IOC Report
Payment Advice D 0024679526 3930.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment Advice D 0024679526 3930.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment Advice D 0024679526 3930.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp7D3C.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\OyXCaSLaAXfAKx.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\OyXCaSLaAXfAKx.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\OyXCaSLaAXfAKx.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5alykqpv.400.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_adwrnhbt.uv1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmz5baya.k3h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ho1fhmnl.nwg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m55eogfc.nfv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_neppi3vh.drh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_otgoey53.eai.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pqs1f13z.5kv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9633.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment Advice D 0024679526 3930.exe
"C:\Users\user\Desktop\Payment Advice D 0024679526 3930.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment Advice D 0024679526 3930.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OyXCaSLaAXfAKx.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OyXCaSLaAXfAKx" /XML "C:\Users\user\AppData\Local\Temp\tmp7D3C.tmp"
malicious
C:\Users\user\Desktop\Payment Advice D 0024679526 3930.exe
"C:\Users\user\Desktop\Payment Advice D 0024679526 3930.exe"
malicious
C:\Users\user\AppData\Roaming\OyXCaSLaAXfAKx.exe
C:\Users\user\AppData\Roaming\OyXCaSLaAXfAKx.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OyXCaSLaAXfAKx" /XML "C:\Users\user\AppData\Local\Temp\tmp9633.tmp"
malicious
C:\Users\user\AppData\Roaming\OyXCaSLaAXfAKx.exe
"C:\Users\user\AppData\Roaming\OyXCaSLaAXfAKx.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fp2e7a.wpc.phicdn.net
192.229.221.95

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
14C0000
direct allocation
page read and write
malicious
56A0000
trusted library allocation
page execute and read and write
7C5E000
stack
page read and write
71C8000
heap
page read and write
1323000
trusted library allocation
page read and write
3040000
heap
page read and write
151F000
stack
page read and write
B25E000
stack
page read and write
2ED0000
trusted library allocation
page read and write
55E2000
trusted library allocation
page read and write
1382000
heap
page read and write
2D80000
heap
page read and write
55B0000
trusted library allocation
page read and write
132D000
trusted library allocation
page execute and read and write
D42000
unkown
page readonly
58A0000
heap
page read and write
28DF000
stack
page read and write
11FF000
stack
page read and write
1310000
trusted library allocation
page read and write
A20D000
stack
page read and write
106E000
heap
page read and write
2F5B000
stack
page read and write
A69F000
stack
page read and write
2990000
heap
page read and write
4159000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
13E1000
heap
page read and write
7170000
heap
page read and write
1360000
direct allocation
page execute and read and write
3256000
trusted library allocation
page read and write
1065000
heap
page read and write
302B000
trusted library allocation
page read and write
174E000
direct allocation
page execute and read and write
1374000
heap
page read and write
598E000
stack
page read and write
CFC000
stack
page read and write
12D5000
heap
page read and write
5310000
trusted library allocation
page read and write
1417000
heap
page read and write
5650000
trusted library section
page readonly
1020000
heap
page read and write
A6AF000
stack
page read and write
5790000
heap
page read and write
57E0000
heap
page read and write
131D000
trusted library allocation
page execute and read and write
12CF000
stack
page read and write
29D0000
heap
page read and write
AE9E000
stack
page read and write
13BE000
stack
page read and write
7890000
heap
page read and write
5940000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
125E000
stack
page read and write
4275000
trusted library allocation
page read and write
AAAE000
stack
page read and write
F07000
heap
page read and write
7000000
heap
page read and write
6160000
heap
page read and write
E0E000
stack
page read and write
5860000
trusted library allocation
page read and write
1260000
heap
page read and write
AC1F000
stack
page read and write
1390000
trusted library allocation
page read and write
139A000
trusted library allocation
page execute and read and write
1330000
trusted library allocation
page read and write
1000000
heap
page read and write
291A000
stack
page read and write
2EBB000
trusted library allocation
page execute and read and write
5905000
heap
page read and write
14BF000
stack
page read and write
55DD000
trusted library allocation
page read and write
6120000
heap
page read and write
1386000
direct allocation
page execute and read and write
2F70000
heap
page execute and read and write
1396000
trusted library allocation
page execute and read and write
42E000
remote allocation
page execute and read and write
A86E000
stack
page read and write
2FC0000
heap
page execute and read and write
30D0000
trusted library allocation
page read and write
3FD1000
trusted library allocation
page read and write
2C5B000
heap
page read and write
2F60000
heap
page read and write
133A000
trusted library allocation
page execute and read and write
5412000
trusted library allocation
page read and write
100E000
heap
page read and write
A9DD000
stack
page read and write
2DBE000
stack
page read and write
73F0000
trusted library allocation
page read and write
700E000
heap
page read and write
7690000
heap
page read and write
5370000
trusted library allocation
page read and write
9F0000
heap
page read and write
2FD1000
trusted library allocation
page read and write
7892000
heap
page read and write
1367000
direct allocation
page execute and read and write
7990000
trusted library allocation
page read and write
134A000
heap
page read and write
370000
heap
page read and write
F37000
stack
page read and write
73E0000
trusted library allocation
page execute and read and write
2F1E000
stack
page read and write
532B000
trusted library allocation
page read and write
B271000
trusted library allocation
page read and write
1035000
heap
page read and write
1336000
trusted library allocation
page execute and read and write
5B40000
trusted library allocation
page execute and read and write
5910000
trusted library allocation
page execute and read and write
5400000
heap
page read and write
543B000
trusted library allocation
page read and write
1332000
trusted library allocation
page read and write
1040000
heap
page read and write
2F88000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page execute and read and write
592B000
stack
page read and write
A89F000
stack
page read and write
A44E000
stack
page read and write
55D1000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
140E000
stack
page read and write
5920000
trusted library allocation
page read and write
3020000
heap
page read and write
18F8000
direct allocation
page execute and read and write
593A000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
78B8000
heap
page read and write
55F0000
trusted library allocation
page read and write
76DE000
stack
page read and write
55A0000
trusted library allocation
page read and write
43F5000
trusted library allocation
page read and write
40B4000
trusted library allocation
page read and write
1383000
trusted library allocation
page read and write
137F000
stack
page read and write
7290000
trusted library allocation
page read and write
6129000
heap
page read and write
42A2000
trusted library allocation
page read and write
380000
heap
page read and write
1200000
heap
page read and write
53A0000
trusted library allocation
page read and write
140F000
heap
page read and write
1876000
direct allocation
page execute and read and write
55D6000
trusted library allocation
page read and write
A96F000
stack
page read and write
1092000
heap
page read and write
16DD000
direct allocation
page execute and read and write
7180000
heap
page read and write
1370000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
BBD000
stack
page read and write
5930000
trusted library allocation
page read and write
524C000
stack
page read and write
78BE000
stack
page read and write
B11C000
stack
page read and write
58C0000
trusted library allocation
page execute and read and write
2EB2000
trusted library allocation
page read and write
5680000
heap
page read and write
FB5000
heap
page read and write
ECA000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
1313000
trusted library allocation
page execute and read and write
B15E000
stack
page read and write
7199000
heap
page read and write
187D000
direct allocation
page execute and read and write
718C000
heap
page read and write
1380000
heap
page read and write
534D000
trusted library allocation
page read and write
58EE000
stack
page read and write
55CE000
trusted library allocation
page read and write
13A2000
trusted library allocation
page read and write
2980000
heap
page read and write
13E0000
direct allocation
page execute and read and write
53C0000
trusted library allocation
page read and write
40FA000
trusted library allocation
page read and write
A5AE000
stack
page read and write
7C1E000
stack
page read and write
30A000
stack
page read and write
5880000
trusted library section
page readonly
6110000
heap
page read and write
3151000
trusted library allocation
page read and write
13E6000
direct allocation
page execute and read and write
1416000
heap
page read and write
1410000
heap
page read and write
170F000
stack
page read and write
2EB7000
trusted library allocation
page execute and read and write
1320000
heap
page read and write
5932000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
5F00000
heap
page read and write
5B30000
trusted library section
page read and write
D40000
unkown
page readonly
73AE000
stack
page read and write
5366000
trusted library allocation
page read and write
15A0000
heap
page read and write
7899000
heap
page read and write
72AE000
stack
page read and write
13A7000
trusted library allocation
page execute and read and write
3118000
trusted library allocation
page read and write
27A0000
heap
page read and write
A72B000
stack
page read and write
418D000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
7BDE000
stack
page read and write
5615000
trusted library allocation
page read and write
1267000
heap
page read and write
AD5E000
stack
page read and write
E39000
stack
page read and write
A34D000
stack
page read and write
7182000
heap
page read and write
5640000
heap
page execute and read and write
1042000
heap
page read and write
5654000
trusted library section
page readonly
1360000
trusted library allocation
page read and write
1210000
heap
page read and write
72B2000
trusted library allocation
page read and write
26BE000
stack
page read and write
563B000
stack
page read and write
1422000
direct allocation
page execute and read and write
5B2D000
stack
page read and write
320A000
trusted library allocation
page read and write
5890000
heap
page read and write
808E000
stack
page read and write
29CE000
unkown
page read and write
7A4E000
stack
page read and write
406D000
trusted library allocation
page read and write
1367000
heap
page read and write
7F00000
trusted library section
page read and write
3FD9000
trusted library allocation
page read and write
5B55000
heap
page read and write
3020000
heap
page read and write
27AB000
heap
page read and write
1483000
direct allocation
page execute and read and write
15B0000
direct allocation
page execute and read and write
135F000
heap
page read and write
A9E0000
heap
page read and write
1140000
heap
page read and write
13D0000
heap
page read and write
12D0000
heap
page read and write
12F0000
heap
page read and write
127E000
stack
page read and write
5420000
trusted library allocation
page execute and read and write
FFE000
stack
page read and write
7A00000
trusted library allocation
page read and write
4151000
trusted library allocation
page read and write
771E000
stack
page read and write
A8DD000
stack
page read and write
AD9E000
stack
page read and write
5410000
trusted library allocation
page read and write
134E000
heap
page read and write
1626000
direct allocation
page execute and read and write
A9AD000
stack
page read and write
F40000
heap
page read and write
5F10000
heap
page read and write
12CD000
stack
page read and write
4237000
trusted library allocation
page read and write
79F0000
trusted library allocation
page execute and read and write
5346000
trusted library allocation
page read and write
2C50000
heap
page read and write
55BB000
trusted library allocation
page read and write
A79E000
stack
page read and write
5352000
trusted library allocation
page read and write
1000000
heap
page read and write
F30000
heap
page read and write
109C000
heap
page read and write
5610000
trusted library allocation
page read and write
E04000
unkown
page readonly
5324000
trusted library allocation
page read and write
533E000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
E10000
heap
page read and write
F80000
heap
page read and write
58E0000
heap
page execute and read and write
1340000
heap
page read and write
26C0000
heap
page read and write
5385000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
1611000
direct allocation
page execute and read and write
5390000
heap
page read and write
EA0000
direct allocation
page read and write
5430000
trusted library allocation
page read and write
58B0000
heap
page read and write
1300000
trusted library allocation
page read and write
138D000
trusted library allocation
page execute and read and write
13C6000
heap
page read and write
71B1000
heap
page read and write
A10D000
stack
page read and write
16D9000
direct allocation
page execute and read and write
9F8F000
stack
page read and write
1373000
trusted library allocation
page execute and read and write
AC5E000
stack
page read and write
1861000
direct allocation
page execute and read and write
2FBB000
stack
page read and write
F00000
heap
page read and write
413F000
trusted library allocation
page read and write
12FF000
stack
page read and write
79A0000
trusted library allocation
page read and write
137D000
trusted library allocation
page execute and read and write
1008000
heap
page read and write
EFC000
stack
page read and write
1320000
trusted library allocation
page read and write
F97000
stack
page read and write
55B4000
trusted library allocation
page read and write
5B50000
heap
page read and write
2EBB000
stack
page read and write
5620000
trusted library allocation
page read and write
162D000
direct allocation
page execute and read and write
1280000
heap
page read and write
2F63000
heap
page read and write
31AB000
trusted library allocation
page read and write
28DD000
stack
page read and write
267F000
unkown
page read and write
133E000
stack
page read and write
13AB000
trusted library allocation
page execute and read and write
2C3F000
unkown
page read and write
13EE000
heap
page read and write
5590000
trusted library allocation
page execute and read and write
A210000
heap
page read and write
E50000
heap
page read and write
314E000
stack
page read and write
614E000
heap
page read and write
A82C000
stack
page read and write
AB1E000
stack
page read and write
4217000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
1148000
heap
page read and write
5900000
heap
page read and write
1374000
trusted library allocation
page read and write
98D000
stack
page read and write
788E000
stack
page read and write
5380000
trusted library allocation
page read and write
743E000
stack
page read and write
1314000
trusted library allocation
page read and write
5393000
heap
page read and write
5364000
trusted library allocation
page read and write
A0CE000
stack
page read and write
B01B000
stack
page read and write
2CD000
stack
page read and write
E9A000
stack
page read and write
F20000
heap
page read and write
9E8E000
stack
page read and write
160E000
stack
page read and write
E9E000
stack
page read and write
43B7000
trusted library allocation
page read and write
1489000
direct allocation
page execute and read and write
31FC000
trusted library allocation
page read and write
10C2000
heap
page read and write
AAB1000
trusted library allocation
page read and write
F90000
heap
page read and write
3088000
trusted library allocation
page read and write
FB0000
heap
page read and write
263E000
unkown
page read and write
5320000
trusted library allocation
page read and write
1392000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
9FCE000
stack
page read and write
79B0000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
56E0000
heap
page read and write
2DD0000
heap
page read and write
12D0000
heap
page read and write
There are 351 hidden memdumps, click here to show them.