IOC Report
TSD_ESign_Window_7_V2.5.8.exe

loading gif

Files

File Path
Type
Category
Malicious
TSD_ESign_Window_7_V2.5.8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-VQOJS.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe
"C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe"
C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp
"C:\Users\user\AppData\Local\Temp\is-536DE.tmp\TSD_ESign_Window_7_V2.5.8.tmp" /SL5="$203EE,7563488,777728,C:\Users\user\Desktop\TSD_ESign_Window_7_V2.5.8.exe"

URLs

Name
IP
Malicious
https://einvoice.com.vn/Ah1
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://www.remobjects.com/ps
unknown
https://einvoice.com.vn/0https://einvoice.com.vn/0https://einvoice.com.vn/
unknown
https://einvoice.com.vn/9jO
unknown
https://www.innosetup.com/
unknown
https://einvoice.com.vn/
unknown

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
50.23.12.20.in-addr.arpa
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
GlobalAssocChangedCounter

Memdumps

Base Address
Regiontype
Protect
Malicious
5EE000
stack
page read and write
2421000
direct allocation
page read and write
3921000
heap
page read and write
8C6000
heap
page read and write
8B5000
heap
page read and write
241A000
direct allocation
page read and write
2430000
direct allocation
page read and write
24FD000
direct allocation
page read and write
2445000
direct allocation
page read and write
4B7000
unkown
page write copy
6C6000
unkown
page write copy
6DD000
unkown
page readonly
4C6000
unkown
page readonly
243E000
direct allocation
page read and write
22D9000
direct allocation
page read and write
6C6000
unkown
page read and write
2AC0000
heap
page read and write
24A4000
direct allocation
page read and write
19D000
stack
page read and write
3960000
heap
page read and write
6F3000
unkown
page readonly
3480000
direct allocation
page read and write
38E1000
heap
page read and write
2257000
direct allocation
page read and write
2333000
direct allocation
page read and write
22A6000
direct allocation
page read and write
27F3000
heap
page read and write
24B4000
direct allocation
page read and write
A7F000
stack
page read and write
8BD000
heap
page read and write
4C4000
unkown
page readonly
8CC000
heap
page read and write
7FB50000
direct allocation
page read and write
6DF000
unkown
page readonly
8A3000
heap
page read and write
23FB000
direct allocation
page read and write
87E000
stack
page read and write
2341000
direct allocation
page read and write
8CF000
heap
page read and write
233A000
direct allocation
page read and write
22BD000
direct allocation
page read and write
2316000
direct allocation
page read and write
225E000
direct allocation
page read and write
B7F000
stack
page read and write
8B1000
heap
page read and write
8BA000
heap
page read and write
770000
heap
page read and write
351E000
stack
page read and write
2480000
direct allocation
page read and write
2521000
direct allocation
page read and write
4D0000
heap
page read and write
8DF000
heap
page read and write
226D000
direct allocation
page read and write
2528000
direct allocation
page read and write
2249000
direct allocation
page read and write
3494000
direct allocation
page read and write
BF0000
direct allocation
page execute and read and write
2230000
direct allocation
page read and write
22E1000
direct allocation
page read and write
1E7000
heap
page read and write
229F000
direct allocation
page read and write
6D0000
unkown
page read and write
8D2000
heap
page read and write
2590000
direct allocation
page read and write
8CF000
heap
page read and write
2308000
direct allocation
page read and write
8DA000
heap
page read and write
8D8000
heap
page read and write
248C000
direct allocation
page read and write
50BF000
stack
page read and write
2513000
direct allocation
page read and write
8DE000
heap
page read and write
2462000
direct allocation
page read and write
249D000
direct allocation
page read and write
91A000
heap
page read and write
8C1000
heap
page read and write
27F0000
heap
page read and write
8D1000
heap
page read and write
2496000
direct allocation
page read and write
22F1000
direct allocation
page read and write
2324000
direct allocation
page read and write
1E0000
heap
page read and write
2348000
direct allocation
page read and write
3480000
direct allocation
page read and write
720000
heap
page read and write
924000
heap
page read and write
BE0000
heap
page read and write
23F0000
direct allocation
page read and write
8D6000
heap
page read and write
8F5000
heap
page read and write
245B000
direct allocation
page read and write
8E1000
heap
page read and write
2291000
direct allocation
page read and write
2282000
direct allocation
page read and write
227B000
direct allocation
page read and write
2265000
direct allocation
page read and write
24D8000
direct allocation
page read and write
6D5000
unkown
page read and write
22B6000
direct allocation
page read and write
6CD000
unkown
page read and write
349E000
direct allocation
page read and write
2479000
direct allocation
page read and write
C40000
heap
page read and write
37AD000
direct allocation
page read and write
8F2000
heap
page read and write
8BD000
heap
page read and write
2298000
direct allocation
page read and write
2C80000
trusted library allocation
page read and write
8D2000
heap
page read and write
24EF000
direct allocation
page read and write
250C000
direct allocation
page read and write
2429000
direct allocation
page read and write
2679000
direct allocation
page read and write
22EA000
direct allocation
page read and write
22C4000
direct allocation
page read and write
96F000
stack
page read and write
C49000
heap
page read and write
3961000
heap
page read and write
361F000
stack
page read and write
19B000
stack
page read and write
4B7000
unkown
page read and write
6C8000
unkown
page read and write
8F5000
heap
page read and write
3480000
heap
page read and write
230F000
direct allocation
page read and write
24F6000
direct allocation
page read and write
27E0000
direct allocation
page read and write
8D8000
heap
page read and write
220F000
stack
page read and write
27E0000
direct allocation
page read and write
23F8000
direct allocation
page read and write
880000
heap
page read and write
7FE35000
direct allocation
page read and write
22F8000
direct allocation
page read and write
400000
unkown
page readonly
1E6000
heap
page read and write
66E000
stack
page read and write
9B000
stack
page read and write
24D1000
direct allocation
page read and write
348B000
direct allocation
page read and write
89E000
heap
page read and write
2413000
direct allocation
page read and write
8F3000
heap
page read and write
244D000
direct allocation
page read and write
8A8000
heap
page read and write
232C000
direct allocation
page read and write
37B7000
direct allocation
page read and write
8DE000
heap
page read and write
24CA000
direct allocation
page read and write
24E8000
direct allocation
page read and write
2504000
direct allocation
page read and write
5F0000
heap
page read and write
8AD000
heap
page read and write
251A000
direct allocation
page read and write
83E000
stack
page read and write
8DE000
heap
page read and write
2437000
direct allocation
page read and write
248F000
direct allocation
page read and write
22AF000
direct allocation
page read and write
400000
unkown
page readonly
231D000
direct allocation
page read and write
C45000
heap
page read and write
2454000
direct allocation
page read and write
4C2000
unkown
page write copy
2401000
direct allocation
page read and write
778000
heap
page read and write
C30000
heap
page read and write
401000
unkown
page execute read
8ED000
heap
page read and write
2289000
direct allocation
page read and write
2590000
direct allocation
page read and write
888000
heap
page read and write
37A6000
direct allocation
page read and write
8DB000
heap
page read and write
89B000
heap
page read and write
93000
stack
page read and write
4B9000
unkown
page read and write
670000
heap
page read and write
B80000
heap
page read and write
366E000
stack
page read and write
401000
unkown
page execute read
8D1000
heap
page read and write
2274000
direct allocation
page read and write
620000
heap
page read and write
34B0000
direct allocation
page read and write
91B000
heap
page read and write
6D8000
unkown
page write copy
37C7000
direct allocation
page read and write
24C2000
direct allocation
page read and write
4C0000
unkown
page read and write
2250000
direct allocation
page read and write
3860000
heap
page read and write
24BB000
direct allocation
page read and write
22CB000
direct allocation
page read and write
There are 184 hidden memdumps, click here to show them.