IOC Report
vTHGfiwMDeoOH5a.exe

loading gif

Files

File Path
Type
Category
Malicious
vTHGfiwMDeoOH5a.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vTHGfiwMDeoOH5a.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuza3cnf.3k0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mr1kh3f1.hqq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_scvnydfv.gi1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0qllomw.uzq.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe
"C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe"
malicious
C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe
"C:\Users\user\Desktop\vTHGfiwMDeoOH5a.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 16 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
FF0000
direct allocation
page read and write
malicious
A29F000
stack
page read and write
127F000
stack
page read and write
A19D000
stack
page read and write
100D000
trusted library allocation
page execute and read and write
FDE000
stack
page read and write
E3E000
stack
page read and write
7A0F000
stack
page read and write
51FB000
trusted library allocation
page read and write
A63E000
stack
page read and write
5250000
trusted library allocation
page read and write
109E000
stack
page read and write
1026000
trusted library allocation
page execute and read and write
2AC0000
trusted library allocation
page read and write
50E4000
heap
page read and write
D68000
heap
page read and write
2E19000
trusted library allocation
page read and write
CAE000
stack
page read and write
680000
unkown
page readonly
30EA000
trusted library allocation
page read and write
EF0000
heap
page read and write
EDE000
stack
page read and write
A53E000
stack
page read and write
6D50000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
30D9000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
7DA000
stack
page read and write
7500000
trusted library section
page read and write
29EE000
stack
page read and write
30CF000
trusted library allocation
page read and write
30D3000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
C10000
heap
page read and write
A01E000
stack
page read and write
2F50000
trusted library allocation
page read and write
2E2E000
trusted library allocation
page read and write
EE0000
heap
page read and write
CB0000
heap
page read and write
2E05000
trusted library allocation
page read and write
2E6C000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
52C0000
heap
page read and write
738E000
stack
page read and write
1609000
direct allocation
page execute and read and write
73DC000
heap
page read and write
2B1A000
trusted library allocation
page read and write
5440000
heap
page read and write
A7BC000
stack
page read and write
2EBF000
trusted library allocation
page read and write
102A000
trusted library allocation
page execute and read and write
30FC000
trusted library allocation
page read and write
17A6000
direct allocation
page execute and read and write
E80000
heap
page read and write
1020000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
DDB000
heap
page read and write
303B000
trusted library allocation
page read and write
10A8000
trusted library allocation
page read and write
52D0000
trusted library allocation
page execute and read and write
3AF1000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
A15E000
stack
page read and write
D85000
heap
page read and write
A8BC000
stack
page read and write
1037000
trusted library allocation
page execute and read and write
75A0000
trusted library allocation
page execute and read and write
30B6000
trusted library allocation
page read and write
6D72000
trusted library allocation
page read and write
1147000
heap
page read and write
30F8000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page execute and read and write
5445000
heap
page read and write
2FB8000
trusted library allocation
page read and write
3064000
trusted library allocation
page read and write
A8D0000
trusted library allocation
page read and write
CFF000
heap
page read and write
1019000
trusted library allocation
page read and write
AF7000
stack
page read and write
73FD000
heap
page read and write
1004000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
A4FF000
stack
page read and write
74B0000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
A05D000
stack
page read and write
2F8E000
trusted library allocation
page read and write
9CD000
stack
page read and write
75EE000
stack
page read and write
3D25000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
1828000
direct allocation
page execute and read and write
1050000
trusted library allocation
page read and write
103B000
trusted library allocation
page execute and read and write
5050000
heap
page read and write
1087000
heap
page read and write
CE0000
heap
page read and write
3AFD000
trusted library allocation
page read and write
7390000
trusted library section
page read and write
CEE000
heap
page read and write
1022000
trusted library allocation
page read and write
74C0000
trusted library allocation
page read and write
101D000
trusted library allocation
page execute and read and write
3AF9000
trusted library allocation
page read and write
2ED4000
trusted library allocation
page read and write
2FD4000
trusted library allocation
page read and write
5560000
heap
page read and write
30EF000
trusted library allocation
page read and write
2DB3000
trusted library allocation
page read and write
2AB0000
trusted library allocation
page read and write
D20000
heap
page read and write
137F000
stack
page read and write
30D5000
trusted library allocation
page read and write
52A0000
trusted library section
page readonly
1035000
trusted library allocation
page execute and read and write
1080000
heap
page read and write
A67E000
stack
page read and write
51F0000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
2A4B000
stack
page read and write
75F0000
trusted library allocation
page read and write
2B88000
trusted library allocation
page read and write
5222000
trusted library allocation
page read and write
160D000
direct allocation
page execute and read and write
527D000
trusted library allocation
page read and write
73C2000
heap
page read and write
715E000
heap
page read and write
5579000
heap
page read and write
53CC000
stack
page read and write
FF0000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
1032000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
DA1000
heap
page read and write
2FE9000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
682000
unkown
page readonly
2E57000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page read and write
2E81000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
3012000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
A3FE000
stack
page read and write
1791000
direct allocation
page execute and read and write
52B0000
heap
page read and write
73BC000
heap
page read and write
3026000
trusted library allocation
page read and write
17AD000
direct allocation
page execute and read and write
5230000
trusted library allocation
page read and write
520E000
trusted library allocation
page read and write
7F360000
trusted library allocation
page execute and read and write
30E6000
trusted library allocation
page read and write
73B0000
heap
page read and write
2EE8000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
2F3B000
trusted library allocation
page read and write
5211000
trusted library allocation
page read and write
A77E000
stack
page read and write
5255000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
29F0000
trusted library allocation
page execute and read and write
2EAA000
trusted library allocation
page read and write
14E0000
direct allocation
page execute and read and write
5570000
heap
page read and write
502F000
stack
page read and write
5060000
heap
page execute and read and write
2FCC000
trusted library allocation
page read and write
55B0000
heap
page read and write
2EFD000
trusted library allocation
page read and write
2AAE000
stack
page read and write
559E000
heap
page read and write
30E1000
trusted library allocation
page read and write
C6E000
stack
page read and write
5280000
trusted library allocation
page read and write
CEA000
heap
page read and write
2DC7000
trusted library allocation
page read and write
D23000
heap
page read and write
2FA3000
trusted library allocation
page read and write
4BEC000
stack
page read and write
728E000
stack
page read and write
C20000
heap
page read and write
D66000
heap
page read and write
E40000
heap
page read and write
CFD000
stack
page read and write
167E000
direct allocation
page execute and read and write
2E95000
trusted library allocation
page read and write
763E000
stack
page read and write
2AE0000
heap
page read and write
C25000
heap
page read and write
3CCA000
trusted library allocation
page read and write
5063000
heap
page execute and read and write
D7B000
heap
page read and write
2A00000
heap
page execute and read and write
1140000
heap
page read and write
1003000
trusted library allocation
page execute and read and write
ECE000
stack
page read and write
51E0000
trusted library allocation
page read and write
5450000
heap
page read and write
1030000
trusted library allocation
page read and write
555E000
stack
page read and write
D15000
heap
page read and write
2A50000
heap
page read and write
52E0000
heap
page execute and read and write
5240000
trusted library allocation
page read and write
50E0000
heap
page read and write
3079000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
7150000
heap
page read and write
B30000
heap
page read and write
DAB000
heap
page read and write
30A2000
trusted library allocation
page read and write
There are 208 hidden memdumps, click here to show them.