IOC Report
JawnEmT6S2.exe

loading gif

Files

File Path
Type
Category
Malicious
JawnEmT6S2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Umbrella.flv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\server.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Epic Games.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bd45e682ad8a06dcb9168f1be41d3129Epic Games.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\autorun.inf
Microsoft Windows Autorun file
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\JawnEmT6S2.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\app
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JawnEmT6S2.exe
"C:\Users\user\Desktop\JawnEmT6S2.exe"
malicious
C:\Users\user\AppData\Local\Temp\server.exe
"C:\Users\user\AppData\Local\Temp\server.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\server.exe" "server.exe" ENABLE
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
7.tcp.eu.ngrok.io
3.125.188.168
malicious

IPs

IP
Domain
Country
Malicious
3.125.188.168
7.tcp.eu.ngrok.io
United States
malicious
3.124.67.191
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
26F1000
trusted library allocation
page read and write
malicious
502000
unkown
page readonly
malicious
3AC8000
trusted library allocation
page read and write
malicious
E17000
trusted library allocation
page execute and read and write
C9C000
heap
page read and write
598D000
stack
page read and write
922000
trusted library allocation
page execute and read and write
D3D000
heap
page read and write
CE9000
heap
page read and write
C86000
heap
page read and write
C89000
heap
page read and write
5207000
heap
page read and write
C9D000
heap
page read and write
4C9000
heap
page read and write
BF0000
trusted library allocation
page execute and read and write
CF9000
heap
page read and write
49D0000
heap
page read and write
4A80000
heap
page read and write
CF4000
heap
page read and write
CA7000
heap
page read and write
275E000
stack
page read and write
47EE000
stack
page read and write
50D000
heap
page read and write
4ADC000
stack
page read and write
51F2000
heap
page read and write
912000
trusted library allocation
page execute and read and write
CA4000
heap
page read and write
2AA0000
heap
page read and write
5201000
heap
page read and write
4F5C000
stack
page read and write
4B9C000
stack
page read and write
E12000
trusted library allocation
page execute and read and write
D1F000
heap
page read and write
D43000
heap
page read and write
291D000
trusted library allocation
page read and write
CE4000
heap
page read and write
CE4000
heap
page read and write
CE7000
heap
page read and write
CF7000
heap
page read and write
D3D000
heap
page read and write
A40000
heap
page read and write
B60000
heap
page read and write
CEA000
heap
page read and write
AEE000
stack
page read and write
CA9000
heap
page read and write
7C0000
heap
page read and write
498B000
stack
page read and write
D3D000
heap
page read and write
D4E000
heap
page read and write
C9A000
heap
page read and write
CEB000
heap
page read and write
2AFA000
trusted library allocation
page read and write
CE9000
heap
page read and write
CE7000
heap
page read and write
5206000
heap
page read and write
55AE000
stack
page read and write
CEF000
heap
page read and write
D3E000
heap
page read and write
5205000
heap
page read and write
CA3000
heap
page read and write
8F6000
stack
page read and write
C9A000
heap
page read and write
CDF000
heap
page read and write
C65000
heap
page read and write
C9E000
heap
page read and write
516E000
stack
page read and write
CBD000
heap
page read and write
D3D000
heap
page read and write
4D8000
heap
page read and write
D3D000
heap
page read and write
4C9D000
stack
page read and write
D41000
heap
page read and write
CBC000
heap
page read and write
AC5000
heap
page read and write
CA9000
heap
page read and write
B30000
heap
page read and write
E3A000
trusted library allocation
page execute and read and write
A06000
heap
page read and write
D1F000
heap
page read and write
4A0E000
stack
page read and write
51D0000
heap
page read and write
5207000
heap
page read and write
410000
heap
page read and write
E10000
trusted library allocation
page read and write
C9C000
heap
page read and write
CDF000
heap
page read and write
CEE000
heap
page read and write
D3D000
heap
page read and write
C90000
heap
page read and write
CC3000
heap
page read and write
CFC000
heap
page read and write
CEF000
heap
page read and write
C80000
heap
page read and write
49CC000
stack
page read and write
9EC000
stack
page read and write
4B1E000
stack
page read and write
28D7000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
51CF000
stack
page read and write
CF5000
heap
page read and write
4CC0000
trusted library allocation
page read and write
2C84000
trusted library allocation
page read and write
F1F000
unkown
page read and write
CDF000
heap
page read and write
C7A000
heap
page read and write
5200000
heap
page read and write
2791000
trusted library allocation
page read and write
C00000
heap
page execute and read and write
2990000
trusted library allocation
page read and write
CAA000
heap
page read and write
C5A000
heap
page read and write
D4E000
heap
page read and write
CF4000
heap
page read and write
4EAB000
stack
page read and write
1460000
heap
page read and write
CFE000
heap
page read and write
CA9000
heap
page read and write
4C90000
heap
page read and write
5E5000
heap
page read and write
CE9000
heap
page read and write
7E0000
heap
page read and write
D1F000
heap
page read and write
D48000
heap
page read and write
CE5000
heap
page read and write
C91000
heap
page read and write
AFB000
stack
page read and write
4CD0000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
CA9000
heap
page read and write
47F000
heap
page read and write
C71000
heap
page read and write
2761000
trusted library allocation
page read and write
E2A000
trusted library allocation
page execute and read and write
CF3000
heap
page read and write
920000
trusted library allocation
page read and write
CC3000
heap
page read and write
CF2000
heap
page read and write
95B000
trusted library allocation
page execute and read and write
488C000
stack
page read and write
2AC1000
trusted library allocation
page read and write
CDF000
heap
page read and write
526E000
stack
page read and write
4C1E000
stack
page read and write
BFA000
trusted library allocation
page execute and read and write
D40000
heap
page read and write
BD0000
heap
page read and write
CF0000
heap
page read and write
D4C000
heap
page read and write
101F000
stack
page read and write
D3D000
heap
page read and write
5200000
heap
page read and write
592C000
stack
page read and write
C0E000
heap
page read and write
E1A000
trusted library allocation
page execute and read and write
CE8000
heap
page read and write
4FA0000
trusted library allocation
page execute and read and write
C96000
heap
page read and write
CA1000
heap
page read and write
512E000
stack
page read and write
AC0000
heap
page read and write
53AF000
stack
page read and write
B10000
trusted library allocation
page read and write
D1D000
heap
page read and write
4FC0000
unclassified section
page read and write
AF4000
stack
page read and write
CF2000
heap
page read and write
CF0000
heap
page read and write
D1F000
heap
page read and write
D45000
heap
page read and write
2799000
trusted library allocation
page read and write
CDE000
heap
page read and write
CED000
heap
page read and write
C71000
heap
page read and write
CDF000
heap
page read and write
D3D000
heap
page read and write
E8E000
stack
page read and write
4DAC000
stack
page read and write
5208000
heap
page read and write
52AE000
stack
page read and write
900000
trusted library allocation
page read and write
4CD000
heap
page read and write
CDE000
heap
page read and write
420000
heap
page read and write
CBB000
heap
page read and write
C00000
heap
page read and write
C08000
heap
page read and write
10A0000
heap
page read and write
57EF000
stack
page read and write
440000
heap
page read and write
4F9B000
stack
page read and write
D1F000
heap
page read and write
937000
trusted library allocation
page execute and read and write
C96000
heap
page read and write
E47000
trusted library allocation
page execute and read and write
2C3A000
trusted library allocation
page read and write
942000
trusted library allocation
page execute and read and write
5200000
heap
page read and write
CF0000
heap
page read and write
C62000
heap
page read and write
44A000
heap
page read and write
B49000
trusted library allocation
page read and write
957000
trusted library allocation
page execute and read and write
CF4000
heap
page read and write
2A41000
trusted library allocation
page read and write
CA5000
heap
page read and write
370C000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page execute and read and write
CE9000
heap
page read and write
4FEC000
stack
page read and write
C50000
heap
page read and write
9E0000
heap
page read and write
4E8000
heap
page read and write
C89000
heap
page read and write
BE0000
trusted library allocation
page read and write
CBB000
heap
page read and write
CC3000
heap
page read and write
CF7000
heap
page read and write
A2E000
stack
page read and write
56EE000
stack
page read and write
275F000
trusted library allocation
page read and write
92A000
trusted library allocation
page execute and read and write
CBC000
heap
page read and write
CE3000
heap
page read and write
B40000
trusted library allocation
page read and write
CBB000
heap
page read and write
2AF3000
trusted library allocation
page read and write
7FB000
stack
page read and write
5E0000
heap
page read and write
CA5000
heap
page read and write
410C000
trusted library allocation
page read and write
D1F000
heap
page read and write
2736000
trusted library allocation
page read and write
BAE000
unkown
page read and write
CE8000
heap
page read and write
A9E000
stack
page read and write
10A6000
heap
page read and write
CEA000
heap
page read and write
7F880000
trusted library allocation
page execute and read and write
1510000
heap
page read and write
CDE000
heap
page read and write
DFE000
stack
page read and write
CEE000
heap
page read and write
E00000
heap
page execute and read and write
C71000
heap
page read and write
C96000
heap
page read and write
E32000
trusted library allocation
page execute and read and write
5200000
heap
page read and write
CE9000
heap
page read and write
51F1000
heap
page read and write
BB5000
heap
page read and write
BC0000
heap
page read and write
4FB0000
trusted library allocation
page read and write
500000
unkown
page readonly
CBB000
heap
page read and write
CC3000
heap
page read and write
BA000
stack
page read and write
CA7000
heap
page read and write
CDE000
heap
page read and write
D49000
heap
page read and write
CBE000
heap
page read and write
5A8F000
stack
page read and write
CE5000
heap
page read and write
CE8000
heap
page read and write
EB0000
heap
page read and write
D1F000
heap
page read and write
CF7000
heap
page read and write
94A000
trusted library allocation
page execute and read and write
D44000
heap
page read and write
36F1000
trusted library allocation
page read and write
5020000
heap
page read and write
4CA0000
trusted library allocation
page read and write
44E000
heap
page read and write
5AB000
stack
page read and write
CA7000
heap
page read and write
C3E000
stack
page read and write
CF7000
heap
page read and write
CEF000
heap
page read and write
CF0000
heap
page read and write
900000
heap
page read and write
CF3000
heap
page read and write
2C37000
trusted library allocation
page read and write
B0F000
stack
page read and write
E4B000
trusted library allocation
page execute and read and write
E1C000
trusted library allocation
page execute and read and write
2C58000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
BCE000
stack
page read and write
CBD000
heap
page read and write
2746000
trusted library allocation
page read and write
5201000
heap
page read and write
51FA000
heap
page read and write
D4B000
heap
page read and write
91A000
trusted library allocation
page execute and read and write
952000
trusted library allocation
page read and write
502E000
stack
page read and write
C9C000
heap
page read and write
C3F000
heap
page read and write
93A000
trusted library allocation
page execute and read and write
C29000
heap
page read and write
AB0000
heap
page read and write
D1F000
heap
page read and write
D4A000
heap
page read and write
BE0000
trusted library allocation
page read and write
CBD000
heap
page read and write
99E000
stack
page read and write
56AE000
stack
page read and write
27A8000
trusted library allocation
page read and write
51F1000
heap
page read and write
CA7000
heap
page read and write
CBD000
heap
page read and write
582B000
stack
page read and write
CF3000
heap
page read and write
D41000
heap
page read and write
BF2000
trusted library allocation
page execute and read and write
5200000
heap
page read and write
1B6000
stack
page read and write
CF8000
heap
page read and write
AFE000
stack
page read and write
4EEC000
stack
page read and write
CA4000
heap
page read and write
A00000
heap
page read and write
4D60000
heap
page read and write
D3D000
heap
page read and write
There are 313 hidden memdumps, click here to show them.