IOC Report
yVhGfho0R4.exe

loading gif

Files

File Path
Type
Category
Malicious
yVhGfho0R4.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yVhGfho0R4.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv28F9.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xc7dcb1fc, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\ghpxetgawuzqhlhqyiosoy
Unicode text, UTF-16, little-endian text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\yVhGfho0R4.exe
"C:\Users\user\Desktop\yVhGfho0R4.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\ghpxetgawuzqhlhqyiosoy"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\aeiaxebwykjatxryydovbqttyepx"
malicious

URLs

Name
IP
Malicious
103.186.116.220
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://www.fontbureau.com/designersG
unknown
http://www.imvu.comr
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
unknown
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
unknown
http://www.fontbureau.com/designers?
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
unknown
http://www.goodfont.co.kr
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://www.google.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://geoplugin.net/json.gp/C
unknown
http://geoplugin.net/json.gplgqL3)
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
unknown
https://login.yahoo.com/config/login
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.nirsoft.net/
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://www.office.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://www.carterandcone.coml
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
unknown
https://www.google.com/accounts/servicelogin
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
unknown
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
unknown
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
unknown
http://www.ebuddy.com
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
malicious
bg.microsoft.map.fastly.net
199.232.214.172
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
103.186.116.220
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-9XV80Z
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-9XV80Z
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-9XV80Z
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B37000
heap
page read and write
malicious
3F69000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4A6A000
trusted library allocation
page read and write
malicious
AC5000
heap
page read and write
1270000
heap
page read and write
57F0000
trusted library allocation
page read and write
45D000
system
page execute and read and write
2FCC000
trusted library allocation
page read and write
13AB000
heap
page read and write
478000
remote allocation
page execute and read and write
B8F000
heap
page read and write
2EFF000
stack
page read and write
3580000
heap
page read and write
75FE000
stack
page read and write
5600000
heap
page read and write
ABF000
stack
page read and write
53C0000
trusted library allocation
page read and write
11FE000
stack
page read and write
358A000
heap
page read and write
400000
system
page execute and read and write
AD0000
heap
page read and write
7090000
trusted library allocation
page read and write
1180000
heap
page read and write
45C000
system
page execute and read and write
5590000
trusted library allocation
page read and write
459000
system
page execute and read and write
12F1000
heap
page read and write
3588000
heap
page read and write
5800000
heap
page read and write
456000
system
page execute and read and write
13E0000
heap
page read and write
2790000
heap
page read and write
400000
system
page execute and read and write
760F000
trusted library allocation
page read and write
5805000
heap
page read and write
1500000
trusted library allocation
page read and write
B6C000
heap
page read and write
12DC000
stack
page read and write
BA6000
heap
page read and write
1516000
trusted library allocation
page execute and read and write
1527000
trusted library allocation
page execute and read and write
3480000
heap
page read and write
70B2000
trusted library allocation
page read and write
2FB0000
heap
page read and write
289F000
stack
page read and write
BB1000
heap
page read and write
13F8000
heap
page read and write
B95000
heap
page read and write
13EE000
stack
page read and write
93C000
stack
page read and write
2F1D000
heap
page read and write
5620000
trusted library allocation
page execute and read and write
53EE000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
12F3000
heap
page read and write
1320000
heap
page read and write
5430000
trusted library allocation
page read and write
299E000
heap
page read and write
1185000
heap
page read and write
10016000
direct allocation
page execute and read and write
294B000
heap
page read and write
7A5D000
stack
page read and write
338F000
stack
page read and write
DD7000
stack
page read and write
55F0000
trusted library section
page readonly
A97E000
stack
page read and write
8040000
trusted library section
page read and write
1458000
heap
page read and write
1540000
trusted library allocation
page read and write
FB0000
heap
page read and write
3000000
heap
page read and write
53D4000
trusted library allocation
page read and write
B52000
unkown
page readonly
53FD000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
BB8000
heap
page read and write
1530000
heap
page read and write
1248000
heap
page read and write
5440000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
5598000
trusted library allocation
page read and write
F4C000
stack
page read and write
12B0000
heap
page read and write
150D000
trusted library allocation
page execute and read and write
328E000
stack
page read and write
14F4000
trusted library allocation
page read and write
3F61000
trusted library allocation
page read and write
B50000
unkown
page readonly
12EF000
stack
page read and write
DD9000
stack
page read and write
5FD7000
heap
page read and write
12F3000
stack
page read and write
1730000
heap
page execute and read and write
1240000
heap
page read and write
1550000
heap
page read and write
1110000
heap
page read and write
5420000
heap
page read and write
7620000
trusted library allocation
page execute and read and write
172E000
stack
page read and write
28A0000
heap
page read and write
5FB1000
heap
page read and write
3540000
heap
page read and write
5630000
heap
page execute and read and write
2F2D000
heap
page read and write
7605000
trusted library allocation
page read and write
3060000
heap
page read and write
14EE000
stack
page read and write
3160000
heap
page read and write
83C000
stack
page read and write
5610000
heap
page read and write
13E0000
heap
page read and write
5402000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
116E000
stack
page read and write
57E0000
trusted library allocation
page read and write
81FE000
stack
page read and write
2918000
heap
page read and write
17AE000
heap
page read and write
5470000
trusted library allocation
page read and write
14F0000
trusted library allocation
page read and write
13D0000
heap
page read and write
9A0000
heap
page read and write
802E000
stack
page read and write
1260000
heap
page read and write
12BE000
heap
page read and write
53D0000
trusted library allocation
page read and write
7490000
heap
page read and write
7C6E000
stack
page read and write
474000
remote allocation
page execute and read and write
7600000
trusted library allocation
page read and write
7F2E000
stack
page read and write
CDC000
stack
page read and write
2F5E000
stack
page read and write
2D78000
trusted library allocation
page read and write
1040000
heap
page read and write
15EF000
stack
page read and write
143F000
stack
page read and write
2FCA000
trusted library allocation
page read and write
AC0000
heap
page read and write
12D7000
stack
page read and write
EFC000
stack
page read and write
7FD50000
trusted library allocation
page execute and read and write
1503000
trusted library allocation
page read and write
2F61000
trusted library allocation
page read and write
C42000
unkown
page readonly
7E6E000
stack
page read and write
14FD000
trusted library allocation
page execute and read and write
14F3000
trusted library allocation
page execute and read and write
139E000
stack
page read and write
1740000
trusted library allocation
page execute and read and write
152B000
trusted library allocation
page execute and read and write
400000
system
page execute and read and write
FFE000
stack
page read and write
5740000
heap
page read and write
8030000
trusted library section
page read and write
1030000
heap
page read and write
505C000
stack
page read and write
128E000
stack
page read and write
C40000
heap
page read and write
142E000
stack
page read and write
41B000
system
page execute and read and write
13F0000
heap
page read and write
2F23000
heap
page read and write
1450000
heap
page read and write
1280000
heap
page read and write
53F1000
trusted library allocation
page read and write
164F000
stack
page read and write
115E000
stack
page read and write
1570000
heap
page read and write
1750000
heap
page read and write
2F31000
heap
page read and write
59CE000
stack
page read and write
1522000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
B30000
heap
page read and write
1170000
heap
page read and write
12A0000
trusted library allocation
page read and write
590D000
stack
page read and write
53A0000
heap
page read and write
3800000
heap
page read and write
17A0000
heap
page read and write
5FB9000
heap
page read and write
2E50000
heap
page read and write
7D6E000
stack
page read and write
5423000
heap
page read and write
54B0000
heap
page read and write
3584000
heap
page read and write
54C0000
trusted library allocation
page execute and read and write
13D5000
heap
page read and write
59D0000
trusted library allocation
page read and write
CDA000
stack
page read and write
270F000
stack
page read and write
5410000
trusted library allocation
page read and write
2F00000
heap
page read and write
12B8000
heap
page read and write
594E000
stack
page read and write
140E000
heap
page read and write
55EB000
stack
page read and write
1512000
trusted library allocation
page read and write
C30000
heap
page read and write
5F90000
heap
page read and write
598E000
stack
page read and write
1050000
heap
page read and write
151A000
trusted library allocation
page execute and read and write
260E000
stack
page read and write
2710000
heap
page read and write
E2F000
stack
page read and write
12D9000
heap
page read and write
FFB000
stack
page read and write
473000
system
page execute and read and write
2DFE000
stack
page read and write
1520000
trusted library allocation
page read and write
2E4B000
stack
page read and write
7630000
trusted library allocation
page read and write
335F000
stack
page read and write
276E000
stack
page read and write
1757000
heap
page read and write
5FA0000
heap
page read and write
54D0000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
10001000
direct allocation
page execute and read and write
There are 214 hidden memdumps, click here to show them.