IOC Report
hcjt7Ajt5t.exe

loading gif

Files

File Path
Type
Category
Malicious
hcjt7Ajt5t.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\hcjt7Ajt5t.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\hcjt7Ajt5t.exe
"C:\Users\user\Desktop\hcjt7Ajt5t.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
https://pushjellysingeywus.shop/api
172.67.217.241
malicious
pushjellysingeywus.shop
malicious
bordersoarmanusjuw.shop
malicious
suitcaseacanehalk.shop
malicious
entitlementappwo.shop
malicious
economicscreateojsu.shop
malicious
mealplayerpreceodsju.shop
malicious
absentconvicsjawun.shop
malicious
wifeplasterbakewis.shop
malicious
https://pushjellysingeywus.shop/Oi
unknown
https://pushjellysingeywus.shop/apip
unknown
https://pushjellysingeywus.shop/l
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pushjellysingeywus.shop
172.67.217.241
malicious

IPs

IP
Domain
Country
Malicious
172.67.217.241
pushjellysingeywus.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3815000
trusted library allocation
page read and write
malicious
318F000
stack
page read and write
F6D000
heap
page read and write
32EA000
trusted library allocation
page read and write
36E0000
heap
page read and write
E45000
heap
page read and write
A20000
heap
page read and write
930000
heap
page read and write
B0F000
heap
page read and write
F20000
heap
page read and write
AF6000
heap
page read and write
2811000
trusted library allocation
page read and write
100D000
heap
page read and write
DE0000
heap
page read and write
353E000
stack
page read and write
2A8D000
stack
page read and write
2812000
trusted library allocation
page execute and read and write
2A4C000
stack
page read and write
FCB000
heap
page read and write
ACA000
heap
page read and write
32E0000
trusted library allocation
page read and write
280E000
stack
page read and write
3324000
trusted library allocation
page read and write
33E0000
heap
page read and write
4D2000
unkown
page readonly
400000
remote allocation
page execute and read and write
E4B000
trusted library allocation
page execute and read and write
32EE000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
A10000
heap
page read and write
AE7000
heap
page read and write
E40000
heap
page read and write
334B000
trusted library allocation
page read and write
AC0000
heap
page read and write
3387000
trusted library allocation
page read and write
2BCE000
stack
page read and write
AAE000
stack
page read and write
32CE000
stack
page read and write
290F000
stack
page read and write
2CCE000
stack
page read and write
F57000
heap
page read and write
E10000
heap
page read and write
F2A000
heap
page read and write
E24000
trusted library allocation
page read and write
DD0000
heap
page read and write
49AE000
stack
page read and write
A6E000
stack
page read and write
DC0000
heap
page read and write
31CE000
stack
page read and write
E90000
heap
page read and write
B04000
heap
page read and write
E13000
trusted library allocation
page execute and read and write
B09000
heap
page read and write
2813000
trusted library allocation
page read and write
520000
unkown
page readonly
F70000
heap
page read and write
5F5000
heap
page read and write
ACE000
heap
page read and write
26BD000
stack
page read and write
280F000
stack
page read and write
2825000
trusted library allocation
page read and write
D68000
stack
page read and write
26D0000
heap
page execute and read and write
294E000
stack
page read and write
CBF000
stack
page read and write
2700000
heap
page read and write
E70000
trusted library allocation
page execute and read and write
44A000
remote allocation
page execute and read and write
5BC000
stack
page read and write
32E7000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
E14000
trusted library allocation
page read and write
8FB000
stack
page read and write
5F0000
heap
page read and write
1006000
heap
page read and write
F85000
heap
page read and write
AEE000
heap
page read and write
AEC000
heap
page read and write
4D0000
unkown
page readonly
11B0000
heap
page read and write
338E000
trusted library allocation
page read and write
DBE000
stack
page read and write
308E000
stack
page read and write
267E000
stack
page read and write
E80000
trusted library allocation
page read and write
2B8E000
stack
page read and write
363F000
stack
page read and write
C6B000
stack
page read and write
E00000
trusted library allocation
page read and write
There are 79 hidden memdumps, click here to show them.