IOC Report
jpGSWjSTSw.exe

loading gif

Files

File Path
Type
Category
Malicious
jpGSWjSTSw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jpGSWjSTSw.exe
"C:\Users\user\Desktop\jpGSWjSTSw.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\Desktop\jpGSWjSTSw.exe" "jpGSWjSTSw.exe" ENABLE
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
0.tcp.eu.ngrok.io
malicious
https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
unknown

Domains

Name
IP
Malicious
0.tcp.eu.ngrok.io
3.124.142.205
malicious

IPs

IP
Domain
Country
Malicious
3.124.142.205
0.tcp.eu.ngrok.io
United States
malicious
3.125.102.39
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di

Memdumps

Base Address
Regiontype
Protect
Malicious
7E2000
unkown
page readonly
malicious
2E61000
trusted library allocation
page read and write
malicious
D53000
stack
page read and write
DFA000
trusted library allocation
page execute and read and write
312D000
trusted library allocation
page read and write
5459000
heap
page read and write
5430000
heap
page read and write
DED000
heap
page read and write
E39000
heap
page read and write
50CB000
stack
page read and write
DD4000
heap
page read and write
DF6000
heap
page read and write
5A3C000
heap
page read and write
E96000
heap
page read and write
E32000
heap
page read and write
E44000
heap
page read and write
E3E000
heap
page read and write
DC0000
heap
page read and write
E0C000
heap
page read and write
E10000
heap
page read and write
5400000
unclassified section
page read and write
E4A000
heap
page read and write
E30000
heap
page read and write
4C10000
heap
page read and write
E99000
heap
page read and write
BF0000
heap
page read and write
DEA000
heap
page read and write
E71000
heap
page read and write
D4E000
stack
page read and write
E0C000
heap
page read and write
31F4000
trusted library allocation
page read and write
DEA000
heap
page read and write
E92000
heap
page read and write
E4E000
heap
page read and write
E2C000
heap
page read and write
DF6000
heap
page read and write
5460000
heap
page read and write
CA0000
heap
page read and write
BE0000
heap
page read and write
3154000
trusted library allocation
page read and write
DF6000
heap
page read and write
4E68000
trusted library allocation
page read and write
E4C000
heap
page read and write
E44000
heap
page read and write
E4B000
heap
page read and write
E39000
heap
page read and write
E2F000
heap
page read and write
E4E000
heap
page read and write
E4A000
heap
page read and write
7F610000
trusted library allocation
page execute and read and write
5450000
heap
page read and write
DFA000
heap
page read and write
5453000
heap
page read and write
E0D000
heap
page read and write
3152000
trusted library allocation
page read and write
EF0000
heap
page read and write
545C000
heap
page read and write
E44000
heap
page read and write
DEF000
heap
page read and write
1330000
trusted library allocation
page read and write
310E000
trusted library allocation
page read and write
E0A000
heap
page read and write
E4A000
heap
page read and write
508C000
stack
page read and write
E3D000
heap
page read and write
1376000
heap
page read and write
5960000
heap
page read and write
E10000
heap
page read and write
E0E000
heap
page read and write
DEE000
heap
page read and write
E9E000
heap
page read and write
E3F000
heap
page read and write
E2F000
heap
page read and write
E10000
heap
page read and write
DF6000
heap
page read and write
E2F000
heap
page read and write
E0D000
heap
page read and write
E9E000
heap
page read and write
52FD000
stack
page read and write
E40000
heap
page read and write
E2B000
heap
page read and write
E97000
heap
page read and write
FE0000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
C3E000
stack
page read and write
E44000
heap
page read and write
DC0000
trusted library allocation
page read and write
F07000
trusted library allocation
page execute and read and write
E36000
heap
page read and write
30BF000
trusted library allocation
page read and write
545A000
heap
page read and write
3EE8000
trusted library allocation
page read and write
E95000
heap
page read and write
E89000
heap
page read and write
E99000
heap
page read and write
51F3000
heap
page read and write
33E0000
heap
page read and write
DA0000
trusted library allocation
page read and write
E0F000
heap
page read and write
DA0000
heap
page read and write
E4B000
heap
page read and write
534D000
heap
page read and write
E3D000
heap
page read and write
DE6000
heap
page read and write
E41000
heap
page read and write
309E000
trusted library allocation
page read and write
E4E000
heap
page read and write
2ED3000
trusted library allocation
page read and write
E3D000
heap
page read and write
DB1000
heap
page read and write
DEF000
heap
page read and write
EB0000
heap
page read and write
532F000
stack
page read and write
DC2000
trusted library allocation
page execute and read and write
DFC000
trusted library allocation
page execute and read and write
E4B000
heap
page read and write
DEE000
heap
page read and write
E47000
heap
page read and write
5451000
heap
page read and write
E3A000
heap
page read and write
5459000
heap
page read and write
D5B000
stack
page read and write
DEA000
heap
page read and write
5A26000
heap
page read and write
E44000
heap
page read and write
7EC000
unkown
page readonly
E30000
heap
page read and write
4FFE000
stack
page read and write
DE0000
heap
page read and write
D5E000
stack
page read and write
E46000
heap
page read and write
DE6000
heap
page read and write
E47000
heap
page read and write
DDA000
trusted library allocation
page execute and read and write
C5B000
stack
page read and write
DD7000
heap
page read and write
DCA000
trusted library allocation
page execute and read and write
5467000
heap
page read and write
E4E000
heap
page read and write
E10000
heap
page read and write
33E6000
heap
page read and write
DFA000
heap
page read and write
1020000
heap
page read and write
DFB000
heap
page read and write
DBA000
trusted library allocation
page execute and read and write
510C000
stack
page read and write
DF9000
heap
page read and write
3E61000
trusted library allocation
page read and write
E93000
heap
page read and write
10FE000
stack
page read and write
5970000
heap
page read and write
E4D000
heap
page read and write
1350000
trusted library allocation
page execute and read and write
FBC000
stack
page read and write
DB4000
heap
page read and write
DF7000
heap
page read and write
5950000
heap
page read and write
E0F000
heap
page read and write
51F0000
heap
page read and write
E35000
heap
page read and write
E44000
heap
page read and write
E3D000
heap
page read and write
E2F000
heap
page read and write
3330000
heap
page read and write
FF0000
heap
page read and write
5431000
heap
page read and write
F60000
heap
page read and write
5453000
heap
page read and write
E6F000
heap
page read and write
F05000
heap
page read and write
DED000
heap
page read and write
E6F000
heap
page read and write
E93000
heap
page read and write
DF4000
heap
page read and write
DF0000
trusted library allocation
page read and write
5459000
heap
page read and write
4C5E000
stack
page read and write
E3A000
heap
page read and write
518C000
stack
page read and write
DE6000
heap
page read and write
E36000
heap
page read and write
E50000
heap
page read and write
E42000
heap
page read and write
5452000
heap
page read and write
E0F000
heap
page read and write
F02000
trusted library allocation
page read and write
CA5000
heap
page read and write
E39000
heap
page read and write
5466000
heap
page read and write
F4E000
stack
page read and write
5465000
heap
page read and write
E4A000
heap
page read and write
E9E000
heap
page read and write
5A20000
heap
page read and write
DDF000
heap
page read and write
E4E000
heap
page read and write
E0F000
heap
page read and write
E47000
heap
page read and write
E95000
heap
page read and write
DD7000
trusted library allocation
page execute and read and write
3EC7000
trusted library allocation
page read and write
ED1000
heap
page read and write
B76000
stack
page read and write
E9E000
heap
page read and write
DEB000
heap
page read and write
E40000
heap
page read and write
545E000
heap
page read and write
E3B000
heap
page read and write
E37000
heap
page read and write
5460000
heap
page read and write
1300000
trusted library allocation
page execute and read and write
57E0000
trusted library allocation
page execute and read and write
DB2000
trusted library allocation
page execute and read and write
30A4000
trusted library allocation
page read and write
E95000
heap
page read and write
5459000
heap
page read and write
E10000
heap
page read and write
E4D000
heap
page read and write
E3F000
heap
page read and write
DF7000
heap
page read and write
1340000
heap
page execute and read and write
E42000
heap
page read and write
12FF000
stack
page read and write
5459000
heap
page read and write
319E000
unkown
page read and write
5464000
heap
page read and write
A79000
stack
page read and write
E2F000
heap
page read and write
E43000
heap
page read and write
E46000
heap
page read and write
E3B000
heap
page read and write
DC0000
heap
page read and write
F00000
heap
page read and write
DFA000
heap
page read and write
DA7000
heap
page read and write
4CE0000
heap
page read and write
E4D000
heap
page read and write
1030000
heap
page read and write
E47000
heap
page read and write
E2F000
heap
page read and write
E4D000
heap
page read and write
5149000
stack
page read and write
5300000
heap
page read and write
E2B000
heap
page read and write
5456000
heap
page read and write
E2F000
heap
page read and write
3EBE000
trusted library allocation
page read and write
DDE000
heap
page read and write
E4D000
heap
page read and write
5466000
heap
page read and write
EFE000
unkown
page read and write
E3F000
heap
page read and write
3E86000
trusted library allocation
page read and write
329E000
stack
page read and write
DF2000
trusted library allocation
page execute and read and write
E3E000
heap
page read and write
E44000
heap
page read and write
E00000
heap
page read and write
1370000
heap
page read and write
DC0000
heap
page read and write
1310000
trusted library allocation
page read and write
101D000
stack
page read and write
E50000
heap
page read and write
E9E000
heap
page read and write
E39000
heap
page read and write
EA8000
heap
page read and write
E2F000
heap
page read and write
5330000
heap
page read and write
7E0000
unkown
page readonly
E2B000
heap
page read and write
DF8000
heap
page read and write
30FE000
trusted library allocation
page read and write
E2F000
heap
page read and write
F0B000
trusted library allocation
page execute and read and write
There are 264 hidden memdumps, click here to show them.