IOC Report
yMHzNMo3xY.exe

loading gif

Files

File Path
Type
Category
Malicious
yMHzNMo3xY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yMHzNMo3xY.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yMHzNMo3xY.exe
"C:\Users\user\Desktop\yMHzNMo3xY.exe"
malicious
C:\Users\user\Desktop\yMHzNMo3xY.exe
"C:\Users\user\Desktop\yMHzNMo3xY.exe"
malicious

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://cp5ua.hyperhost.ua
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://ocsp.sectigo.com0
unknown

Domains

Name
IP
Malicious
cp5ua.hyperhost.ua
91.235.128.141

IPs

IP
Domain
Country
Malicious
91.235.128.141
cp5ua.hyperhost.ua
Ukraine

Memdumps

Base Address
Regiontype
Protect
Malicious
29A1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3A5A000
trusted library allocation
page read and write
malicious
29EE000
trusted library allocation
page read and write
malicious
2A19000
trusted library allocation
page read and write
malicious
CA2000
heap
page read and write
CC0000
trusted library allocation
page read and write
67AF000
stack
page read and write
4EF0000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
F0F000
stack
page read and write
4F50000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
BEE000
stack
page read and write
4EE0000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page execute and read and write
11A4000
trusted library allocation
page read and write
CD6000
trusted library allocation
page execute and read and write
549E000
stack
page read and write
52EE000
stack
page read and write
55AE000
stack
page read and write
4F16000
trusted library allocation
page read and write
57E000
unkown
page readonly
4F34000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
CDA000
trusted library allocation
page execute and read and write
61B6000
heap
page read and write
27F7000
trusted library allocation
page execute and read and write
4F02000
trusted library allocation
page read and write
294E000
stack
page read and write
636D000
stack
page read and write
C8E000
stack
page read and write
61E8000
heap
page read and write
D65000
heap
page read and write
60B7000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
4FD1000
trusted library allocation
page read and write
27FE000
stack
page read and write
CB3000
trusted library allocation
page execute and read and write
4F90000
heap
page execute and read and write
7DA000
stack
page read and write
4FF7000
trusted library allocation
page read and write
2970000
heap
page read and write
AF8000
stack
page read and write
CC4000
trusted library allocation
page read and write
5190000
trusted library section
page read and write
512000
unkown
page readonly
67E0000
heap
page read and write
4FCE000
trusted library allocation
page read and write
52AE000
stack
page read and write
2820000
heap
page execute and read and write
2990000
heap
page read and write
5E8F000
stack
page read and write
C48000
heap
page read and write
6800000
trusted library allocation
page execute and read and write
D39000
heap
page read and write
60B0000
trusted library allocation
page read and write
29EC000
trusted library allocation
page read and write
501D000
trusted library allocation
page read and write
C05000
heap
page read and write
296E000
stack
page read and write
5015000
trusted library allocation
page read and write
C00000
heap
page read and write
67F0000
heap
page read and write
5159000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
2950000
trusted library allocation
page execute and read and write
6191000
heap
page read and write
11C6000
trusted library allocation
page execute and read and write
2970000
heap
page read and write
2960000
trusted library allocation
page read and write
5D8E000
stack
page read and write
936000
stack
page read and write
2810000
trusted library allocation
page read and write
11C2000
trusted library allocation
page read and write
4F1D000
trusted library allocation
page read and write
4FBB000
trusted library allocation
page read and write
B1E000
stack
page read and write
5BAF000
stack
page read and write
27F0000
trusted library allocation
page read and write
BA0000
heap
page read and write
400000
remote allocation
page execute and read and write
D18000
heap
page read and write
54FC000
trusted library allocation
page read and write
54DE000
stack
page read and write
27FB000
trusted library allocation
page execute and read and write
C5E000
heap
page read and write
5F60000
trusted library allocation
page read and write
5154000
trusted library allocation
page read and write
FEF000
stack
page read and write
4B1E000
stack
page read and write
11AD000
trusted library allocation
page execute and read and write
5FD0000
trusted library allocation
page execute and read and write
B45000
heap
page read and write
11BD000
trusted library allocation
page execute and read and write
27B0000
trusted library allocation
page read and write
B40000
heap
page read and write
4B7D000
stack
page read and write
530C000
stack
page read and write
C69000
heap
page read and write
512E000
stack
page read and write
FF0000
heap
page read and write
CFE000
heap
page read and write
5150000
trusted library allocation
page read and write
66AE000
stack
page read and write
606E000
stack
page read and write
C4E000
stack
page read and write
11A0000
trusted library allocation
page read and write
4F22000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
5020000
heap
page read and write
D33000
heap
page read and write
CF0000
heap
page read and write
54AE000
stack
page read and write
5F38000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
5080000
heap
page execute and read and write
4F43000
heap
page read and write
B40000
heap
page read and write
286E000
stack
page read and write
39A1000
trusted library allocation
page read and write
2A15000
trusted library allocation
page read and write
5FCE000
stack
page read and write
11A3000
trusted library allocation
page execute and read and write
67B0000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
535E000
stack
page read and write
D36000
heap
page read and write
CBD000
trusted library allocation
page execute and read and write
4FA0000
trusted library allocation
page read and write
61E1000
heap
page read and write
CA0000
trusted library allocation
page read and write
CB4000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
C96000
heap
page read and write
501A000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
545F000
stack
page read and write
A90000
heap
page read and write
520C000
stack
page read and write
C40000
heap
page read and write
5185000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
60AD000
stack
page read and write
A60000
heap
page read and write
980000
heap
page read and write
4EFE000
trusted library allocation
page read and write
4FD6000
trusted library allocation
page read and write
11D0000
heap
page read and write
D15000
heap
page read and write
4F11000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
6170000
heap
page read and write
4A7C000
stack
page read and write
2800000
heap
page execute and read and write
5140000
trusted library allocation
page read and write
11CA000
trusted library allocation
page execute and read and write
515E000
trusted library allocation
page read and write
5F80000
trusted library allocation
page execute and read and write
CF8000
heap
page read and write
4F1E000
stack
page read and write
CEB000
trusted library allocation
page execute and read and write
510000
unkown
page readonly
CB0000
trusted library allocation
page read and write
7F690000
trusted library allocation
page execute and read and write
D25000
heap
page read and write
5180000
trusted library allocation
page read and write
5CAE000
stack
page read and write
CE7000
heap
page read and write
C74000
heap
page read and write
4F40000
heap
page read and write
562E000
stack
page read and write
2981000
trusted library allocation
page read and write
27F5000
trusted library allocation
page execute and read and write
49A8000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
4EFB000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
C30000
trusted library allocation
page read and write
83B000
stack
page read and write
C76000
heap
page read and write
B90000
heap
page read and write
B20000
heap
page read and write
2A21000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
5F76000
trusted library allocation
page read and write
5008000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
55EE000
stack
page read and write
4FB4000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
4F0A000
trusted library allocation
page read and write
4F0E000
trusted library allocation
page read and write
4F20000
trusted library section
page read and write
ADE000
stack
page read and write
4F70000
heap
page read and write
290E000
stack
page read and write
CE7000
trusted library allocation
page execute and read and write
3A0C000
trusted library allocation
page read and write
EEE000
stack
page read and write
4FE5000
trusted library allocation
page read and write
There are 197 hidden memdumps, click here to show them.