IOC Report
Gxm6KI51wl.exe

loading gif

Files

File Path
Type
Category
Malicious
Gxm6KI51wl.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Gxm6KI51wl.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\d3d9x.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Gxm6KI51wl.exe
"C:\Users\user\Desktop\Gxm6KI51wl.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
time.windows.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
802000
remote allocation
page execute and read and write
malicious
6D86B000
unkown
page read and write
malicious
AB8000
heap
page read and write
4CD0000
trusted library allocation
page read and write
880000
heap
page read and write
E07000
trusted library allocation
page execute and read and write
DAE000
stack
page read and write
4DF0000
heap
page read and write
E6E000
stack
page read and write
8C0000
heap
page read and write
AF1000
heap
page read and write
E70000
heap
page read and write
4DFC000
heap
page read and write
63C000
stack
page read and write
4EF0000
trusted library allocation
page read and write
2C0000
unkown
page readonly
2C2000
unkown
page readonly
4C72000
trusted library allocation
page read and write
47AE000
stack
page read and write
2870000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
FA0000
heap
page read and write
AC7000
heap
page read and write
4DF8000
heap
page read and write
5960000
heap
page read and write
4C6D000
trusted library allocation
page read and write
A3B000
heap
page read and write
6D841000
unkown
page execute read
538D000
stack
page read and write
4F70000
trusted library section
page readonly
48FC000
stack
page read and write
800000
remote allocation
page execute and read and write
50C0000
trusted library allocation
page execute and read and write
27F0000
heap
page execute and read and write
4C10000
trusted library allocation
page read and write
A18000
heap
page read and write
4FB5000
heap
page read and write
6A50000
heap
page read and write
B90000
trusted library allocation
page read and write
4C95000
trusted library allocation
page read and write
B77000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
5950000
heap
page read and write
4FA0000
trusted library allocation
page read and write
A5F000
heap
page read and write
A33000
trusted library allocation
page execute and read and write
A4E000
heap
page read and write
4D20000
heap
page read and write
A80000
heap
page read and write
B4D000
trusted library allocation
page execute and read and write
4C44000
trusted library allocation
page read and write
85E000
remote allocation
page execute and read and write
724D000
stack
page read and write
F90000
trusted library allocation
page read and write
523E000
stack
page read and write
4C80000
trusted library allocation
page read and write
AB3000
heap
page read and write
4F6B000
stack
page read and write
EBD000
stack
page read and write
738E000
stack
page read and write
B66000
trusted library allocation
page execute and read and write
50B0000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
4CAE000
trusted library allocation
page read and write
A0E000
stack
page read and write
25DE000
stack
page read and write
9CE000
stack
page read and write
7140000
heap
page execute and read and write
4FC0000
trusted library allocation
page execute and read and write
980000
heap
page read and write
4C40000
trusted library allocation
page read and write
DEF000
stack
page read and write
4C4B000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
A4E000
heap
page read and write
9CE000
stack
page read and write
BA0000
heap
page read and write
4FB0000
heap
page read and write
A40000
heap
page read and write
B6A000
trusted library allocation
page execute and read and write
B5D000
trusted library allocation
page execute and read and write
41B3000
trusted library allocation
page read and write
4D5E000
stack
page read and write
6D840000
unkown
page readonly
26BB000
trusted library allocation
page read and write
26A0000
heap
page execute and read and write
850000
heap
page read and write
770000
heap
page read and write
AB7000
heap
page read and write
4CA0000
trusted library allocation
page read and write
597000
stack
page read and write
27D0000
trusted library allocation
page read and write
728E000
stack
page read and write
89E000
stack
page read and write
3F68000
trusted library allocation
page read and write
4C61000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
4C5E000
trusted library allocation
page read and write
276E000
stack
page read and write
2801000
trusted library allocation
page read and write
985000
heap
page read and write
527E000
stack
page read and write
FA7000
heap
page read and write
F80000
trusted library allocation
page execute and read and write
EC0000
heap
page read and write
36B5000
trusted library allocation
page read and write
AAA000
heap
page read and write
ABD000
heap
page read and write
26BF000
trusted library allocation
page read and write
5280000
heap
page read and write
4DD0000
trusted library allocation
page execute and read and write
4E32000
heap
page read and write
714F000
stack
page read and write
AD3000
heap
page read and write
6D864000
unkown
page readonly
73B000
stack
page read and write
A6B000
heap
page read and write
2690000
trusted library allocation
page read and write
A0E000
stack
page read and write
B44000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
B7B000
trusted library allocation
page execute and read and write
863F000
stack
page read and write
6D8EF000
unkown
page readonly
4B20000
heap
page read and write
4F80000
heap
page read and write
6D8E5000
unkown
page execute read
A2F000
heap
page read and write
718E000
stack
page read and write
4C66000
trusted library allocation
page read and write
27B0000
heap
page read and write
B60000
trusted library allocation
page read and write
26B9000
trusted library allocation
page read and write
51FE000
stack
page read and write
AC2000
heap
page read and write
853E000
stack
page read and write
B40000
trusted library allocation
page read and write
2680000
trusted library allocation
page execute and read and write
2660000
heap
page read and write
E0B000
trusted library allocation
page execute and read and write
711E000
stack
page read and write
4C90000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
A48000
heap
page read and write
4F90000
heap
page read and write
A20000
trusted library allocation
page read and write
B53000
trusted library allocation
page read and write
8C5000
heap
page read and write
CD4000
trusted library allocation
page read and write
27AC000
stack
page read and write
4C8F000
trusted library allocation
page read and write
A74000
heap
page read and write
CE0000
heap
page read and write
B43000
trusted library allocation
page execute and read and write
3801000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
4FD0000
heap
page execute and read and write
4C4E000
trusted library allocation
page read and write
499000
stack
page read and write
B72000
trusted library allocation
page read and write
4AF0000
heap
page read and write
4DE0000
heap
page read and write
873E000
stack
page read and write
4CB0000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
F7E000
stack
page read and write
4B10000
heap
page read and write
4C5E000
stack
page read and write
CAE000
stack
page read and write
960000
heap
page read and write
4DE3000
heap
page read and write
4E0C000
heap
page read and write
There are 163 hidden memdumps, click here to show them.