IOC Report
tGm4SuP0sz.exe

loading gif

Files

File Path
Type
Category
Malicious
tGm4SuP0sz.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tGm4SuP0sz.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\d3d9.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tGm4SuP0sz.exe
"C:\Users\user\Desktop\tGm4SuP0sz.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
justifycanddidatewd.shop
malicious
employeedscratshj.shop
malicious
marathonbeedksow.shop
malicious
pleasurenarrowsdla.shop
malicious
richardflorespoew.shop
malicious
falseaudiencekd.shop
malicious
feighminoritsjda.shop
malicious
strwawrunnygjwu.shop
malicious
raiseboltskdlwpow.shop
malicious
https://pleasurenarrowsdla.shop/
unknown
https://richardflorespoew.shop/apii
unknown
https://feighminoritsjda.shop/api1
unknown
https://falseaudiencekd.shop/api
unknown
https://richardflorespoew.shop/apiy
unknown
https://richardflorespoew.shop/api7
unknown
https://strwawrunnygjwu.shop//l
unknown
https://richardflorespoew.shop/api
unknown
https://justifycanddidatewd.shop/
unknown
https://pleasurenarrowsdla.shop/api?
unknown
https://raiseboltskdlwpow.shop/B
unknown
https://employeedscratshj.shop/api
unknown
https://richardflorespoew.shop/0
unknown
https://richardflorespoew.shop/
unknown
https://strwawrunnygjwu.shop/api
unknown
https://richardflorespoew.shop/g
unknown
https://justifycanddidatewd.shop/api
unknown
https://feighminoritsjda.shop/apiK
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
justifycanddidatewd.shop
unknown
malicious
richardflorespoew.shop
unknown
malicious
strwawrunnygjwu.shop
unknown
malicious
falseaudiencekd.shop
unknown
malicious
raiseboltskdlwpow.shop
unknown
malicious
employeedscratshj.shop
unknown
malicious
marathonbeedksow.shop
unknown
malicious
feighminoritsjda.shop
unknown
malicious
pleasurenarrowsdla.shop
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6D36F000
unkown
page read and write
malicious
48F0000
remote allocation
page read and write
4690000
heap
page read and write
AD0000
heap
page read and write
479D000
stack
page read and write
87C000
stack
page read and write
3210000
trusted library allocation
page read and write
AA0000
heap
page read and write
468E000
stack
page read and write
B2F000
heap
page read and write
4D7E000
stack
page read and write
1410000
heap
page read and write
1790000
trusted library allocation
page execute and read and write
16E0000
trusted library allocation
page read and write
146E000
stack
page read and write
10AC000
stack
page read and write
9E0000
heap
page read and write
16E3000
trusted library allocation
page execute and read and write
6D368000
unkown
page readonly
A80000
heap
page read and write
48DE000
stack
page read and write
44F000
remote allocation
page execute and read and write
B22000
heap
page read and write
4334000
trusted library allocation
page read and write
11A8000
stack
page read and write
15F8000
heap
page read and write
6D351000
unkown
page execute read
546E000
stack
page read and write
4C7E000
stack
page read and write
400000
remote allocation
page execute and read and write
57B0000
trusted library allocation
page read and write
6D350000
unkown
page readonly
15D0000
heap
page read and write
E92000
unkown
page readonly
1485000
heap
page read and write
A75000
heap
page read and write
1605000
heap
page read and write
2DAE000
stack
page read and write
16E4000
trusted library allocation
page read and write
1613000
heap
page read and write
15DE000
heap
page read and write
4339000
trusted library allocation
page read and write
159E000
stack
page read and write
18AF000
stack
page read and write
177E000
stack
page read and write
AF6000
heap
page read and write
47DD000
stack
page read and write
48F0000
remote allocation
page read and write
31F0000
heap
page read and write
1710000
trusted library allocation
page read and write
332F000
stack
page read and write
16ED000
trusted library allocation
page execute and read and write
1480000
heap
page read and write
1420000
heap
page read and write
2EAE000
stack
page read and write
16D0000
trusted library allocation
page read and write
57E0000
trusted library allocation
page execute and read and write
17A0000
heap
page read and write
15DA000
heap
page read and write
1717000
trusted library allocation
page execute and read and write
AD8000
heap
page read and write
48F0000
remote allocation
page read and write
A2E000
stack
page read and write
B0E000
heap
page read and write
101C000
unkown
page readonly
97D000
stack
page read and write
4331000
trusted library allocation
page read and write
15FC000
heap
page read and write
536D000
stack
page read and write
A70000
heap
page read and write
3213000
trusted library allocation
page read and write
19AF000
stack
page read and write
E90000
unkown
page readonly
A6E000
stack
page read and write
3220000
heap
page execute and read and write
15B0000
heap
page read and write
AFA000
heap
page read and write
1780000
heap
page read and write
6D3BA000
unkown
page readonly
171B000
trusted library allocation
page execute and read and write
3331000
trusted library allocation
page read and write
16F4000
trusted library allocation
page read and write
There are 72 hidden memdumps, click here to show them.