Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jpGSWjSTSw.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jpGSWjSTSw.exe
|
"C:\Users\user\Desktop\jpGSWjSTSw.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\Desktop\jpGSWjSTSw.exe" "jpGSWjSTSw.exe" ENABLE
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
|||
https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
3.124.142.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.124.142.205
|
0.tcp.eu.ngrok.io
|
United States
|
||
3.125.102.39
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7E2000
|
unkown
|
page readonly
|
||
2E61000
|
trusted library allocation
|
page read and write
|
||
D53000
|
stack
|
page read and write
|
||
DFA000
|
trusted library allocation
|
page execute and read and write
|
||
312D000
|
trusted library allocation
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
50CB000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
5A3C000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
E32000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
E3E000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
5400000
|
unclassified section
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
E99000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
E71000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
E92000
|
heap
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3154000
|
trusted library allocation
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
4E68000
|
trusted library allocation
|
page read and write
|
||
E4C000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
7F610000
|
trusted library allocation
|
page execute and read and write
|
||
5450000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
5453000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
3152000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
545C000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
508C000
|
stack
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
5960000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
52FD000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
E97000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
F07000
|
trusted library allocation
|
page execute and read and write
|
||
E36000
|
heap
|
page read and write
|
||
30BF000
|
trusted library allocation
|
page read and write
|
||
545A000
|
heap
|
page read and write
|
||
3EE8000
|
trusted library allocation
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
E99000
|
heap
|
page read and write
|
||
51F3000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
534D000
|
heap
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
309E000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
532F000
|
stack
|
page read and write
|
||
DC2000
|
trusted library allocation
|
page execute and read and write
|
||
DFC000
|
trusted library allocation
|
page execute and read and write
|
||
E4B000
|
heap
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
5451000
|
heap
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
D5B000
|
stack
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
5A26000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
7EC000
|
unkown
|
page readonly
|
||
E30000
|
heap
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
DDA000
|
trusted library allocation
|
page execute and read and write
|
||
C5B000
|
stack
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
DCA000
|
trusted library allocation
|
page execute and read and write
|
||
5467000
|
heap
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
33E6000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
DFB000
|
heap
|
page read and write
|
||
DBA000
|
trusted library allocation
|
page execute and read and write
|
||
510C000
|
stack
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
3E61000
|
trusted library allocation
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page execute and read and write
|
||
FBC000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
5431000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
5453000
|
heap
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
518C000
|
stack
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
E42000
|
heap
|
page read and write
|
||
5452000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
F02000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
5466000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
5465000
|
heap
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
5A20000
|
heap
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
E0F000
|
heap
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
DD7000
|
trusted library allocation
|
page execute and read and write
|
||
3EC7000
|
trusted library allocation
|
page read and write
|
||
ED1000
|
heap
|
page read and write
|
||
B76000
|
stack
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
545E000
|
heap
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page execute and read and write
|
||
57E0000
|
trusted library allocation
|
page execute and read and write
|
||
DB2000
|
trusted library allocation
|
page execute and read and write
|
||
30A4000
|
trusted library allocation
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
DF7000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page execute and read and write
|
||
E42000
|
heap
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
5459000
|
heap
|
page read and write
|
||
319E000
|
unkown
|
page read and write
|
||
5464000
|
heap
|
page read and write
|
||
A79000
|
stack
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
E43000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
5149000
|
stack
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
E2B000
|
heap
|
page read and write
|
||
5456000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
3EBE000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
5466000
|
heap
|
page read and write
|
||
EFE000
|
unkown
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
3E86000
|
trusted library allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
DF2000
|
trusted library allocation
|
page execute and read and write
|
||
E3E000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
101D000
|
stack
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
E2B000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
30FE000
|
trusted library allocation
|
page read and write
|
||
E2F000
|
heap
|
page read and write
|
||
F0B000
|
trusted library allocation
|
page execute and read and write
|
There are 264 hidden memdumps, click here to show them.