IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\cred64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
"C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
C:\Users\user\AppData\Local\Temp\ecaac49691\gntuud.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
77.73.133.72/hfk3vK9/index.php
malicious
http://77.73.133.72/hfk3vK9/Plugins/cred64.dll_
unknown
http://77.73.133.72/hfk3vK9/Plugins/cred64.dll
unknown
http://77.73.133.72/hfk3vK9/Plugins/cred64.dll=
unknown
http://77.73.133.72/hfk3vK9/index.php
unknown
http://77.73.133.72/hfk3vK9/index.php8
unknown
http://77.73.133.72/hfk3vK9/Plugins/cred64.dll)
unknown
http://77.73.133.72/hfk3vK9/index.phpplay
unknown

IPs

IP
Domain
Country
Malicious
77.73.133.72
unknown
Kazakhstan
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
940000
direct allocation
page read and write
malicious
680000
direct allocation
page read and write
malicious
7CB000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
940000
direct allocation
page read and write
malicious
6E0000
direct allocation
page execute and read and write
malicious
7AF000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
900000
direct allocation
page execute and read and write
malicious
26663302000
heap
page read and write
4335000
trusted library allocation
page read and write
3831000
trusted library allocation
page read and write
22CC8802000
heap
page read and write
2E80000
heap
page read and write
D6EFCFF000
stack
page read and write
F9160FE000
stack
page read and write
2DFA000
heap
page read and write
433E000
trusted library allocation
page read and write
42E000
unkown
page write copy
590000
heap
page read and write
6347BFF000
stack
page read and write
1D1F8E6D000
heap
page read and write
500387C000
stack
page read and write
224C6A43000
heap
page read and write
D6EFA7C000
stack
page read and write
26170400000
heap
page read and write
3770000
heap
page read and write
500337E000
stack
page read and write
26170B90000
heap
page read and write
22825138000
heap
page read and write
F915BEE000
stack
page read and write
22CC8918000
heap
page read and write
7D0000
heap
page read and write
1D1F8F02000
heap
page read and write
2B6E000
stack
page read and write
25F4D402000
trusted library allocation
page read and write
59E000
stack
page read and write
418000
unkown
page write copy
228250F0000
heap
page read and write
22CC884B000
heap
page read and write
63476FB000
stack
page read and write
224C6A69000
heap
page read and write
26FB3590000
heap
page read and write
26663287000
heap
page read and write
4D0000
heap
page read and write
2282517C000
heap
page read and write
1C101D80000
trusted library allocation
page read and write
1C101C20000
heap
page read and write
2E00000
heap
page read and write
8C0000
heap
page read and write
1C101E13000
heap
page read and write
224C68B0000
heap
page read and write
418000
unkown
page write copy
433B000
trusted library allocation
page read and write
1D1F8E28000
heap
page read and write
BCA44FF000
stack
page read and write
3660000
heap
page read and write
22CC87B0000
heap
page read and write
2B2F000
stack
page read and write
4336000
trusted library allocation
page read and write
F915E7E000
stack
page read and write
1D1F8E02000
heap
page read and write
AC9EAFB000
stack
page read and write
22CC883D000
heap
page read and write
767000
heap
page read and write
29EF000
stack
page read and write
4339000
trusted library allocation
page read and write
1B0000
remote allocation
page read and write
500357C000
stack
page read and write
261701A0000
heap
page read and write
452000
unkown
page readonly
3831000
trusted library allocation
page read and write
5D3000
heap
page execute and read and write
3831000
trusted library allocation
page read and write
7FE000
stack
page read and write
AC9E57F000
stack
page read and write
3831000
trusted library allocation
page read and write
4339000
trusted library allocation
page read and write
D6EF9FE000
stack
page read and write
4335000
trusted library allocation
page read and write
480000
heap
page read and write
BCA47FF000
stack
page read and write
224C6A60000
heap
page read and write
F38697D000
stack
page read and write
224C68A0000
heap
page read and write
AC9ECFE000
stack
page read and write
1D1F8E79000
heap
page read and write
224C6A78000
heap
page read and write
26663243000
heap
page read and write
26170443000
heap
page read and write
57E000
stack
page read and write
1D1F8E75000
heap
page read and write
224C6A7B000
heap
page read and write
3E3C000
trusted library allocation
page read and write
470000
heap
page read and write
5002C8B000
stack
page read and write
2F4A000
heap
page read and write
BCA3C7B000
stack
page read and write
26170426000
heap
page read and write
22825400000
trusted library allocation
page read and write
1D1F8E13000
heap
page read and write
3831000
trusted library allocation
page read and write
377A000
heap
page read and write
26170B22000
heap
page read and write
442000
unkown
page write copy
22825070000
trusted library allocation
page read and write
43E000
unkown
page execute and read and write
26663213000
heap
page read and write
26170B00000
heap
page read and write
42E000
unkown
page write copy
2617046A000
heap
page read and write
401000
unkown
page execute read
22CC8913000
heap
page read and write
25F4D290000
remote allocation
page read and write
442000
unkown
page write copy
2F10000
heap
page read and write
30000
heap
page read and write
433D000
trusted library allocation
page read and write
5D5CB7B000
stack
page read and write
26170B43000
heap
page read and write
26170B02000
heap
page read and write
26170C29000
heap
page read and write
7D7000
heap
page read and write
4339000
trusted library allocation
page read and write
26170429000
heap
page read and write
224C6A59000
heap
page read and write
6347A7E000
stack
page read and write
332A000
heap
page read and write
D6EFDFD000
stack
page read and write
D6EFE7E000
stack
page read and write
BCA45FE000
stack
page read and write
452000
unkown
page readonly
60E000
heap
page read and write
224C6A29000
heap
page read and write
BCA43FF000
stack
page read and write
452000
unkown
page readonly
26FB3E02000
trusted library allocation
page read and write
2F2A000
heap
page read and write
634747E000
stack
page read and write
AC9E47B000
stack
page read and write
26170B6D000
heap
page read and write
3320000
heap
page read and write
25F4CC00000
heap
page read and write
1D1F8F13000
heap
page read and write
433F000
trusted library allocation
page read and write
366A000
heap
page read and write
26170990000
trusted library allocation
page read and write
7A7000
heap
page read and write
42E000
unkown
page write copy
22CCA2E0000
trusted library allocation
page read and write
26170484000
heap
page read and write
5D5CC7B000
stack
page read and write
1B0000
remote allocation
page read and write
26FB3613000
heap
page read and write
1B0000
remote allocation
page read and write
401000
unkown
page execute read
3831000
trusted library allocation
page read and write
25F4CC57000
heap
page read and write
25F4D260000
trusted library allocation
page read and write
25F4D290000
remote allocation
page read and write
6DE000
stack
page read and write
786000
heap
page read and write
19B000
stack
page read and write
22CC8800000
heap
page read and write
22CCA360000
remote allocation
page read and write
4338000
trusted library allocation
page read and write
26FB3600000
heap
page read and write
26663802000
heap
page read and write
28AF000
stack
page read and write
93F000
stack
page read and write
224C7070000
trusted library allocation
page read and write
30000
heap
page read and write
1C101E3D000
heap
page read and write
22825D70000
trusted library allocation
page read and write
4334000
trusted library allocation
page read and write
44C000
unkown
page read and write
42E000
unkown
page write copy
400000
unkown
page readonly
79B000
heap
page read and write
22825FB0000
trusted library allocation
page read and write
25F4CC20000
heap
page read and write
F386779000
stack
page read and write
AC9EDFE000
stack
page read and write
22825410000
trusted library allocation
page read and write
26FB3702000
heap
page read and write
6347B7B000
stack
page read and write
3831000
trusted library allocation
page read and write
5D5CE7E000
stack
page read and write
224C6A32000
heap
page read and write
1C101E29000
heap
page read and write
26170443000
heap
page read and write
22CC884A000
heap
page read and write
2617046D000
heap
page read and write
2617043C000
heap
page read and write
224C6A64000
heap
page read and write
F915FFE000
stack
page read and write
25F4D290000
remote allocation
page read and write
22CC882A000
heap
page read and write
224C6A00000
heap
page read and write
26170C32000
heap
page read and write
1F0000
trusted library allocation
page read and write
634797F000
stack
page read and write
3831000
trusted library allocation
page read and write
224C7202000
trusted library allocation
page read and write
433A000
trusted library allocation
page read and write
26FB3D50000
trusted library allocation
page read and write
2F9A000
heap
page read and write
26FB35F0000
heap
page read and write
764000
heap
page read and write
266632CA000
heap
page read and write
22CCA270000
trusted library allocation
page read and write
26FB364E000
heap
page read and write
BCA46FF000
stack
page read and write
22CC8874000
heap
page read and write
772000
heap
page read and write
452000
unkown
page readonly
730000
heap
page read and write
7A1000
heap
page read and write
198000
stack
page read and write
452000
unkown
page readonly
25F4CC52000
heap
page read and write
22CC8859000
heap
page read and write
2EE0000
heap
page read and write
22CC885B000
heap
page read and write
5D5C87B000
stack
page read and write
500327F000
stack
page read and write
26170C02000
heap
page read and write
2F20000
heap
page read and write
401000
unkown
page execute read
1C101E54000
heap
page read and write
63475FF000
stack
page read and write
42E000
unkown
page write copy
2F90000
heap
page read and write
266632B9000
heap
page read and write
224C6A84000
heap
page read and write
26170413000
heap
page read and write
22CC8872000
heap
page read and write
AC9EA7C000
stack
page read and write
26170491000
heap
page read and write
400000
unkown
page readonly
22825140000
heap
page read and write
26663790000
trusted library allocation
page read and write
2617058F000
heap
page read and write
224C6A6D000
heap
page read and write
26663313000
heap
page read and write
25F4CC13000
heap
page read and write
224C6A41000
heap
page read and write
7AA000
heap
page read and write
28EE000
stack
page read and write
3831000
trusted library allocation
page read and write
1C101E3B000
heap
page read and write
AC9E97F000
stack
page read and write
22C0000
heap
page read and write
2A2E000
stack
page read and write
518517E000
stack
page read and write
1C101E47000
heap
page read and write
BCA3E7A000
stack
page read and write
1C101E00000
heap
page read and write
940000
heap
page read and write
AC9EBFD000
stack
page read and write
D6EFC7D000
stack
page read and write
452000
unkown
page readonly
1C101F02000
heap
page read and write
AC9E5FF000
stack
page read and write
22825FE0000
trusted library allocation
page read and write
518507F000
stack
page read and write
2617048F000
heap
page read and write
5C8000
heap
page read and write
1C101E02000
heap
page read and write
261701B0000
heap
page read and write
2DCA000
heap
page read and write
261705E7000
heap
page read and write
26663264000
heap
page read and write
401000
unkown
page execute read
228250D0000
heap
page read and write
1C101C80000
heap
page read and write
9A0000
heap
page read and write
63470AB000
stack
page read and write
26662FC0000
heap
page read and write
224C6A3D000
heap
page read and write
2DC0000
heap
page read and write
485000
heap
page read and write
26170454000
heap
page read and write
26170C00000
heap
page read and write
5184F79000
stack
page read and write
44C000
unkown
page read and write
1C101E2E000
heap
page read and write
26170458000
heap
page read and write
401000
unkown
page execute read
452000
unkown
page readonly
418000
unkown
page write copy
43E000
unkown
page execute and read and write
26170C24000
heap
page read and write
224C6A3B000
heap
page read and write
3831000
trusted library allocation
page read and write
9D000
stack
page read and write
22825FD0000
trusted library allocation
page read and write
400000
unkown
page readonly
26170210000
heap
page read and write
26663229000
heap
page read and write
3831000
trusted library allocation
page read and write
25F4CC02000
heap
page read and write
224C6A58000
heap
page read and write
4DA000
heap
page read and write
3831000
trusted library allocation
page read and write
25F4CC3C000
heap
page read and write
3831000
trusted library allocation
page read and write
5184E7E000
stack
page read and write
3831000
trusted library allocation
page read and write
26170B54000
heap
page read and write
25F4CAA0000
heap
page read and write
22825174000
heap
page read and write
5C0000
heap
page read and write
3831000
trusted library allocation
page read and write
2DAC000
stack
page read and write
2F1A000
heap
page read and write
418000
unkown
page write copy
9A0000
heap
page read and write
22CC8849000
heap
page read and write
22CC8900000
heap
page read and write
22CCA360000
remote allocation
page read and write
26FB3580000
heap
page read and write
224C6B02000
heap
page read and write
2E8A000
heap
page read and write
26170513000
heap
page read and write
BCA40FC000
stack
page read and write
22DE000
stack
page read and write
F3867FF000
stack
page read and write
27AE000
stack
page read and write
26FB367A000
heap
page read and write
2E70000
heap
page read and write
67C000
heap
page read and write
22825FC0000
heap
page readonly
5F2000
heap
page read and write
25F4CB00000
heap
page read and write
634787A000
stack
page read and write
25F4CC29000
heap
page read and write
1D1F9602000
trusted library allocation
page read and write
63B000
heap
page read and write
22825435000
heap
page read and write
22CC8740000
heap
page read and write
1D1F8E40000
heap
page read and write
22825430000
heap
page read and write
645000
heap
page read and write
26662FD0000
heap
page read and write
648000
heap
page read and write
654000
heap
page read and write
F3866F9000
stack
page read and write
224C6A62000
heap
page read and write
8CA000
heap
page read and write
740000
heap
page read and write
7D4000
heap
page read and write
F3868F9000
stack
page read and write
9C000
stack
page read and write
BCA42FD000
stack
page read and write
224C6A66000
heap
page read and write
22825439000
heap
page read and write
224C6A61000
heap
page read and write
4331000
trusted library allocation
page read and write
22CC8865000
heap
page read and write
22825130000
heap
page read and write
2EEA000
heap
page read and write
261705BB000
heap
page read and write
4D0000
heap
page read and write
4337000
trusted library allocation
page read and write
5184C7C000
stack
page read and write
1D1F8D60000
trusted library allocation
page read and write
224C6A7C000
heap
page read and write
26170BB0000
heap
page read and write
3E36000
trusted library allocation
page read and write
25F4CD02000
heap
page read and write
1C101E4A000
heap
page read and write
97A000
heap
page read and write
377A000
heap
page read and write
970000
heap
page read and write
261703E0000
trusted library allocation
page read and write
276F000
stack
page read and write
2F40000
heap
page read and write
3831000
trusted library allocation
page read and write
7BF000
stack
page read and write
1C102602000
trusted library allocation
page read and write
224C6910000
heap
page read and write
67C000
heap
page read and write
22825197000
heap
page read and write
F915B6C000
stack
page read and write
500347F000
stack
page read and write
22CC87E0000
trusted library allocation
page read and write
22CC8813000
heap
page read and write
360A000
heap
page read and write
AC9E87C000
stack
page read and write
26663030000
heap
page read and write
433E000
trusted library allocation
page read and write
AC9E67C000
stack
page read and write
400000
unkown
page readonly
5D5CD7B000
stack
page read and write
F38636C000
stack
page read and write
F9162FE000
stack
page read and write
69F000
stack
page read and write
2282517C000
heap
page read and write
22CCA2A0000
trusted library allocation
page read and write
4DA000
heap
page read and write
2282517E000
heap
page read and write
2282517C000
heap
page read and write
26663900000
heap
page read and write
418000
unkown
page write copy
1D1F8F00000
heap
page read and write
67C000
heap
page read and write
2666326E000
heap
page read and write
2320000
heap
page read and write
3831000
trusted library allocation
page read and write
26170B22000
heap
page read and write
1C101C30000
heap
page read and write
6347779000
stack
page read and write
22CC885A000
heap
page read and write
8FF000
stack
page read and write
3831000
trusted library allocation
page read and write
26170477000
heap
page read and write
22825060000
heap
page read and write
2E7A000
heap
page read and write
500367C000
stack
page read and write
26663200000
heap
page read and write
26170C13000
heap
page read and write
26FB3602000
heap
page read and write
266632C3000
heap
page read and write
3831000
trusted library allocation
page read and write
401000
unkown
page execute read
22826030000
trusted library allocation
page read and write
452000
unkown
page readonly
1D1F8BF0000
heap
page read and write
D6EF55C000
stack
page read and write
26663267000
heap
page read and write
26FB3629000
heap
page read and write
400000
unkown
page readonly
1C101E1F000
heap
page read and write
26170BBC000
heap
page read and write
26FB363D000
heap
page read and write
224C6A13000
heap
page read and write
26FB3713000
heap
page read and write
3770000
heap
page read and write
BCA3FFE000
stack
page read and write
2CAE000
stack
page read and write
1D1F8E52000
heap
page read and write
26170489000
heap
page read and write
601000
heap
page read and write
1D1F8C00000
heap
page read and write
26FB3667000
heap
page read and write
1D1F8E00000
heap
page read and write
22825420000
trusted library allocation
page read and write
4337000
trusted library allocation
page read and write
224C6A57000
heap
page read and write
F9161FE000
stack
page read and write
3600000
heap
page read and write
224C6A7F000
heap
page read and write
1D1F8C60000
heap
page read and write
22CCA360000
remote allocation
page read and write
224C6A48000
heap
page read and write
22CC8902000
heap
page read and write
26170A02000
heap
page read and write
26170475000
heap
page read and write
26170BC7000
heap
page read and write
433A000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
2310000
heap
page read and write
2C6F000
stack
page read and write
400000
unkown
page readonly
745000
heap
page execute and read and write
67C000
heap
page read and write
418000
unkown
page write copy
224C6A5D000
heap
page read and write
26663223000
heap
page read and write
2DF0000
heap
page read and write
22CCA402000
trusted library allocation
page read and write
224C6A4E000
heap
page read and write
25F4CA90000
heap
page read and write
224C6A5B000
heap
page read and write
2E0A000
heap
page read and write
22CC8750000
heap
page read and write
26663912000
heap
page read and write
26FB3669000
heap
page read and write
22825440000
trusted library allocation
page read and write
42E000
unkown
page write copy
3831000
trusted library allocation
page read and write
There are 472 hidden memdumps, click here to show them.