IOC Report
5Uvn8Uyob8.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5Uvn8Uyob8.exe
"C:\Users\user\Desktop\5Uvn8Uyob8.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://code.jquery.com/
unknown
malicious
http://119.45.147.28/jquery-3.3.2.slim.min.js
malicious
http://119.45.147.28:443/jquery-3.3.2.slim.min.js
malicious
https://119.45.147.28/F
unknown
https://119.45.147.28/jquery-3.3.2.slim.min.jsi
unknown
https://119.45.147.28/jquery-3.3.2.slim.min.jsm:
unknown
http://code.jquery.com/Rs
unknown
https://119.45.147.28/jquery-3.3.2.slim.min.js
unknown
https://119.45.147.28/su
unknown
https://119.45.147.28/jquery-3.3.2.slim.min.jsd4_
unknown
https://119.45.147.28/jquery-3.3.2.slim.min.jsM
unknown
https://119.45.147.28/jquery-3.3.2.slim.min.jsY
unknown
https://119.45.147.28/query-3.3.2.slim.min.js1
unknown
https://119.45.147.28/
unknown
https://119.45.147.28/e
unknown
https://119.45.147.28/jquery-3.3.2.slim.min.jsu
unknown
There are 6 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
119.45.147.28
unknown
China
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
21DEDA70000
direct allocation
page execute read
malicious
2214F2C000
stack
page read and write
malicious
7FF687305000
unkown
page readonly
22158FE000
stack
page read and write
21DEDB09000
heap
page read and write
21DEDAF0000
heap
page read and write
7FF687308000
unkown
page readonly
2215BFD000
stack
page read and write
7FF6872FF000
unkown
page write copy
21DEF4F5000
heap
page read and write
7FF6872FF000
unkown
page write copy
22154FA000
unkown
page read and write
21DEDA30000
heap
page read and write
21DEDA20000
heap
page read and write
7FF687302000
unkown
page readonly
22157FE000
stack
page read and write
22159F8000
stack
page read and write
21DEDB0C000
heap
page read and write
7FF687302000
unkown
page readonly
21DEDB40000
heap
page read and write
2215AFD000
stack
page read and write
21DEF4C0000
remote allocation
page read and write
21DEDAF0000
heap
page read and write
21DEF4C0000
remote allocation
page read and write
21DEDAB0000
heap
page read and write
21DEDAEE000
heap
page read and write
7FF687300000
unkown
page read and write
21DEDB47000
heap
page read and write
21DEDB40000
heap
page read and write
7FF6872F5000
unkown
page readonly
7FF6872E1000
unkown
page execute read
21DEDB40000
heap
page read and write
21DEDB1C000
heap
page read and write
21DEDB2E000
heap
page read and write
21DEF4F0000
heap
page read and write
21DEDB19000
heap
page read and write
7FF6872E1000
unkown
page execute read
21DEDB2E000
heap
page read and write
7FF687305000
unkown
page readonly
7FF6872F5000
unkown
page readonly
21DEDABB000
heap
page read and write
7FF687308000
unkown
page readonly
21DEDB2E000
heap
page read and write
21DEDB40000
heap
page read and write
21DEDB19000
heap
page read and write
21DEDB1D000
heap
page read and write
7FF6872E0000
unkown
page readonly
7FF6872E0000
unkown
page readonly
21DEDB47000
heap
page read and write
21DEDA80000
heap
page read and write
21DEF4C0000
remote allocation
page read and write
21DEDB2E000
heap
page read and write
21DEDB0C000
heap
page read and write
There are 43 hidden memdumps, click here to show them.