IOC Report
QUG24-2003700542005180.exe

loading gif

Files

File Path
Type
Category
Malicious
QUG24-2003700542005180.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\isochronally
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUG24-2003700542005180.exe
"C:\Users\user\Desktop\QUG24-2003700542005180.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\QUG24-2003700542005180.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/mgravell/protobuf-net
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3F11000
trusted library allocation
page read and write
malicious
5480000
trusted library section
page read and write
malicious
2F11000
trusted library allocation
page read and write
malicious
2DD5000
trusted library allocation
page read and write
41AC000
heap
page read and write
41B1000
heap
page read and write
414A000
heap
page read and write
3122000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
14A7000
trusted library allocation
page read and write
129D000
trusted library allocation
page execute and read and write
4739000
direct allocation
page read and write
93E000
stack
page read and write
F37000
stack
page read and write
2D80000
heap
page execute and read and write
14B0000
trusted library allocation
page read and write
14B2000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
40DE000
heap
page read and write
5AD2000
heap
page read and write
41AC000
heap
page read and write
3B42000
heap
page read and write
10CE000
stack
page read and write
12A8000
heap
page read and write
14BA000
trusted library allocation
page execute and read and write
3150000
trusted library allocation
page read and write
2FA0000
heap
page read and write
4AB000
unkown
page readonly
41AC000
heap
page read and write
5630000
trusted library section
page read and write
2DD0000
trusted library allocation
page read and write
3171000
trusted library allocation
page read and write
47A9000
direct allocation
page read and write
473D000
direct allocation
page read and write
5AD0000
heap
page read and write
56D0000
trusted library section
page read and write
2DE0000
trusted library allocation
page read and write
4AB000
unkown
page readonly
41B1000
heap
page read and write
414A000
heap
page read and write
4A7000
unkown
page read and write
40EE000
heap
page read and write
14F0000
trusted library allocation
page execute and read and write
5A40000
trusted library allocation
page execute and read and write
2E00000
heap
page read and write
FA0000
heap
page read and write
4070000
heap
page read and write
5AD4000
heap
page read and write
490000
unkown
page read and write
3124000
trusted library allocation
page read and write
400000
unkown
page readonly
3154000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
401000
unkown
page execute read
12A0000
heap
page read and write
7F420000
trusted library allocation
page execute and read and write
40DE000
heap
page read and write
414A000
heap
page read and write
5770000
trusted library allocation
page read and write
41AC000
heap
page read and write
2F0F000
stack
page read and write
414A000
heap
page read and write
4F18000
trusted library allocation
page read and write
120000
heap
page read and write
2FA4000
heap
page read and write
41AC000
heap
page read and write
57DE000
stack
page read and write
5795000
trusted library allocation
page read and write
481E000
direct allocation
page read and write
A70000
heap
page read and write
4603000
direct allocation
page read and write
400A000
heap
page read and write
12BE000
heap
page read and write
482000
unkown
page readonly
41AC000
heap
page read and write
1500000
heap
page read and write
400F000
heap
page read and write
4475000
heap
page read and write
1385000
heap
page read and write
414A000
heap
page read and write
41AC000
heap
page read and write
8B4000
stack
page read and write
3D00000
direct allocation
page read and write
5A70000
heap
page read and write
41AC000
heap
page read and write
44E0000
direct allocation
page read and write
41AC000
heap
page read and write
5D70000
heap
page read and write
414A000
heap
page read and write
50AE000
stack
page read and write
316D000
trusted library allocation
page read and write
3173000
trusted library allocation
page read and write
4470000
direct allocation
page read and write
316F000
trusted library allocation
page read and write
4013000
heap
page read and write
4593000
direct allocation
page read and write
166F000
stack
page read and write
A0E000
stack
page read and write
4026000
trusted library allocation
page read and write
4610000
direct allocation
page read and write
47AE000
direct allocation
page read and write
149F000
stack
page read and write
3163000
trusted library allocation
page read and write
2CEE000
stack
page read and write
404C000
heap
page read and write
317B000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
44E0000
direct allocation
page read and write
414A000
heap
page read and write
3156000
trusted library allocation
page read and write
2D2C000
stack
page read and write
4002000
heap
page read and write
9A000
stack
page read and write
4739000
direct allocation
page read and write
54B0000
trusted library allocation
page execute and read and write
10D0000
heap
page read and write
473D000
direct allocation
page read and write
A7E000
heap
page read and write
490000
unkown
page write copy
599F000
stack
page read and write
400D000
heap
page read and write
47AD000
direct allocation
page read and write
41AC000
heap
page read and write
41AC000
heap
page read and write
41AC000
heap
page read and write
40DE000
heap
page read and write
315E000
trusted library allocation
page read and write
126F000
stack
page read and write
3184000
trusted library allocation
page read and write
5C6E000
stack
page read and write
4470000
direct allocation
page read and write
4610000
direct allocation
page read and write
2DB0000
trusted library allocation
page read and write
3B4B000
heap
page read and write
414A000
heap
page read and write
400000
system
page execute and read and write
41B0000
heap
page execute and read and write
AA9000
heap
page read and write
A7A000
heap
page read and write
3146000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
12D9000
heap
page read and write
5740000
trusted library allocation
page read and write
40DE000
heap
page read and write
41B1000
heap
page read and write
552E000
stack
page read and write
4680000
direct allocation
page read and write
110000
heap
page read and write
3BDB000
heap
page read and write
414A000
heap
page read and write
14C0000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
373E000
stack
page read and write
5A1E000
stack
page read and write
414A000
heap
page read and write
111E000
stack
page read and write
12DC000
heap
page read and write
47A9000
direct allocation
page read and write
89F000
stack
page read and write
E3B000
stack
page read and write
8AF000
stack
page read and write
4680000
direct allocation
page read and write
3FFA000
heap
page read and write
408A000
heap
page read and write
47A9000
direct allocation
page read and write
4680000
direct allocation
page read and write
313F000
trusted library allocation
page read and write
2E15000
heap
page read and write
54E8000
trusted library allocation
page read and write
3FDD000
trusted library allocation
page read and write
41F6000
heap
page read and write
9BE000
stack
page read and write
4603000
direct allocation
page read and write
4593000
direct allocation
page read and write
3186000
trusted library allocation
page read and write
1364000
heap
page read and write
59DE000
stack
page read and write
414A000
heap
page read and write
31A5000
trusted library allocation
page read and write
41AC000
heap
page read and write
1294000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
3D70000
heap
page read and write
1370000
heap
page read and write
3E70000
heap
page read and write
481E000
direct allocation
page read and write
41B1000
heap
page read and write
4470000
direct allocation
page read and write
4094000
heap
page read and write
2D30000
trusted library allocation
page read and write
A60000
heap
page read and write
414A000
heap
page read and write
40DE000
heap
page read and write
402000
system
page execute and read and write
41AC000
heap
page read and write
2DC0000
trusted library allocation
page execute and read and write
482000
unkown
page readonly
950000
heap
page read and write
41B5000
heap
page read and write
3188000
trusted library allocation
page read and write
2FF5000
heap
page read and write
14CB000
trusted library allocation
page execute and read and write
57E0000
trusted library allocation
page read and write
40DE000
heap
page read and write
1165000
heap
page read and write
3139000
trusted library allocation
page read and write
562F000
stack
page read and write
1293000
trusted library allocation
page execute and read and write
1361000
heap
page read and write
1160000
heap
page read and write
473D000
direct allocation
page read and write
4739000
direct allocation
page read and write
481E000
direct allocation
page read and write
313D000
trusted library allocation
page read and write
414A000
heap
page read and write
313B000
trusted library allocation
page read and write
5EE0000
heap
page read and write
414A000
heap
page read and write
4011000
heap
page read and write
5400000
trusted library allocation
page execute and read and write
54D0000
trusted library allocation
page read and write
44E0000
direct allocation
page read and write
5750000
trusted library allocation
page execute and read and write
14A0000
trusted library allocation
page read and write
3126000
trusted library allocation
page read and write
47AD000
direct allocation
page read and write
54DE000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
4603000
direct allocation
page read and write
400000
unkown
page readonly
1315000
heap
page read and write
41B1000
heap
page read and write
401B000
heap
page read and write
1290000
trusted library allocation
page read and write
40DE000
heap
page read and write
4593000
direct allocation
page read and write
3B3F000
stack
page read and write
40DE000
heap
page read and write
47AE000
direct allocation
page read and write
312A000
trusted library allocation
page read and write
126F000
stack
page read and write
41B1000
heap
page read and write
41B1000
heap
page read and write
14B6000
trusted library allocation
page execute and read and write
40DE000
heap
page read and write
3141000
trusted library allocation
page read and write
41AC000
heap
page read and write
318A000
trusted library allocation
page read and write
414A000
heap
page read and write
8FE000
stack
page read and write
A50000
heap
page read and write
5774000
trusted library allocation
page read and write
14C2000
trusted library allocation
page read and write
41B1000
heap
page read and write
3B42000
heap
page read and write
41AC000
heap
page read and write
315C000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
14C7000
trusted library allocation
page execute and read and write
47AD000
direct allocation
page read and write
3128000
trusted library allocation
page read and write
3FFF000
heap
page read and write
3FF8000
heap
page read and write
5D6E000
stack
page read and write
401000
unkown
page execute read
4610000
direct allocation
page read and write
41AC000
heap
page read and write
54E0000
trusted library allocation
page read and write
100000
heap
page read and write
47AE000
direct allocation
page read and write
2FF0000
heap
page read and write
3143000
trusted library allocation
page read and write
40DE000
heap
page read and write
2D70000
heap
page execute and read and write
1130000
heap
page read and write
1080000
heap
page read and write
There are 268 hidden memdumps, click here to show them.