IOC Report
L3pFsxNFICpBGmi.exe

loading gif

Files

File Path
Type
Category
Malicious
L3pFsxNFICpBGmi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\L3pFsxNFICpBGmi.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp4C43.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VgPjxShbdbBH.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3pad0gkz.1q4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_504tzhih.vd4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dd3gdga5.5id.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxs0w3zc.zmi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5CCE.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\L3pFsxNFICpBGmi.exe
"C:\Users\user\Desktop\L3pFsxNFICpBGmi.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VgPjxShbdbBH" /XML "C:\Users\user\AppData\Local\Temp\tmp4C43.tmp"
malicious
C:\Users\user\Desktop\L3pFsxNFICpBGmi.exe
"C:\Users\user\Desktop\L3pFsxNFICpBGmi.exe"
malicious
C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe
C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VgPjxShbdbBH" /XML "C:\Users\user\AppData\Local\Temp\tmp5CCE.tmp"
malicious
C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe
"C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe"
malicious
C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe
"C:\Users\user\AppData\Roaming\VgPjxShbdbBH.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
BE0000
direct allocation
page read and write
malicious
305B000
heap
page read and write
117F000
stack
page read and write
1652000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
A8A000
heap
page read and write
5048000
trusted library allocation
page read and write
7C03000
heap
page read and write
1670000
trusted library allocation
page read and write
7460000
trusted library allocation
page execute and read and write
CB0000
heap
page read and write
BD0000
heap
page read and write
71FE000
stack
page read and write
4F20000
heap
page read and write
164A000
trusted library allocation
page execute and read and write
9E6E000
stack
page read and write
450000
unkown
page readonly
11B0000
heap
page read and write
76F0000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
5E6D000
trusted library allocation
page read and write
2730000
heap
page read and write
3861000
trusted library allocation
page read and write
5903000
heap
page read and write
1361000
direct allocation
page execute and read and write
4CA4000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
1591000
direct allocation
page execute and read and write
A1F000
heap
page read and write
495C000
stack
page read and write
11A0000
heap
page read and write
4CBE000
trusted library allocation
page read and write
7F3E000
stack
page read and write
CC4000
trusted library allocation
page read and write
5900000
heap
page read and write
4381000
trusted library allocation
page read and write
1680000
heap
page read and write
3A3E000
trusted library allocation
page read and write
E1F000
unkown
page read and write
70D000
stack
page read and write
96E000
stack
page read and write
13A2000
direct allocation
page execute and read and write
E87000
heap
page read and write
703A000
heap
page read and write
5360000
trusted library allocation
page read and write
5D5000
heap
page read and write
78CE000
stack
page read and write
11DD000
direct allocation
page execute and read and write
13F8000
direct allocation
page execute and read and write
3050000
heap
page read and write
2720000
trusted library allocation
page execute and read and write
1409000
direct allocation
page execute and read and write
DFA000
trusted library allocation
page execute and read and write
E1E000
stack
page read and write
4CA0000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
16D0000
heap
page read and write
17B5000
heap
page read and write
A51E000
stack
page read and write
2ACB000
trusted library allocation
page read and write
165B000
trusted library allocation
page execute and read and write
AD5000
heap
page read and write
E6E000
stack
page read and write
1657000
trusted library allocation
page execute and read and write
5950000
trusted library section
page readonly
595F000
trusted library section
page readonly
2700000
heap
page read and write
DED000
trusted library allocation
page execute and read and write
33C4000
trusted library allocation
page read and write
4DC0000
heap
page read and write
33D4000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
12BF000
stack
page read and write
1646000
trusted library allocation
page execute and read and write
BBA000
stack
page read and write
9FEF000
stack
page read and write
7210000
trusted library allocation
page read and write
AA50000
heap
page read and write
E70000
heap
page read and write
EB0000
heap
page read and write
4DD0000
heap
page read and write
16D8000
heap
page read and write
58B0000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page execute and read and write
7F200000
trusted library allocation
page execute and read and write
1625000
heap
page read and write
75DD000
trusted library allocation
page read and write
14FF000
stack
page read and write
A7FE000
stack
page read and write
9EE000
heap
page read and write
A02E000
stack
page read and write
EB7000
heap
page read and write
9E0000
heap
page read and write
A12F000
stack
page read and write
7230000
trusted library allocation
page read and write
11D9000
direct allocation
page execute and read and write
7600000
trusted library allocation
page execute and read and write
18CF000
stack
page read and write
5E60000
trusted library allocation
page read and write
5E70000
trusted library allocation
page execute and read and write
4DB0000
heap
page read and write
2840000
trusted library allocation
page read and write
AA44000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
7FE000
stack
page read and write
5886000
trusted library allocation
page read and write
E20000
heap
page read and write
CC0000
trusted library allocation
page read and write
734E000
stack
page read and write
5B55000
heap
page read and write
CCD000
trusted library allocation
page execute and read and write
1613000
trusted library allocation
page execute and read and write
5E10000
trusted library allocation
page read and write
515D000
stack
page read and write
C40000
heap
page read and write
5960000
heap
page read and write
7220000
trusted library section
page read and write
5860000
trusted library allocation
page read and write
7A80000
trusted library allocation
page execute and read and write
6FF0000
trusted library allocation
page execute and read and write
7454000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
7035000
heap
page read and write
A14000
heap
page read and write
4CD0000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
1743000
heap
page read and write
D00000
heap
page read and write
DCE000
unkown
page read and write
E6E000
unkown
page read and write
75D0000
trusted library allocation
page read and write
5B4D000
stack
page read and write
7000000
heap
page read and write
8F7000
stack
page read and write
E8E000
stack
page read and write
AD2000
heap
page read and write
4CC6000
trusted library allocation
page read and write
3300000
heap
page read and write
4F40000
heap
page read and write
7BE000
stack
page read and write
7DFE000
stack
page read and write
4416000
trusted library allocation
page read and write
AFC000
stack
page read and write
CAE000
stack
page read and write
5C00000
heap
page read and write
E80000
heap
page read and write
9F6D000
trusted library allocation
page read and write
9D6D000
stack
page read and write
6962000
trusted library allocation
page read and write
9B0E000
stack
page read and write
7280000
trusted library section
page read and write
C7A000
stack
page read and write
7C4B000
heap
page read and write
16C0000
trusted library allocation
page read and write
4DA0000
trusted library section
page readonly
11FE000
stack
page read and write
7B1E000
stack
page read and write
910000
heap
page read and write
DF8000
heap
page read and write
15A6000
direct allocation
page execute and read and write
43CF000
trusted library allocation
page read and write
7BE0000
heap
page read and write
1376000
direct allocation
page execute and read and write
7ADE000
stack
page read and write
16DE000
heap
page read and write
594C000
stack
page read and write
75AE000
stack
page read and write
2861000
trusted library allocation
page read and write
1A20000
trusted library allocation
page read and write
3953000
trusted library allocation
page read and write
DD0000
heap
page read and write
15AD000
direct allocation
page execute and read and write
14F6000
stack
page read and write
1707000
heap
page read and write
E0B000
trusted library allocation
page execute and read and write
1620000
heap
page read and write
1366000
direct allocation
page execute and read and write
1A40000
heap
page read and write
ECF000
stack
page read and write
6FEE000
stack
page read and write
E20000
trusted library allocation
page read and write
2668000
trusted library allocation
page read and write
77CE000
stack
page read and write
5D0000
heap
page read and write
4CCD000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
1A26000
trusted library allocation
page read and write
920000
heap
page read and write
5050000
heap
page read and write
113A000
stack
page read and write
9C0E000
stack
page read and write
5C10000
heap
page read and write
A16E000
stack
page read and write
EDF000
unkown
page read and write
3280000
heap
page read and write
7610000
heap
page read and write
4CF0000
trusted library allocation
page read and write
DF2000
trusted library allocation
page read and write
A26E000
stack
page read and write
9AE000
stack
page read and write
1306000
direct allocation
page execute and read and write
B7D000
stack
page read and write
3070000
heap
page read and write
E20000
heap
page read and write
AC4E000
stack
page read and write
4F50000
heap
page execute and read and write
A57E000
stack
page read and write
445B000
trusted library allocation
page read and write
5BF0000
heap
page execute and read and write
4D9B000
stack
page read and write
59A0000
heap
page read and write
7DBE000
unkown
page read and write
DE0000
trusted library allocation
page read and write
5D00000
heap
page read and write
5970000
heap
page read and write
EAB000
stack
page read and write
4CE0000
trusted library allocation
page read and write
F80000
heap
page read and write
10B0000
direct allocation
page execute and read and write
1A1F000
stack
page read and write
74AE000
stack
page read and write
E20000
heap
page read and write
16F8000
heap
page read and write
1403000
direct allocation
page execute and read and write
332F000
stack
page read and write
124E000
direct allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
9FF000
heap
page read and write
A8FE000
stack
page read and write
18D0000
heap
page read and write
1712000
heap
page read and write
4D10000
trusted library allocation
page read and write
9EEE000
stack
page read and write
58A0000
trusted library allocation
page read and write
4F30000
trusted library allocation
page execute and read and write
163D000
trusted library allocation
page execute and read and write
E07000
trusted library allocation
page execute and read and write
7C12000
heap
page read and write
3370000
heap
page read and write
5260000
heap
page read and write
452000
unkown
page readonly
770000
heap
page read and write
DF0000
trusted library allocation
page read and write
E30000
direct allocation
page read and write
7200000
trusted library section
page read and write
137D000
direct allocation
page execute and read and write
A37E000
stack
page read and write
CFC000
stack
page read and write
CC3000
trusted library allocation
page execute and read and write
1360000
direct allocation
page execute and read and write
587E000
trusted library allocation
page read and write
12E0000
direct allocation
page execute and read and write
1600000
trusted library allocation
page read and write
744E000
stack
page read and write
5055000
heap
page read and write
7450000
trusted library allocation
page read and write
A93C000
stack
page read and write
588D000
trusted library allocation
page read and write
6E60000
trusted library allocation
page execute and read and write
5E50000
trusted library allocation
page read and write
5160000
heap
page read and write
1614000
trusted library allocation
page read and write
7FB80000
trusted library allocation
page execute and read and write
A3AC000
stack
page read and write
AA3C000
stack
page read and write
DF0000
heap
page read and write
3869000
trusted library allocation
page read and write
DDE000
stack
page read and write
16A0000
trusted library allocation
page execute and read and write
336B000
stack
page read and write
5170000
heap
page read and write
1714000
heap
page read and write
A67E000
stack
page read and write
E02000
trusted library allocation
page read and write
C3D000
stack
page read and write
6E30000
trusted library allocation
page execute and read and write
A6BE000
stack
page read and write
1610000
trusted library allocation
page read and write
5B50000
heap
page read and write
AA40000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
16B0000
heap
page execute and read and write
DF6000
trusted library allocation
page execute and read and write
4CD2000
trusted library allocation
page read and write
551C000
stack
page read and write
53BE000
stack
page read and write
59A000
stack
page read and write
A2AC000
stack
page read and write
7C35000
heap
page read and write
1A24000
trusted library allocation
page read and write
C30000
heap
page read and write
98D000
stack
page read and write
E5A000
direct allocation
page read and write
1A47000
heap
page read and write
DE0000
heap
page read and write
283E000
stack
page read and write
AC2000
heap
page read and write
191E000
stack
page read and write
1642000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
5D0E000
heap
page read and write
322E000
stack
page read and write
1A30000
trusted library allocation
page read and write
4CAB000
trusted library allocation
page read and write
504000
unkown
page readonly
5040000
trusted library allocation
page read and write
FEF000
stack
page read and write
1640000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
A7BE000
stack
page read and write
E90000
heap
page read and write
3381000
trusted library allocation
page read and write
2850000
heap
page execute and read and write
307B000
heap
page read and write
5864000
trusted library allocation
page read and write
4CC1000
trusted library allocation
page read and write
5190000
heap
page read and write
A21000
heap
page read and write
11BE000
stack
page read and write
7E3E000
stack
page read and write
17B0000
heap
page read and write
12E7000
direct allocation
page execute and read and write
5E40000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
4DD3000
heap
page read and write
161D000
trusted library allocation
page execute and read and write
CD0000
heap
page read and write
There are 324 hidden memdumps, click here to show them.