IOC Report
VXHv7tw0l9.exe

loading gif

Files

File Path
Type
Category
Malicious
VXHv7tw0l9.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VXHv7tw0l9.exe
"C:\Users\user\Desktop\VXHv7tw0l9.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\Desktop\VXHv7tw0l9.exe" "VXHv7tw0l9.exe" ENABLE
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

IPs

IP
Domain
Country
Malicious
49.228.131.165
unknown
Thailand
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\fa6b40864b6c109adbc85023cd1f59d2
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2B71000
trusted library allocation
page read and write
malicious
882000
unkown
page readonly
malicious
E40000
heap
page read and write
990000
heap
page read and write
4AB000
heap
page read and write
481000
heap
page read and write
4FE000
heap
page read and write
4B6000
heap
page read and write
534000
heap
page read and write
DC0000
heap
page read and write
F88000
heap
page read and write
509000
heap
page read and write
5071000
trusted library allocation
page read and write
4B1000
heap
page read and write
50F000
heap
page read and write
551000
heap
page read and write
4A8000
heap
page read and write
5310000
trusted library allocation
page execute and read and write
504000
heap
page read and write
501000
heap
page read and write
4FF000
heap
page read and write
2C19000
trusted library allocation
page read and write
50B000
heap
page read and write
535000
heap
page read and write
29C0000
trusted library allocation
page execute and read and write
4FF000
heap
page read and write
534000
heap
page read and write
980000
heap
page read and write
538000
heap
page read and write
E70000
trusted library allocation
page read and write
511000
heap
page read and write
E53000
trusted library allocation
page read and write
481000
heap
page read and write
2B30000
trusted library allocation
page read and write
2B34000
trusted library allocation
page read and write
4FE000
heap
page read and write
538000
heap
page read and write
521C000
stack
page read and write
5730000
heap
page read and write
4BB000
heap
page read and write
505B000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
4BA000
heap
page read and write
4F9000
heap
page read and write
4C05000
heap
page read and write
E63000
trusted library allocation
page execute and read and write
507000
heap
page read and write
4C15000
heap
page read and write
50B000
heap
page read and write
4B78000
trusted library allocation
page read and write
538000
heap
page read and write
50E0000
trusted library allocation
page read and write
4CD000
heap
page read and write
4AB000
heap
page read and write
55E000
heap
page read and write
4F6000
heap
page read and write
4BE0000
heap
page read and write
52BE000
stack
page read and write
1C4000
stack
page read and write
4C14000
heap
page read and write
59E000
unkown
page read and write
2B40000
trusted library allocation
page read and write
534000
heap
page read and write
4B9000
heap
page read and write
4EF000
heap
page read and write
EE8000
heap
page read and write
50DC000
stack
page read and write
553000
heap
page read and write
4BA000
heap
page read and write
4B3000
heap
page read and write
4C09000
heap
page read and write
880000
unkown
page readonly
3B71000
trusted library allocation
page read and write
E64000
trusted library allocation
page read and write
2B60000
heap
page read and write
5320000
heap
page execute and read and write
2C0A000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
4C19000
heap
page read and write
506E000
trusted library allocation
page read and write
430000
heap
page read and write
5056000
trusted library allocation
page read and write
55E000
heap
page read and write
7FA40000
trusted library allocation
page execute and read and write
910000
heap
page read and write
507000
heap
page read and write
14DF000
stack
page read and write
966000
heap
page read and write
5E30000
heap
page read and write
4EF000
heap
page read and write
4C07000
heap
page read and write
F20000
heap
page read and write
919000
stack
page read and write
E73000
trusted library allocation
page read and write
4B8F000
stack
page read and write
4F4000
heap
page read and write
4BE1000
heap
page read and write
474000
heap
page read and write
4EF000
heap
page read and write
4D6000
heap
page read and write
55A000
heap
page read and write
4C07000
heap
page read and write
4C1A000
heap
page read and write
4A7000
heap
page read and write
4FE000
heap
page read and write
E80000
trusted library allocation
page read and write
E97000
trusted library allocation
page execute and read and write
E60000
trusted library allocation
page read and write
4AB000
heap
page read and write
556000
heap
page read and write
4C17000
heap
page read and write
507D000
trusted library allocation
page read and write
E9B000
trusted library allocation
page execute and read and write
7ED000
stack
page read and write
4BA000
heap
page read and write
4D0000
heap
page read and write
55E000
heap
page read and write
4CD000
heap
page read and write
558000
heap
page read and write
4B7000
heap
page read and write
5D0000
heap
page read and write
9E0000
heap
page read and write
5260000
trusted library allocation
page read and write
4F0000
heap
page read and write
E7D000
trusted library allocation
page execute and read and write
4AE000
heap
page read and write
E6D000
trusted library allocation
page execute and read and write
4FE000
heap
page read and write
4AE000
heap
page read and write
4F8000
heap
page read and write
4B5000
heap
page read and write
4B4000
heap
page read and write
4C02000
heap
page read and write
4C14000
heap
page read and write
4F1000
heap
page read and write
4F3000
heap
page read and write
2C20000
trusted library allocation
page read and write
4BB000
heap
page read and write
9F0000
heap
page read and write
4C04000
heap
page read and write
4AE000
heap
page read and write
460000
heap
page read and write
29BE000
stack
page read and write
8EE000
stack
page read and write
62F0000
trusted library allocation
page read and write
440000
heap
page read and write
538000
heap
page read and write
9DE000
stack
page read and write
4C00000
heap
page read and write
4F9000
heap
page read and write
4F7000
heap
page read and write
4FC000
heap
page read and write
5054000
trusted library allocation
page read and write
10DE000
stack
page read and write
4AB000
heap
page read and write
2DD9000
trusted library allocation
page read and write
507000
heap
page read and write
505E000
trusted library allocation
page read and write
F23000
heap
page read and write
F07000
heap
page read and write
4C06000
heap
page read and write
4CD000
heap
page read and write
4D0E000
stack
page read and write
54CE000
stack
page read and write
538000
heap
page read and write
4D6000
heap
page read and write
506000
heap
page read and write
5076000
trusted library allocation
page read and write
1CB000
stack
page read and write
E8A000
trusted library allocation
page execute and read and write
4C19000
heap
page read and write
538000
heap
page read and write
6020000
heap
page read and write
4F5000
heap
page read and write
535000
heap
page read and write
535000
heap
page read and write
CB000
stack
page read and write
5F1B000
stack
page read and write
4C17000
heap
page read and write
EC0000
heap
page read and write
4B7000
heap
page read and write
481000
heap
page read and write
50D000
heap
page read and write
2B2C000
stack
page read and write
4C07000
heap
page read and write
E59000
trusted library allocation
page read and write
550000
heap
page read and write
4C17000
heap
page read and write
534000
heap
page read and write
504000
heap
page read and write
50D000
heap
page read and write
4BC000
heap
page read and write
632D000
heap
page read and write
4F7000
heap
page read and write
4C18000
heap
page read and write
5A0000
heap
page read and write
508000
heap
page read and write
4D6000
heap
page read and write
4F1000
heap
page read and write
4C09000
heap
page read and write
7AF000
unkown
page read and write
4B1000
heap
page read and write
4B4000
heap
page read and write
4EF000
heap
page read and write
552000
heap
page read and write
4FF000
heap
page read and write
F50000
heap
page read and write
496000
heap
page read and write
5082000
trusted library allocation
page read and write
4BA000
heap
page read and write
4F4000
heap
page read and write
5259000
stack
page read and write
2D2B000
trusted library allocation
page read and write
5062000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
1BE000
stack
page read and write
4F9000
heap
page read and write
4990000
heap
page read and write
534000
heap
page read and write
4F8000
heap
page read and write
29D0000
trusted library allocation
page read and write
4FB000
heap
page read and write
50B000
heap
page read and write
534000
heap
page read and write
5270000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
4F9000
heap
page read and write
EE0000
heap
page read and write
E86000
trusted library allocation
page execute and read and write
EEE000
heap
page read and write
1CE000
stack
page read and write
2C13000
trusted library allocation
page read and write
13DE000
stack
page read and write
555000
heap
page read and write
6300000
trusted library allocation
page execute and read and write
555000
heap
page read and write
4A7000
heap
page read and write
4EF000
heap
page read and write
50F000
heap
page read and write
471000
heap
page read and write
51C9000
stack
page read and write
51D3000
heap
page read and write
499000
heap
page read and write
CF7000
stack
page read and write
E45000
heap
page read and write
4B7000
heap
page read and write
4C07000
heap
page read and write
2B37000
trusted library allocation
page read and write
151E000
stack
page read and write
4F1000
heap
page read and write
535000
heap
page read and write
601C000
stack
page read and write
62E0000
trusted library allocation
page read and write
508000
heap
page read and write
960000
heap
page read and write
50E000
heap
page read and write
530000
heap
page read and write
4B9000
heap
page read and write
5D5000
heap
page read and write
4F4000
heap
page read and write
6324000
heap
page read and write
4C17000
heap
page read and write
468000
heap
page read and write
4C0C000
heap
page read and write
E92000
trusted library allocation
page read and write
29E0000
heap
page execute and read and write
51D0000
heap
page read and write
501000
heap
page read and write
2AEE000
stack
page read and write
6320000
heap
page read and write
4CE000
heap
page read and write
4FE000
heap
page read and write
50F000
heap
page read and write
500000
heap
page read and write
4A7000
heap
page read and write
5780000
trusted library allocation
page execute and read and write
2C11000
trusted library allocation
page read and write
55E000
heap
page read and write
4D6000
heap
page read and write
FCB000
heap
page read and write
533000
heap
page read and write
4F1000
heap
page read and write
EB0000
trusted library allocation
page read and write
FA4000
heap
page read and write
There are 274 hidden memdumps, click here to show them.