IOC Report
1x6jzcZeRu.exe

loading gif

Files

File Path
Type
Category
Malicious
1x6jzcZeRu.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1x6jzcZeRu.exe
"C:\Users\user\Desktop\1x6jzcZeRu.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
156.255.2.100
malicious
https://156.255.2.100:18896/jquery-3.3.1.min.js53011b87bd06M
unknown
http://code.jquery.com/
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsography
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsV
unknown
https://156.255.2.100/
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsY
unknown
https://156.255.2.100:18896/dlliCe
unknown
https://156.255.2.100:18896/
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsyptnetUrlCache
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsrovider
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jspXS
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.js$Y
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsl
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.js.
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.js
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.js2
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsr
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsxX
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.js9
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsoint:V
unknown
https://156.255.2.100:18896/SMF
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsrovider9
unknown
http://code.jquery.com/9
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsy~Z
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsvider
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.js%
unknown
https://156.255.2.100:18896/jquery-3.3.1.min.jsvider8Xk
unknown
https://156.255.2.100:18896/l
unknown
There are 19 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
156.255.2.100
unknown
Seychelles
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C000180000
direct allocation
page read and write
malicious
14673FE0000
direct allocation
page execute read
malicious
14674DC0000
direct allocation
page execute read
malicious
14674061000
direct allocation
page read and write
malicious
C000104000
direct allocation
page read and write
C000060000
direct allocation
page read and write
14674A24000
heap
page read and write
1464D408000
direct allocation
page read and write
1464D4BA000
heap
page read and write
14674A4F000
heap
page read and write
1464D4DD000
heap
page read and write
14674991000
heap
page read and write
E051FE000
stack
page read and write
1464D45C000
heap
page read and write
E05DFB000
stack
page read and write
E05FFD000
stack
page read and write
14674A09000
heap
page read and write
C00003D000
direct allocation
page read and write
1464D4B4000
heap
page read and write
14674A36000
heap
page read and write
1D5000
unkown
page read and write
14674A09000
heap
page read and write
C000028000
direct allocation
page read and write
14674A2A000
heap
page read and write
C000044000
direct allocation
page read and write
1464D404000
direct allocation
page read and write
14674AB1000
heap
page read and write
14674A36000
heap
page read and write
C00002A000
direct allocation
page read and write
1464D440000
direct allocation
page read and write
146749B8000
heap
page read and write
1464D54A000
heap
page read and write
1D7000
unkown
page write copy
1464D532000
heap
page read and write
14674DC1000
direct allocation
page read and write
14674A3C000
heap
page read and write
14672800000
direct allocation
page read and write
1464D40A000
direct allocation
page read and write
C000114000
direct allocation
page read and write
14674A36000
heap
page read and write
14674A36000
heap
page read and write
14674B88000
heap
page read and write
14674A01000
heap
page read and write
14674A1B000
heap
page read and write
14674A3F000
heap
page read and write
1467407D000
direct allocation
page read and write
14674A3C000
heap
page read and write
C00002D000
direct allocation
page read and write
14674082000
direct allocation
page read and write
14674AB0000
heap
page read and write
1D8000
unkown
page read and write
C000038000
direct allocation
page read and write
14674A24000
heap
page read and write
1464D52F000
heap
page read and write
E4000
unkown
page readonly
1464D4FC000
heap
page read and write
C000065000
direct allocation
page read and write
14674A17000
heap
page read and write
1464D40C000
direct allocation
page read and write
14674A51000
heap
page read and write
C000002000
direct allocation
page read and write
C000116000
direct allocation
page read and write
1464D54C000
heap
page read and write
60000
unkown
page readonly
1D5000
unkown
page write copy
14674A09000
heap
page read and write
14674AB1000
heap
page read and write
14674990000
heap
page read and write
14674A09000
heap
page read and write
14674A4F000
heap
page read and write
1464D4C0000
heap
page read and write
1464D450000
heap
page read and write
C00004D000
direct allocation
page read and write
14674A3C000
heap
page read and write
1464D52C000
heap
page read and write
1464D532000
heap
page read and write
26C000
unkown
page read and write
1467407A000
direct allocation
page read and write
1FE000
unkown
page read and write
14674AD5000
heap
page read and write
14674980000
remote allocation
page read and write
61000
unkown
page execute read
276000
unkown
page readonly
1464D581000
direct allocation
page read and write
E4000
unkown
page readonly
275000
unkown
page write copy
275000
unkown
page write copy
C000010000
direct allocation
page read and write
1464D3D0000
heap
page read and write
C00005C000
direct allocation
page read and write
E4000
unkown
page readonly
14674A17000
heap
page read and write
276000
unkown
page readonly
1464D5F5000
heap
page read and write
14674A27000
heap
page read and write
14674B00000
heap
page read and write
14674B88000
heap
page read and write
204000
unkown
page read and write
146744BF000
heap
page read and write
C000118000
direct allocation
page read and write
14674A36000
heap
page read and write
1464D532000
heap
page read and write
C000006000
direct allocation
page read and write
14674A3C000
heap
page read and write
14674A46000
heap
page read and write
60000
unkown
page readonly
14674A1B000
heap
page read and write
E04FFF000
stack
page read and write
14674077000
direct allocation
page read and write
C000100000
direct allocation
page read and write
14674B8B000
heap
page read and write
1464D400000
direct allocation
page read and write
14674A24000
heap
page read and write
14674B37000
heap
page read and write
14674080000
direct allocation
page read and write
146749DA000
heap
page read and write
14674980000
remote allocation
page read and write
14674A3C000
heap
page read and write
C00000C000
direct allocation
page read and write
14674B00000
heap
page read and write
C00011C000
direct allocation
page read and write
E05BFE000
stack
page read and write
61000
unkown
page execute read
14674B0B000
heap
page read and write
270000
unkown
page readonly
14674B88000
heap
page read and write
1464D4DD000
heap
page read and write
C00000E000
direct allocation
page read and write
14674980000
remote allocation
page read and write
14674A3C000
heap
page read and write
14674A3C000
heap
page read and write
14674B5C000
heap
page read and write
14674A62000
heap
page read and write
1464D530000
heap
page read and write
C000102000
direct allocation
page read and write
E057FD000
stack
page read and write
14674B37000
heap
page read and write
14674ADD000
heap
page read and write
270000
unkown
page readonly
1464D52C000
heap
page read and write
1464D4C1000
heap
page read and write
14674A27000
heap
page read and write
1464D464000
heap
page read and write
C000080000
direct allocation
page read and write
14674A01000
heap
page read and write
14674A1B000
heap
page read and write
1464D4F8000
heap
page read and write
14674A2A000
heap
page read and write
1464D2D0000
heap
page read and write
14674B0A000
heap
page read and write
1464D54A000
heap
page read and write
E059FB000
stack
page read and write
1464D4FC000
heap
page read and write
1464D5F0000
heap
page read and write
C00010E000
direct allocation
page read and write
14674A17000
heap
page read and write
14674A1A000
heap
page read and write
14674A36000
heap
page read and write
1464D4FC000
heap
page read and write
14674A17000
heap
page read and write
1464D3B0000
heap
page read and write
14674A36000
heap
page read and write
E04BFE000
stack
page read and write
1464D4FA000
heap
page read and write
14674A3C000
heap
page read and write
E04DFF000
stack
page read and write
14674AB1000
heap
page read and write
C00002F000
direct allocation
page read and write
E047FA000
stack
page read and write
14674030000
direct allocation
page execute read
14674B90000
heap
page read and write
146749E2000
heap
page read and write
14674A09000
heap
page read and write
C000004000
direct allocation
page read and write
14674B91000
heap
page read and write
E061FF000
stack
page read and write
C00003F000
direct allocation
page read and write
14674A4F000
heap
page read and write
1464D52C000
heap
page read and write
14674A24000
heap
page read and write
C000012000
direct allocation
page read and write
14674B0A000
heap
page read and write
61000
unkown
page execute read
14674A1A000
heap
page read and write
14674A2A000
heap
page read and write
14674A01000
heap
page read and write
146749B9000
heap
page read and write
14674A36000
heap
page read and write
14674B5C000
heap
page read and write
14674A51000
heap
page read and write
14674B92000
heap
page read and write
14674A29000
heap
page read and write
14674A24000
heap
page read and write
C000016000
direct allocation
page read and write
1464D583000
direct allocation
page read and write
14674B90000
heap
page read and write
C000014000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
C000018000
direct allocation
page read and write
1464D532000
heap
page read and write
There are 190 hidden memdumps, click here to show them.