IOC Report
dkFx5VWeuM.exe

loading gif

Files

File Path
Type
Category
Malicious
dkFx5VWeuM.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dkFx5VWeuM.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\435e5d62355646e5495fb86b5a8982b6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\435e5d62355646e5495fb86b5a8982b6.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\svchost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dkFx5VWeuM.exe
"C:\Users\user\Desktop\dkFx5VWeuM.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe" ..
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe" ..
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe" ..
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://go.microsoft.
unknown
https://dl.dropbox.com/s/p84aaz28t0hepul/Pass.exe?dl=0
unknown
http://go.microsoft.LinkId=42127
unknown

IPs

IP
Domain
Country
Malicious
45.83.207.67
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
435e5d62355646e5495fb86b5a8982b6
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
435e5d62355646e5495fb86b5a8982b6

Memdumps

Base Address
Regiontype
Protect
Malicious
C82000
unkown
page readonly
malicious
3241000
trusted library allocation
page read and write
malicious
89A000
heap
page read and write
8A6000
heap
page read and write
4C54000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
970000
heap
page read and write
1A10000
heap
page read and write
FF0000
heap
page execute and read and write
FCE000
stack
page read and write
1101000
heap
page read and write
C5A000
heap
page read and write
8F8000
heap
page read and write
5D2E000
stack
page read and write
13A2000
trusted library allocation
page execute and read and write
166E000
stack
page read and write
3C51000
trusted library allocation
page read and write
15CE000
stack
page read and write
8EF000
heap
page read and write
4267000
trusted library allocation
page read and write
26801A13000
heap
page read and write
740000
heap
page read and write
A18000
heap
page read and write
35B7000
trusted library allocation
page execute and read and write
16CF000
stack
page read and write
36EE000
trusted library allocation
page read and write
1382000
trusted library allocation
page execute and read and write
4C4F000
stack
page read and write
93B000
stack
page read and write
857000
heap
page read and write
2DEE000
stack
page read and write
D90000
heap
page read and write
5E70000
trusted library allocation
page execute and read and write
104F000
heap
page read and write
5750000
trusted library allocation
page execute and read and write
44D4000
trusted library allocation
page read and write
5FAE000
stack
page read and write
A15000
heap
page read and write
30FE000
stack
page read and write
8D4000
heap
page read and write
13B0000
heap
page read and write
890000
heap
page read and write
62EE000
stack
page read and write
8AE000
heap
page read and write
D32967D000
stack
page read and write
88F000
heap
page read and write
122E000
heap
page read and write
173A000
trusted library allocation
page execute and read and write
3841000
trusted library allocation
page read and write
8A5000
heap
page read and write
894000
heap
page read and write
2B6B000
trusted library allocation
page execute and read and write
DDE000
stack
page read and write
847000
heap
page read and write
876000
heap
page read and write
2FCE000
stack
page read and write
89E000
heap
page read and write
1BDA000
trusted library allocation
page execute and read and write
1253000
heap
page read and write
8F5000
heap
page read and write
2B67000
trusted library allocation
page execute and read and write
86F000
heap
page read and write
86D000
heap
page read and write
B00000
heap
page read and write
89A000
heap
page read and write
3844000
trusted library allocation
page read and write
26801B02000
heap
page read and write
891000
heap
page read and write
2B47000
trusted library allocation
page execute and read and write
44AE000
trusted library allocation
page read and write
5E3C000
stack
page read and write
2B32000
trusted library allocation
page execute and read and write
125B000
stack
page read and write
1372000
trusted library allocation
page execute and read and write
606E000
stack
page read and write
1610000
heap
page read and write
5D3B000
stack
page read and write
155E000
stack
page read and write
897000
heap
page read and write
26801A2B000
heap
page read and write
4CDA000
heap
page read and write
3601000
heap
page execute and read and write
84D000
heap
page read and write
2C01000
heap
page execute and read and write
990000
heap
page read and write
2B40000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
8AC000
heap
page read and write
1401000
heap
page read and write
2BFC000
stack
page read and write
1001000
heap
page read and write
4CCB000
heap
page read and write
35BB000
trusted library allocation
page execute and read and write
5E2F000
stack
page read and write
C41000
heap
page read and write
1B60000
heap
page execute and read and write
2F01000
heap
page read and write
35FE000
stack
page read and write
57CE000
stack
page read and write
8A8000
heap
page read and write
133F000
stack
page read and write
62AE000
stack
page read and write
9E0000
heap
page read and write
174C000
trusted library allocation
page execute and read and write
2FB000
stack
page read and write
8AB000
heap
page read and write
86C000
heap
page read and write
898000
heap
page read and write
42BD000
trusted library allocation
page read and write
8D4000
heap
page read and write
C80000
unkown
page readonly
1801000
heap
page read and write
5BCE000
stack
page read and write
5D30000
heap
page read and write
5CD0000
trusted library allocation
page execute and read and write
3F3000
stack
page read and write
85A000
heap
page read and write
855000
heap
page read and write
1BEC000
trusted library allocation
page execute and read and write
561C000
stack
page read and write
9A0000
heap
page read and write
53DE000
stack
page read and write
F40000
heap
page read and write
80B000
heap
page read and write
8AE000
heap
page read and write
2B30000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
1021000
heap
page read and write
1052000
heap
page read and write
1360000
trusted library allocation
page read and write
7F920000
trusted library allocation
page execute and read and write
5F4E000
stack
page read and write
4B4E000
stack
page read and write
4311000
trusted library allocation
page read and write
594E000
stack
page read and write
8A8000
heap
page read and write
5B8F000
stack
page read and write
8EF000
heap
page read and write
1690000
trusted library allocation
page read and write
897000
heap
page read and write
8FC000
heap
page read and write
8B2000
heap
page read and write
84A000
heap
page read and write
55DE000
stack
page read and write
3444000
trusted library allocation
page read and write
1110000
heap
page read and write
1402000
heap
page read and write
1BE2000
trusted library allocation
page execute and read and write
5F2E000
stack
page read and write
3301000
heap
page read and write
D32977E000
unkown
page readonly
897000
heap
page read and write
FE0000
heap
page read and write
26801980000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
1600000
heap
page read and write
26802202000
trusted library allocation
page read and write
44B0000
trusted library allocation
page read and write
990000
heap
page read and write
4CD8000
heap
page read and write
1A5E000
stack
page read and write
585D000
stack
page read and write
1777000
trusted library allocation
page execute and read and write
4444000
trusted library allocation
page read and write
1BC0000
trusted library allocation
page read and write
602E000
stack
page read and write
117D000
heap
page read and write
5590000
heap
page read and write
2EFE000
stack
page read and write
A26000
heap
page read and write
5760000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
1720000
heap
page execute and read and write
FDE000
stack
page read and write
836000
heap
page read and write
D329F7E000
unkown
page readonly
5420000
trusted library allocation
page execute and read and write
2B3A000
trusted library allocation
page execute and read and write
145F000
stack
page read and write
89E000
heap
page read and write
2E01000
heap
page execute and read and write
8AB000
heap
page read and write
8B0000
heap
page read and write
5D0E000
stack
page read and write
1701000
heap
page read and write
571F000
stack
page read and write
84A000
heap
page read and write
FC0000
heap
page read and write
1012000
heap
page read and write
1070000
heap
page read and write
3EE000
stack
page read and write
C6B000
heap
page read and write
1285000
heap
page read and write
B30000
heap
page read and write
89E000
heap
page read and write
58C0000
trusted library allocation
page execute and read and write
13B0000
trusted library allocation
page read and write
CC6000
heap
page read and write
17BE000
stack
page read and write
8FB000
heap
page read and write
597E000
stack
page read and write
D01000
heap
page read and write
821000
heap
page read and write
5A8D000
stack
page read and write
B36000
heap
page read and write
8FA000
heap
page read and write
8D1000
heap
page read and write
111A000
heap
page read and write
2B60000
trusted library allocation
page read and write
858000
heap
page read and write
88F000
heap
page read and write
4CC3000
heap
page read and write
800000
heap
page read and write
2B52000
trusted library allocation
page execute and read and write
D329E7D000
stack
page read and write
133F000
stack
page read and write
43BF000
trusted library allocation
page read and write
CF6000
heap
page read and write
847000
heap
page read and write
85B000
heap
page read and write
1501000
heap
page read and write
4CCB000
heap
page read and write
1562000
trusted library allocation
page execute and read and write
568E000
stack
page read and write
5740000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
8D4000
heap
page read and write
EF6000
stack
page read and write
9F0000
heap
page execute and read and write
31F0000
trusted library allocation
page execute and read and write
8EF000
heap
page read and write
38FE000
stack
page read and write
EF9000
stack
page read and write
157A000
trusted library allocation
page execute and read and write
8F1000
heap
page read and write
CCC000
heap
page read and write
54DC000
stack
page read and write
575C000
stack
page read and write
86C000
heap
page read and write
858000
heap
page read and write
4241000
trusted library allocation
page read and write
3544000
trusted library allocation
page read and write
126A000
heap
page read and write
8A3000
heap
page read and write
939000
stack
page read and write
123A000
heap
page read and write
61AE000
stack
page read and write
16C0000
trusted library allocation
page read and write
13BB000
trusted library allocation
page execute and read and write
4CC5000
heap
page read and write
7DD000
stack
page read and write
1000000
heap
page read and write
D80000
heap
page read and write
8D4000
heap
page read and write
8F1000
heap
page read and write
89E000
heap
page read and write
F50000
heap
page read and write
960000
heap
page read and write
3701000
heap
page read and write
2B2A000
trusted library allocation
page execute and read and write
2B10000
trusted library allocation
page read and write
5E01000
heap
page read and write
4844000
trusted library allocation
page read and write
86D000
heap
page read and write
DE0000
heap
page read and write
C84000
heap
page read and write
AFE000
stack
page read and write
8AD000
heap
page read and write
8AA000
heap
page read and write
5A4F000
stack
page read and write
1732000
trusted library allocation
page execute and read and write
88F000
heap
page read and write
4CD7000
heap
page read and write
31DE000
stack
page read and write
5CCE000
stack
page read and write
C8C000
unkown
page readonly
111E000
heap
page read and write
137A000
trusted library allocation
page execute and read and write
4313000
trusted library allocation
page read and write
9D0000
heap
page read and write
8F3000
heap
page read and write
26801A02000
heap
page read and write
3FE000
stack
page read and write
8EF000
heap
page read and write
8B0000
heap
page read and write
1BE6000
trusted library allocation
page execute and read and write
58CE000
stack
page read and write
8FE000
heap
page read and write
89A000
heap
page read and write
590E000
stack
page read and write
102E000
heap
page read and write
8AB000
heap
page read and write
16A0000
heap
page read and write
8F9000
heap
page read and write
2B62000
trusted library allocation
page read and write
8F0000
heap
page read and write
561E000
stack
page read and write
1742000
trusted library allocation
page execute and read and write
846000
heap
page read and write
1572000
trusted library allocation
page execute and read and write
138C000
trusted library allocation
page execute and read and write
46B0000
heap
page read and write
5ABE000
stack
page read and write
163B000
heap
page read and write
15A0000
heap
page read and write
35B0000
trusted library allocation
page read and write
755000
heap
page read and write
890000
heap
page read and write
C2C000
heap
page read and write
59DE000
stack
page read and write
8EF000
heap
page read and write
85A000
heap
page read and write
374B000
trusted library allocation
page read and write
1612000
heap
page read and write
839000
heap
page read and write
190E000
stack
page read and write
855000
heap
page read and write
8F7000
heap
page read and write
15BB000
trusted library allocation
page execute and read and write
897000
heap
page read and write
1630000
heap
page read and write
1251000
heap
page read and write
84D000
heap
page read and write
5CCF000
stack
page read and write
89F000
heap
page read and write
FF0000
heap
page read and write
660000
heap
page read and write
2D01000
heap
page read and write
2B5A000
trusted library allocation
page execute and read and write
13F0000
heap
page read and write
5E0F000
stack
page read and write
9C0000
heap
page read and write
85A000
heap
page read and write
2BAE000
stack
page read and write
3449000
trusted library allocation
page read and write
8AA000
heap
page read and write
26801A22000
heap
page read and write
16E0000
heap
page read and write
1C01000
heap
page read and write
3C54000
trusted library allocation
page read and write
616E000
stack
page read and write
578E000
stack
page read and write
2DF0000
heap
page read and write
3311000
trusted library allocation
page read and write
876000
heap
page read and write
4CD9000
heap
page read and write
DF0000
heap
page read and write
1901000
heap
page read and write
16B0000
trusted library allocation
page execute and read and write
3441000
trusted library allocation
page read and write
5BCE000
stack
page read and write
4C51000
trusted library allocation
page read and write
8AA000
heap
page read and write
F60000
heap
page read and write
1654000
heap
page read and write
1002000
heap
page read and write
177B000
trusted library allocation
page execute and read and write
4441000
trusted library allocation
page read and write
1356000
stack
page read and write
5719000
stack
page read and write
4CCC000
heap
page read and write
F9E000
stack
page read and write
156A000
trusted library allocation
page execute and read and write
1212000
heap
page read and write
1762000
trusted library allocation
page execute and read and write
1101000
heap
page read and write
1746000
trusted library allocation
page execute and read and write
59E0000
trusted library allocation
page read and write
15B7000
trusted library allocation
page execute and read and write
F10000
heap
page read and write
876000
heap
page read and write
5F00000
heap
page read and write
15FE000
stack
page read and write
940000
heap
page read and write
846000
heap
page read and write
1B5F000
stack
page read and write
58D0000
trusted library allocation
page read and write
114E000
heap
page read and write
1039000
heap
page read and write
4CCE000
heap
page read and write
8F5000
heap
page read and write
1BE0000
trusted library allocation
page read and write
1200000
heap
page read and write
8AE000
heap
page read and write
1B80000
heap
page read and write
856000
heap
page read and write
855000
heap
page read and write
26801950000
heap
page read and write
898000
heap
page read and write
2B22000
trusted library allocation
page execute and read and write
CF6000
stack
page read and write
894000
heap
page read and write
58E0000
unclassified section
page read and write
26801A2E000
heap
page read and write
13FE000
stack
page read and write
1221000
heap
page read and write
54AE000
stack
page read and write
4CA0000
heap
page read and write
4415000
trusted library allocation
page read and write
1623000
heap
page read and write
13B7000
trusted library allocation
page execute and read and write
CF9000
stack
page read and write
846000
heap
page read and write
353C000
trusted library allocation
page read and write
89E000
heap
page read and write
C7A000
heap
page read and write
88F000
heap
page read and write
C0B000
heap
page read and write
1386000
trusted library allocation
page execute and read and write
1BD2000
trusted library allocation
page execute and read and write
2B4A000
trusted library allocation
page execute and read and write
10F6000
stack
page read and write
936000
stack
page read and write
1592000
trusted library allocation
page execute and read and write
8A8000
heap
page read and write
CD7000
heap
page read and write
5E80000
trusted library allocation
page read and write
3201000
heap
page execute and read and write
1A0F000
stack
page read and write
9F0000
heap
page read and write
5CFF000
stack
page read and write
C3B000
heap
page read and write
858000
heap
page read and write
5430000
trusted library allocation
page read and write
9FE000
unkown
page read and write
1301000
heap
page read and write
9EE000
stack
page read and write
1740000
trusted library allocation
page read and write
5EAE000
stack
page read and write
BBB000
stack
page read and write
446B000
trusted library allocation
page read and write
895000
heap
page read and write
123E000
stack
page read and write
5E4E000
stack
page read and write
63EE000
stack
page read and write
890000
heap
page read and write
4369000
trusted library allocation
page read and write
CED000
heap
page read and write
8AA000
heap
page read and write
157C000
trusted library allocation
page execute and read and write
1D01000
heap
page read and write
8A3000
heap
page read and write
876000
heap
page read and write
26801A00000
heap
page read and write
5BBE000
stack
page read and write
8F6000
heap
page read and write
849000
heap
page read and write
1280000
heap
page read and write
1260000
heap
page read and write
857000
heap
page read and write
1060000
heap
page read and write
2B50000
trusted library allocation
page read and write
4841000
trusted library allocation
page read and write
4CC2000
heap
page read and write
8A5000
heap
page read and write
1270000
trusted library allocation
page read and write
5B8E000
stack
page read and write
53E0000
heap
page read and write
10F9000
stack
page read and write
848000
heap
page read and write
FD0000
heap
page execute and read and write
E02000
heap
page read and write
5240000
trusted library allocation
page read and write
44B4000
trusted library allocation
page read and write
84A000
heap
page read and write
C00000
heap
page read and write
8D4000
heap
page read and write
55DB000
stack
page read and write
35A2000
trusted library allocation
page execute and read and write
5E30000
heap
page read and write
85B000
heap
page read and write
1720000
trusted library allocation
page read and write
750000
heap
page read and write
84A000
heap
page read and write
26801A43000
heap
page read and write
A28000
heap
page read and write
1650000
heap
page read and write
79D000
unkown
page read and write
896000
heap
page read and write
3FB000
stack
page read and write
890000
heap
page read and write
8A8000
heap
page read and write
5BFE000
stack
page read and write
A2E000
heap
page read and write
8A0000
heap
page read and write
BF0000
heap
page read and write
85A000
heap
page read and write
17D0000
heap
page read and write
D1B000
stack
page read and write
1663000
heap
page read and write
5A7E000
stack
page read and write
13E0000
heap
page read and write
A00000
heap
page read and write
8A2000
heap
page read and write
1136000
heap
page read and write
86C000
heap
page read and write
8B0000
heap
page read and write
1390000
heap
page read and write
26801850000
heap
page read and write
4CCC000
heap
page read and write
580E000
stack
page read and write
7E0000
heap
page read and write
124E000
stack
page read and write
5248000
trusted library allocation
page read and write
34FE000
stack
page read and write
C12000
heap
page read and write
8AE000
heap
page read and write
8AA000
heap
page read and write
5A8E000
stack
page read and write
123E000
stack
page read and write
3548000
trusted library allocation
page read and write
2B5C000
trusted library allocation
page execute and read and write
D32909B000
stack
page read and write
83A000
stack
page read and write
354E000
trusted library allocation
page read and write
26801870000
heap
page read and write
There are 507 hidden memdumps, click here to show them.