IOC Report
HmGUCvTQIacWu7Q.exe

loading gif

Files

File Path
Type
Category
Malicious
HmGUCvTQIacWu7Q.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HmGUCvTQIacWu7Q.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HmGUCvTQIacWu7Q.exe
"C:\Users\user\Desktop\HmGUCvTQIacWu7Q.exe"
malicious
C:\Users\user\Desktop\HmGUCvTQIacWu7Q.exe
"C:\Users\user\Desktop\HmGUCvTQIacWu7Q.exe"
malicious

URLs

Name
IP
Malicious
http://tempuri.org/x.xsd?MultiGames.Properties.Resources
unknown
https://account.dyn.com/
unknown
http://us2.smtp.mailhostbox.com
unknown
https://github.com/zuppao).
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.199.223

IPs

IP
Domain
Country
Malicious
208.91.198.143
unknown
United States
208.91.199.225
unknown
United States
208.91.199.223
us2.smtp.mailhostbox.com
United States
208.91.199.224
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
41D5000
trusted library allocation
page read and write
malicious
3779000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
30E1000
trusted library allocation
page read and write
malicious
312E000
trusted library allocation
page read and write
malicious
1510000
heap
page read and write
5B68000
trusted library allocation
page read and write
7C91000
trusted library allocation
page read and write
2640000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
276F000
stack
page read and write
BFE000
stack
page read and write
664C000
trusted library allocation
page read and write
A3D000
heap
page read and write
AB0000
heap
page read and write
24E2000
trusted library allocation
page read and write
1336000
trusted library allocation
page execute and read and write
2771000
trusted library allocation
page read and write
15CE000
stack
page read and write
4C30000
trusted library allocation
page read and write
AAE000
stack
page read and write
1500000
heap
page read and write
695E000
stack
page read and write
4DC0000
heap
page read and write
5546000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
10F9000
stack
page read and write
27BF000
trusted library allocation
page read and write
131D000
trusted library allocation
page execute and read and write
B4DE000
stack
page read and write
24D3000
trusted library allocation
page read and write
13AE000
heap
page read and write
55A0000
heap
page execute and read and write
6640000
trusted library allocation
page read and write
9B1000
heap
page read and write
679E000
stack
page read and write
4F80000
trusted library allocation
page read and write
66BD000
stack
page read and write
1398000
heap
page read and write
5020000
trusted library section
page read and write
13B9000
heap
page read and write
4CB2000
trusted library allocation
page read and write
29DA000
trusted library allocation
page read and write
1407000
heap
page read and write
1634000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
24FB000
trusted library allocation
page execute and read and write
D1D000
trusted library allocation
page execute and read and write
25B0000
trusted library allocation
page read and write
1380000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
48AC000
stack
page read and write
1320000
trusted library allocation
page read and write
30D0000
heap
page read and write
2530000
trusted library allocation
page read and write
1314000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1357000
trusted library allocation
page execute and read and write
631E000
stack
page read and write
3018000
trusted library allocation
page read and write
5526000
trusted library allocation
page read and write
24DD000
trusted library allocation
page execute and read and write
133A000
trusted library allocation
page execute and read and write
6666000
trusted library allocation
page read and write
1250000
heap
page read and write
14B0000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
5A4E000
stack
page read and write
559C000
stack
page read and write
6593000
heap
page read and write
D13000
trusted library allocation
page execute and read and write
552E000
trusted library allocation
page read and write
5ACE000
stack
page read and write
160C000
stack
page read and write
2510000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
553A000
trusted library allocation
page read and write
24E6000
trusted library allocation
page execute and read and write
27B4000
trusted library allocation
page read and write
4CA0000
heap
page read and write
5B7000
stack
page read and write
1390000
heap
page read and write
55B0000
heap
page read and write
621E000
stack
page read and write
4FE0000
trusted library section
page read and write
3771000
trusted library allocation
page read and write
145E000
heap
page read and write
594E000
stack
page read and write
6670000
trusted library allocation
page execute and read and write
4BA000
stack
page read and write
A1A000
heap
page read and write
95E000
stack
page read and write
6544000
heap
page read and write
3000000
heap
page execute and read and write
25B3000
trusted library allocation
page read and write
40E9000
trusted library allocation
page read and write
141F000
heap
page read and write
2590000
trusted library allocation
page execute and read and write
6547000
heap
page read and write
2540000
heap
page execute and read and write
845000
heap
page read and write
264F000
trusted library allocation
page read and write
7F660000
trusted library allocation
page execute and read and write
D20000
heap
page read and write
13C5000
heap
page read and write
400000
remote allocation
page execute and read and write
1490000
trusted library allocation
page execute and read and write
148E000
heap
page read and write
2660000
heap
page read and write
4FDE000
stack
page read and write
25AA000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
1355000
trusted library allocation
page execute and read and write
4BFB000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
27BD000
trusted library allocation
page read and write
1130000
heap
page read and write
2FFE000
stack
page read and write
1436000
heap
page read and write
4C16000
trusted library allocation
page read and write
554D000
trusted library allocation
page read and write
9B3000
heap
page read and write
6550000
heap
page read and write
24F7000
trusted library allocation
page execute and read and write
B79F000
stack
page read and write
24E0000
trusted library allocation
page read and write
258E000
stack
page read and write
6660000
trusted library allocation
page read and write
12D0000
heap
page read and write
4109000
trusted library allocation
page read and write
2655000
trusted library allocation
page read and write
5930000
heap
page read and write
47AB000
stack
page read and write
4C0E000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
1630000
trusted library allocation
page read and write
320000
unkown
page readonly
6540000
heap
page read and write
519D000
stack
page read and write
24F2000
trusted library allocation
page read and write
4C90000
heap
page execute and read and write
312C000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
970000
heap
page read and write
830000
heap
page read and write
5010000
trusted library section
page read and write
CFF000
stack
page read and write
4BF0000
trusted library allocation
page read and write
4DC3000
heap
page read and write
1650000
heap
page read and write
B8DE000
stack
page read and write
5090000
heap
page read and write
D10000
trusted library allocation
page read and write
5B2E000
stack
page read and write
124E000
stack
page read and write
4F6B000
stack
page read and write
5A8E000
stack
page read and write
675F000
stack
page read and write
1610000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
1332000
trusted library allocation
page read and write
40EA000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
97E000
heap
page read and write
B9DE000
stack
page read and write
D14000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
414B000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
B49E000
stack
page read and write
25FE000
stack
page read and write
1330000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
24EA000
trusted library allocation
page execute and read and write
4C11000
trusted library allocation
page read and write
55B3000
heap
page read and write
135B000
trusted library allocation
page execute and read and write
2610000
trusted library allocation
page read and write
650E000
stack
page read and write
12A5000
heap
page read and write
6542000
heap
page read and write
7EE0000
trusted library section
page read and write
DCA000
stack
page read and write
51DD000
stack
page read and write
B89E000
stack
page read and write
29DD000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page execute and read and write
5070000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
1313000
trusted library allocation
page execute and read and write
529F000
stack
page read and write
552B000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
1340000
heap
page read and write
2520000
trusted library allocation
page execute and read and write
840000
heap
page read and write
13C2000
heap
page read and write
55C0000
heap
page read and write
14D0000
trusted library allocation
page read and write
97A000
heap
page read and write
40E1000
trusted library allocation
page read and write
4BF4000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
4C1D000
trusted library allocation
page read and write
322000
unkown
page readonly
58FC000
stack
page read and write
1352000
trusted library allocation
page read and write
B69E000
stack
page read and write
594D000
heap
page read and write
14B7000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
4F90000
heap
page read and write
AF0000
heap
page read and write
506E000
stack
page read and write
5B60000
trusted library allocation
page read and write
1520000
trusted library allocation
page execute and read and write
12A0000
heap
page read and write
7F650000
trusted library allocation
page execute and read and write
6556000
heap
page read and write
820000
heap
page read and write
4D90000
trusted library allocation
page execute and read and write
1640000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
There are 218 hidden memdumps, click here to show them.