IOC Report
Onvf4Tujuw.exe

loading gif

Files

File Path
Type
Category
Malicious
Onvf4Tujuw.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Onvf4Tujuw.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\sofftware.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0624860fa806af32d62c5910019216a8.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\sofftware.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Onvf4Tujuw.exe
"C:\Users\user\Desktop\Onvf4Tujuw.exe"
malicious
C:\Users\user\AppData\Local\Temp\sofftware.exe
"C:\Users\user\AppData\Local\Temp\sofftware.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\sofftware.exe" "sofftware.exe" ENABLE
malicious
C:\Users\user\AppData\Local\Temp\sofftware.exe
"C:\Users\user\AppData\Local\Temp\sofftware.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\sofftware.exe
"C:\Users\user\AppData\Local\Temp\sofftware.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\sofftware.exe
"C:\Users\user\AppData\Local\Temp\sofftware.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
seznam.zapto.org
34.102.5.126

IPs

IP
Domain
Country
Malicious
34.102.5.126
seznam.zapto.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
0624860fa806af32d62c5910019216a8
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
0624860fa806af32d62c5910019216a8
HKEY_CURRENT_USER\SOFTWARE\0624860fa806af32d62c5910019216a8
[kl]
HKEY_CURRENT_USER\SOFTWARE\0624860fa806af32d62c5910019216a8
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
7B2000
unkown
page readonly
malicious
3421000
trusted library allocation
page read and write
malicious
2D71000
trusted library allocation
page read and write
malicious
4D31000
heap
page read and write
555E000
stack
page read and write
A20000
heap
page read and write
4BBE000
stack
page read and write
B1A000
heap
page read and write
165E000
stack
page read and write
E90000
trusted library allocation
page read and write
560C000
stack
page read and write
777000
trusted library allocation
page execute and read and write
10EE000
stack
page read and write
B16000
heap
page read and write
B03000
heap
page read and write
15A7000
trusted library allocation
page execute and read and write
592F000
stack
page read and write
15C0000
trusted library allocation
page read and write
6FE000
stack
page read and write
D10000
heap
page read and write
15CE000
stack
page read and write
559E000
stack
page read and write
15AA000
trusted library allocation
page execute and read and write
56AE000
stack
page read and write
555E000
stack
page read and write
B04000
heap
page read and write
12C0000
trusted library allocation
page read and write
D10000
heap
page read and write
740000
trusted library allocation
page read and write
B0A000
heap
page read and write
92D000
heap
page read and write
4D31000
heap
page read and write
CD0000
heap
page read and write
1270000
trusted library allocation
page read and write
8D5000
heap
page read and write
1650000
trusted library allocation
page read and write
DCB000
heap
page read and write
47C0000
heap
page read and write
D46000
heap
page read and write
56CE000
stack
page read and write
8D0000
trusted library allocation
page read and write
16AE000
stack
page read and write
5400000
trusted library allocation
page read and write
15BA000
trusted library allocation
page execute and read and write
13F0000
heap
page read and write
B62000
heap
page read and write
590F000
stack
page read and write
1435000
heap
page read and write
BD0000
heap
page read and write
55C0000
trusted library allocation
page read and write
B0D000
heap
page read and write
15FA000
trusted library allocation
page execute and read and write
4D3A000
heap
page read and write
1778000
trusted library allocation
page read and write
5AAE000
stack
page read and write
1630000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
B10000
heap
page read and write
541F000
stack
page read and write
12E0000
heap
page read and write
558E000
stack
page read and write
EB6000
trusted library allocation
page execute and read and write
1292000
trusted library allocation
page execute and read and write
5610000
trusted library allocation
page read and write
2A2E000
stack
page read and write
157E000
stack
page read and write
B09000
heap
page read and write
5E90000
heap
page read and write
91E000
stack
page read and write
B1E000
heap
page read and write
15E0000
heap
page execute and read and write
B41000
heap
page read and write
B82000
heap
page read and write
E50000
heap
page execute and read and write
74C000
trusted library allocation
page execute and read and write
159A000
trusted library allocation
page execute and read and write
168F000
trusted library allocation
page read and write
3D74000
trusted library allocation
page read and write
705000
heap
page read and write
32B000
stack
page read and write
ADE000
heap
page read and write
56DE000
stack
page read and write
AE7000
heap
page read and write
4D10000
heap
page read and write
D64000
heap
page read and write
47D0000
heap
page read and write
4E4E000
stack
page read and write
F56000
stack
page read and write
1190000
heap
page read and write
1220000
heap
page read and write
13F1000
heap
page read and write
732000
trusted library allocation
page execute and read and write
EBC000
trusted library allocation
page execute and read and write
4FF0000
trusted library allocation
page read and write
B0A000
heap
page read and write
4D2F000
stack
page read and write
2FAE000
stack
page read and write
4B7E000
stack
page read and write
EB0000
trusted library allocation
page read and write
53EE000
stack
page read and write
B80000
heap
page read and write
E5E000
stack
page read and write
D82000
heap
page read and write
CEE000
stack
page read and write
1300000
heap
page read and write
B80000
heap
page read and write
77B000
trusted library allocation
page execute and read and write
4C20000
heap
page read and write
92F000
heap
page read and write
B32000
heap
page read and write
3944000
trusted library allocation
page read and write
568E000
stack
page read and write
1582000
trusted library allocation
page execute and read and write
15F2000
trusted library allocation
page execute and read and write
7EEC0000
trusted library allocation
page execute and read and write
1230000
heap
page read and write
1830000
heap
page read and write
1680000
trusted library allocation
page read and write
AEB000
heap
page read and write
57CE000
stack
page read and write
189F000
trusted library allocation
page read and write
6F3000
stack
page read and write
AC9000
heap
page read and write
B18000
heap
page read and write
110E000
stack
page read and write
56AC000
stack
page read and write
1A70000
heap
page read and write
4A3F000
stack
page read and write
AEC000
heap
page read and write
15B2000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
73A000
trusted library allocation
page execute and read and write
AD6000
heap
page read and write
292E000
stack
page read and write
3D71000
trusted library allocation
page read and write
12C7000
trusted library allocation
page execute and read and write
ADC000
heap
page read and write
B16000
heap
page read and write
F00000
heap
page read and write
67E000
stack
page read and write
1637000
trusted library allocation
page execute and read and write
1245000
heap
page read and write
1FB000
stack
page read and write
1139000
stack
page read and write
AEF000
stack
page read and write
AFF000
heap
page read and write
13F5000
heap
page read and write
5B70000
heap
page read and write
550E000
stack
page read and write
15E0000
trusted library allocation
page read and write
B41000
heap
page read and write
B62000
heap
page read and write
BC0000
heap
page read and write
581B000
stack
page read and write
154E000
stack
page read and write
B8B000
heap
page read and write
AFF000
heap
page read and write
4F70000
trusted library allocation
page execute and read and write
4B3E000
stack
page read and write
1388000
heap
page read and write
113F000
heap
page read and write
4D45000
heap
page read and write
1265000
heap
page read and write
4D45000
heap
page read and write
55B0000
trusted library allocation
page execute and read and write
136E000
stack
page read and write
1282000
trusted library allocation
page execute and read and write
5B40000
trusted library allocation
page execute and read and write
129C000
trusted library allocation
page execute and read and write
42F4000
trusted library allocation
page read and write
CD6000
heap
page read and write
B8E000
heap
page read and write
E60000
heap
page read and write
B02000
heap
page read and write
566B000
stack
page read and write
D20000
heap
page read and write
B1E000
heap
page read and write
AEC000
heap
page read and write
DB0000
trusted library allocation
page read and write
B40000
heap
page read and write
B16000
heap
page read and write
1622000
trusted library allocation
page execute and read and write
AEA000
heap
page read and write
11E0000
heap
page read and write
5CC0000
heap
page read and write
51DD000
stack
page read and write
A1E000
stack
page read and write
596E000
stack
page read and write
ED2000
trusted library allocation
page execute and read and write
B0C000
heap
page read and write
569E000
stack
page read and write
B1B000
heap
page read and write
B15000
heap
page read and write
4D3A000
heap
page read and write
AFF000
heap
page read and write
163B000
trusted library allocation
page execute and read and write
5BAE000
stack
page read and write
560F000
stack
page read and write
B80000
heap
page read and write
B0C000
heap
page read and write
124F000
heap
page read and write
4D46000
heap
page read and write
1296000
trusted library allocation
page execute and read and write
B8E000
heap
page read and write
AE9000
heap
page read and write
B0F000
heap
page read and write
B1B000
heap
page read and write
44D1000
trusted library allocation
page read and write
160C000
trusted library allocation
page execute and read and write
5A5E000
stack
page read and write
5A6F000
stack
page read and write
1330000
heap
page read and write
118A000
heap
page read and write
B87000
heap
page read and write
B8C000
heap
page read and write
11DE000
stack
page read and write
B15000
heap
page read and write
32F1000
trusted library allocation
page read and write
1670000
heap
page read and write
B13000
heap
page read and write
1810000
trusted library allocation
page execute and read and write
50F0000
heap
page read and write
B82000
heap
page read and write
1180000
heap
page read and write
544E000
stack
page read and write
128A000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
42F1000
trusted library allocation
page read and write
4D48000
heap
page read and write
B1A000
heap
page read and write
6FB000
stack
page read and write
595E000
stack
page read and write
1550000
heap
page read and write
B0C000
heap
page read and write
5D80000
heap
page read and write
AEB000
heap
page read and write
7B0000
unkown
page readonly
545E000
stack
page read and write
103A000
stack
page read and write
D5E000
heap
page read and write
1590000
trusted library allocation
page read and write
8CE000
unkown
page read and write
1370000
trusted library allocation
page read and write
AEB000
heap
page read and write
6C0000
heap
page read and write
B0E000
heap
page read and write
A5B000
stack
page read and write
560000
heap
page read and write
30DE000
stack
page read and write
13AE000
stack
page read and write
4447000
trusted library allocation
page read and write
1154000
heap
page read and write
B32000
heap
page read and write
1120000
heap
page read and write
1602000
trusted library allocation
page execute and read and write
4F60000
trusted library allocation
page read and write
1128000
heap
page read and write
3DE000
unkown
page read and write
1136000
stack
page read and write
800000
heap
page read and write
790000
heap
page read and write
EA2000
trusted library allocation
page execute and read and write
B40000
heap
page read and write
B00000
heap
page read and write
B0F000
heap
page read and write
E3E000
stack
page read and write
1606000
trusted library allocation
page execute and read and write
EBB000
stack
page read and write
CEE000
stack
page read and write
3E0000
heap
page read and write
B0C000
heap
page read and write
AFD000
heap
page read and write
52DE000
stack
page read and write
390000
heap
page read and write
4D49000
heap
page read and write
A90000
heap
page read and write
AE7000
heap
page read and write
B43000
heap
page read and write
100F000
stack
page read and write
EAA000
trusted library allocation
page execute and read and write
4D32000
heap
page read and write
B09000
heap
page read and write
B13000
heap
page read and write
DFE000
stack
page read and write
5D90000
heap
page read and write
44D4000
trusted library allocation
page read and write
1700000
heap
page read and write
F59000
stack
page read and write
AC6000
heap
page read and write
1110000
heap
page read and write
B32000
heap
page read and write
AEB000
heap
page read and write
10A0000
heap
page read and write
B0E000
heap
page read and write
B1F000
heap
page read and write
D9F000
heap
page read and write
57DE000
stack
page read and write
150E000
stack
page read and write
B82000
heap
page read and write
D28000
heap
page read and write
AD8000
heap
page read and write
4D47000
heap
page read and write
AD8000
heap
page read and write
1660000
heap
page read and write
BD5000
heap
page read and write
1090000
heap
page read and write
15C2000
trusted library allocation
page read and write
7DE000
stack
page read and write
B17000
heap
page read and write
D5E000
stack
page read and write
56E9000
stack
page read and write
B1A000
heap
page read and write
B03000
heap
page read and write
15CB000
trusted library allocation
page execute and read and write
8F0000
heap
page read and write
746000
trusted library allocation
page execute and read and write
129A000
heap
page read and write
1666000
heap
page read and write
5623000
heap
page read and write
B05000
heap
page read and write
1140000
heap
page execute and read and write
925000
heap
page read and write
1290000
trusted library allocation
page read and write
90E000
heap
page read and write
A97000
heap
page read and write
AE7000
heap
page read and write
140F000
stack
page read and write
1240000
heap
page read and write
AE7000
heap
page read and write
1660000
heap
page read and write
13B0000
heap
page read and write
138E000
heap
page read and write
B03000
heap
page read and write
531D000
stack
page read and write
4D45000
heap
page read and write
1404000
heap
page read and write
4F6000
stack
page read and write
B1E000
heap
page read and write
AEA000
heap
page read and write
B8E000
heap
page read and write
B1A000
heap
page read and write
1592000
trusted library allocation
page execute and read and write
4F4F000
stack
page read and write
ADB000
heap
page read and write
1A40000
trusted library allocation
page execute and read and write
AD6000
heap
page read and write
394D000
trusted library allocation
page read and write
16C0000
heap
page read and write
10A5000
heap
page read and write
17D0000
heap
page read and write
B40000
heap
page read and write
B11000
heap
page read and write
1380000
heap
page read and write
17CE000
stack
page read and write
B40000
heap
page read and write
580E000
stack
page read and write
FB6000
stack
page read and write
B04000
heap
page read and write
13BF000
heap
page read and write
EE7000
trusted library allocation
page execute and read and write
ADC000
heap
page read and write
15C7000
trusted library allocation
page execute and read and write
582E000
stack
page read and write
4D0F000
stack
page read and write
B0C000
heap
page read and write
6EE000
stack
page read and write
EBA000
trusted library allocation
page execute and read and write
762000
trusted library allocation
page execute and read and write
476E000
stack
page read and write
6BE000
stack
page read and write
8F8000
heap
page read and write
57EE000
stack
page read and write
1237000
heap
page read and write
56E0000
heap
page read and write
742000
trusted library allocation
page execute and read and write
EB2000
trusted library allocation
page execute and read and write
158A000
trusted library allocation
page execute and read and write
4E2E000
stack
page read and write
ADA000
heap
page read and write
1610000
heap
page execute and read and write
12B2000
trusted library allocation
page execute and read and write
1690000
trusted library allocation
page execute and read and write
8D0000
heap
page read and write
ADD000
heap
page read and write
EEB000
trusted library allocation
page execute and read and write
1890000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
B32000
heap
page read and write
34D1000
trusted library allocation
page read and write
7F0000
heap
page read and write
B13000
heap
page read and write
4D45000
heap
page read and write
B11000
heap
page read and write
E5B000
stack
page read and write
2941000
trusted library allocation
page read and write
B13000
heap
page read and write
591C000
stack
page read and write
A70000
heap
page read and write
318F000
stack
page read and write
11C0000
heap
page read and write
8E0000
trusted library allocation
page execute and read and write
AB1000
heap
page read and write
18A0000
heap
page execute and read and write
554E000
stack
page read and write
12CB000
trusted library allocation
page execute and read and write
B8C000
heap
page read and write
5660000
trusted library allocation
page read and write
BEF000
stack
page read and write
B09000
heap
page read and write
B56000
stack
page read and write
162E000
stack
page read and write
3941000
trusted library allocation
page read and write
D2E000
heap
page read and write
125E000
stack
page read and write
720000
trusted library allocation
page read and write
AE5000
heap
page read and write
5750000
unclassified section
page read and write
FB0000
heap
page read and write
B32000
heap
page read and write
B81000
heap
page read and write
5620000
heap
page read and write
4421000
trusted library allocation
page read and write
4D38000
heap
page read and write
700000
heap
page read and write
4F2E000
stack
page read and write
AE9000
heap
page read and write
545C000
stack
page read and write
8DF000
trusted library allocation
page read and write
B00000
heap
page read and write
There are 419 hidden memdumps, click here to show them.