http://r11.i.lencr.org/0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
zqamcx.com
78.110.166.82

IPs

IP
Domain
Country
Malicious
78.110.166.82
zqamcx.com
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
4130000
direct allocation
page read and write
malicious
1030000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
322A000
trusted library allocation
page read and write
malicious
3200000
trusted library allocation
page read and write
malicious
31B1000
trusted library allocation
page read and write
malicious
2FD0000
heap
page read and write
950000
heap
page read and write
4CC000
stack
page read and write
1A99000
heap
page read and write
6650000
trusted library allocation
page read and write
156E000
stack
page read and write
11A0000
heap
page read and write
AFD000
unkown
page readonly
D3A000
stack
page read and write
AFD000
unkown
page readonly
AFD000
unkown
page readonly
183A000
heap
page read and write
15A0000
heap
page execute and read and write
113E000
heap
page read and write
4439000
direct allocation
page read and write
3BAD000
direct allocation
page read and write
4439000
direct allocation
page read and write
A70000
unkown
page readonly
1290000
trusted library allocation
page read and write
1329000
heap
page execute and read and write
114F000
heap
page read and write
1A97000
heap
page read and write
114F000
heap
page read and write
3A03000
direct allocation
page read and write
1A97000
heap
page read and write
4345000
trusted library allocation
page read and write
2BD28280000
heap
page read and write
1370000
heap
page read and write
F7F000
stack
page read and write
1D2E000
stack
page read and write
1570000
trusted library allocation
page read and write
2ED000
unkown
page readonly
A70000
unkown
page readonly
3A03000
direct allocation
page read and write
89A000
stack
page read and write
16DF000
stack
page read and write
6C0D000
stack
page read and write
113A000
heap
page read and write
B2A000
unkown
page write copy
103D000
stack
page read and write
192E000
stack
page read and write
31A0000
heap
page execute and read and write
134E000
heap
page read and write
30E000
unkown
page readonly
1A97000
heap
page read and write
42E3000
direct allocation
page read and write
324000
unkown
page readonly
12AE000
heap
page read and write
443D000
direct allocation
page read and write
3C1E000
direct allocation
page read and write
64B0000
trusted library allocation
page read and write
C819EFE000
stack
page read and write
6D60000
heap
page read and write
C819BFF000
stack
page read and write
400000
system
page execute and read and write
1283000
trusted library allocation
page execute and read and write
39D0000
direct allocation
page read and write
12A2000
trusted library allocation
page read and write
1177000
heap
page read and write
38E0000
direct allocation
page read and write
162E000
stack
page read and write
128D000
trusted library allocation
page execute and read and write
448D000
direct allocation
page read and write
1372000
heap
page read and write
3C1E000
direct allocation
page read and write
1370000
heap
page read and write
3C1E000
direct allocation
page read and write
A20000
heap
page read and write
3A03000
direct allocation
page read and write
6B0E000
stack
page read and write
1370000
heap
page read and write
A71000
unkown
page execute read
1875000
heap
page read and write
1407000
heap
page read and write
38E0000
direct allocation
page read and write
190A000
heap
page read and write
125A000
stack
page read and write
3A80000
direct allocation
page read and write
3A7D000
direct allocation
page read and write
3BAD000
direct allocation
page read and write
33CF000
trusted library allocation
page read and write
3BAD000
direct allocation
page read and write
3BA9000
direct allocation
page read and write
12D0000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
FCF000
stack
page read and write
1A97000
heap
page read and write
185B000
heap
page read and write
FFC000
stack
page read and write
44AE000
direct allocation
page read and write
31A000
unkown
page read and write
11A5000
heap
page read and write
4293000
direct allocation
page read and write
19C9000
heap
page read and write
3BAD000
direct allocation
page read and write
B67000
unkown
page readonly
189F000
heap
page read and write
38E0000
direct allocation
page read and write
261000
unkown
page execute read
DEE000
stack
page read and write
2BD28066000
heap
page read and write
1D0F000
stack
page read and write
2F9B000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
17B0000
heap
page read and write
1179000
heap
page read and write
3BA9000
direct allocation
page read and write
38E0000
direct allocation
page read and write
38E0000
direct allocation
page read and write
3375000
trusted library allocation
page read and write
660E000
stack
page read and write
2FAA000
trusted library allocation
page read and write
15D0000
heap
page read and write
5C10000
trusted library allocation
page execute and read and write
12A6000
trusted library allocation
page execute and read and write
3382000
trusted library allocation
page read and write
11E2000
heap
page read and write
3A80000
direct allocation
page read and write
3208000
trusted library allocation
page read and write
6DA0000
heap
page read and write
3C1E000
direct allocation
page read and write
31F000
unkown
page write copy
1370000
heap
page read and write
1130000
heap
page read and write
1A97000
heap
page read and write
42E3000
direct allocation
page read and write
1A64000
heap
page read and write
30E000
unkown
page readonly
357000
unkown
page readonly
18A4000
heap
page read and write
B34000
unkown
page readonly
576C000
stack
page read and write
B2F000
unkown
page write copy
1370000
heap
page read and write
132E000
heap
page read and write
7F1C0000
trusted library allocation
page execute and read and write
341C000
trusted library allocation
page read and write
64AF000
stack
page read and write
664E000
stack
page read and write
186B000
heap
page read and write
1179000
heap
page read and write
1194000
heap
page read and write
1A97000
heap
page read and write
B1E000
unkown
page readonly
3C1E000
direct allocation
page read and write
1875000
heap
page read and write
6D80000
trusted library allocation
page execute and read and write
16E0000
heap
page read and write
C81A0FB000
stack
page read and write
1874000
heap
page read and write
B34000
unkown
page readonly
9F0000
heap
page read and write
FDB000
stack
page read and write
1A51000
heap
page read and write
B67000
unkown
page readonly
17FE000
stack
page read and write
A30000
heap
page read and write
3A8E000
direct allocation
page read and write
39C0000
heap
page read and write
4489000
direct allocation
page read and write
4170000
direct allocation
page read and write
99E000
stack
page read and write
12B0000
trusted library allocation
page read and write
B34000
unkown
page readonly
5560000
heap
page read and write
AFD000
unkown
page readonly
17A0000
heap
page read and write
3DEF000
stack
page read and write
2BD28285000
heap
page read and write
38E0000
direct allocation
page read and write
3A80000
direct allocation
page read and write
443D000
direct allocation
page read and write
11A8000
heap
page read and write
113E000
stack
page read and write
58AF000
stack
page read and write
44FE000
direct allocation
page read and write
116D000
heap
page read and write
3A03000
direct allocation
page read and write
2BD28030000
heap
page read and write
4360000
direct allocation
page read and write
5548000
trusted library allocation
page read and write
1875000
heap
page read and write
4489000
direct allocation
page read and write
920000
heap
page read and write
1118000
heap
page read and write
3C1E000
direct allocation
page read and write
12B2000
trusted library allocation
page read and write
C8196FA000
stack
page read and write
1A50000
heap
page execute and read and write
FBC000
stack
page read and write
2BD280C3000
heap
page read and write
3C1E000
direct allocation
page read and write
3BA9000
direct allocation
page read and write
1370000
heap
page read and write
16C0000
heap
page read and write
3BA9000
direct allocation
page read and write
5D9000
stack
page read and write
1150000
heap
page read and write
4217000
trusted library allocation
page read and write
B67000
unkown
page readonly
135C000
stack
page read and write
11E1000
heap
page read and write
3A80000
direct allocation
page read and write
2BD28220000
heap
page read and write
3C1E000
direct allocation
page read and write
5570000
heap
page read and write
1A97000
heap
page read and write
C8198FE000
stack
page read and write
1A97000
heap
page read and write
3417000
trusted library allocation
page read and write
41C0000
direct allocation
page read and write
4293000
direct allocation
page read and write
2BD2828E000
heap
page read and write
2F90000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
640D000
stack
page read and write
3BA9000
direct allocation
page read and write
12AA000
trusted library allocation
page execute and read and write
10F8000
stack
page read and write
1395000
heap
page read and write
115D000
heap
page read and write
4439000
direct allocation
page read and write
1110000
heap
page read and write
698E000
stack
page read and write
3BA9000
direct allocation
page read and write
1177000
heap
page read and write
B2F000
unkown
page write copy
C819DFD000
stack
page read and write
31FE000
trusted library allocation
page read and write
144F000
heap
page read and write
840000
heap
page read and write
F8B000
stack
page read and write
1A51000
heap
page read and write
13A1000
heap
page read and write
41D9000
trusted library allocation
page read and write
FAC000
stack
page read and write
3BA9000
direct allocation
page read and write
6410000
trusted library allocation
page read and write
6D4E000
stack
page read and write
1201000
heap
page read and write
DA0000
heap
page read and write
1909000
heap
page read and write
443D000
direct allocation
page read and write
357000
unkown
page readonly
340F000
trusted library allocation
page read and write
1875000
heap
page read and write
39E4000
heap
page read and write
1830000
heap
page read and write
1ED0000
heap
page read and write
132A000
heap
page read and write
129D000
trusted library allocation
page execute and read and write
1284000
trusted library allocation
page read and write
B67000
unkown
page readonly
132A000
heap
page read and write
1375000
heap
page read and write
120C000
heap
page read and write
1280000
trusted library allocation
page read and write
133D000
heap
page read and write
114F000
heap
page read and write
324000
unkown
page readonly
44FE000
direct allocation
page read and write
4310000
direct allocation
page read and write
2BD27FA0000
heap
page read and write
260000
unkown
page readonly
114F000
heap
page read and write
2BD27FD0000
heap
page read and write
12A0000
trusted library allocation
page read and write
4310000
direct allocation
page read and write
1080000
heap
page read and write
190E000
stack
page read and write
5580000
heap
page read and write
1A97000
heap
page read and write
342A000
trusted library allocation
page read and write
187F000
heap
page read and write
3AC2000
direct allocation
page read and write
41C0000
direct allocation
page read and write
3A80000
direct allocation
page read and write
B1E000
unkown
page readonly
DF0000
heap
page read and write
B1E000
unkown
page readonly
57AE000
stack
page read and write
1A97000
heap
page read and write
1A97000
heap
page read and write
1590000
trusted library allocation
page read and write
1A97000
heap
page read and write
12B7000
trusted library allocation
page execute and read and write
2100000
heap
page read and write
3A03000
direct allocation
page read and write
5BF0000
trusted library allocation
page execute and read and write
4310000
direct allocation
page read and write
A70000
unkown
page readonly
694E000
stack
page read and write
1A97000
heap
page read and write
2F8E000
stack
page read and write
107E000
stack
page read and write
1A97000
heap
page read and write
1370000
heap
page read and write
4170000
direct allocation
page read and write
3BAD000
direct allocation
page read and write
A34000
heap
page read and write
134D000
heap
page execute and read and write
1A55000
heap
page read and write
3A03000
direct allocation
page read and write
11E1000
heap
page read and write
2FBD000
trusted library allocation
page read and write
552C000
stack
page read and write
3217000
trusted library allocation
page read and write
1A97000
heap
page read and write
39E0000
heap
page read and write
44AE000
direct allocation
page read and write
4360000
direct allocation
page read and write
134E000
heap
page read and write
A71000
unkown
page execute read
2FAE000
trusted library allocation
page read and write
5590000
heap
page read and write
1143000
heap
page read and write
3A03000
direct allocation
page read and write
1370000
heap
page read and write
5563000
heap
page read and write
4170000
direct allocation
page read and write
3684000
heap
page read and write
3620000
direct allocation
page read and write
1370000
heap
page read and write
317E000
stack
page read and write
12B5000
trusted library allocation
page execute and read and write
163B000
stack
page read and write
910000
heap
page read and write
C8197FE000
stack
page read and write
4360000
direct allocation
page read and write
83D000
system
page execute and read and write
1370000
heap
page read and write
B2A000
unkown
page write copy
B1E000
unkown
page readonly
3BA9000
direct allocation
page read and write
2BD28094000
heap
page read and write
C819FFE000
stack
page read and write
3BAD000
direct allocation
page read and write
33A4000
trusted library allocation
page read and write
900000
heap
page read and write
F6C000
stack
page read and write
A71000
unkown
page execute read
1370000
heap
page read and write
1370000
heap
page read and write
1352000
heap
page read and write
117E000
heap
page read and write
134E000
heap
page read and write
4293000
direct allocation
page read and write
3432000
trusted library allocation
page read and write
448D000
direct allocation
page read and write
555C000
trusted library allocation
page read and write
B2A000
unkown
page read and write
13A6000
heap
page read and write
1370000
heap
page read and write
2FB6000
trusted library allocation
page read and write
B34000
unkown
page readonly
3427000
trusted library allocation
page read and write
B2A000
unkown
page read and write
2ED000
unkown
page readonly
3A80000
direct allocation
page read and write
183E000
heap
page read and write
5550000
trusted library allocation
page read and write
5BE6000
trusted library allocation
page read and write
165C000
stack
page read and write
1355000
heap
page read and write
448D000
direct allocation
page read and write
38E0000
direct allocation
page read and write
120B000
heap
page read and write
12BB000
trusted library allocation
page execute and read and write
31A000
unkown
page write copy
1909000
heap
page read and write
3BAD000
direct allocation
page read and write
38E0000
direct allocation
page read and write
2FE8000
trusted library allocation
page read and write
64B8000
trusted library allocation
page read and write
1370000
heap
page read and write
138F000
heap
page read and write
3A03000
direct allocation
page read and write
3A80000
direct allocation
page read and write
1435000
heap
page read and write
5573000
heap
page read and write
3A80000
direct allocation
page read and write
42E3000
direct allocation
page read and write
A71000
unkown
page execute read
680E000
stack
page read and write
131E000
stack
page read and write
11A1000
heap
page read and write
2FB1000
trusted library allocation
page read and write
41C0000
direct allocation
page read and write
33CD000
trusted library allocation
page read and write
41B1000
trusted library allocation
page read and write
2BD27FB0000
heap
page read and write
1352000
heap
page read and write
1190000
trusted library allocation
page read and write
3BAD000
direct allocation
page read and write
202F000
stack
page read and write
132A000
heap
page read and write
6C4E000
stack
page read and write
3600000
heap
page read and write
1361000
heap
page read and write
690E000
stack
page read and write
4489000
direct allocation
page read and write
1A51000
heap
page read and write
3680000
heap
page read and write
3225000
trusted library allocation
page read and write
206E000
stack
page read and write
1370000
heap
page read and write
F9F000
stack
page read and write
3221000
trusted library allocation
page read and write
2BD2828C000
heap
page read and write
1378000
heap
page read and write
3231000
trusted library allocation
page read and write
13E2000
heap
page read and write
2F96000
trusted library allocation
page read and write
44FE000
direct allocation
page read and write
4170000
direct allocation
page read and write
44AE000
direct allocation
page read and write
5BE0000
trusted library allocation
page read and write
18BB000
heap
page read and write
161C000
stack
page read and write
1A9B000
heap
page read and write
340B000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
114B000
heap
page read and write
260000
unkown
page readonly
1580000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page execute and read and write
120B000
heap
page read and write
1133000
heap
page read and write
64C0000
trusted library allocation
page read and write
1179000
heap
page read and write
64D0000
heap
page read and write
15B0000
trusted library allocation
page read and write
A70000
unkown
page readonly
2FA2000
trusted library allocation
page read and write
2F9E000
trusted library allocation
page read and write
13A9000
heap
page read and write
1370000
heap
page read and write
1360000
trusted library allocation
page execute and read and write
C819AFF000
stack
page read and write
9DE000
stack
page read and write
261000
unkown
page execute read
There are 439 hidden memdumps, click here to show them.