IOC Report
electrumx64.exe

loading gif

Files

File Path
Type
Category
Malicious
electrumx64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\licence.rtf
Rich Text Format data, version 1, ANSI, code page 936, default language ID 1033
dropped
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\logo.ico
MS Windows icon resource - 10 icons, 256x256, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\nsNiuniuSkin.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\AppData\Local\Temp\nsxCF02.tmp\skin.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\electrumx64.exe
"C:\Users\user\Desktop\electrumx64.exe"
malicious

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://www.leeqia.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
22BE000
stack
page read and write
536000
unkown
page readonly
401000
unkown
page execute read
859000
heap
page read and write
2CFB000
heap
page read and write
859000
heap
page read and write
2CF7000
heap
page read and write
7E0000
heap
page read and write
40C000
unkown
page read and write
534000
unkown
page readonly
86B000
heap
page read and write
859000
heap
page read and write
859000
heap
page read and write
47A3000
heap
page read and write
856000
heap
page read and write
2C00000
heap
page read and write
2B99000
heap
page read and write
6A0000
heap
page read and write
859000
heap
page read and write
6F953000
unkown
page readonly
859000
heap
page read and write
859000
heap
page read and write
409000
unkown
page readonly
2BE9000
heap
page read and write
2BF6000
heap
page read and write
2C13000
heap
page read and write
2C15000
heap
page read and write
6F951000
unkown
page execute read
859000
heap
page read and write
2BC1000
heap
page read and write
859000
heap
page read and write
6D05F000
unkown
page execute and read and write
859000
heap
page read and write
6D062000
unkown
page read and write
2B84000
heap
page read and write
99000
stack
page read and write
859000
heap
page read and write
7B5000
heap
page read and write
81E000
heap
page read and write
2B70000
heap
page read and write
2B80000
heap
page read and write
2B9A000
heap
page read and write
2BE3000
heap
page read and write
84D000
heap
page read and write
2BD4000
heap
page read and write
859000
heap
page read and write
2BA7000
heap
page read and write
859000
heap
page read and write
2CF4000
heap
page read and write
6D061000
unkown
page execute and write copy
2BB9000
heap
page read and write
859000
heap
page read and write
2B9F000
heap
page read and write
2C09000
heap
page read and write
859000
heap
page read and write
400000
unkown
page readonly
84E000
heap
page read and write
859000
heap
page read and write
82C000
heap
page read and write
2C09000
heap
page read and write
2B80000
heap
page read and write
2BF5000
heap
page read and write
2B83000
heap
page read and write
847000
heap
page read and write
192000
stack
page read and write
859000
heap
page read and write
2BC1000
heap
page read and write
760000
heap
page read and write
2BF0000
heap
page read and write
859000
heap
page read and write
2BE9000
heap
page read and write
2BF5000
heap
page read and write
2BD7000
heap
page read and write
84C000
heap
page read and write
2CF0000
heap
page read and write
2CF7000
heap
page read and write
2C0D000
heap
page read and write
2BB0000
heap
page read and write
859000
heap
page read and write
2CFA000
heap
page read and write
6D05A000
unkown
page execute and read and write
2C00000
heap
page read and write
2C4E000
heap
page read and write
85A000
heap
page read and write
859000
heap
page read and write
859000
heap
page read and write
859000
heap
page read and write
2B9A000
heap
page read and write
2C1D000
heap
page read and write
409000
unkown
page readonly
2E30000
heap
page read and write
2C1D000
heap
page read and write
859000
heap
page read and write
2C00000
heap
page read and write
4742000
heap
page read and write
2E9C000
stack
page read and write
859000
heap
page read and write
859000
heap
page read and write
690000
heap
page read and write
2BD2000
heap
page read and write
859000
heap
page read and write
6D047000
unkown
page execute and read and write
285F000
stack
page read and write
859000
heap
page read and write
2BCF000
heap
page read and write
859000
heap
page read and write
6A5000
heap
page read and write
2BE9000
heap
page read and write
871000
heap
page read and write
2BD4000
heap
page read and write
47ED000
heap
page read and write
2BF1000
heap
page read and write
2C59000
heap
page read and write
2B8B000
heap
page read and write
5B0000
heap
page read and write
23D4000
heap
page read and write
2B9C000
heap
page read and write
2B73000
heap
page read and write
2BED000
heap
page read and write
859000
heap
page read and write
420000
unkown
page read and write
84C000
heap
page read and write
275E000
stack
page read and write
2C03000
heap
page read and write
2E50000
heap
page read and write
2BB8000
heap
page read and write
7EA000
heap
page read and write
2BD6000
heap
page read and write
2BB8000
heap
page read and write
2B7D000
heap
page read and write
2C02000
heap
page read and write
400000
unkown
page readonly
859000
heap
page read and write
2F9E000
stack
page read and write
859000
heap
page read and write
2BF0000
heap
page read and write
859000
heap
page read and write
401000
unkown
page execute read
859000
heap
page read and write
2BA2000
heap
page read and write
2BEC000
heap
page read and write
2BF3000
heap
page read and write
859000
heap
page read and write
2BBD000
heap
page read and write
2BB6000
heap
page read and write
859000
heap
page read and write
7EE000
heap
page read and write
6CF60000
unkown
page readonly
2B77000
heap
page read and write
859000
heap
page read and write
2B79000
heap
page read and write
2C13000
heap
page read and write
2AD0000
heap
page read and write
6F950000
unkown
page readonly
859000
heap
page read and write
884000
heap
page read and write
2BD2000
heap
page read and write
859000
heap
page read and write
2980000
heap
page read and write
859000
heap
page read and write
2BF9000
heap
page read and write
859000
heap
page read and write
859000
heap
page read and write
536000
unkown
page readonly
40C000
unkown
page write copy
2C00000
heap
page read and write
23BE000
stack
page read and write
859000
heap
page read and write
859000
heap
page read and write
2BBE000
heap
page read and write
854000
heap
page read and write
2BBD000
heap
page read and write
2BF0000
heap
page read and write
4720000
heap
page read and write
7B0000
heap
page read and write
6CF61000
unkown
page execute and read and write
46B000
unkown
page read and write
534000
unkown
page readonly
23D0000
heap
page read and write
6F955000
unkown
page readonly
2BE1000
heap
page read and write
2B7C000
heap
page read and write
859000
heap
page read and write
849000
heap
page read and write
2C13000
heap
page read and write
There are 175 hidden memdumps, click here to show them.