IOC Report
uGfpJynSWM

loading gif

Files

File Path
Type
Category
Malicious
uGfpJynSWM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\uGfpJynSWM.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uGfpJynSWM.exe
"C:\Users\user\Desktop\uGfpJynSWM.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
malicious

URLs

Name
IP
Malicious
http://45.159.249.4/1474h.dll
unknown
malicious
http://45.159.249.4/1474stem32
unknown
malicious
https://climatejustice.social
unknown
malicious
http://45.159.249.4/1474N
unknown
malicious
http://45.159.249.4/=:
unknown
malicious
https://climatejustice.social/@ffoleg94
167.86.107.75
malicious
http://45.159.249.4/1474
unknown
malicious
http://45.159.249.4/147474R
unknown
malicious
http://45.159.249.4/1474b
unknown
malicious
http://45.159.249.4/1474l
unknown
malicious
http://45.159.249.4/1474u
unknown
malicious
https://climatejustice.social/
unknown
malicious
http://45.159.249.4/1474x
unknown
malicious
http://45.159.249.4:80
unknown
malicious
https://climatejustice.social;
unknown
https://climatejustice.social/.well-known/webfinger?resource=acct%3Affoleg94%40climatejustice.social
unknown
https://web.telegram.org
unknown
https://telegram.org/img/t_logo.png
unknown
https://funk.climatejustice.global
unknown
https://t.me/korstonsaleshttps://climatejustice.social/
unknown
https://climatejustice.social/users/ffoleg94/followers
unknown
https://github.com/mastodon/mastodon
unknown
https://climatejustice.social/users/ffoleg94/following
unknown
https://joinmastodon.org/apps
unknown
https://climatejustice.social/custom.css
unknown
https://climatejustice.social/tags/grunewald"
unknown
https://docs.joinmastodon.org/client/intro/
unknown
https://climatejustice.rocks
unknown
https://docs.joinmastodon.org/
unknown
https://climatejustice.social/avatars/original/missing.png
unknown
https://climatejustice.social/tags/gitlab"
unknown
https://climatejustice.social/users/ffoleg94
unknown
http://crl.microsoft.c
unknown
https://climatejustice.social/tags/gitea"
unknown
https://joinmastodon.org/
unknown
https://t.me/korstonsales
149.154.167.99
https://climatejustice.global
unknown
https://t.me/korstonsalesi
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
climatejustice.social
167.86.107.75
malicious
t.me
149.154.167.99

IPs

IP
Domain
Country
Malicious
167.86.107.75
climatejustice.social
Germany
malicious
45.159.249.4
unknown
Russian Federation
149.154.167.99
t.me
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2BEF000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3BE1000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
13B0000
trusted library allocation
page execute and read and write
A47907F000
stack
page read and write
847E779000
stack
page read and write
2AB71190000
heap
page read and write
2AB7084C000
heap
page read and write
4473000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
4D58000
heap
page read and write
400000
remote allocation
page execute and read and write
22370BF0000
heap
page read and write
C4EABF8000
stack
page read and write
2AB708E9000
heap
page read and write
22370D0F000
heap
page read and write
D1A59EE000
stack
page read and write
8B43BFB000
stack
page read and write
3E8B000
trusted library allocation
page read and write
1DEFA140000
heap
page read and write
1AF4564F000
heap
page read and write
459000
remote allocation
page execute and read and write
4D5E000
heap
page read and write
47F0000
remote allocation
page read and write
9442B6B000
stack
page read and write
9F76D77000
stack
page read and write
13C0000
heap
page read and write
4D47000
heap
page read and write
E7B000
trusted library allocation
page execute and read and write
1AF4564D000
heap
page read and write
2AB71196000
heap
page read and write
2A30000
heap
page execute and read and write
2AB71173000
heap
page read and write
1E5EF245000
heap
page read and write
5210000
trusted library allocation
page read and write
2AB71194000
heap
page read and write
2AB711D5000
heap
page read and write
1DEFA300000
heap
page read and write
2065EAAC000
heap
page read and write
F63000
heap
page read and write
2A00000
trusted library allocation
page read and write
4D48000
heap
page read and write
847E87F000
stack
page read and write
47F0000
remote allocation
page read and write
29F3000
trusted library allocation
page read and write
2AB71119000
heap
page read and write
2BE1000
trusted library allocation
page read and write
1FFA9280000
heap
page read and write
1AF45700000
heap
page read and write
22370D15000
heap
page read and write
47CE000
stack
page read and write
3C06000
trusted library allocation
page read and write
47F0000
remote allocation
page read and write
2AB71602000
heap
page read and write
1EBDF000
stack
page read and write
4D54000
heap
page read and write
4CF7000
heap
page read and write
4D5E000
heap
page read and write
4B30000
trusted library allocation
page read and write
A47927F000
stack
page read and write
C4EAF7F000
unkown
page read and write
2AB7084B000
heap
page read and write
2AB71194000
heap
page read and write
1AF45648000
heap
page read and write
1DEFA224000
heap
page read and write
1E5EF229000
heap
page read and write
5210000
trusted library allocation
page read and write
47F0000
remote allocation
page read and write
1EADF000
stack
page read and write
94431FB000
stack
page read and write
1AF45613000
heap
page read and write
2065F960000
trusted library allocation
page read and write
459000
remote allocation
page execute and read and write
1AF45670000
heap
page read and write
4D01000
heap
page read and write
1AF4564C000
heap
page read and write
2065F9B0000
trusted library allocation
page read and write
1E5EF28F000
heap
page read and write
4070000
trusted library allocation
page read and write
1AF45E02000
trusted library allocation
page read and write
4D5F000
heap
page read and write
E44000
trusted library allocation
page read and write
E67000
trusted library allocation
page execute and read and write
A4790FF000
stack
page read and write
9F76DFE000
stack
page read and write
2AB71196000
heap
page read and write
D1A5DFE000
stack
page read and write
2AB71196000
heap
page read and write
4CEF000
heap
page read and write
2AB70640000
heap
page read and write
4C10000
heap
page read and write
1AF45708000
heap
page read and write
2AB71186000
heap
page read and write
2AB71196000
heap
page read and write
3F85000
trusted library allocation
page read and write
4C50000
heap
page read and write
2AB71191000
heap
page read and write
22370CFF000
heap
page read and write
2AB70FA0000
remote allocation
page read and write
51BE000
stack
page read and write
7310000
trusted library allocation
page read and write
847E7FE000
stack
page read and write
4D4E000
heap
page read and write
2AB71192000
heap
page read and write
2AB711B2000
heap
page read and write
8B43DFF000
stack
page read and write
2C18000
trusted library allocation
page read and write
2AB71602000
heap
page read and write
22370CF7000
heap
page read and write
4C6D000
stack
page read and write
8B0000
heap
page read and write
2B3E000
stack
page read and write
1E8DA000
stack
page read and write
C4EB17C000
stack
page read and write
2AB708DA000
heap
page read and write
2AB708C1000
heap
page read and write
1DEFA213000
heap
page read and write
5217000
trusted library allocation
page read and write
4D57000
heap
page read and write
1AF45655000
heap
page read and write
2AB7111B000
heap
page read and write
4B40000
heap
page read and write
94433FE000
stack
page read and write
2AB7119C000
heap
page read and write
9F76A7E000
stack
page read and write
4D0D000
heap
page read and write
2065EA49000
heap
page read and write
5060000
heap
page read and write
1E5EF9C0000
trusted library allocation
page read and write
1DEFA29B000
heap
page read and write
47F0000
remote allocation
page read and write
42EA000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
1ED80000
remote allocation
page read and write
2AB71194000
heap
page read and write
2A2F000
trusted library allocation
page read and write
9F76EFE000
stack
page read and write
4D02000
heap
page read and write
2AB711D3000
heap
page read and write
EDE000
stack
page read and write
1AF45681000
heap
page read and write
22370CFF000
heap
page read and write
4D0A000
heap
page read and write
C4EB078000
stack
page read and write
4D0E000
heap
page read and write
1AF45654000
heap
page read and write
8B4379D000
stack
page read and write
832000
unkown
page readonly
1ED80000
remote allocation
page read and write
1AF4568F000
heap
page read and write
847E6FE000
stack
page read and write
22370AC0000
heap
page read and write
1FFA9402000
heap
page read and write
D1A61FE000
stack
page read and write
F3B000
heap
page read and write
1E5EF290000
heap
page read and write
847E67E000
stack
page read and write
4D65000
heap
page read and write
29E0000
trusted library allocation
page read and write
8B4371E000
stack
page read and write
4BE0000
heap
page read and write
4D59000
heap
page read and write
2065EAAC000
heap
page read and write
2AB71644000
heap
page read and write
C4EAAFB000
stack
page read and write
2AB7119F000
heap
page read and write
1AF45657000
heap
page read and write
F0C000
heap
page read and write
4D7E000
stack
page read and write
2AB71186000
heap
page read and write
2AB7119C000
heap
page read and write
2A00000
trusted library allocation
page read and write
A478DFA000
stack
page read and write
2AB708AC000
heap
page read and write
1EBE0000
trusted library section
page readonly
2AB70908000
heap
page read and write
1FFA9C02000
trusted library allocation
page read and write
22370CE2000
heap
page read and write
2065EAA4000
heap
page read and write
2AB71171000
heap
page read and write
4C70000
trusted library allocation
page read and write
22370CF4000
heap
page read and write
D1A5EFB000
stack
page read and write
446A000
trusted library allocation
page read and write
EE9000
heap
page read and write
5220000
trusted library allocation
page read and write
1E5EF24D000
heap
page read and write
1E5EF266000
heap
page read and write
2065F6F0000
trusted library allocation
page read and write
2AB71192000
heap
page read and write
2A00000
trusted library allocation
page read and write
22370D11000
heap
page read and write
1AF45676000
heap
page read and write
2AB71199000
heap
page read and write
4D09000
heap
page read and write
C4EACF7000
stack
page read and write
1E5EF23C000
heap
page read and write
1DEFA308000
heap
page read and write
2065F950000
trusted library allocation
page read and write
1FFA9441000
heap
page read and write
2AB711AF000
heap
page read and write
847E3AB000
stack
page read and write
22370D01000
heap
page read and write
22370C10000
heap
page read and write
2AB7119A000
heap
page read and write
F20000
heap
page read and write
2AB7119C000
heap
page read and write
9F7679F000
stack
page read and write
4D75000
heap
page read and write
2065F940000
heap
page readonly
C4EA7CE000
stack
page read and write
2AB7118B000
heap
page read and write
2AB7119E000
heap
page read and write
E0E000
stack
page read and write
22370CDB000
heap
page read and write
4D6A000
heap
page read and write
94430FB000
stack
page read and write
22370CD0000
heap
page read and write
22370F35000
heap
page read and write
1AF453F0000
heap
page read and write
1AF45650000
heap
page read and write
2A20000
trusted library allocation
page read and write
9F76FFE000
stack
page read and write
2AB705D0000
heap
page read and write
1AF45652000
heap
page read and write
2065EA60000
heap
page read and write
4660000
trusted library allocation
page readonly
46CC000
stack
page read and write
22370F30000
heap
page read and write
1AF453E0000
heap
page read and write
2AB70740000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
4D57000
heap
page read and write
1DEFAC02000
trusted library allocation
page read and write
2AB71196000
heap
page read and write
1EC4E000
stack
page read and write
4D6B000
heap
page read and write
830000
unkown
page readonly
1ED80000
remote allocation
page read and write
1DEFA251000
heap
page read and write
2A00000
trusted library allocation
page read and write
4D50000
heap
page read and write
2A20000
trusted library allocation
page read and write
1DEFA266000
heap
page read and write
980000
trusted library allocation
page read and write
1E5EF302000
heap
page read and write
1E5EF200000
heap
page read and write
2AB711C3000
heap
page read and write
2AB708EC000
heap
page read and write
E34000
trusted library allocation
page read and write
2065F680000
trusted library allocation
page read and write
A479179000
stack
page read and write
4D52000
heap
page read and write
4D53000
heap
page read and write
2AB71602000
heap
page read and write
1AF45629000
heap
page read and write
D1A60FF000
stack
page read and write
2065EB60000
trusted library allocation
page read and write
847E8F9000
stack
page read and write
2065EAAC000
heap
page read and write
1DEFA302000
heap
page read and write
2AB71192000
heap
page read and write
1DEFA200000
heap
page read and write
2AB70800000
heap
page read and write
1E5EFA02000
trusted library allocation
page read and write
2AB71602000
heap
page read and write
4D75000
heap
page read and write
2AB71602000
heap
page read and write
1E9DA000
stack
page read and write
4D59000
heap
page read and write
2AB711AD000
heap
page read and write
2065EA45000
heap
page read and write
4D54000
heap
page read and write
1DEFA260000
heap
page read and write
1FFA9453000
heap
page read and write
2AB71602000
heap
page read and write
2AB708C8000
heap
page read and write
1FFA92F0000
heap
page read and write
1AF45659000
heap
page read and write
2AB71100000
heap
page read and write
1DEFA0E0000
heap
page read and write
C4EAEFF000
stack
page read and write
1E5EF0B0000
heap
page read and write
51C0000
trusted library section
page read and write
1E5EF120000
heap
page read and write
43B2000
trusted library allocation
page read and write
4D66000
heap
page read and write
2AB7119E000
heap
page read and write
2AB70813000
heap
page read and write
D1A5C7E000
stack
page read and write
9F0000
heap
page read and write
9F76B7C000
stack
page read and write
2AB7084D000
heap
page read and write
2AB71186000
heap
page read and write
2065EA40000
heap
page read and write
1AF45450000
heap
page read and write
2A00000
trusted library allocation
page read and write
2A0E000
trusted library allocation
page read and write
E6A000
trusted library allocation
page execute and read and write
22370CF6000
heap
page read and write
4D09000
heap
page read and write
2A10000
heap
page execute and read and write
1FFA9500000
heap
page read and write
4D6B000
heap
page read and write
4650000
heap
page read and write
E40000
trusted library allocation
page read and write
EE0000
heap
page read and write
43E5000
trusted library allocation
page read and write
415B000
trusted library allocation
page read and write
2AB71002000
heap
page read and write
1EEBF000
stack
page read and write
2AB7119E000
heap
page read and write
F73000
heap
page read and write
2AB71182000
heap
page read and write
2AB7119A000
heap
page read and write
2AB71602000
heap
page read and write
1DEFA27C000
heap
page read and write
2AB70871000
heap
page read and write
884000
unkown
page readonly
1AF45649000
heap
page read and write
2AB71186000
heap
page read and write
2AB71186000
heap
page read and write
9CE000
stack
page read and write
504E000
stack
page read and write
C4EA74E000
stack
page read and write
2AB711AD000
heap
page read and write
10DF000
stack
page read and write
2AB70829000
heap
page read and write
2AB71186000
heap
page read and write
E77000
trusted library allocation
page execute and read and write
2065F670000
trusted library allocation
page read and write
22370D17000
heap
page read and write
9F76C7B000
stack
page read and write
C4EA6CC000
stack
page read and write
1E5EF284000
heap
page read and write
1FFA9513000
heap
page read and write
8B43EFE000
stack
page read and write
1E5EF22E000
heap
page read and write
1FFA9290000
heap
page read and write
9F5000
heap
page read and write
1FFA9413000
heap
page read and write
22370D01000
heap
page read and write
29F0000
trusted library allocation
page read and write
A4792FC000
stack
page read and write
47F0000
remote allocation
page read and write
4223000
trusted library allocation
page read and write
47F0000
remote allocation
page read and write
2A00000
trusted library allocation
page read and write
2AB7119E000
heap
page read and write
2AB71186000
heap
page read and write
400000
remote allocation
page execute and read and write
2AB7118B000
heap
page read and write
2AB71190000
heap
page read and write
1AF45600000
heap
page read and write
2AB71600000
heap
page read and write
1AF4564B000
heap
page read and write
2065E8B0000
trusted library allocation
page read and write
47F0000
remote allocation
page read and write
2AB71123000
heap
page read and write
2AB70902000
heap
page read and write
1FFA9429000
heap
page read and write
2AB71188000
heap
page read and write
2A20000
trusted library allocation
page read and write
13AE000
stack
page read and write
2065F930000
trusted library allocation
page read and write
2AB7083C000
heap
page read and write
4D57000
heap
page read and write
1E5EF213000
heap
page read and write
5216000
trusted library allocation
page read and write
1AF45550000
trusted library allocation
page read and write
1EDBE000
stack
page read and write
D1A5D7B000
stack
page read and write
1DEFA23C000
heap
page read and write
2B80000
trusted library section
page read and write
4D06000
heap
page read and write
2AB708AC000
heap
page read and write
1AF45702000
heap
page read and write
4D50000
heap
page read and write
4D75000
heap
page read and write
47F0000
remote allocation
page read and write
2AB71620000
heap
page read and write
2B80000
trusted library allocation
page read and write
2AB7084F000
heap
page read and write
2AB711C2000
heap
page read and write
459000
remote allocation
page execute and read and write
8B43AFB000
stack
page read and write
4D56000
heap
page read and write
4B45000
heap
page read and write
22370CFF000
heap
page read and write
2AB71196000
heap
page read and write
2BD0000
heap
page read and write
22370D01000
heap
page read and write
2A07000
trusted library allocation
page read and write
1DEFA0D0000
heap
page read and write
2065EA68000
heap
page read and write
4D5E000
heap
page read and write
1E5EF300000
heap
page read and write
1FFA93F0000
trusted library allocation
page read and write
2AB71602000
heap
page read and write
2C58000
trusted library allocation
page read and write
521A000
trusted library allocation
page read and write
4D56000
heap
page read and write
A4791F9000
stack
page read and write
9442BEF000
stack
page read and write
2AB71175000
heap
page read and write
2AB71152000
heap
page read and write
2AB71171000
heap
page read and write
2AB711A0000
heap
page read and write
1FFA9400000
heap
page read and write
2AB708B6000
heap
page read and write
2AB70FA0000
remote allocation
page read and write
8B4369C000
stack
page read and write
1ED4E000
stack
page read and write
E50000
heap
page read and write
2065E8A0000
heap
page read and write
1AF4565A000
heap
page read and write
2A00000
trusted library allocation
page read and write
E33000
trusted library allocation
page execute and read and write
2B7E000
stack
page read and write
4D47000
heap
page read and write
C4EADFB000
stack
page read and write
11DE000
stack
page read and write
4D47000
heap
page read and write
22370CF2000
heap
page read and write
1DEFA313000
heap
page read and write
2AB70913000
heap
page read and write
2AB711A7000
heap
page read and write
8B43CF7000
stack
page read and write
D1A5FF7000
stack
page read and write
2A20000
trusted library allocation
page read and write
2AB70916000
heap
page read and write
1E5EF202000
heap
page read and write
2AB711A2000
heap
page read and write
2AB70882000
heap
page read and write
1E5EF0C0000
heap
page read and write
5213000
trusted library allocation
page read and write
1E5EF308000
heap
page read and write
CF5000
stack
page read and write
1FFA9502000
heap
page read and write
2A00000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
4D4E000
heap
page read and write
1E5EF260000
heap
page read and write
4D07000
heap
page read and write
47C6000
stack
page read and write
91C000
stack
page read and write
4C70000
trusted library allocation
page read and write
4D66000
heap
page read and write
2AB7119D000
heap
page read and write
500E000
stack
page read and write
4FCD000
stack
page read and write
4D66000
heap
page read and write
2AB7119C000
heap
page read and write
2AB70FA0000
remote allocation
page read and write
2AB71193000
heap
page read and write
3CC5000
trusted library allocation
page read and write
2AB71603000
heap
page read and write
2AB705E0000
heap
page read and write
9F7671B000
stack
page read and write
1AF45713000
heap
page read and write
2AB708EB000
heap
page read and write
1E5EF313000
heap
page read and write
2065EA00000
heap
page read and write
2AB708E7000
heap
page read and write
4C97000
heap
page read and write
4D5F000
heap
page read and write
E4D000
trusted library allocation
page execute and read and write
1FFA947B000
heap
page read and write
3E9A000
trusted library allocation
page read and write
1AF4563C000
heap
page read and write
94432FE000
stack
page read and write
2AB708FA000
heap
page read and write
3D91000
trusted library allocation
page read and write
4D0E000
heap
page read and write
22370CE7000
heap
page read and write
4D4F000
heap
page read and write
4C90000
heap
page read and write
22370CE6000
heap
page read and write
1FFA946B000
heap
page read and write
2065EACC000
heap
page read and write
F51000
heap
page read and write
2065F6E0000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
2065E9E0000
heap
page read and write
D1A596C000
stack
page read and write
1DEFA170000
trusted library allocation
page read and write
There are 482 hidden memdumps, click here to show them.