IOC Report
jicQJ2cdlM.exe

loading gif

Files

File Path
Type
Category
Malicious
jicQJ2cdlM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\ScreenUpdateSync[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\A8A9.tmp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_A8A9.tmp.exe_3d5dfce8cbb349ab566cb0d21cc9f0676852a9d_1a91c480_0c8ad302-763a-4e17-a97b-0dc6c15c2859\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAACC.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 26 16:58:28 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE58.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAEB6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jicQJ2cdlM.exe
"C:\Users\user\Desktop\jicQJ2cdlM.exe"
malicious
C:\Users\user\AppData\Local\Temp\A8A9.tmp.exe
"C:\Users\user\AppData\Local\Temp\A8A9.tmp.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7404 -s 1132

URLs

Name
IP
Malicious
http://62.204.41.177/edd20096ecef326d.php
62.204.41.177
malicious
http://62.204.41.177/
62.204.41.177
malicious
http://62.204.41.177
unknown
malicious
http://62.204.41.177/edd20096ecef326d.phpL
unknown
https://post-to-me.com/track_prt.php?sub=&cc=DE
unknown
https://post-to-me.com/track_prt.php?sub=
unknown
http://176.113.115.37/ScreenUpdateSync.exeP
unknown
http://62.204.41.177/K
unknown
http://62.204.41.177/edd20096ecef326d.phpJ
unknown
http://176.113.115.37/ScreenUpdateSync.exek4
unknown
http://62.204.41.177/$c
unknown
http://62.204.41.177/edd20096ecef326d.php6
unknown
https://post-to-me.com/track_prt.php?sub=0&cc=DE
104.21.56.70
https://post-to-me.com/track_prt.php?sub=0&cc=DET
unknown
http://176.113.115.37/ScreenUpdateSync.exe48rt8k8rt4rwe5rbSOFTWARE
unknown
https://post-to-me.com/
unknown
http://upx.sf.net
unknown
https://post-to-me.com/v
unknown
http://176.113.115.37/ScreenUpdateSync.exea
unknown
http://62.204.41.177/edd20096ecef326d.phpIc
unknown
http://176.113.115.37/ScreenUpdateSync.exe
unknown
http://62.204.41.177/edd20096ecef326d.phpGc:
unknown
http://62.204.41.177/edd20096ecef326d.phpb
unknown
http://62.204.41.177S
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
post-to-me.com
104.21.56.70

IPs

IP
Domain
Country
Malicious
62.204.41.177
unknown
United Kingdom
malicious
176.113.115.37
unknown
Russian Federation
104.21.56.70
post-to-me.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\prtscreen
Enabled
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
ProgramId
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
FileId
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
LowerCaseLongPath
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
LongPathHash
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
Name
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
OriginalFileName
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
Publisher
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
Version
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
BinFileVersion
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
BinaryType
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
ProductName
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
ProductVersion
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
LinkDate
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
BinProductVersion
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
AppxPackageFullName
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
AppxPackageRelativeId
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
Size
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
Language
\REGISTRY\A\{09435240-3365-7182-ceb5-6a330624b9ef}\Root\InventoryApplicationFile\a8a9.tmp.exe|764abec2f79a8b5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E39000
heap
page read and write
malicious
2D60000
direct allocation
page read and write
malicious
2D10000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
9B000
stack
page read and write
560000
heap
page read and write
878000
heap
page read and write
886000
heap
page read and write
1D15F000
stack
page read and write
452000
unkown
page write copy
4B1000
unkown
page execute and read and write
4A80000
heap
page read and write
886000
heap
page read and write
2DA0000
heap
page read and write
7E0000
heap
page read and write
9C000
stack
page read and write
2DD0000
remote allocation
page read and write
4A83000
heap
page read and write
2B70000
heap
page read and write
1CB5F000
stack
page read and write
297F000
stack
page read and write
859000
heap
page read and write
401000
unkown
page execute read
1F0000
heap
page read and write
7DF000
stack
page read and write
8A3000
heap
page read and write
2F23000
heap
page read and write
283F000
stack
page read and write
273F000
stack
page read and write
400000
unkown
page readonly
89D000
heap
page read and write
A70000
heap
page read and write
1CF1E000
stack
page read and write
2DFA000
heap
page read and write
878000
heap
page read and write
4A3E000
stack
page read and write
8A4000
heap
page read and write
29CE000
stack
page read and write
2BBE000
stack
page read and write
5EE000
stack
page read and write
2C30000
heap
page read and write
19A000
stack
page read and write
2F20000
heap
page read and write
40E000
unkown
page execute read
532000
unkown
page readonly
1CC5F000
stack
page read and write
8A4000
heap
page read and write
2F24000
heap
page read and write
2E33000
heap
page read and write
2DF0000
heap
page read and write
2B46000
unkown
page readonly
2BD0000
heap
page read and write
7EE000
heap
page read and write
9DF000
stack
page read and write
2DD0000
remote allocation
page read and write
2DD0000
remote allocation
page read and write
1D01D000
stack
page read and write
65C000
unkown
page execute and read and write
19C000
stack
page read and write
3310000
heap
page read and write
195000
stack
page read and write
2FEF000
stack
page read and write
43F000
unkown
page read and write
400000
unkown
page execute and read and write
1CC9E000
stack
page read and write
44F000
unkown
page readonly
2E87000
heap
page read and write
2B46000
unkown
page readonly
43F000
unkown
page write copy
5AE000
stack
page read and write
A77000
heap
page read and write
2E6A000
heap
page read and write
86F000
heap
page read and write
2F0F000
stack
page read and write
532000
unkown
page readonly
896000
heap
page read and write
1CDDE000
stack
page read and write
2F64000
heap
page read and write
A50000
direct allocation
page read and write
4E2000
unkown
page execute and read and write
329F000
stack
page read and write
9E0000
direct allocation
page execute and read and write
2ACF000
stack
page read and write
AC0000
heap
page read and write
4A7E000
stack
page read and write
2C1E000
stack
page read and write
85A000
heap
page read and write
43C000
unkown
page readonly
30EF000
stack
page read and write
1D05E000
stack
page read and write
2E0E000
stack
page read and write
8A1000
heap
page read and write
2C35000
heap
page read and write
3990000
heap
page read and write
48CE000
stack
page read and write
49F0000
heap
page read and write
64A000
unkown
page execute and read and write
8D4000
heap
page read and write
287E000
stack
page read and write
A90000
heap
page read and write
1CD9F000
stack
page read and write
2F30000
heap
page read and write
2DFE000
heap
page read and write
836000
heap
page read and write
319C000
stack
page read and write
7F9000
heap
page execute and read and write
B4E000
stack
page read and write
8D7000
heap
page read and write
1F0000
heap
page read and write
7EA000
heap
page read and write
2F21000
heap
page read and write
605000
heap
page read and write
1CEDE000
stack
page read and write
49CF000
stack
page read and write
89D000
heap
page read and write
2F25000
heap
page read and write
400000
unkown
page readonly
B50000
heap
page read and write
600000
heap
page read and write
40E000
unkown
page execute read
4BD000
unkown
page execute and read and write
401000
unkown
page execute read
B0E000
stack
page read and write
2E09000
heap
page execute and read and write
86F000
heap
page read and write
8A4000
heap
page read and write
There are 116 hidden memdumps, click here to show them.