IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\zjlxnt.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\anaictjg.cte
data
dropped
C:\Users\user\AppData\Local\Temp\nsi8BD7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\pqknsgems.bq
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\zjlxnt.exe
"C:\Users\user\AppData\Local\Temp\zjlxnt.exe" C:\Users\user\AppData\Local\Temp\anaictjg.cte
malicious
C:\Users\user\AppData\Local\Temp\zjlxnt.exe
C:\Users\user\AppData\Local\Temp\zjlxnt.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://ocsp.sectigo.com0A
unknown
https://sectigo.com/CPS0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://us2.smtp.mailhostbox.com
unknown
http://crt.sectigo?
unknown
http://crl.usertru
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.199.224

IPs

IP
Domain
Country
Malicious
208.91.199.224
us2.smtp.mailhostbox.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2391000
trusted library allocation
page read and write
malicious
5780000
trusted library allocation
page read and write
199000
stack
page read and write
274B000
heap
page read and write
2170000
trusted library allocation
page execute and read and write
2180000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
21F0000
heap
page read and write
59A000
heap
page read and write
53CB000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
4802000
direct allocation
page execute and read and write
5230000
trusted library allocation
page read and write
53E3000
trusted library allocation
page read and write
58A0000
heap
page read and write
53D0000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
600000
heap
page read and write
8CF000
stack
page read and write
2409000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
55E000
stack
page read and write
5890000
trusted library allocation
page read and write
5E5000
heap
page read and write
5400000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
1A280000
direct allocation
page read and write
5900000
trusted library allocation
page read and write
401000
unkown
page execute read
80D000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
5870000
heap
page read and write
5760000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
21CE000
stack
page read and write
5680000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
810000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
47D0000
trusted library section
page read and write
490000
heap
page read and write
30000
heap
page read and write
53D0000
trusted library allocation
page read and write
59EE000
stack
page read and write
400000
system
page execute and read and write
4C0000
heap
page read and write
5210000
trusted library allocation
page read and write
50CF000
stack
page read and write
4880000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
30000
heap
page read and write
53E0000
unkown
page read and write
5790000
trusted library allocation
page read and write
4D0000
trusted library section
page read and write
53E0000
trusted library allocation
page read and write
58F000
heap
page read and write
1A39B000
direct allocation
page read and write
53E0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
53E8000
unkown
page read and write
427000
unkown
page read and write
53D0000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
1A280000
direct allocation
page read and write
5860000
heap
page read and write
5210000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
48A0000
trusted library allocation
page read and write
48A0000
trusted library allocation
page read and write
227D000
stack
page read and write
5680000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
4850000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
1A206000
direct allocation
page read and write
5210000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5D5000
heap
page read and write
53E0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
48D0000
heap
page execute and read and write
5C7000
heap
page read and write
238F000
stack
page read and write
826000
trusted library allocation
page execute and read and write
5680000
trusted library allocation
page read and write
53E2000
trusted library allocation
page read and write
4E0000
trusted library allocation
page read and write
5680000
unkown
page read and write
53C0000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
640000
heap
page read and write
5B9000
heap
page read and write
1A39B000
direct allocation
page read and write
5EC000
heap
page read and write
520F000
stack
page read and write
53C0000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5C7000
heap
page read and write
5230000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
1A206000
direct allocation
page read and write
686000
heap
page read and write
1A280000
direct allocation
page read and write
53D0000
trusted library allocation
page read and write
65E000
heap
page read and write
400000
unkown
page readonly
57C0000
unkown
page read and write
23E9000
trusted library allocation
page read and write
40C000
unkown
page read and write
57B0000
trusted library allocation
page read and write
211E000
stack
page read and write
1A206000
direct allocation
page read and write
58B0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
5E7E000
stack
page read and write
5400000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
1A206000
direct allocation
page read and write
418000
unkown
page write copy
5400000
trusted library allocation
page read and write
5E8000
heap
page read and write
5680000
unkown
page read and write
58A3000
heap
page read and write
56E000
stack
page read and write
53C0000
trusted library allocation
page read and write
401000
unkown
page execute read
5680000
unkown
page read and write
5400000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5A2F000
stack
page read and write
570000
direct allocation
page execute and read and write
5760000
trusted library allocation
page read and write
400000
unkown
page readonly
573F000
trusted library allocation
page read and write
1A39F000
direct allocation
page read and write
4E8E000
stack
page read and write
5400000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
5A30000
remote allocation
page read and write
1F0000
heap
page read and write
5680000
trusted library allocation
page read and write
510000
heap
page read and write
5210000
trusted library allocation
page read and write
688000
heap
page read and write
5210000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
A10000
direct allocation
page read and write
53E0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
2419000
trusted library allocation
page read and write
1A0F0000
direct allocation
page read and write
5870000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
67D000
heap
page read and write
1A39B000
direct allocation
page read and write
5210000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
1A39F000
direct allocation
page read and write
53D0000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
660000
heap
page read and write
1A0F0000
direct allocation
page read and write
2280000
heap
page read and write
1A39B000
direct allocation
page read and write
53EA000
trusted library allocation
page read and write
5E4000
heap
page read and write
4F7000
heap
page read and write
53E0000
unkown
page read and write
5888000
trusted library allocation
page read and write
5730000
trusted library allocation
page execute and read and write
510E000
stack
page read and write
5730000
trusted library allocation
page read and write
43B000
unkown
page readonly
53D0000
trusted library allocation
page read and write
1A39F000
direct allocation
page read and write
411000
unkown
page readonly
53D0000
trusted library allocation
page read and write
7CE000
stack
page read and write
5780000
trusted library allocation
page read and write
418000
unkown
page write copy
4F8F000
stack
page read and write
5690000
trusted library allocation
page read and write
5EC000
heap
page read and write
53DD000
trusted library allocation
page read and write
48C0000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5A30000
remote allocation
page read and write
53F0000
trusted library allocation
page read and write
78D000
stack
page read and write
401000
unkown
page execute read
53D0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
19C000
stack
page read and write
1A39B000
direct allocation
page read and write
5EB000
heap
page read and write
5210000
trusted library allocation
page read and write
400000
unkown
page readonly
5E0000
heap
page read and write
5451000
heap
page read and write
598000
heap
page read and write
23FC000
trusted library allocation
page read and write
57A6000
trusted library allocation
page read and write
1A206000
direct allocation
page read and write
5680000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
1A280000
direct allocation
page read and write
425000
unkown
page read and write
1A206000
direct allocation
page read and write
5680000
trusted library allocation
page read and write
484D000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
67D000
heap
page read and write
5410000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
437000
unkown
page read and write
53D0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5DB000
heap
page read and write
5400000
trusted library allocation
page read and write
82A000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
5459000
heap
page read and write
408000
unkown
page readonly
5780000
unkown
page read and write
520000
heap
page read and write
1A0F0000
direct allocation
page read and write
53E0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
686000
heap
page read and write
A0F000
stack
page read and write
83F000
stack
page read and write
5680000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
66F000
heap
page read and write
9B000
stack
page read and write
53E0000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
5460000
heap
page read and write
58E0000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
1A39F000
direct allocation
page read and write
5780000
trusted library allocation
page read and write
5D3E000
stack
page read and write
21A8000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
304F000
stack
page read and write
5EC000
heap
page read and write
53D0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
2190000
heap
page execute and read and write
5730000
trusted library allocation
page read and write
93F000
stack
page read and write
803000
trusted library allocation
page execute and read and write
53F0000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
30000
heap
page read and write
57A0000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
837000
trusted library allocation
page execute and read and write
543E000
stack
page read and write
408000
unkown
page readonly
53D1000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
526000
heap
page read and write
5780000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
4844000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
53F0000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
400000
unkown
page readonly
43B000
unkown
page readonly
57F0000
trusted library allocation
page read and write
66F000
heap
page read and write
4FCE000
stack
page read and write
5210000
trusted library allocation
page read and write
590000
heap
page read and write
5770000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
2416000
trusted library allocation
page read and write
5458000
heap
page read and write
887000
heap
page read and write
48A0000
trusted library allocation
page read and write
5AB000
heap
page read and write
880000
heap
page read and write
48A0000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
19A000
stack
page read and write
482C000
direct allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
448E000
stack
page read and write
53D0000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
273F000
stack
page read and write
5E8000
heap
page read and write
5210000
trusted library allocation
page read and write
1A0F0000
direct allocation
page read and write
2130000
heap
page read and write
7FE50000
trusted library allocation
page execute and read and write
57D0000
trusted library allocation
page read and write
401000
unkown
page execute read
48A0000
trusted library allocation
page read and write
5EB000
heap
page read and write
5730000
unkown
page read and write
5400000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
9B000
stack
page read and write
602E000
stack
page read and write
4842000
trusted library allocation
page read and write
4864000
trusted library allocation
page read and write
4F0000
heap
page read and write
58D0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
1A280000
direct allocation
page read and write
5680000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
648000
heap
page read and write
53D4000
trusted library allocation
page read and write
4847000
trusted library allocation
page read and write
240D000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
1A206000
direct allocation
page read and write
4858000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
83B000
trusted library allocation
page execute and read and write
5210000
trusted library allocation
page read and write
5EC000
heap
page read and write
411000
unkown
page readonly
1A280000
direct allocation
page read and write
5250000
trusted library allocation
page read and write
529000
heap
page read and write
4874000
trusted library allocation
page read and write
612F000
stack
page read and write
2360000
heap
page read and write
1A0F0000
direct allocation
page read and write
411000
unkown
page readonly
5400000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
217E000
stack
page read and write
5210000
trusted library allocation
page read and write
1A39F000
direct allocation
page read and write
4855000
trusted library allocation
page read and write
5442000
heap
page read and write
53D0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
485C000
trusted library allocation
page read and write
832000
trusted library allocation
page read and write
1A0F0000
direct allocation
page read and write
1A280000
direct allocation
page read and write
53E0000
trusted library allocation
page read and write
1A0F0000
direct allocation
page read and write
53E0000
trusted library allocation
page read and write
4834000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
9D000
stack
page read and write
5400000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
58F0000
unkown
page read and write
53E0000
trusted library allocation
page read and write
90E000
stack
page read and write
4B0000
trusted library section
page read and write
5870000
trusted library allocation
page read and write
804000
trusted library allocation
page read and write
483B000
trusted library allocation
page read and write
5736000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
401000
unkown
page execute read
5400000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
418000
unkown
page read and write
5400000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
40A000
unkown
page write copy
5400000
trusted library allocation
page read and write
5210000
trusted library allocation
page execute and read and write
5870000
trusted library allocation
page read and write
400000
unkown
page readonly
5740000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5680000
unkown
page read and write
5400000
trusted library allocation
page read and write
1F0000
heap
page read and write
5410000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
4800000
direct allocation
page execute and read and write
484A000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
AD0000
heap
page read and write
5D7E000
stack
page read and write
5EC000
heap
page read and write
5440000
heap
page read and write
5400000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
5A30000
remote allocation
page read and write
1A39B000
direct allocation
page read and write
58C0000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
1A39F000
direct allocation
page read and write
40A000
unkown
page read and write
216E000
stack
page read and write
440000
heap
page read and write
3391000
trusted library allocation
page read and write
1A39B000
direct allocation
page read and write
1A39F000
direct allocation
page read and write
53E0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5A60000
heap
page read and write
5680000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
4861000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5AE000
stack
page read and write
263F000
stack
page read and write
53D0000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
48A0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
81D000
trusted library allocation
page execute and read and write
5240000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
There are 468 hidden memdumps, click here to show them.