IOC Report
HHGHJJUILn.exe

loading gif

Files

File Path
Type
Category
Malicious
HHGHJJUILn.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\vbsqlite3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HHGHJJUILn.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\A8EC33334FD0FF0355\LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 3
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HHGHJJUILn.exe
C:\Users\user\Desktop\HHGHJJUILn.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
malicious

URLs

Name
IP
Malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://search.yahoo.com?fr=crmas_sfp
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schema.org
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://showip.net/
unknown
https://www.openstreetmap.org/copyright
unknown
https://unpkg.com/leaflet
unknown
https://search.yahoo.com?fr=crmas_sfpf
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
http://www.maxmind.com
unknown
https://showip.net/?checkip=
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
unknown
http://showip.net/
162.55.60.2
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
showip.net
162.55.60.2

IPs

IP
Domain
Country
Malicious
162.55.60.2
showip.net
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
remote allocation
page execute and read and write
malicious
252D012D000
trusted library allocation
page read and write
malicious
2BD49C3D000
heap
page read and write
1BA9E04E000
heap
page read and write
1DE6D590000
heap
page read and write
1BA9E042000
heap
page read and write
252BE0F0000
trusted library allocation
page read and write
1DE6E002000
heap
page read and write
69D4000
heap
page read and write
252BE030000
heap
page read and write
252BE0F0000
trusted library allocation
page read and write
25DD0402000
heap
page read and write
2BD49C00000
heap
page read and write
777E000
stack
page read and write
1BA9E030000
heap
page read and write
252BF9A1000
trusted library allocation
page read and write
27A3E150000
heap
page read and write
1DE6D896000
heap
page read and write
252BDC30000
unkown
page readonly
252BE120000
trusted library allocation
page read and write
B81B97B000
stack
page read and write
27A3E2CB000
heap
page read and write
1BA9E02D000
heap
page read and write
23277C45000
heap
page read and write
1DE6E1C8000
heap
page read and write
69A9B7F000
stack
page read and write
B74DC7D000
stack
page read and write
508F000
heap
page read and write
252BE0D0000
trusted library section
page read and write
50A3000
heap
page read and write
252D0003000
trusted library allocation
page read and write
252BE080000
trusted library allocation
page read and write
27A3E245000
heap
page read and write
507C000
heap
page read and write
252BE105000
heap
page read and write
54618FE000
stack
page read and write
C55487F000
stack
page read and write
1DE6E223000
heap
page read and write
23277C3A000
heap
page read and write
25DD0240000
heap
page read and write
69A99FB000
stack
page read and write
252BE0E0000
trusted library allocation
page read and write
6FA000
stack
page read and write
508F000
heap
page read and write
5091000
heap
page read and write
252BE0E0000
trusted library allocation
page read and write
252BDF9A000
heap
page read and write
B81BD7F000
stack
page read and write
74FD000
stack
page read and write
4FFA000
heap
page read and write
1DE6E102000
heap
page read and write
1BA9E057000
heap
page read and write
27A3E302000
heap
page read and write
1DE6D5A0000
heap
page read and write
5A0000
remote allocation
page read and write
27A3E2BD000
heap
page read and write
7FFDC86C2000
trusted library allocation
page read and write
252BE0E0000
trusted library allocation
page read and write
5461FFE000
stack
page read and write
1BA9E074000
heap
page read and write
50B8000
heap
page read and write
252BE130000
trusted library allocation
page read and write
43F000
remote allocation
page execute and read and write
23277C3C000
heap
page read and write
C553F6C000
stack
page read and write
4FE7000
heap
page read and write
2BD49C5A000
heap
page read and write
1BA9E07B000
heap
page read and write
1BA9DE80000
heap
page read and write
C55467F000
stack
page read and write
1DE6D700000
trusted library allocation
page read and write
27A3ED39000
heap
page read and write
25DD043C000
heap
page read and write
5057000
heap
page read and write
6BC0000
heap
page read and write
1DE6D829000
heap
page read and write
226E8FE000
stack
page read and write
27A3ED13000
heap
page read and write
27A3E268000
heap
page read and write
1BA9E075000
heap
page read and write
2BD49D13000
heap
page read and write
400000
remote allocation
page execute and read and write
69A9C7A000
stack
page read and write
1DE6E200000
heap
page read and write
23277AE0000
heap
page read and write
C55457C000
stack
page read and write
C554A7F000
stack
page read and write
54620FF000
stack
page read and write
5085000
heap
page read and write
252CFB18000
trusted library allocation
page read and write
7FFDC87E0000
trusted library allocation
page execute and read and write
2BD49C02000
heap
page read and write
1DE6E230000
heap
page read and write
7FFDC86CD000
trusted library allocation
page execute and read and write
252BE0E0000
trusted library allocation
page read and write
1BA9E05A000
heap
page read and write
1DE6D600000
heap
page read and write
B81B7FC000
stack
page read and write
7FFDC870C000
trusted library allocation
page execute and read and write
1BA9E802000
trusted library allocation
page read and write
25DD03D0000
remote allocation
page read and write
1BA9E079000
heap
page read and write
252BDDBE000
unkown
page readonly
5461BFE000
stack
page read and write
252CF9A3000
trusted library allocation
page read and write
F4601FE000
stack
page read and write
50BC000
heap
page read and write
23277C4C000
heap
page read and write
252CFA81000
trusted library allocation
page read and write
252BDC32000
unkown
page readonly
508A000
heap
page read and write
680000
heap
page read and write
50C1000
heap
page read and write
69D0000
heap
page read and write
252CFF77000
trusted library allocation
page read and write
252CFC58000
trusted library allocation
page read and write
69A9F7F000
stack
page read and write
2BD49C29000
heap
page read and write
5087000
heap
page read and write
5461EFE000
stack
page read and write
50BC000
heap
page read and write
50BD000
heap
page read and write
252CFECA000
trusted library allocation
page read and write
252BE110000
trusted library allocation
page read and write
6A49000
heap
page read and write
252D00AB000
trusted library allocation
page read and write
226EB7F000
stack
page read and write
252BDC30000
unkown
page readonly
7A10000
trusted library allocation
page read and write
252BE0E0000
trusted library allocation
page read and write
2BD4A402000
trusted library allocation
page read and write
25DD0413000
heap
page read and write
763E000
stack
page read and write
23278402000
trusted library allocation
page read and write
25DD0230000
heap
page read and write
252BDF3C000
heap
page read and write
690000
trusted library allocation
page readonly
7FFDC86B4000
trusted library allocation
page read and write
1DE6E197000
heap
page read and write
226EC7E000
stack
page read and write
1BA9E05F000
heap
page read and write
B81B77F000
stack
page read and write
7FFDC86BD000
trusted library allocation
page execute and read and write
252CFBC9000
trusted library allocation
page read and write
252D8350000
heap
page execute and read and write
69A931C000
stack
page read and write
23277C29000
heap
page read and write
50B9000
heap
page read and write
252BDF59000
heap
page read and write
69A9E7C000
stack
page read and write
1DE6E1D3000
heap
page read and write
1BA9E03D000
heap
page read and write
7FFDC87D5000
trusted library allocation
page read and write
27A3E2CE000
heap
page read and write
252BE0F0000
trusted library allocation
page read and write
6AB6000
heap
page read and write
1DE6D843000
heap
page read and write
50AF000
heap
page read and write
23277C02000
heap
page read and write
F4600FE000
stack
page read and write
226E87E000
stack
page read and write
252BDDC0000
heap
page read and write
1DE6E154000
heap
page read and write
50B7000
heap
page read and write
7FFDC87D0000
trusted library allocation
page read and write
5461CFD000
stack
page read and write
1DE6E122000
heap
page read and write
1DE6D83C000
heap
page read and write
440000
remote allocation
page execute and read and write
25DD045C000
heap
page read and write
2BD49C8A000
heap
page read and write
252BDD15000
unkown
page readonly
1DE6D86A000
heap
page read and write
1BA9E065000
heap
page read and write
B81B08C000
stack
page read and write
C55437B000
stack
page read and write
787F000
stack
page read and write
50BA000
heap
page read and write
252BDF6C000
heap
page read and write
B74D57B000
stack
page read and write
B74D9FE000
stack
page read and write
1DE6D9B9000
heap
page read and write
1BA9E07E000
heap
page read and write
252BE0D0000
trusted library allocation
page read and write
1BA9E03B000
heap
page read and write
8A5000
heap
page read and write
1DE6E143000
heap
page read and write
6A2D000
stack
page read and write
1DE6E213000
heap
page read and write
1BA9E058000
heap
page read and write
252BE160000
trusted library allocation
page read and write
1DE6D865000
heap
page read and write
252CF9A5000
trusted library allocation
page read and write
252BE0E0000
trusted library allocation
page read and write
5461DFE000
stack
page read and write
25DD03D0000
remote allocation
page read and write
23277C26000
heap
page read and write
25DD0429000
heap
page read and write
1DE6D874000
heap
page read and write
23277D02000
heap
page read and write
B81BA7C000
stack
page read and write
6AC0000
trusted library allocation
page read and write
50BA000
heap
page read and write
2BD49C65000
heap
page read and write
252BE0B4000
trusted library allocation
page read and write
C554B7F000
stack
page read and write
4BF0000
trusted library allocation
page execute read
1BA9E07A000
heap
page read and write
5461AFF000
stack
page read and write
252CF9A1000
trusted library allocation
page read and write
1DE6E122000
heap
page read and write
252BDF98000
heap
page read and write
1DE6E1D0000
heap
page read and write
1BA9E035000
heap
page read and write
B81BB7E000
stack
page read and write
23277A90000
heap
page read and write
252BE120000
trusted library allocation
page read and write
C55497F000
stack
page read and write
50AF000
heap
page read and write
50BA000
heap
page read and write
1BA9E083000
heap
page read and write
252BE050000
heap
page read and write
2BD49A80000
heap
page read and write
1DE6D88A000
heap
page read and write
252BE100000
heap
page read and write
507A000
heap
page read and write
B81B8FD000
stack
page read and write
23277BE0000
trusted library allocation
page read and write
1BA9DEF0000
heap
page read and write
1DE6E100000
heap
page read and write
B81BC7C000
stack
page read and write
B81B4FC000
stack
page read and write
23277A80000
heap
page read and write
69C0000
trusted library allocation
page read and write
27A3E213000
heap
page read and write
50A8000
heap
page read and write
50BD000
heap
page read and write
1DE6D720000
trusted library allocation
page read and write
2BD49C65000
heap
page read and write
252D8363000
heap
page read and write
1DE6D9E5000
heap
page read and write
1BA9E063000
heap
page read and write
5085000
heap
page read and write
B74DB7E000
stack
page read and write
252BE0C0000
heap
page execute and read and write
F4602F9000
stack
page read and write
27A3E289000
heap
page read and write
50C4000
heap
page read and write
1DE6E227000
heap
page read and write
507C000
heap
page read and write
C554C7F000
stack
page read and write
25DD0400000
heap
page read and write
2BD49C6D000
heap
page read and write
7FFDC86DD000
trusted library allocation
page execute and read and write
1BA9E013000
heap
page read and write
7FFDC8770000
trusted library allocation
page execute and read and write
1BA9DFF0000
trusted library allocation
page read and write
50B0000
heap
page read and write
1DE6E171000
heap
page read and write
C55447E000
stack
page read and write
50C2000
heap
page read and write
2BD49D02000
heap
page read and write
79BF000
stack
page read and write
252BE0A0000
trusted library allocation
page read and write
50BD000
heap
page read and write
226E5BB000
stack
page read and write
1DE6D855000
heap
page read and write
252BE150000
trusted library allocation
page read and write
252CFD91000
trusted library allocation
page read and write
5059000
heap
page read and write
F45FA8B000
stack
page read and write
27A3EC02000
heap
page read and write
252BDD15000
unkown
page readonly
50A9000
heap
page read and write
F45FFFA000
stack
page read and write
252CF9A9000
trusted library allocation
page read and write
50CE000
heap
page read and write
27A3E0E0000
heap
page read and write
69A977B000
stack
page read and write
25DD03D0000
remote allocation
page read and write
890000
trusted library allocation
page read and write
1BA9E02E000
heap
page read and write
1BA9E035000
heap
page read and write
1DE6D85B000
heap
page read and write
69A0000
trusted library allocation
page read and write
252BE0E0000
trusted library allocation
page read and write
7FFDC86D0000
trusted library allocation
page read and write
1BA9E077000
heap
page read and write
252D0000000
trusted library allocation
page read and write
2BD49C13000
heap
page read and write
27A3E22A000
heap
page read and write
50B1000
heap
page read and write
69A9A79000
stack
page read and write
252BDC43000
unkown
page readonly
25DD0C02000
trusted library allocation
page read and write
4FE0000
heap
page read and write
252CFB15000
trusted library allocation
page read and write
252D836C000
heap
page read and write
2BD49A90000
heap
page read and write
50C3000
heap
page read and write
23277C00000
heap
page read and write
23277C36000
heap
page read and write
27A3ED00000
heap
page read and write
50CC000
heap
page read and write
5067000
heap
page read and write
252BE170000
heap
page read and write
1BA9E056000
heap
page read and write
1BA9E060000
heap
page read and write
252BDDAA000
unkown
page readonly
1DE6D893000
heap
page read and write
6990000
heap
page read and write
506F000
heap
page read and write
252BE150000
trusted library allocation
page read and write
252CF9AE000
trusted library allocation
page read and write
252BF9FC000
trusted library allocation
page read and write
1BA9DE90000
heap
page read and write
B74DA7E000
stack
page read and write
6BF0000
heap
page read and write
23277C2E000
heap
page read and write
54615D6000
stack
page read and write
252BE1F5000
heap
page read and write
27A3E270000
heap
page read and write
B81B67E000
stack
page read and write
505D000
heap
page read and write
1BA9E040000
heap
page read and write
27A3E284000
heap
page read and write
252BDDBC000
unkown
page readonly
252BDC32000
unkown
page readonly
2BD49C77000
heap
page read and write
1BA9E026000
heap
page read and write
C55477D000
stack
page read and write
27A3E313000
heap
page read and write
1BA9E06C000
heap
page read and write
78BE000
stack
page read and write
226ED7F000
stack
page read and write
252D8173000
heap
page read and write
2BD49C75000
heap
page read and write
5085000
heap
page read and write
5096000
heap
page read and write
54619FF000
stack
page read and write
5090000
heap
page read and write
1BA9E032000
heap
page read and write
25DD0502000
heap
page read and write
25DD03A0000
trusted library allocation
page read and write
27A3E2C4000
heap
page read and write
8A0000
heap
page read and write
252BDF30000
heap
page read and write
50BA000
heap
page read and write
6A40000
heap
page read and write
252BE140000
heap
page read and write
252CFEC7000
trusted library allocation
page read and write
1BA9E000000
heap
page read and write
1BA9E061000
heap
page read and write
50B0000
heap
page read and write
7FFDC86C0000
trusted library allocation
page read and write
6AB0000
heap
page read and write
1DE6D98C000
heap
page read and write
69A98FF000
stack
page read and write
7FFDC86C4000
trusted library allocation
page read and write
252BE1F0000
heap
page read and write
252BDDBE000
unkown
page readonly
69A9D7E000
stack
page read and write
5006000
heap
page read and write
7FFDC87D2000
trusted library allocation
page read and write
252D8167000
heap
page read and write
1BA9E049000
heap
page read and write
23277C13000
heap
page read and write
252BE180000
trusted library allocation
page read and write
23277C52000
heap
page read and write
1DE6D88E000
heap
page read and write
252BDF00000
heap
page read and write
252CFD8E000
trusted library allocation
page read and write
2BD49BF0000
trusted library allocation
page read and write
1DE6D913000
heap
page read and write
25DD02A0000
heap
page read and write
1BA9E05C000
heap
page read and write
7FFDC8796000
trusted library allocation
page execute and read and write
1DE6E202000
heap
page read and write
75FA000
stack
page read and write
2BD49AF0000
heap
page read and write
252CFC56000
trusted library allocation
page read and write
1BA9E068000
heap
page read and write
27A3E180000
trusted library allocation
page read and write
1BA9E102000
heap
page read and write
B74DEFD000
stack
page read and write
252BE130000
trusted library allocation
page read and write
69A9EFE000
stack
page read and write
252BDDBC000
unkown
page readonly
7FA000
stack
page read and write
1DE6D876000
heap
page read and write
252D8160000
heap
page read and write
252BE0D0000
trusted library allocation
page read and write
B74D8FE000
stack
page read and write
27A3E200000
heap
page read and write
1BA9E029000
heap
page read and write
506F000
heap
page read and write
252BDF6E000
heap
page read and write
6C00000
trusted library allocation
page read and write
1DE6D813000
heap
page read and write
1DE6E1C0000
heap
page read and write
1DE6D800000
heap
page read and write
27A3E0F0000
heap
page read and write
7FF46BA90000
trusted library allocation
page execute and read and write
5055000
heap
page read and write
252BE110000
trusted library allocation
page read and write
50B5000
heap
page read and write
5087000
heap
page read and write
5076000
heap
page read and write
252BF9FA000
trusted library allocation
page read and write
2BD49C72000
heap
page read and write
7FFDC8760000
trusted library allocation
page read and write
50A9000
heap
page read and write
773E000
stack
page read and write
B74DDFD000
stack
page read and write
252BDDAA000
unkown
page readonly
1DE6E1B2000
heap
page read and write
B74DCFF000
stack
page read and write
252BE0B0000
trusted library allocation
page read and write
6A8D000
stack
page read and write
252CFD06000
trusted library allocation
page read and write
226EA7E000
stack
page read and write
252CFE3E000
trusted library allocation
page read and write
252BDC43000
unkown
page readonly
There are 413 hidden memdumps, click here to show them.