IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\qtcnnjjg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\tsqtjgfo\qtcnnjjg.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Windows\SysWOW64\tsqtjgfo\qtcnnjjg.exe
C:\Windows\SysWOW64\tsqtjgfo\qtcnnjjg.exe /d"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tsqtjgfo\
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\user\AppData\Local\Temp\qtcnnjjg.exe" C:\Windows\SysWOW64\tsqtjgfo\
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
C:\Windows\System32\sc.exe" create tsqtjgfo binPath= "C:\Windows\SysWOW64\tsqtjgfo\qtcnnjjg.exe /d\"C:\Users\user\Desktop\file.exe\"" type= own start= auto DisplayName= "wifi support
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
C:\Windows\System32\sc.exe" description tsqtjgfo "wifi internet conection
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\sc.exe
"C:\Windows\System32\sc.exe" start tsqtjgfo
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
svartalfheim.top:443
malicious
jotunheim.name:443
malicious

Domains

Name
IP
Malicious
svartalfheim.top
93.189.42.6
malicious
jotunheim.name
80.66.75.254
malicious
microsoft-com.mail.protection.outlook.com
52.101.40.29

IPs

IP
Domain
Country
Malicious
80.66.75.254
jotunheim.name
Russian Federation
malicious
93.189.42.6
svartalfheim.top
Russian Federation
malicious
52.101.40.29
microsoft-com.mail.protection.outlook.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths
C:\Windows\SysWOW64\tsqtjgfo
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsqtjgfo
ImagePath

Memdumps

Base Address
Regiontype
Protect
Malicious
2D20000
direct allocation
page execute and read and write
malicious
2C40000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2D40000
direct allocation
page read and write
malicious
2DA0000
direct allocation
page read and write
malicious
2D40000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
4D0000
remote allocation
page execute and read and write
malicious
415000
unkown
page execute read
863000
trusted library allocation
page read and write
A27000
heap
page read and write
863000
trusted library allocation
page read and write
837000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
383D000
stack
page read and write
2DA8000
heap
page execute and read and write
4DFC000
stack
page read and write
2E00000
heap
page read and write
84D000
trusted library allocation
page read and write
83D000
trusted library allocation
page read and write
84B000
trusted library allocation
page read and write
3199000
heap
page read and write
84D000
trusted library allocation
page read and write
400000
unkown
page readonly
83D000
trusted library allocation
page read and write
861000
trusted library allocation
page read and write
49C000
stack
page read and write
2B91000
unkown
page readonly
58E000
stack
page read and write
4C0000
heap
page read and write
5F0000
trusted library allocation
page read and write
482F000
stack
page read and write
397E000
stack
page read and write
84D000
trusted library allocation
page read and write
D5C000
stack
page read and write
53EF000
stack
page read and write
A7D000
stack
page read and write
2D90000
heap
page read and write
51EF000
stack
page read and write
33FF000
stack
page read and write
84D000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
2B8E000
unkown
page read and write
401000
unkown
page execute read
2D9E000
stack
page read and write
A3E000
stack
page read and write
50EF000
stack
page read and write
84D000
trusted library allocation
page read and write
32CE000
stack
page read and write
1F0000
trusted library allocation
page read and write
30000
heap
page read and write
19A000
stack
page read and write
84D000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
2B91000
unkown
page readonly
36AF000
stack
page read and write
2D50000
heap
page read and write
497E000
stack
page read and write
2D8C000
stack
page read and write
2C60000
heap
page read and write
863000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
2E1A000
heap
page read and write
831000
trusted library allocation
page read and write
486E000
stack
page read and write
30F0000
heap
page read and write
540000
trusted library allocation
page readonly
D80000
trusted library allocation
page read and write
2E40000
heap
page read and write
55CC000
stack
page read and write
414000
unkown
page execute and read and write
83D000
trusted library allocation
page read and write
D1D000
stack
page read and write
84D000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
38AE000
stack
page read and write
2BEE000
stack
page read and write
415000
unkown
page execute read
417000
unkown
page execute read
520000
heap
page read and write
84D000
trusted library allocation
page read and write
49B0000
heap
page read and write
863000
trusted library allocation
page read and write
9BE000
stack
page read and write
83D000
trusted library allocation
page read and write
97F000
stack
page read and write
84D000
trusted library allocation
page read and write
84D000
trusted library allocation
page read and write
48F0000
heap
page read and write
84D000
trusted library allocation
page read and write
2D9A000
heap
page read and write
19B000
stack
page read and write
D7E000
stack
page read and write
1F0000
trusted library allocation
page read and write
313E000
stack
page read and write
C0D000
stack
page read and write
838000
trusted library allocation
page read and write
2B8E000
unkown
page read and write
84D000
trusted library allocation
page read and write
84D000
trusted library allocation
page read and write
37A0000
heap
page read and write
2B91000
unkown
page readonly
48AE000
stack
page read and write
863000
trusted library allocation
page read and write
84D000
trusted library allocation
page read and write
B60000
heap
page read and write
822000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
48C0000
heap
page read and write
3AFE000
stack
page read and write
3ABE000
stack
page read and write
2B91000
unkown
page readonly
31C9000
heap
page read and write
419000
unkown
page write copy
BA0000
heap
page read and write
48C6000
heap
page read and write
4E3E000
stack
page read and write
861000
trusted library allocation
page read and write
848000
trusted library allocation
page read and write
54CE000
stack
page read and write
84D000
trusted library allocation
page read and write
2E33000
heap
page read and write
2DEF000
stack
page read and write
84D000
trusted library allocation
page read and write
84D000
trusted library allocation
page read and write
8F0000
heap
page read and write
2DB9000
heap
page read and write
2D0E000
stack
page read and write
863000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
84D000
trusted library allocation
page read and write
300F000
stack
page read and write
2F8F000
stack
page read and write
2E10000
heap
page read and write
317F000
stack
page read and write
D2F000
stack
page read and write
3330000
heap
page read and write
56C000
stack
page read and write
4ED0000
trusted library allocation
page read and write
812000
trusted library allocation
page read and write
2D10000
heap
page read and write
417000
unkown
page execute read
602000
heap
page read and write
CB0000
heap
page read and write
2C5F000
stack
page read and write
836000
trusted library allocation
page read and write
901000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
429000
unkown
page read and write
84D000
trusted library allocation
page read and write
84B000
trusted library allocation
page read and write
419000
unkown
page write copy
52D000
stack
page read and write
1F0000
heap
page read and write
33C0000
heap
page read and write
5E0000
heap
page read and write
84D000
trusted library allocation
page read and write
84D000
trusted library allocation
page read and write
2CBE000
stack
page read and write
9D000
stack
page read and write
2E23000
heap
page read and write
2DD7000
heap
page read and write
CEE000
stack
page read and write
93E000
stack
page read and write
45C000
stack
page read and write
3190000
heap
page read and write
419000
unkown
page write copy
D30000
heap
page read and write
3BFF000
stack
page read and write
4EE0000
heap
page read and write
863000
trusted library allocation
page read and write
417000
unkown
page execute read
30000
heap
page read and write
5D0000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
9FF000
stack
page read and write
4FEF000
stack
page read and write
834000
trusted library allocation
page read and write
401000
unkown
page execute read
863000
trusted library allocation
page read and write
863000
trusted library allocation
page read and write
84D000
trusted library allocation
page read and write
419000
unkown
page write copy
2C3E000
stack
page read and write
863000
trusted library allocation
page read and write
400000
unkown
page readonly
9D000
stack
page read and write
39BE000
stack
page read and write
417000
unkown
page execute read
530000
heap
page read and write
2E23000
heap
page execute and read and write
863000
trusted library allocation
page read and write
429000
unkown
page read and write
A20000
heap
page read and write
31C0000
heap
page read and write
863000
trusted library allocation
page read and write
387E000
stack
page read and write
52EF000
stack
page read and write
330F000
stack
page read and write
C4C000
stack
page read and write
493E000
stack
page read and write
83D000
trusted library allocation
page read and write
There are 194 hidden memdumps, click here to show them.