IOC Report
ctVXvVgUrO.exe

loading gif

Files

File Path
Type
Category
Malicious
ctVXvVgUrO.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\chargeable.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\ctVXvVgUrO.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ctVXvVgUrO.exe
"C:\Users\user\Desktop\ctVXvVgUrO.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
"C:\Users\user\AppData\Roaming\confuse\chargeable.exe"
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
C:\Users\user\AppData\Roaming\confuse\chargeable.exe
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 80
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
doddyfire.linkpc.net

Domains

Name
IP
Malicious
doddyfire.linkpc.net
41.249.48.248

IPs

IP
Domain
Country
Malicious
41.249.48.248
doddyfire.linkpc.net
Morocco

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
confuse
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SysMain
malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\e1a87040f2026369a233f9ae76301b7b
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2FF1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2E51000
trusted library allocation
page read and write
malicious
9F5000
heap
page read and write
FA2000
trusted library allocation
page execute and read and write
64ED000
stack
page read and write
4FF8000
trusted library allocation
page read and write
FF0000
heap
page read and write
A70000
heap
page read and write
9DA000
heap
page read and write
18CF000
stack
page read and write
991000
heap
page read and write
4E1F000
stack
page read and write
A01000
heap
page read and write
1177000
trusted library allocation
page read and write
3641000
trusted library allocation
page read and write
5990000
heap
page read and write
36CE000
trusted library allocation
page read and write
8D0E000
stack
page read and write
146E000
stack
page read and write
4FAC000
heap
page read and write
1045000
heap
page read and write
53EE000
stack
page read and write
9D5000
heap
page read and write
D69000
stack
page read and write
A56000
heap
page read and write
68BE000
stack
page read and write
7E1F000
stack
page read and write
4FAE000
heap
page read and write
18F0000
trusted library allocation
page read and write
8EE000
stack
page read and write
FBE000
unkown
page readonly
9D9000
heap
page read and write
35C000
stack
page read and write
1190000
trusted library allocation
page read and write
4FAC000
heap
page read and write
F82000
trusted library allocation
page execute and read and write
A7B000
heap
page read and write
F8A000
trusted library allocation
page execute and read and write
A1C000
heap
page read and write
9CB000
heap
page read and write
B76000
stack
page read and write
5780000
trusted library allocation
page read and write
940000
heap
page read and write
89B0000
heap
page read and write
65EE000
stack
page read and write
D66000
heap
page read and write
BF0000
heap
page read and write
524D000
stack
page read and write
9FB000
heap
page read and write
6360000
heap
page read and write
A7E000
heap
page read and write
A6F000
heap
page read and write
1973000
heap
page read and write
A00000
heap
page read and write
9DA000
heap
page read and write
A56000
heap
page read and write
1970000
heap
page read and write
9F1000
heap
page read and write
FB7000
trusted library allocation
page execute and read and write
36D8000
trusted library allocation
page read and write
A2F000
heap
page read and write
1420000
heap
page read and write
13DE000
stack
page read and write
FBB000
trusted library allocation
page execute and read and write
4FB7000
heap
page read and write
503F000
stack
page read and write
9EC000
heap
page read and write
1425000
heap
page read and write
9D1000
heap
page read and write
662E000
stack
page read and write
8E8E000
stack
page read and write
12AC000
stack
page read and write
594D000
stack
page read and write
5800000
heap
page read and write
9C9000
heap
page read and write
308E000
trusted library allocation
page read and write
9F5000
heap
page read and write
5260000
heap
page read and write
CB0000
heap
page read and write
A0E000
heap
page read and write
9D5000
heap
page read and write
C9A000
trusted library allocation
page execute and read and write
9FB000
heap
page read and write
677E000
stack
page read and write
3DC1000
trusted library allocation
page read and write
1A50000
heap
page read and write
1356000
stack
page read and write
5200000
trusted library allocation
page read and write
4FAF000
heap
page read and write
D4B000
heap
page read and write
12D0000
heap
page read and write
A75000
heap
page read and write
6FD000
stack
page read and write
9F8000
heap
page read and write
6370000
heap
page read and write
14C0000
trusted library allocation
page read and write
526C000
stack
page read and write
F8C000
trusted library allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
C8E000
unkown
page read and write
9F3000
heap
page read and write
9CC000
heap
page read and write
9FB000
heap
page read and write
9FE000
heap
page read and write
10CE000
stack
page read and write
7D0000
heap
page read and write
4FB5000
heap
page read and write
8D4C000
stack
page read and write
C6A000
stack
page read and write
9F7000
heap
page read and write
11A7000
trusted library allocation
page execute and read and write
9F1000
heap
page read and write
9F2000
heap
page read and write
18EA000
trusted library allocation
page execute and read and write
A0B000
heap
page read and write
A4F000
heap
page read and write
5950000
trusted library section
page readonly
8F4000
stack
page read and write
A08000
heap
page read and write
A4F000
heap
page read and write
F9A000
trusted library allocation
page execute and read and write
8ACF000
stack
page read and write
328D000
trusted library allocation
page read and write
950000
heap
page read and write
4700000
heap
page read and write
A7C000
heap
page read and write
9FE000
heap
page read and write
A78000
heap
page read and write
11C0000
trusted library allocation
page read and write
17BC000
trusted library allocation
page execute and read and write
9F9000
heap
page read and write
11CB000
trusted library allocation
page execute and read and write
9F4000
heap
page read and write
9D5000
heap
page read and write
9F1000
heap
page read and write
11C2000
trusted library allocation
page read and write
994000
heap
page read and write
1170000
trusted library allocation
page read and write
2A7E000
stack
page read and write
1190000
trusted library allocation
page read and write
B79000
stack
page read and write
1584000
heap
page read and write
A1C000
heap
page read and write
5329000
stack
page read and write
9D7000
heap
page read and write
9D8000
heap
page read and write
5223000
heap
page read and write
5810000
heap
page read and write
CD0000
heap
page read and write
18D0000
trusted library allocation
page read and write
A04000
heap
page read and write
CBE000
heap
page read and write
A05000
heap
page read and write
A10000
heap
page read and write
5390000
unclassified section
page read and write
A6F000
heap
page read and write
14D0000
heap
page read and write
A56000
heap
page read and write
8BCF000
stack
page read and write
A70000
heap
page read and write
9D7000
heap
page read and write
59F0000
heap
page read and write
5DB000
stack
page read and write
A79000
heap
page read and write
687F000
stack
page read and write
1400000
heap
page execute and read and write
9D8000
heap
page read and write
1192000
trusted library allocation
page execute and read and write
F92000
trusted library allocation
page read and write
1018000
heap
page read and write
13FE000
stack
page read and write
52EC000
stack
page read and write
2DC1000
trusted library allocation
page read and write
179E000
stack
page read and write
3069000
trusted library allocation
page read and write
A7A000
stack
page read and write
1545000
heap
page read and write
4FB8000
heap
page read and write
A7E000
heap
page read and write
4E20000
heap
page read and write
FFE000
stack
page read and write
1040000
heap
page execute and read and write
A2F000
heap
page read and write
308C000
trusted library allocation
page read and write
980000
heap
page read and write
5B40000
heap
page read and write
7272000
trusted library allocation
page read and write
11BA000
trusted library allocation
page execute and read and write
9FB000
heap
page read and write
9B4000
heap
page read and write
9CC000
heap
page read and write
567B000
stack
page read and write
A0A000
heap
page read and write
59B0000
heap
page read and write
4FAC000
heap
page read and write
18D7000
trusted library allocation
page execute and read and write
5980000
heap
page read and write
F80000
trusted library allocation
page read and write
9F3000
heap
page read and write
9F9000
heap
page read and write
10D7000
heap
page read and write
4FAC000
heap
page read and write
4790000
heap
page read and write
4FAE000
heap
page read and write
A0C000
heap
page read and write
584B000
stack
page read and write
BE0000
heap
page read and write
A73000
heap
page read and write
9F7000
heap
page read and write
4FA1000
heap
page read and write
4F33000
heap
page read and write
4FAC000
heap
page read and write
1A40000
trusted library allocation
page execute and read and write
6FDE000
stack
page read and write
DC0000
heap
page read and write
119A000
trusted library allocation
page execute and read and write
A04000
heap
page read and write
11B2000
trusted library allocation
page execute and read and write
11C7000
trusted library allocation
page execute and read and write
1480000
heap
page read and write
A78000
heap
page read and write
1140000
heap
page execute and read and write
1987000
heap
page read and write
9C5000
heap
page read and write
11B0000
trusted library allocation
page read and write
C92000
trusted library allocation
page execute and read and write
9D5000
heap
page read and write
A01000
heap
page read and write
9A1000
heap
page read and write
1A30000
trusted library allocation
page read and write
BD0000
heap
page read and write
4FA1000
heap
page read and write
D66000
stack
page read and write
59D0000
heap
page read and write
9C5000
heap
page read and write
59B5000
heap
page read and write
89C0000
trusted library section
page read and write
9D4000
heap
page read and write
7D00000
heap
page read and write
121E000
stack
page read and write
17B0000
trusted library allocation
page read and write
150E000
heap
page read and write
CCD000
stack
page read and write
9A1000
heap
page read and write
9F5000
heap
page read and write
9EC000
heap
page read and write
17B2000
trusted library allocation
page execute and read and write
118A000
trusted library allocation
page execute and read and write
17C0000
heap
page read and write
EE0000
heap
page read and write
4FAC000
heap
page read and write
9FA000
heap
page read and write
5780000
trusted library allocation
page execute and read and write
1259000
stack
page read and write
6F2E000
stack
page read and write
A1C000
heap
page read and write
5B4E000
heap
page read and write
1556000
heap
page read and write
A7A000
heap
page read and write
18F7000
trusted library allocation
page execute and read and write
70DF000
stack
page read and write
11D0000
heap
page read and write
52AB000
stack
page read and write
9F5000
heap
page read and write
970000
heap
page read and write
9FD000
heap
page read and write
400000
remote allocation
page execute and read and write
A08000
heap
page read and write
2E95000
trusted library allocation
page read and write
8C0E000
stack
page read and write
CA0000
heap
page read and write
CA5000
heap
page read and write
11D6000
heap
page read and write
D60000
heap
page read and write
9CD000
heap
page read and write
C80000
trusted library allocation
page read and write
1010000
heap
page read and write
3045000
trusted library allocation
page read and write
A31000
heap
page read and write
A01000
heap
page read and write
17BA000
trusted library allocation
page execute and read and write
4FA9000
heap
page read and write
4D1E000
stack
page read and write
FA2000
unkown
page readonly
13E0000
trusted library allocation
page read and write
14DE000
heap
page read and write
4F80000
heap
page read and write
A01000
heap
page read and write
9F4000
heap
page read and write
10AB000
heap
page read and write
A7E000
heap
page read and write
5250000
heap
page read and write
A50000
heap
page read and write
1010000
heap
page read and write
6E2E000
stack
page read and write
9CB000
heap
page read and write
5350000
heap
page read and write
5210000
trusted library allocation
page execute and read and write
A56000
heap
page read and write
11A0000
trusted library allocation
page execute and read and write
10D0000
heap
page read and write
98A000
heap
page read and write
F7E000
stack
page read and write
A72000
heap
page read and write
14DA000
heap
page read and write
7F370000
trusted library allocation
page execute and read and write
711E000
stack
page read and write
A0B000
heap
page read and write
5090000
trusted library section
page readonly
715E000
stack
page read and write
32FE000
stack
page read and write
4F30000
heap
page read and write
18DA000
trusted library allocation
page execute and read and write
A6F000
heap
page read and write
9F8000
heap
page read and write
36D1000
trusted library allocation
page read and write
18E2000
trusted library allocation
page execute and read and write
9F3000
heap
page read and write
4EBE000
stack
page read and write
4FB5000
heap
page read and write
8E4C000
stack
page read and write
11D0000
heap
page read and write
B8E000
unkown
page read and write
508B000
stack
page read and write
FAA000
trusted library allocation
page execute and read and write
8F8E000
stack
page read and write
108C000
stack
page read and write
A30000
heap
page read and write
F30000
heap
page read and write
A0E000
heap
page read and write
1400000
heap
page read and write
5220000
heap
page read and write
54EE000
stack
page read and write
13B0000
heap
page read and write
C3E000
stack
page read and write
9B7000
heap
page read and write
5140000
heap
page read and write
11AA000
trusted library allocation
page execute and read and write
8FB000
stack
page read and write
1120000
heap
page read and write
6470000
trusted library allocation
page read and write
A0B000
heap
page read and write
D20000
heap
page read and write
A2F000
heap
page read and write
D22000
heap
page read and write
9F1000
heap
page read and write
17A2000
trusted library allocation
page execute and read and write
577E000
stack
page read and write
9EC000
heap
page read and write
9D7000
heap
page read and write
18FB000
trusted library allocation
page execute and read and write
307A000
trusted library allocation
page read and write
30AF000
trusted library allocation
page read and write
A0E000
heap
page read and write
5830000
heap
page read and write
A2F000
heap
page read and write
1359000
stack
page read and write
5145000
heap
page read and write
D26000
heap
page read and write
59C0000
heap
page read and write
4FB6000
heap
page read and write
9EE000
heap
page read and write
975000
heap
page read and write
CEE000
heap
page read and write
18D2000
trusted library allocation
page read and write
9F7000
heap
page read and write
E6E000
stack
page read and write
A0B000
heap
page read and write
1182000
trusted library allocation
page execute and read and write
17AA000
trusted library allocation
page execute and read and write
A6F000
heap
page read and write
672E000
stack
page read and write
13A0000
heap
page read and write
193E000
stack
page read and write
D40000
heap
page read and write
1541000
heap
page read and write
13F0000
trusted library allocation
page execute and read and write
9F9000
heap
page read and write
3FF1000
trusted library allocation
page read and write
4641000
trusted library allocation
page read and write
6970000
trusted library allocation
page execute and read and write
518E000
stack
page read and write
2E4E000
trusted library allocation
page read and write
8FE000
stack
page read and write
59A0000
trusted library allocation
page execute and read and write
A08000
heap
page read and write
9A1000
heap
page read and write
9F5000
heap
page read and write
1074000
heap
page read and write
9C5000
heap
page read and write
18F2000
trusted library allocation
page read and write
CB9000
heap
page read and write
1980000
heap
page read and write
9D7000
heap
page read and write
4FA2000
heap
page read and write
EE5000
heap
page read and write
F97000
trusted library allocation
page execute and read and write
FA0000
unkown
page readonly
There are 389 hidden memdumps, click here to show them.