IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\cred64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\853321935212
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
\Device\ConDrv
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
"C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
C:\Users\user\AppData\Local\Temp\9c69749b54\gntuud.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\85f469ce401df1\cred64.dll, Main
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "gntuud.exe" /P "user:N"&&CACLS "gntuud.exe" /P "user:R" /E&&echo Y|CACLS "..\9c69749b54" /P "user:N"&&CACLS "..\9c69749b54" /P "user:R" /E&&Exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "gntuud.exe" /P "user:R" /E
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo Y"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\9c69749b54" /P "user:N"
C:\Windows\SysWOW64\cacls.exe
CACLS "..\9c69749b54" /P "user:R" /E
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
31.41.244.237/jg94cVd30f/index.php
malicious
http://31.41.244.237/jg94cVd30f/index.phpWindows
unknown
http://31.41.244.237/jg94cVd30f/index.phpce401df1
unknown
http://31.41.244.237/jg94cVd30f/index.php9749b54
unknown
http://31.41.244.237/jg94cVd30f/index.phpW
unknown
http://31.41.244.237/jg94cVd30f/index.php1df1
unknown
http://31.41.244.237/jg94cVd30f/index.phpc
unknown
http://31.41.244.237/jg94cVd30f/index.phpq
unknown
http://31.41.244.237/jg94cVd30f/index.phpl4
unknown
http://31.41.244.237/jg94cVd30f/index.php
unknown
http://31.41.244.237/jg94cVd30f/index.php?scr=1
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
31.41.244.237
unknown
Russian Federation
malicious
192.168.2.5
unknown
unknown
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
920000
direct allocation
page read and write
malicious
B00000
direct allocation
page read and write
malicious
72F000
heap
page read and write
malicious
5E0000
direct allocation
page execute and read and write
malicious
72F000
heap
page read and write
malicious
900000
direct allocation
page execute and read and write
malicious
731000
heap
page read and write
malicious
620000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
47A000
heap
page read and write
9C0000
heap
page read and write
870000
heap
page read and write
390F000
trusted library allocation
page read and write
6E8000
heap
page read and write
2E60000
heap
page read and write
418000
unkown
page write copy
4DC1000
heap
page read and write
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
880000
heap
page read and write
66E000
heap
page read and write
3901000
trusted library allocation
page read and write
9D000
stack
page read and write
32D1000
trusted library allocation
page read and write
452000
unkown
page readonly
2870000
heap
page read and write
4DC1000
heap
page read and write
736000
heap
page read and write
6A3000
heap
page read and write
6AA000
heap
page read and write
23B0000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
323E000
stack
page read and write
2E2A000
heap
page read and write
EFE000
stack
page read and write
2E5A000
heap
page read and write
E3D000
stack
page read and write
401000
unkown
page execute read
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
652000
heap
page read and write
2DB0000
heap
page read and write
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
745000
heap
page read and write
3300000
heap
page read and write
4DC1000
heap
page read and write
3280000
heap
page read and write
B80000
heap
page read and write
198000
stack
page read and write
31D0000
heap
page read and write
729000
heap
page read and write
3310000
heap
page read and write
4DC1000
heap
page read and write
3E0C000
trusted library allocation
page read and write
967000
heap
page read and write
2E20000
heap
page read and write
4DC1000
heap
page read and write
43E000
unkown
page execute and read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
3E05000
trusted library allocation
page read and write
3450000
heap
page read and write
2FBE000
stack
page read and write
32F0000
heap
page read and write
400000
unkown
page readonly
3E04000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
88A000
heap
page read and write
418000
unkown
page write copy
3E05000
trusted library allocation
page read and write
DFC000
stack
page read and write
452000
unkown
page readonly
E30000
trusted library allocation
page read and write
72F000
heap
page read and write
400000
unkown
page readonly
323E000
stack
page read and write
620000
heap
page read and write
500000
heap
page read and write
ECF000
stack
page read and write
227F000
stack
page read and write
4DC1000
heap
page read and write
2E6A000
heap
page read and write
2DD0000
heap
page read and write
31B0000
heap
page read and write
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
401000
unkown
page execute read
2B7F000
stack
page read and write
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
42E000
unkown
page write copy
31BA000
heap
page read and write
2E6A000
heap
page read and write
30C6000
heap
page read and write
5220000
trusted library allocation
page read and write
3270000
heap
page read and write
4DC1000
heap
page read and write
3640000
heap
page read and write
376A000
heap
page read and write
550000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
7FE000
stack
page read and write
3140000
heap
page read and write
32D1000
trusted library allocation
page read and write
74C000
heap
page read and write
2E50000
heap
page read and write
2FFF000
stack
page read and write
32D1000
trusted library allocation
page read and write
2C7F000
stack
page read and write
4DC1000
heap
page read and write
42E000
unkown
page write copy
4DC1000
heap
page read and write
418000
unkown
page write copy
9C000
stack
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
6E4000
heap
page read and write
667000
heap
page read and write
AB0000
heap
page read and write
280E000
stack
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
32D1000
trusted library allocation
page read and write
418000
unkown
page write copy
2DBC000
stack
page read and write
2FF0000
heap
page read and write
4DC1000
heap
page read and write
32D1000
trusted library allocation
page read and write
401000
unkown
page execute read
960000
heap
page read and write
3410000
direct allocation
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
3150000
heap
page read and write
3E02000
trusted library allocation
page read and write
4DC1000
heap
page read and write
400000
unkown
page readonly
4DC1000
heap
page read and write
950000
heap
page read and write
400000
unkown
page readonly
2FFA000
heap
page read and write
30000
heap
page read and write
3140000
heap
page read and write
6C5000
heap
page execute and read and write
3547000
heap
page read and write
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
69F000
stack
page read and write
2EBA000
heap
page read and write
B1F000
stack
page read and write
B3E000
stack
page read and write
DEE000
stack
page read and write
3106000
heap
page read and write
1F0000
trusted library allocation
page read and write
E60000
heap
page read and write
2EB0000
heap
page read and write
307B000
stack
page read and write
A7E000
stack
page read and write
95A000
heap
page read and write
4DC1000
heap
page read and write
401000
unkown
page execute read
81F000
stack
page read and write
2DBA000
heap
page read and write
4DC1000
heap
page read and write
B60000
heap
page read and write
4DC1000
heap
page read and write
2F8A000
heap
page read and write
3E02000
trusted library allocation
page read and write
BB0000
heap
page read and write
4DC1000
heap
page read and write
DBD000
stack
page read and write
43E000
unkown
page execute and read and write
30000
heap
page read and write
5AC000
stack
page read and write
284E000
stack
page read and write
1B0000
remote allocation
page read and write
6EC000
heap
page read and write
30C0000
heap
page read and write
3277000
heap
page read and write
452000
unkown
page readonly
F50000
trusted library allocation
page read and write
71C000
heap
page read and write
87A000
heap
page read and write
960000
heap
page read and write
93E000
stack
page read and write
35EA000
heap
page read and write
3E01000
trusted library allocation
page read and write
3E0B000
trusted library allocation
page read and write
32F7000
heap
page read and write
3E0C000
trusted library allocation
page read and write
27CF000
stack
page read and write
3333000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
33AF000
stack
page read and write
4DC1000
heap
page read and write
442000
unkown
page write copy
729000
heap
page read and write
F3F000
stack
page read and write
8FF000
stack
page read and write
4DC1000
heap
page read and write
5DE000
stack
page read and write
373A000
heap
page read and write
6E7000
heap
page read and write
62A000
heap
page read and write
3730000
heap
page read and write
4DC1000
heap
page read and write
418000
unkown
page write copy
4DC1000
heap
page read and write
42E000
unkown
page write copy
442000
unkown
page write copy
4DC1000
heap
page read and write
4DC1000
heap
page read and write
3334000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
729000
heap
page read and write
A9E000
stack
page read and write
56D000
stack
page read and write
452000
unkown
page readonly
4DC1000
heap
page read and write
CD0000
heap
page read and write
ADE000
stack
page read and write
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
32D1000
trusted library allocation
page read and write
8F0000
heap
page read and write
2380000
heap
page read and write
E40000
trusted library allocation
page read and write
2E60000
heap
page read and write
418000
unkown
page write copy
32D1000
trusted library allocation
page read and write
237E000
stack
page read and write
B86000
heap
page read and write
4DC1000
heap
page read and write
F40000
trusted library allocation
page read and write
2F80000
heap
page read and write
331A000
heap
page read and write
4DC1000
heap
page read and write
44C000
unkown
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
2ED0000
heap
page read and write
D50000
heap
page read and write
744000
heap
page read and write
59E000
stack
page read and write
297F000
stack
page read and write
400000
unkown
page readonly
32D1000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
3147000
heap
page read and write
4DC1000
heap
page read and write
1B0000
remote allocation
page read and write
3E06000
trusted library allocation
page read and write
4DC1000
heap
page read and write
744000
heap
page read and write
42E000
unkown
page write copy
401000
unkown
page execute read
4DC1000
heap
page read and write
3760000
heap
page read and write
748000
heap
page read and write
42E000
unkown
page write copy
32D1000
trusted library allocation
page read and write
91F000
stack
page read and write
E8E000
stack
page read and write
820000
heap
page read and write
4DC0000
heap
page read and write
3E0A000
trusted library allocation
page read and write
4DC1000
heap
page read and write
59E000
stack
page read and write
4DC1000
heap
page read and write
5F0000
trusted library allocation
page read and write
71C000
heap
page read and write
4EC0000
heap
page read and write
32D1000
trusted library allocation
page read and write
19B000
stack
page read and write
400000
unkown
page readonly
327F000
stack
page read and write
1B0000
remote allocation
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
31B0000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
3E00000
trusted library allocation
page read and write
6C8000
heap
page read and write
6C0000
heap
page read and write
35E0000
heap
page read and write
4DC1000
heap
page read and write
452000
unkown
page readonly
32D1000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
3540000
heap
page read and write
3E0E000
trusted library allocation
page read and write
633000
heap
page execute and read and write
4DC1000
heap
page read and write
3E0A000
trusted library allocation
page read and write
A30000
heap
page read and write
4DC1000
heap
page read and write
3E00000
trusted library allocation
page read and write
364A000
heap
page read and write
308E000
stack
page read and write
3100000
heap
page read and write
4DC1000
heap
page read and write
745000
heap
page read and write
4DC1000
heap
page read and write
3908000
trusted library allocation
page read and write
32CE000
stack
page read and write
30CF000
stack
page read and write
31D4000
heap
page read and write
2CBE000
stack
page read and write
4DC1000
heap
page read and write
452000
unkown
page readonly
4DC1000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
2EF2000
trusted library allocation
page read and write
82A000
heap
page read and write
2A7F000
stack
page read and write
940000
trusted library allocation
page read and write
480000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
1F0000
trusted library allocation
page read and write
3E05000
trusted library allocation
page read and write
4DC1000
heap
page read and write
452000
unkown
page readonly
4DC1000
heap
page read and write
E7C000
stack
page read and write
4DC1000
heap
page read and write
233E000
stack
page read and write
31D4000
heap
page read and write
452000
unkown
page readonly
303C000
stack
page read and write
4DC1000
heap
page read and write
42E000
unkown
page write copy
4DC1000
heap
page read and write
C3D000
stack
page read and write
3530000
heap
page read and write
970000
heap
page read and write
3456000
heap
page read and write
2EDA000
heap
page read and write
330F000
stack
page read and write
C7C000
stack
page read and write
470000
heap
page read and write
F40000
trusted library allocation
page read and write
44C000
unkown
page read and write
71A000
heap
page read and write
3E08000
trusted library allocation
page read and write
401000
unkown
page execute read
E2F000
stack
page read and write
4DC1000
heap
page read and write
There are 355 hidden memdumps, click here to show them.