IOC Report
JIL-_Document_No._2500015903.cmd

loading gif

Files

File Path
Type
Category
Malicious
JIL-_Document_No._2500015903.cmd
Microsoft Cabinet archive data, Windows 2000/XP setup, 4294967295 bytes, 1 file, at 0x75 +A "x.exe", number 1, 39 datablocks, 0 compression
initial sample
malicious
C:\Users\user\AppData\Local\Temp\x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\JIL-_Document_No._2500015903.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\extrac32.exe
extrac32 /y "C:\Users\user\Desktop\JIL-_Document_No._2500015903.cmd" "C:\Users\user\AppData\Local\Temp\x.exe"

URLs

Name
IP
Malicious
http://programania.com/en.htm
unknown
http://programania.com/en.zip
unknown
http://programania.com/en_source.zip
unknown
http://programania.com/index_ru.htm
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2276000
direct allocation
page read and write
malicious
7FB80000
direct allocation
page read and write
malicious
2079A000
direct allocation
page read and write
24E0000
heap
page read and write
20F87284000
heap
page read and write
20F84A50000
heap
page read and write
20F87283000
heap
page read and write
7F430000
direct allocation
page read and write
7FA40000
direct allocation
page read and write
20773000
direct allocation
page read and write
7FA50000
direct allocation
page read and write
20F84ADB000
heap
page read and write
7FDB0000
direct allocation
page read and write
7F430000
direct allocation
page read and write
660000
heap
page read and write
7ECD0000
direct allocation
page read and write
20F84CF3000
heap
page read and write
26E0C8B000
stack
page read and write
20F84AF8000
heap
page read and write
207A8000
direct allocation
page read and write
2891000
direct allocation
page execute and read and write
20F84DAC000
heap
page read and write
7FC00000
direct allocation
page read and write
20F84AF4000
heap
page read and write
20F84ACB000
heap
page read and write
20F84DA0000
heap
page read and write
2077C000
direct allocation
page read and write
2313000
direct allocation
page read and write
20F84A40000
heap
page read and write
720000
heap
page read and write
26E0D0E000
stack
page read and write
20F84AC7000
heap
page read and write
2075E000
direct allocation
page read and write
75E000
heap
page read and write
7F1C0000
direct allocation
page read and write
A4F000
stack
page read and write
22FD000
direct allocation
page read and write
7F910000
direct allocation
page read and write
20F84AF8000
heap
page read and write
20F84AF8000
heap
page read and write
2986000
direct allocation
page execute and read and write
665000
heap
page read and write
208AA000
stack
page read and write
20F84B13000
heap
page read and write
20F84CC0000
heap
page read and write
20F84AB7000
heap
page read and write
20F84AC7000
heap
page read and write
483000
unkown
page readonly
730000
direct allocation
page execute and read and write
47E000
unkown
page write copy
21060000
heap
page read and write
20F86A80000
trusted library allocation
page read and write
231A000
direct allocation
page read and write
209EF000
stack
page read and write
7F300000
direct allocation
page read and write
478000
unkown
page read and write
7F2F0000
direct allocation
page read and write
7FD10000
direct allocation
page read and write
20F84AD6000
heap
page read and write
285D000
direct allocation
page read and write
7FC70000
direct allocation
page read and write
20F84ACB000
heap
page read and write
7F2F0000
direct allocation
page read and write
20F84DA5000
heap
page read and write
6C0000
heap
page read and write
1F0000
heap
page read and write
20F84ACB000
heap
page read and write
21070000
heap
page read and write
2321000
direct allocation
page read and write
2073F000
direct allocation
page read and write
20784000
direct allocation
page read and write
759000
heap
page read and write
208AF000
stack
page read and write
20765000
direct allocation
page read and write
610000
heap
page read and write
478000
unkown
page write copy
20F84AF8000
heap
page read and write
20F84A70000
heap
page read and write
401000
unkown
page execute read
7FA50000
direct allocation
page read and write
65E000
stack
page read and write
6C6000
heap
page read and write
208AE000
stack
page execute and read and write
21050000
heap
page read and write
20F84AB0000
heap
page read and write
2831000
direct allocation
page execute read
22E0000
direct allocation
page read and write
2328000
direct allocation
page read and write
20F84B13000
heap
page read and write
2988000
direct allocation
page execute and read and write
208EE000
stack
page read and write
20757000
direct allocation
page read and write
207A1000
direct allocation
page read and write
288E000
direct allocation
page read and write
19D000
stack
page read and write
2304000
direct allocation
page read and write
400000
unkown
page readonly
7A7000
heap
page read and write
7F55B000
direct allocation
page read and write
6AE000
stack
page read and write
9B000
stack
page read and write
20DBF000
stack
page read and write
26E107F000
stack
page read and write
20F84ADB000
heap
page read and write
700000
heap
page read and write
2340000
heap
page read and write
94F000
stack
page read and write
2830000
direct allocation
page readonly
7ECD0000
direct allocation
page read and write
20793000
direct allocation
page read and write
230C000
direct allocation
page read and write
26E0D8E000
stack
page read and write
7F300000
direct allocation
page read and write
750000
heap
page read and write
20F84AF3000
heap
page read and write
20F84CF0000
heap
page read and write
20F87280000
heap
page read and write
24E3000
heap
page read and write
7F910000
direct allocation
page read and write
249C000
stack
page read and write
20CBE000
stack
page read and write
20F84AC3000
heap
page read and write
There are 112 hidden memdumps, click here to show them.