IOC Report
z2PaymentAdviceD00772795264733.exe

loading gif

Files

File Path
Type
Category
Malicious
z2PaymentAdviceD00772795264733.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z2PaymentAdviceD00772795264733.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpB018.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\YDKFDa.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\YDKFDa.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_z2PaymentAdviceD_164c51a5d229aa518dd17c3de4a35bd70dfff2c_68d82f61_79e08b0e-ca07-4f91-a818-252224a5049e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD37F.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Nov 21 06:02:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3DD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD40D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YDKFDa.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_10jtw2tl.eau.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3j4yt0gt.tnp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5gsnvkha.2o3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bj43j0zf.ymy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljsnq2wn.jtt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdv1ryt4.f03.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t45vent5.t15.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wxlrcx5r.fbs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpCA38.tmp
XML 1.0 document, ASCII text
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z2PaymentAdviceD00772795264733.exe
"C:\Users\user\Desktop\z2PaymentAdviceD00772795264733.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z2PaymentAdviceD00772795264733.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\YDKFDa.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YDKFDa" /XML "C:\Users\user\AppData\Local\Temp\tmpB018.tmp"
malicious
C:\Users\user\Desktop\z2PaymentAdviceD00772795264733.exe
"C:\Users\user\Desktop\z2PaymentAdviceD00772795264733.exe"
malicious
C:\Users\user\AppData\Roaming\YDKFDa.exe
C:\Users\user\AppData\Roaming\YDKFDa.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YDKFDa" /XML "C:\Users\user\AppData\Local\Temp\tmpCA38.tmp"
malicious
C:\Users\user\AppData\Roaming\YDKFDa.exe
"C:\Users\user\AppData\Roaming\YDKFDa.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7736 -s 196
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/ianiDataSet2.xsdM
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://tempuri.org/ianiDataSet.xsd
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://tempuri.org/ianiDataSet1.xsd
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 20 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
ProgramId
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
FileId
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
LowerCaseLongPath
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
LongPathHash
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
Name
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
OriginalFileName
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
Publisher
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
Version
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
BinFileVersion
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
BinaryType
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
ProductName
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
ProductVersion
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
LinkDate
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
BinProductVersion
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
AppxPackageFullName
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
AppxPackageRelativeId
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
Size
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
Language
\REGISTRY\A\{1ebbb459-a112-a2dc-1919-69e26dc4c92d}\Root\InventoryApplicationFile\z2paymentadviced|b93a06365e1f1933
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
15B0000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
CEE000
stack
page read and write
4E90000
trusted library allocation
page read and write
A1CD000
stack
page read and write
4EA0000
trusted library allocation
page read and write
9ECE000
stack
page read and write
6C20000
trusted library allocation
page read and write
AA2E000
stack
page read and write
5E7000
stack
page read and write
CA0000
trusted library allocation
page execute and read and write
15AD000
direct allocation
page execute and read and write
1D4D000
direct allocation
page execute and read and write
13A2000
direct allocation
page execute and read and write
4D03000
heap
page read and write
4FC0000
heap
page read and write
6AEE000
stack
page read and write
10DD000
stack
page read and write
4F40000
trusted library section
page readonly
53A0000
trusted library section
page read and write
5970000
heap
page read and write
2A4B000
trusted library allocation
page read and write
A0FC000
stack
page read and write
943000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
285D000
trusted library allocation
page read and write
3779000
trusted library allocation
page read and write
AB0000
heap
page read and write
A64E000
stack
page read and write
95A000
trusted library allocation
page execute and read and write
5B40000
heap
page read and write
4CF0000
trusted library allocation
page execute and read and write
A23E000
stack
page read and write
CFC000
stack
page read and write
A8EC000
stack
page read and write
329E000
stack
page read and write
263D000
trusted library allocation
page read and write
276F000
stack
page read and write
8AE000
stack
page read and write
933000
trusted library allocation
page execute and read and write
74CE000
stack
page read and write
6870000
heap
page read and write
967000
stack
page read and write
9D0000
heap
page read and write
C4E000
heap
page read and write
2656000
trusted library allocation
page read and write
1360000
direct allocation
page execute and read and write
9FFB000
stack
page read and write
2F0A000
stack
page read and write
2600000
trusted library allocation
page read and write
750D000
stack
page read and write
5290000
heap
page read and write
5960000
heap
page read and write
E80000
heap
page read and write
2ACD000
trusted library allocation
page read and write
987F000
stack
page read and write
25F0000
trusted library allocation
page read and write
A1D0000
heap
page read and write
4ED0000
trusted library allocation
page read and write
8D5000
heap
page read and write
930000
trusted library allocation
page read and write
3ACC000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
73AE000
stack
page read and write
4EB0000
heap
page execute and read and write
195E000
stack
page read and write
1366000
direct allocation
page execute and read and write
4E72000
trusted library allocation
page read and write
70B0000
trusted library allocation
page execute and read and write
76AE000
stack
page read and write
262E000
trusted library allocation
page read and write
3C27000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
A40E000
stack
page read and write
B90000
trusted library allocation
page read and write
C5F000
stack
page read and write
490B000
stack
page read and write
5170000
trusted library allocation
page execute and read and write
4EF5000
heap
page read and write
7050000
trusted library allocation
page execute and read and write
4FD0000
heap
page read and write
2F2A000
stack
page read and write
4E0000
unkown
page readonly
6F50000
heap
page read and write
12E0000
direct allocation
page execute and read and write
29BF000
stack
page read and write
2FBE000
unkown
page read and write
599E000
heap
page read and write
C9E000
stack
page read and write
962000
trusted library allocation
page read and write
96B000
trusted library allocation
page execute and read and write
9AFD000
stack
page read and write
DE0000
heap
page read and write
6AA0000
trusted library allocation
page read and write
850000
heap
page read and write
EEE000
stack
page read and write
A380000
trusted library allocation
page read and write
28B0000
heap
page read and write
9FCE000
stack
page read and write
6C30000
trusted library allocation
page execute and read and write
2FFE000
unkown
page read and write
1570000
heap
page read and write
5190000
heap
page read and write
5180000
heap
page read and write
70FE000
stack
page read and write
2F70000
heap
page read and write
6A90000
trusted library allocation
page execute and read and write
A0CE000
stack
page read and write
12E7000
direct allocation
page execute and read and write
98BE000
stack
page read and write
34E0000
heap
page read and write
4F3B000
stack
page read and write
C03000
heap
page read and write
8B7000
heap
page read and write
78BE000
stack
page read and write
B9D000
trusted library allocation
page execute and read and write
6A80000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
52B0000
trusted library allocation
page execute and read and write
980000
trusted library allocation
page read and write
4E9000
stack
page read and write
282D000
trusted library allocation
page read and write
99FD000
stack
page read and write
6B50000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
1420000
heap
page read and write
A92E000
stack
page read and write
FB0000
heap
page read and write
2FA0000
heap
page read and write
3760000
heap
page read and write
93D000
trusted library allocation
page execute and read and write
11DD000
stack
page read and write
2610000
trusted library allocation
page read and write
990000
heap
page read and write
A54E000
stack
page read and write
FB7000
heap
page read and write
BA3000
trusted library allocation
page read and write
99BE000
stack
page read and write
A31000
heap
page read and write
D40000
heap
page read and write
1BA9000
direct allocation
page execute and read and write
9C4000
heap
page read and write
9D3E000
stack
page read and write
3C69000
trusted library allocation
page read and write
BB6000
trusted library allocation
page execute and read and write
76B0000
heap
page read and write
4C70000
trusted library allocation
page read and write
F80000
heap
page read and write
7400000
trusted library section
page read and write
3A42000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
B3E000
stack
page read and write
9FBE000
stack
page read and write
BCE000
heap
page read and write
C5B000
heap
page read and write
BBA000
trusted library allocation
page execute and read and write
A4D000
heap
page read and write
4FD0000
heap
page read and write
15A0000
heap
page read and write
1D46000
direct allocation
page execute and read and write
C0B000
heap
page read and write
9C3E000
stack
page read and write
6BEE000
stack
page read and write
6C2A000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
4778000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
2768000
trusted library allocation
page read and write
4E60000
heap
page read and write
2ECD000
stack
page read and write
B94000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
1DC8000
direct allocation
page execute and read and write
8E0000
heap
page read and write
4FB0000
trusted library section
page readonly
687E000
heap
page read and write
1A80000
direct allocation
page execute and read and write
BE8000
heap
page read and write
A10000
heap
page read and write
F3E000
stack
page read and write
4CE2000
trusted library allocation
page read and write
1C1E000
direct allocation
page execute and read and write
532D000
stack
page read and write
287B000
trusted library allocation
page read and write
1D31000
direct allocation
page execute and read and write
5180000
heap
page read and write
4F50000
trusted library allocation
page read and write
967000
trusted library allocation
page execute and read and write
4FAB000
stack
page read and write
940000
trusted library allocation
page read and write
5280000
heap
page read and write
B80000
trusted library allocation
page read and write
7703000
heap
page read and write
3853000
trusted library allocation
page read and write
2A7D000
trusted library allocation
page read and write
977F000
stack
page read and write
380D000
trusted library allocation
page read and write
2631000
trusted library allocation
page read and write
86A000
stack
page read and write
A7EB000
stack
page read and write
1450000
heap
page read and write
A27E000
stack
page read and write
2636000
trusted library allocation
page read and write
754E000
stack
page read and write
2650000
trusted library allocation
page read and write
1A5F000
stack
page read and write
9EBE000
stack
page read and write
A3CF000
stack
page read and write
9D2000
heap
page read and write
AF5000
heap
page read and write
392D000
trusted library allocation
page read and write
2EED000
stack
page read and write
4CD0000
heap
page read and write
C01000
heap
page read and write
5B45000
heap
page read and write
28A0000
trusted library allocation
page read and write
6E3E000
stack
page read and write
9B00000
heap
page read and write
4E2000
unkown
page readonly
3771000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
34AF000
stack
page read and write
2810000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
2FFF000
unkown
page read and write
2820000
heap
page execute and read and write
2A1A000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
C68000
heap
page read and write
59B0000
heap
page read and write
2654000
trusted library allocation
page read and write
1306000
direct allocation
page execute and read and write
BAD000
trusted library allocation
page execute and read and write
2870000
trusted library allocation
page read and write
4F44000
trusted library section
page readonly
BA0000
trusted library allocation
page read and write
C8C000
heap
page read and write
1627000
heap
page read and write
71AE000
stack
page read and write
4FF0000
heap
page execute and read and write
EF0000
trusted library allocation
page read and write
AA40000
trusted library allocation
page read and write
A50E000
stack
page read and write
A13E000
stack
page read and write
D90000
heap
page read and write
BF5000
heap
page read and write
2830000
trusted library allocation
page read and write
39D7000
trusted library allocation
page read and write
4EF0000
heap
page read and write
42E000
remote allocation
page execute and read and write
C5D000
heap
page read and write
283B000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
FA0000
trusted library allocation
page execute and read and write
4ABC000
stack
page read and write
1409000
direct allocation
page execute and read and write
1620000
heap
page read and write
2890000
heap
page read and write
287D000
trusted library allocation
page read and write
2893000
heap
page read and write
1403000
direct allocation
page execute and read and write
4C90000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
39C1000
trusted library allocation
page read and write
6998000
heap
page read and write
1720000
heap
page read and write
2F90000
heap
page read and write
AA51000
trusted library allocation
page read and write
BC0000
heap
page read and write
6980000
heap
page read and write
156E000
stack
page read and write
DC7000
trusted library allocation
page execute and read and write
27CA000
trusted library allocation
page read and write
F7C000
stack
page read and write
98C000
stack
page read and write
956000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
860000
heap
page read and write
25EF000
stack
page read and write
4E80000
trusted library allocation
page execute and read and write
32D0000
heap
page read and write
4CE0000
trusted library allocation
page read and write
32AA000
heap
page read and write
2FB0000
heap
page read and write
8B0000
heap
page read and write
75AE000
stack
page read and write
1591000
direct allocation
page execute and read and write
38DF000
trusted library allocation
page read and write
934000
trusted library allocation
page read and write
99E000
heap
page read and write
4C65000
trusted library allocation
page read and write
6DFE000
stack
page read and write
950000
trusted library allocation
page read and write
76C5000
heap
page read and write
323F000
unkown
page read and write
F80000
heap
page read and write
4D00000
heap
page read and write
99A000
heap
page read and write
517D000
stack
page read and write
D30000
heap
page read and write
AF0000
heap
page read and write
DBE000
stack
page read and write
73EE000
stack
page read and write
261B000
trusted library allocation
page read and write
A37E000
stack
page read and write
1BAD000
direct allocation
page execute and read and write
2660000
heap
page execute and read and write
191F000
stack
page read and write
8D0000
heap
page read and write
3A1A000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
35E0000
heap
page read and write
94D000
trusted library allocation
page execute and read and write
6C7E000
stack
page read and write
B93000
trusted library allocation
page execute and read and write
3350000
heap
page read and write
32A0000
heap
page read and write
15A6000
direct allocation
page execute and read and write
A391000
trusted library allocation
page read and write
6B72000
trusted library allocation
page read and write
B7E000
stack
page read and write
DC2000
trusted library allocation
page read and write
389A000
trusted library allocation
page read and write
9D0000
heap
page read and write
D2C000
stack
page read and write
4E70000
trusted library allocation
page read and write
284E000
trusted library allocation
page read and write
76DB000
heap
page read and write
39C9000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
34EB000
heap
page read and write
DCB000
trusted library allocation
page execute and read and write
There are 324 hidden memdumps, click here to show them.