IOC Report
7UpMyeV5pj.exe

loading gif

Files

File Path
Type
Category
Malicious
7UpMyeV5pj.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Notepad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Notepad.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Umbrella.flv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Umbrella.flv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Favorites\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\autorun.inf
Microsoft Windows Autorun file
dropped
malicious
C:\system.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\system.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Explower.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\app
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\Desktop\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Documents\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Favorites\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7UpMyeV5pj.exe
"C:\Users\user\Desktop\7UpMyeV5pj.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\Desktop\7UpMyeV5pj.exe" "7UpMyeV5pj.exe" ENABLE
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
0.tcp.eu.ngrok.io
3.124.142.205
malicious

IPs

IP
Domain
Country
Malicious
3.124.142.205
0.tcp.eu.ngrok.io
United States
malicious
18.192.31.165
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B62000
unkown
page readonly
malicious
31C1000
trusted library allocation
page read and write
malicious
570E000
stack
page read and write
1442000
heap
page read and write
1298000
heap
page read and write
5450000
trusted library allocation
page execute and read and write
7894000
heap
page read and write
50B0000
heap
page read and write
14CE000
heap
page read and write
1447000
heap
page read and write
534C000
stack
page read and write
1517000
heap
page read and write
4F60000
heap
page read and write
542C000
stack
page read and write
503E000
stack
page read and write
14A0000
heap
page read and write
115A000
trusted library allocation
page execute and read and write
78B3000
heap
page read and write
788A000
heap
page read and write
1850000
trusted library allocation
page execute and read and write
DC0000
heap
page read and write
608E000
stack
page read and write
1182000
trusted library allocation
page execute and read and write
126A000
trusted library allocation
page execute and read and write
5170000
heap
page read and write
7815000
heap
page read and write
56D8000
heap
page read and write
5D10000
heap
page read and write
544C000
stack
page read and write
1330000
heap
page read and write
7853000
heap
page read and write
1423000
heap
page read and write
7643000
heap
page read and write
4FFC000
stack
page read and write
7808000
heap
page read and write
1337000
heap
page read and write
1409000
heap
page read and write
56E1000
heap
page read and write
786B000
heap
page read and write
77E8000
heap
page read and write
1414000
heap
page read and write
E86000
heap
page read and write
13DA000
heap
page read and write
1240000
heap
page read and write
1424000
heap
page read and write
1455000
heap
page read and write
14C9000
heap
page read and write
2E84000
trusted library allocation
page read and write
1510000
heap
page read and write
1040000
heap
page read and write
782A000
heap
page read and write
566C000
stack
page read and write
1451000
heap
page read and write
53EC000
stack
page read and write
118A000
trusted library allocation
page execute and read and write
14A0000
heap
page read and write
165E000
stack
page read and write
1419000
heap
page read and write
144B000
heap
page read and write
14A0000
heap
page read and write
56D1000
heap
page read and write
56E2000
heap
page read and write
112F000
stack
page read and write
7837000
heap
page read and write
144E000
heap
page read and write
7910000
heap
page read and write
788D000
heap
page read and write
119B000
trusted library allocation
page execute and read and write
10F4000
stack
page read and write
1447000
heap
page read and write
1197000
trusted library allocation
page execute and read and write
144E000
heap
page read and write
556B000
stack
page read and write
1425000
heap
page read and write
1252000
trusted library allocation
page execute and read and write
14BD000
heap
page read and write
786D000
heap
page read and write
144D000
heap
page read and write
11D0000
heap
page read and write
1420000
heap
page read and write
14C8000
heap
page read and write
138F000
unkown
page read and write
16A0000
heap
page read and write
1317000
heap
page read and write
1443000
heap
page read and write
14A0000
heap
page read and write
143F000
heap
page read and write
523C000
stack
page read and write
5240000
trusted library allocation
page read and write
1425000
heap
page read and write
7883000
heap
page read and write
1162000
trusted library allocation
page execute and read and write
125C000
stack
page read and write
E20000
heap
page execute and read and write
14D0000
heap
page read and write
D70000
heap
page read and write
535D000
stack
page read and write
6621000
trusted library allocation
page read and write
78A3000
heap
page read and write
E9E000
heap
page read and write
A11D000
stack
page read and write
141E000
heap
page read and write
7811000
heap
page read and write
147E000
heap
page read and write
1427000
heap
page read and write
F60000
heap
page read and write
780E000
heap
page read and write
1451000
heap
page read and write
147E000
heap
page read and write
1414000
heap
page read and write
13F1000
heap
page read and write
50AC000
stack
page read and write
5F8E000
stack
page read and write
DC0000
heap
page read and write
1423000
heap
page read and write
5BCF000
stack
page read and write
D0B000
stack
page read and write
116C000
trusted library allocation
page execute and read and write
149F000
heap
page read and write
1414000
heap
page read and write
1449000
heap
page read and write
144B000
heap
page read and write
1406000
heap
page read and write
13D0000
heap
page read and write
580E000
stack
page read and write
14BD000
heap
page read and write
7FB90000
trusted library allocation
page execute and read and write
1270000
heap
page read and write
1429000
heap
page read and write
133C000
heap
page read and write
143F000
heap
page read and write
584E000
stack
page read and write
7656000
heap
page read and write
14BE000
heap
page read and write
5050000
trusted library allocation
page execute and read and write
1427000
heap
page read and write
1260000
trusted library allocation
page read and write
667F000
trusted library allocation
page read and write
B60000
unkown
page readonly
1152000
trusted library allocation
page execute and read and write
1280000
heap
page read and write
1860000
heap
page execute and read and write
14A0000
heap
page read and write
1240000
trusted library allocation
page read and write
782D000
heap
page read and write
1459000
heap
page read and write
1262000
trusted library allocation
page execute and read and write
1492000
trusted library allocation
page read and write
1445000
heap
page read and write
1480000
heap
page read and write
E39000
stack
page read and write
5460000
heap
page read and write
75F0000
heap
page read and write
67BF000
trusted library allocation
page read and write
1454000
heap
page read and write
1427000
heap
page read and write
14C4000
heap
page read and write
1277000
trusted library allocation
page execute and read and write
2E86000
trusted library allocation
page read and write
5ACD000
stack
page read and write
145B000
heap
page read and write
13F1000
heap
page read and write
14BF000
heap
page read and write
1285000
heap
page read and write
56E1000
heap
page read and write
56E5000
heap
page read and write
F36000
stack
page read and write
D75000
heap
page read and write
E60000
heap
page read and write
E30000
heap
page read and write
24788000
trusted library allocation
page read and write
14CA000
heap
page read and write
1500000
trusted library allocation
page execute and read and write
69C9000
trusted library allocation
page read and write
7886000
heap
page read and write
55CE000
stack
page read and write
75C0000
heap
page read and write
367F000
stack
page read and write
2E8D000
trusted library allocation
page read and write
1459000
heap
page read and write
C3B000
stack
page read and write
7F5E000
stack
page read and write
1453000
heap
page read and write
594E000
stack
page read and write
E0E000
stack
page read and write
935E000
stack
page read and write
1424000
heap
page read and write
77FB000
heap
page read and write
11C0000
trusted library allocation
page read and write
666F000
trusted library allocation
page read and write
1428000
heap
page read and write
41C1000
trusted library allocation
page read and write
1276000
heap
page read and write
56E7000
heap
page read and write
14C0000
trusted library allocation
page read and write
117A000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
41E8000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
135F000
heap
page read and write
7869000
heap
page read and write
121E000
stack
page read and write
128A000
trusted library allocation
page execute and read and write
1327000
heap
page read and write
925D000
stack
page read and write
1290000
heap
page read and write
143D000
heap
page read and write
1442000
heap
page read and write
56E1000
heap
page read and write
1282000
trusted library allocation
page execute and read and write
14CE000
heap
page read and write
144B000
heap
page read and write
3E61000
trusted library allocation
page read and write
1447000
heap
page read and write
D36000
stack
page read and write
530B000
stack
page read and write
14BD000
heap
page read and write
141C000
heap
page read and write
1459000
heap
page read and write
ABEA000
heap
page read and write
548E000
stack
page read and write
56E2000
heap
page read and write
77E0000
heap
page read and write
DA0000
heap
page read and write
ABE0000
heap
page read and write
2E90000
trusted library allocation
page read and write
1448000
heap
page read and write
129E000
heap
page read and write
78E0000
heap
page read and write
C09D000
stack
page read and write
56E8000
heap
page read and write
56E1000
heap
page read and write
108E000
stack
page read and write
1418000
heap
page read and write
4F0E000
stack
page read and write
56E6000
heap
page read and write
6311000
trusted library allocation
page read and write
6717000
trusted library allocation
page read and write
1459000
heap
page read and write
558E000
stack
page read and write
1210000
heap
page read and write
1454000
heap
page read and write
6785000
trusted library allocation
page read and write
14BD000
heap
page read and write
1453000
heap
page read and write
1190000
trusted library allocation
page read and write
782F000
heap
page read and write
1425000
heap
page read and write
1429000
heap
page read and write
E6A000
heap
page read and write
14C1000
heap
page read and write
2B1E000
stack
page read and write
1457000
heap
page read and write
767A000
heap
page read and write
56DB000
heap
page read and write
169C000
stack
page read and write
AE20000
heap
page read and write
147E000
heap
page read and write
24680000
trusted library allocation
page read and write
51BF000
stack
page read and write
14A0000
heap
page read and write
1454000
heap
page read and write
1429000
heap
page read and write
145C000
heap
page read and write
127A000
trusted library allocation
page execute and read and write
14C4000
heap
page read and write
A01D000
stack
page read and write
1105000
heap
page read and write
120E000
stack
page read and write
4EC0000
heap
page read and write
24795000
trusted library allocation
page read and write
14BD000
heap
page read and write
1428000
heap
page read and write
155E000
stack
page read and write
3E64000
trusted library allocation
page read and write
7E5D000
stack
page read and write
14BD000
heap
page read and write
142A000
heap
page read and write
125A000
trusted library allocation
page execute and read and write
5040000
trusted library allocation
page read and write
7870000
heap
page read and write
DD0000
heap
page read and write
D70000
heap
page read and write
1497000
trusted library allocation
page execute and read and write
1388000
heap
page read and write
1454000
heap
page read and write
5F4E000
stack
page read and write
1100000
heap
page read and write
1459000
heap
page read and write
1140000
trusted library allocation
page read and write
14A0000
heap
page read and write
14F0000
trusted library allocation
page read and write
56B0000
heap
page read and write
1416000
heap
page read and write
7857000
heap
page read and write
10FB000
stack
page read and write
AF20000
heap
page read and write
56AF000
stack
page read and write
5430000
unclassified section
page read and write
DBE000
unkown
page read and write
149B000
trusted library allocation
page execute and read and write
145C000
heap
page read and write
7900000
heap
page read and write
1270000
heap
page read and write
56E1000
heap
page read and write
1445000
heap
page read and write
56E9000
heap
page read and write
5E4D000
stack
page read and write
147E000
heap
page read and write
120F000
stack
page read and write
56CE000
stack
page read and write
1423000
heap
page read and write
1440000
heap
page read and write
780C000
heap
page read and write
56D2000
heap
page read and write
144E000
heap
page read and write
14C5000
heap
page read and write
2E61000
trusted library allocation
page read and write
747B000
stack
page read and write
144E000
heap
page read and write
14C0000
heap
page read and write
10EE000
stack
page read and write
7623000
heap
page read and write
10FE000
stack
page read and write
1448000
heap
page read and write
783E000
heap
page read and write
C19E000
stack
page read and write
145C000
heap
page read and write
E6E000
heap
page read and write
1418000
heap
page read and write
144B000
heap
page read and write
143D000
heap
page read and write
14BD000
heap
page read and write
1443000
heap
page read and write
77F8000
heap
page read and write
116A000
trusted library allocation
page execute and read and write
667D000
trusted library allocation
page read and write
14D7000
heap
page read and write
16A7000
heap
page read and write
1429000
heap
page read and write
1160000
trusted library allocation
page read and write
There are 331 hidden memdumps, click here to show them.