IOC Report
Jl5yg1Km2s.exe

loading gif

Files

File Path
Type
Category
Malicious
Jl5yg1Km2s.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\explorti.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Jl5yg1Km2s.exe
"C:\Users\user\Desktop\Jl5yg1Km2s.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\user\AppData\Local\Temp\ad40971b6b\explorti.exe
malicious

URLs

Name
IP
Malicious
http://77.91.77.82/Hun4Ko/index.php$
unknown
malicious
http://77.91.77.82/
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php2
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php?
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php8
unknown
malicious
http://77.91.77.82/Hun4Ko/index.php
77.91.77.82
malicious
http://77.91.77.82/Hun4Ko/index.phpKR
unknown
malicious
http://77.91.77.82/Hun4Ko/index.phpe
unknown
malicious

IPs

IP
Domain
Country
Malicious
77.91.77.82
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4BF0000
direct allocation
page read and write
malicious
4BD0000
direct allocation
page read and write
malicious
5210000
direct allocation
page read and write
malicious
3E1000
unkown
page execute and read and write
malicious
3E1000
unkown
page execute and read and write
malicious
A01000
unkown
page execute and read and write
malicious
4D0F000
stack
page read and write
16AE000
heap
page read and write
2990000
direct allocation
page read and write
168F000
heap
page read and write
2B57000
heap
page read and write
4D71000
heap
page read and write
39BE000
stack
page read and write
1687000
heap
page read and write
4761000
heap
page read and write
396F000
stack
page read and write
3110000
direct allocation
page read and write
6B20000
heap
page read and write
1650000
heap
page read and write
306F000
stack
page read and write
4761000
heap
page read and write
9F4000
heap
page read and write
5D1000
unkown
page execute and read and write
4761000
heap
page read and write
2C5F000
stack
page read and write
5420000
direct allocation
page execute and read and write
F1F000
stack
page read and write
5200000
direct allocation
page read and write
4761000
heap
page read and write
4D40000
direct allocation
page execute and read and write
44EE000
stack
page read and write
3110000
direct allocation
page read and write
2990000
direct allocation
page read and write
4D71000
heap
page read and write
4741000
heap
page read and write
2D5F000
stack
page read and write
158E000
stack
page read and write
FA0000
heap
page read and write
4761000
heap
page read and write
FB0000
direct allocation
page read and write
67D6000
heap
page read and write
169A000
heap
page read and write
7150000
heap
page read and write
4D71000
heap
page read and write
3D2F000
stack
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
9F4000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4761000
heap
page read and write
5360000
direct allocation
page execute and read and write
4D71000
heap
page read and write
436F000
stack
page read and write
4E00000
direct allocation
page execute and read and write
30AC000
stack
page read and write
3110000
direct allocation
page read and write
4D71000
heap
page read and write
4D50000
direct allocation
page execute and read and write
4C0E000
stack
page read and write
162D000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
44B000
unkown
page execute and read and write
44FE000
stack
page read and write
3B1E000
stack
page read and write
4D71000
heap
page read and write
3FDF000
stack
page read and write
2990000
direct allocation
page read and write
449000
unkown
page read and write
4761000
heap
page read and write
534F000
stack
page read and write
4D71000
heap
page read and write
15D0000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
67D0000
heap
page read and write
FB0000
direct allocation
page read and write
2990000
direct allocation
page read and write
4D71000
heap
page read and write
9F4000
heap
page read and write
4761000
heap
page read and write
A62000
unkown
page execute and read and write
4DA0000
direct allocation
page execute and read and write
2FDE000
stack
page read and write
4D71000
heap
page read and write
8AE6000
heap
page read and write
3E0000
unkown
page readonly
F0E000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
84E0000
heap
page read and write
4D40000
direct allocation
page execute and read and write
4D71000
heap
page read and write
84E3000
heap
page read and write
437F000
stack
page read and write
4D71000
heap
page read and write
CFD000
stack
page read and write
FB0000
direct allocation
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
A00000
unkown
page readonly
4761000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4D71000
heap
page read and write
4761000
heap
page read and write
FC0000
heap
page read and write
168F000
heap
page read and write
4D71000
heap
page read and write
4D90000
direct allocation
page execute and read and write
4BE0000
direct allocation
page read and write
3D5F000
stack
page read and write
332F000
stack
page read and write
3110000
direct allocation
page read and write
9F4000
heap
page read and write
4D71000
heap
page read and write
16A7000
heap
page read and write
465E000
stack
page read and write
162D000
heap
page read and write
4D71000
heap
page read and write
53F0000
direct allocation
page execute and read and write
4D71000
heap
page read and write
2A5F000
stack
page read and write
3AEE000
stack
page read and write
15DE000
heap
page read and write
5200000
direct allocation
page read and write
1671000
heap
page read and write
449000
unkown
page read and write
D00000
heap
page read and write
1671000
heap
page read and write
4761000
heap
page read and write
16A7000
heap
page read and write
45FF000
stack
page read and write
3AAF000
stack
page read and write
4D71000
heap
page read and write
6FB000
unkown
page execute and read and write
1688000
heap
page read and write
4D71000
heap
page read and write
9F4000
heap
page read and write
49EE000
stack
page read and write
2F9F000
stack
page read and write
8AD0000
heap
page read and write
372E000
stack
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4D70000
direct allocation
page execute and read and write
4D6F000
stack
page read and write
3110000
direct allocation
page read and write
5390000
direct allocation
page execute and read and write
9A0000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
4BA0000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
16A7000
heap
page read and write
3E9E000
stack
page read and write
4761000
heap
page read and write
4B2E000
stack
page read and write
389E000
stack
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
3110000
direct allocation
page read and write
43DE000
stack
page read and write
5380000
direct allocation
page execute and read and write
4761000
heap
page read and write
1445000
heap
page read and write
885F000
stack
page read and write
9B0000
heap
page read and write
16B0000
heap
page read and write
89CB000
stack
page read and write
4D71000
heap
page read and write
4D50000
direct allocation
page execute and read and write
BF1000
unkown
page execute and read and write
5390000
direct allocation
page execute and read and write
16A7000
heap
page read and write
35FE000
stack
page read and write
16B7000
heap
page read and write
3BEF000
stack
page read and write
48AE000
stack
page read and write
2ABF000
stack
page read and write
2990000
direct allocation
page read and write
4D71000
heap
page read and write
4D70000
direct allocation
page execute and read and write
2B5D000
heap
page read and write
43BE000
stack
page read and write
4D70000
direct allocation
page execute and read and write
34BE000
stack
page read and write
4761000
heap
page read and write
4C31000
direct allocation
page read and write
439F000
stack
page read and write
4C2B000
stack
page read and write
102C000
heap
page read and write
4D20000
direct allocation
page execute and read and write
3E6F000
stack
page read and write
557D000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
114F000
stack
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
337E000
stack
page read and write
89F000
unkown
page execute and read and write
1698000
heap
page read and write
4D71000
heap
page read and write
399F000
stack
page read and write
4761000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
1052000
heap
page read and write
2990000
direct allocation
page read and write
D1C000
unkown
page execute and write copy
3FEE000
stack
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4BC0000
direct allocation
page read and write
4D71000
heap
page read and write
A69000
unkown
page write copy
3110000
direct allocation
page read and write
F9E000
stack
page read and write
4761000
heap
page read and write
4D71000
heap
page read and write
4770000
heap
page read and write
1430000
heap
page read and write
422F000
stack
page read and write
1034000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
6FC000
unkown
page execute and write copy
4D71000
heap
page read and write
15CE000
stack
page read and write
1003000
heap
page read and write
EBF000
unkown
page execute and read and write
413E000
stack
page read and write
6E4000
unkown
page execute and read and write
4761000
heap
page read and write
4D70000
direct allocation
page execute and read and write
4D71000
heap
page read and write
335F000
stack
page read and write
4D71000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
346F000
stack
page read and write
15DA000
heap
page read and write
3E1000
unkown
page execute and write copy
3FAF000
stack
page read and write
585E000
stack
page read and write
429E000
stack
page read and write
1671000
heap
page read and write
4761000
heap
page read and write
442000
unkown
page execute and read and write
FB0000
direct allocation
page read and write
4D71000
heap
page read and write
A6B000
unkown
page execute and read and write
4761000
heap
page read and write
4D71000
heap
page read and write
3EAE000
stack
page read and write
4761000
heap
page read and write
168E000
heap
page read and write
375E000
stack
page read and write
3EBE000
stack
page read and write
4761000
heap
page read and write
4761000
heap
page read and write
39DE000
stack
page read and write
44BF000
stack
page read and write
3C3E000
stack
page read and write
2B5B000
heap
page read and write
164D000
heap
page read and write
4E10000
direct allocation
page execute and read and write
4D71000
heap
page read and write
297E000
stack
page read and write
442000
unkown
page execute and read and write
FC0000
heap
page read and write
CFD000
stack
page read and write
4D71000
heap
page read and write
5390000
direct allocation
page execute and read and write
4D71000
heap
page read and write
16B8000
heap
page read and write
29B0000
heap
page read and write
4761000
heap
page read and write
449000
unkown
page write copy
FB0000
direct allocation
page read and write
472F000
stack
page read and write
4C2F000
stack
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
4C51000
direct allocation
page read and write
4D50000
direct allocation
page execute and read and write
5D1000
unkown
page execute and read and write
4780000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
5390000
direct allocation
page execute and read and write
36FF000
stack
page read and write
1440000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
30EE000
stack
page read and write
4761000
heap
page read and write
4D71000
heap
page read and write
CD3000
unkown
page execute and read and write
9F4000
heap
page read and write
2E7E000
stack
page read and write
43AE000
stack
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
30BF000
stack
page read and write
4D71000
heap
page read and write
411F000
stack
page read and write
D1B000
unkown
page execute and write copy
4D71000
heap
page read and write
FB0000
direct allocation
page read and write
4761000
heap
page read and write
336E000
stack
page read and write
386E000
stack
page read and write
67D5000
heap
page read and write
461F000
stack
page read and write
3110000
direct allocation
page read and write
2990000
direct allocation
page read and write
16AE000
heap
page read and write
FB0000
direct allocation
page read and write
3E0000
unkown
page readonly
875E000
stack
page read and write
54A0000
heap
page read and write
4D60000
direct allocation
page execute and read and write
93C000
stack
page read and write
2980000
heap
page read and write
30FE000
stack
page read and write
4761000
heap
page read and write
4D71000
heap
page read and write
9F4000
heap
page read and write
4761000
heap
page read and write
333F000
stack
page read and write
168F000
heap
page read and write
1671000
heap
page read and write
4D71000
heap
page read and write
E15000
heap
page read and write
4F1B000
stack
page read and write
861B000
stack
page read and write
4761000
heap
page read and write
44DF000
stack
page read and write
2F7F000
stack
page read and write
2B20000
heap
page read and write
12FA000
stack
page read and write
2990000
direct allocation
page read and write
5200000
direct allocation
page read and write
1675000
heap
page read and write
293E000
stack
page read and write
347F000
stack
page read and write
3C1F000
stack
page read and write
FB0000
direct allocation
page read and write
714E000
heap
page read and write
2E9E000
stack
page read and write
7140000
heap
page read and write
542F000
stack
page read and write
16B0000
heap
page read and write
2B50000
heap
page read and write
35AF000
stack
page read and write
3C5E000
stack
page read and write
4D71000
heap
page read and write
FD0000
heap
page read and write
4D71000
heap
page read and write
2BFE000
stack
page read and write
2990000
direct allocation
page read and write
3110000
direct allocation
page read and write
4741000
heap
page read and write
4D70000
direct allocation
page execute and read and write
361E000
stack
page read and write
2A9B000
stack
page read and write
4761000
heap
page read and write
547D000
stack
page read and write
6B3000
unkown
page execute and read and write
51B0000
trusted library allocation
page read and write
3110000
direct allocation
page read and write
4761000
heap
page read and write
4D71000
heap
page read and write
9F4000
heap
page read and write
4D80000
direct allocation
page execute and read and write
93C000
stack
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
6A1E000
stack
page read and write
4D71000
heap
page read and write
30DF000
stack
page read and write
9F4000
heap
page read and write
3BFF000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
9F4000
heap
page read and write
4BC0000
direct allocation
page read and write
4DB0000
direct allocation
page execute and read and write
5271000
direct allocation
page read and write
4D71000
heap
page read and write
56BD000
stack
page read and write
371F000
stack
page read and write
6FB000
unkown
page execute and write copy
30F0000
heap
page read and write
4D71000
heap
page read and write
3E0000
unkown
page read and write
4761000
heap
page read and write
D1B000
unkown
page execute and read and write
7150000
heap
page read and write
4D81000
heap
page read and write
FCE000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4BC0000
direct allocation
page read and write
4D71000
heap
page read and write
4D90000
direct allocation
page execute and read and write
4761000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
401E000
stack
page read and write
9F4000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
524E000
stack
page read and write
4D71000
heap
page read and write
311E000
stack
page read and write
4761000
heap
page read and write
44AF000
stack
page read and write
40FF000
stack
page read and write
2990000
direct allocation
page read and write
9F4000
heap
page read and write
5400000
direct allocation
page execute and read and write
9F0000
heap
page read and write
423F000
stack
page read and write
4D71000
heap
page read and write
51DE000
stack
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
FB0000
direct allocation
page read and write
2ADE000
stack
page read and write
4D71000
heap
page read and write
39AE000
stack
page read and write
575D000
stack
page read and write
4D50000
direct allocation
page execute and read and write
34AE000
stack
page read and write
476E000
stack
page read and write
168F000
heap
page read and write
54A4000
heap
page read and write
4761000
heap
page read and write
161F000
heap
page read and write
164B000
heap
page read and write
321F000
stack
page read and write
A01000
unkown
page execute and write copy
4BE0000
direct allocation
page read and write
412E000
stack
page read and write
52DF000
stack
page read and write
68DF000
stack
page read and write
4D71000
heap
page read and write
5410000
direct allocation
page execute and read and write
FB0000
direct allocation
page read and write
486F000
stack
page read and write
4B80000
trusted library allocation
page read and write
4AEF000
stack
page read and write
4761000
heap
page read and write
6EC000
unkown
page execute and read and write
49AF000
stack
page read and write
4761000
heap
page read and write
35BF000
stack
page read and write
3ABF000
stack
page read and write
6B3000
unkown
page execute and read and write
2E3F000
stack
page read and write
140E000
stack
page read and write
4D71000
heap
page read and write
3ADF000
stack
page read and write
36EF000
stack
page read and write
4761000
heap
page read and write
4D71000
heap
page read and write
154E000
stack
page read and write
31FF000
stack
page read and write
2990000
direct allocation
page read and write
4D71000
heap
page read and write
3FFE000
stack
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4764000
heap
page read and write
89F000
unkown
page execute and read and write
4761000
heap
page read and write
17CE000
stack
page read and write
5390000
direct allocation
page execute and read and write
397F000
stack
page read and write
3FBF000
stack
page read and write
4761000
heap
page read and write
FB0000
direct allocation
page read and write
4DA0000
direct allocation
page execute and read and write
385F000
stack
page read and write
4761000
heap
page read and write
9D0000
heap
page read and write
4D71000
heap
page read and write
FB0000
direct allocation
page read and write
4D71000
heap
page read and write
D0B000
heap
page read and write
3AFE000
stack
page read and write
4D71000
heap
page read and write
D04000
unkown
page execute and read and write
4D71000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
2D3E000
stack
page read and write
4D71000
heap
page read and write
473F000
stack
page read and write
35DF000
stack
page read and write
35EE000
stack
page read and write
6B1F000
stack
page read and write
3D3F000
stack
page read and write
4761000
heap
page read and write
104E000
stack
page read and write
4761000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
7141000
heap
page read and write
4D70000
heap
page read and write
4BE0000
direct allocation
page read and write
A69000
unkown
page read and write
4D71000
heap
page read and write
6FB000
unkown
page execute and read and write
4D80000
direct allocation
page execute and read and write
4D71000
heap
page read and write
3D6E000
stack
page read and write
475F000
stack
page read and write
4D71000
heap
page read and write
44B000
unkown
page execute and read and write
5430000
direct allocation
page execute and read and write
2990000
direct allocation
page read and write
387E000
stack
page read and write
3110000
direct allocation
page read and write
4761000
heap
page read and write
1614000
heap
page read and write
40EF000
stack
page read and write
1046000
heap
page read and write
871C000
stack
page read and write
463E000
stack
page read and write
325E000
stack
page read and write
4D50000
direct allocation
page execute and read and write
4BDC000
stack
page read and write
4D71000
heap
page read and write
29B7000
heap
page read and write
53B0000
direct allocation
page execute and read and write
3110000
direct allocation
page read and write
16A7000
heap
page read and write
426E000
stack
page read and write
34DE000
stack
page read and write
4D71000
heap
page read and write
2B1E000
stack
page read and write
425F000
stack
page read and write
4D71000
heap
page read and write
4760000
heap
page read and write
16AE000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4D71000
heap
page read and write
4761000
heap
page read and write
9A0000
heap
page read and write
2990000
direct allocation
page read and write
4D71000
heap
page read and write
6E4000
unkown
page execute and read and write
4761000
heap
page read and write
4761000
heap
page read and write
6EC000
unkown
page execute and read and write
4D60000
direct allocation
page execute and read and write
4D71000
heap
page read and write
53E0000
direct allocation
page execute and read and write
427E000
stack
page read and write
679E000
stack
page read and write
462E000
stack
page read and write
4740000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
2E5F000
stack
page read and write
4D71000
heap
page read and write
D0C000
unkown
page execute and read and write
D1A000
heap
page read and write
6FB000
unkown
page execute and write copy
3110000
direct allocation
page read and write
339E000
stack
page read and write
4C6E000
stack
page read and write
2BBF000
stack
page read and write
1658000
heap
page read and write
3E0000
unkown
page read and write
FCA000
heap
page read and write
3EDE000
stack
page read and write
E0E000
stack
page read and write
1658000
heap
page read and write
4D50000
direct allocation
page execute and read and write
4D71000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
4D71000
heap
page read and write
2FBE000
stack
page read and write
4D71000
heap
page read and write
2990000
direct allocation
page read and write
382F000
stack
page read and write
383F000
stack
page read and write
2CFF000
stack
page read and write
322F000
stack
page read and write
100F000
stack
page read and write
4D71000
heap
page read and write
675E000
stack
page read and write
4761000
heap
page read and write
5370000
direct allocation
page execute and read and write
16C4000
heap
page read and write
4D71000
heap
page read and write
16A7000
heap
page read and write
3110000
direct allocation
page read and write
3120000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
4D2F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
373E000
stack
page read and write
A00000
unkown
page read and write
4741000
heap
page read and write
F5B000
stack
page read and write
55BD000
stack
page read and write
53D0000
direct allocation
page execute and read and write
5390000
direct allocation
page execute and read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
349F000
stack
page read and write
4D71000
heap
page read and write
323E000
stack
page read and write
4D71000
heap
page read and write
8ACC000
stack
page read and write
3E1000
unkown
page execute and write copy
4D71000
heap
page read and write
4761000
heap
page read and write
3C2E000
stack
page read and write
E10000
heap
page read and write
6FC000
unkown
page execute and write copy
53A0000
direct allocation
page execute and read and write
4761000
heap
page read and write
4D71000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
45EF000
stack
page read and write
4761000
heap
page read and write
FB0000
direct allocation
page read and write
449000
unkown
page write copy
3127000
heap
page read and write
415E000
stack
page read and write
168F000
heap
page read and write
451E000
stack
page read and write
69DF000
stack
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4D71000
heap
page read and write
4761000
heap
page read and write
532E000
stack
page read and write
4761000
heap
page read and write
3D9E000
stack
page read and write
3E7F000
stack
page read and write
There are 645 hidden memdumps, click here to show them.