IOC Report
rJlMhHdHP2mDzMGx.exe

loading gif

Files

File Path
Type
Category
Malicious
rJlMhHdHP2mDzMGx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rJlMhHdHP2mDzMGx.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rJlMhHdHP2mDzMGx.exe
"C:\Users\user\Desktop\rJlMhHdHP2mDzMGx.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious

URLs

Name
IP
Malicious
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://mail.gazityres.com
unknown

Domains

Name
IP
Malicious
mail.gazityres.com
203.169.24.24
malicious
bg.microsoft.map.fastly.net
199.232.210.172
fp2e7a.wpc.phicdn.net
192.229.211.108
windowsupdatebg.s.llnwi.net
69.164.42.0
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
203.169.24.24
mail.gazityres.com
Bangladesh
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
4855000
trusted library allocation
page read and write
malicious
2E59000
trusted library allocation
page read and write
malicious
2E2F000
trusted library allocation
page read and write
malicious
2DE1000
trusted library allocation
page read and write
malicious
4EE0000
heap
page read and write
27D0000
heap
page read and write
49EC000
stack
page read and write
5175000
heap
page read and write
5440000
trusted library section
page read and write
5170000
heap
page read and write
2D70000
trusted library allocation
page read and write
2D50000
heap
page read and write
626C000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
549E000
stack
page read and write
1106000
trusted library allocation
page execute and read and write
4E5D000
trusted library allocation
page read and write
6EE0F000
unkown
page readonly
1098000
heap
page read and write
1050000
trusted library allocation
page read and write
FD5000
heap
page read and write
7F0000
trusted library allocation
page read and write
1127000
heap
page read and write
CBA0000
heap
page read and write
5F1E000
stack
page read and write
2D2E000
stack
page read and write
107D000
trusted library allocation
page execute and read and write
2980000
trusted library allocation
page read and write
6B40000
heap
page read and write
2E55000
trusted library allocation
page read and write
6EDF0000
unkown
page readonly
56BF000
stack
page read and write
10AE000
heap
page read and write
4F7E000
stack
page read and write
63C0000
trusted library allocation
page read and write
7C0000
heap
page read and write
B90000
heap
page read and write
6EE06000
unkown
page readonly
10F3000
trusted library allocation
page read and write
51E0000
heap
page read and write
2D40000
heap
page execute and read and write
4E62000
trusted library allocation
page read and write
2A95000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
6CEE000
stack
page read and write
723E000
stack
page read and write
4E4E000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
B84000
heap
page read and write
B6F000
heap
page read and write
1290000
trusted library allocation
page read and write
3E44000
trusted library allocation
page read and write
39B1000
trusted library allocation
page read and write
6B4E000
heap
page read and write
3A19000
trusted library allocation
page read and write
1063000
trusted library allocation
page execute and read and write
637E000
stack
page read and write
62DD000
stack
page read and write
1102000
trusted library allocation
page read and write
5450000
trusted library section
page read and write
129B000
trusted library allocation
page execute and read and write
5110000
trusted library section
page readonly
28DE000
stack
page read and write
5470000
trusted library allocation
page read and write
B4D000
trusted library allocation
page execute and read and write
2D7B000
trusted library allocation
page read and write
E1F000
stack
page read and write
5A40000
heap
page read and write
6290000
trusted library allocation
page execute and read and write
2D30000
trusted library allocation
page read and write
2DD0000
heap
page read and write
71A000
stack
page read and write
51F0000
heap
page execute and read and write
5480000
trusted library allocation
page execute and read and write
57FE000
stack
page read and write
592000
unkown
page readonly
B5E000
heap
page read and write
108A000
trusted library allocation
page execute and read and write
4E30000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
3DE1000
trusted library allocation
page read and write
1340000
trusted library allocation
page execute and read and write
1120000
heap
page read and write
432A000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
97C0000
trusted library allocation
page read and write
780000
heap
page read and write
B92000
heap
page read and write
4F10000
trusted library allocation
page read and write
6160000
heap
page read and write
29B1000
trusted library allocation
page read and write
C0C000
heap
page read and write
1060000
trusted library allocation
page read and write
4E34000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
51C0000
trusted library section
page read and write
2D96000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
10C6000
heap
page read and write
B40000
trusted library allocation
page read and write
29A0000
heap
page execute and read and write
51BE000
stack
page read and write
F5E000
stack
page read and write
63D0000
trusted library allocation
page read and write
4ED0000
heap
page read and write
6EE0D000
unkown
page read and write
CB9D000
stack
page read and write
6DEF000
stack
page read and write
62E0000
trusted library allocation
page execute and read and write
1117000
heap
page read and write
6286000
trusted library allocation
page read and write
BE0000
heap
page read and write
1370000
trusted library allocation
page read and write
6B40000
trusted library allocation
page execute and read and write
5140000
trusted library allocation
page read and write
28F0000
trusted library allocation
page execute and read and write
6EDF1000
unkown
page execute read
2D7E000
trusted library allocation
page read and write
B50000
heap
page read and write
936C000
trusted library allocation
page read and write
63BE000
stack
page read and write
2990000
trusted library allocation
page read and write
297E000
stack
page read and write
4DE8000
trusted library allocation
page read and write
12FE000
stack
page read and write
133C000
stack
page read and write
7251000
heap
page read and write
2A93000
trusted library allocation
page read and write
97AE000
stack
page read and write
1064000
trusted library allocation
page read and write
1040000
heap
page read and write
1185000
heap
page read and write
1086000
trusted library allocation
page execute and read and write
1082000
trusted library allocation
page read and write
FD0000
heap
page read and write
114D000
heap
page read and write
713E000
stack
page read and write
4E51000
trusted library allocation
page read and write
106D000
trusted library allocation
page execute and read and write
707E000
stack
page read and write
590000
unkown
page readonly
29FC000
trusted library allocation
page read and write
5A50000
heap
page read and write
4F7B000
stack
page read and write
2C09000
trusted library allocation
page read and write
1113000
heap
page read and write
CE9E000
stack
page read and write
39B9000
trusted library allocation
page read and write
6F90000
trusted library section
page read and write
1380000
heap
page read and write
724F000
heap
page read and write
28E7000
trusted library allocation
page read and write
111B000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
2D82000
trusted library allocation
page read and write
724C000
heap
page read and write
FF8D0000
trusted library allocation
page execute and read and write
6E00000
heap
page read and write
55BC000
stack
page read and write
1360000
trusted library allocation
page read and write
10C3000
heap
page read and write
7A0000
heap
page read and write
1110000
trusted library allocation
page read and write
2995000
trusted library allocation
page read and write
1090000
heap
page read and write
CD9E000
stack
page read and write
5848000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
2E37000
trusted library allocation
page read and write
7240000
heap
page read and write
4EFA000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
5160000
trusted library allocation
page execute and read and write
AF7000
stack
page read and write
2D9D000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
1107000
heap
page read and write
6AFF000
stack
page read and write
279E000
stack
page read and write
52C0000
heap
page read and write
1100000
trusted library allocation
page read and write
2D8E000
trusted library allocation
page read and write
4E3B000
trusted library allocation
page read and write
5130000
heap
page read and write
5120000
heap
page read and write
6270000
trusted library allocation
page read and write
539D000
stack
page read and write
7247000
heap
page read and write
70BD000
stack
page read and write
4AEC000
stack
page read and write
E5E000
stack
page read and write
4E70000
trusted library allocation
page read and write
B29000
stack
page read and write
10BA000
heap
page read and write
6260000
trusted library allocation
page read and write
7FC20000
trusted library allocation
page execute and read and write
4E90000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
6EE0D000
unkown
page read and write
63C7000
trusted library allocation
page read and write
C99E000
stack
page read and write
4F00000
trusted library allocation
page execute and read and write
6B30000
heap
page read and write
790000
heap
page read and write
4E56000
trusted library allocation
page read and write
53FC000
stack
page read and write
976E000
stack
page read and write
2750000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
EF8000
stack
page read and write
4ED3000
heap
page read and write
B44000
trusted library allocation
page read and write
69FE000
stack
page read and write
10F0000
trusted library allocation
page read and write
B43000
trusted library allocation
page execute and read and write
6B00000
trusted library allocation
page read and write
57BE000
stack
page read and write
1297000
trusted library allocation
page execute and read and write
2E61000
trusted library allocation
page read and write
657E000
stack
page read and write
545E000
stack
page read and write
110A000
trusted library allocation
page execute and read and write
293E000
stack
page read and write
1353000
heap
page read and write
1350000
heap
page read and write
5840000
trusted library allocation
page read and write
116F000
heap
page read and write
3E09000
trusted library allocation
page read and write
1117000
trusted library allocation
page execute and read and write
2D8A000
trusted library allocation
page read and write
CA9E000
stack
page read and write
1292000
trusted library allocation
page read and write
27A0000
trusted library allocation
page execute and read and write
4415000
trusted library allocation
page read and write
54B0000
heap
page execute and read and write
4EF2000
trusted library allocation
page read and write
10FD000
trusted library allocation
page execute and read and write
5420000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
61CC000
heap
page read and write
B90000
heap
page read and write
6280000
trusted library allocation
page read and write
1295000
trusted library allocation
page execute and read and write
B95000
heap
page read and write
1112000
trusted library allocation
page read and write
B3E000
stack
page read and write
There are 239 hidden memdumps, click here to show them.