IOC Report
4wECQoBvYC.exe

loading gif

Files

File Path
Type
Category
Malicious
4wECQoBvYC.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ukiglbypimmphepyxgwyogkqxgydyyk.vbs
data
dropped
malicious
C:\Users\user\Documents\Perfectouin\Bin\PerfectouinVans.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\registro\registros.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4wECQoBvYC.exe
"C:\Users\user\Desktop\4wECQoBvYC.exe"
malicious
C:\Users\user\Desktop\4wECQoBvYC.exe
"C:\Users\user\Desktop\4wECQoBvYC.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\ukiglbypimmphepyxgwyogkqxgydyyk.vbs"
malicious

URLs

Name
IP
Malicious
formationslistcomplet2.sexidude.com
malicious
http://geoplugin.net/json.gp
178.237.33.50
http://www.evenbalance.com/troubletick
unknown
http://www.evenbalance.com/
unknown
http://www.evenbalance.com/index.php?page=pbsvcfaq.phpChecking
unknown
http://www.evenbalance.com/troubleticket/
unknown
http://geoplugin.net/
unknown
http://geoplugin.net/json.gp/C
unknown
http://geoplugin.net/json.gpl
unknown
http://www.evenbalance.com/index.php?page=pbsvcfaq.php
unknown
http://geoplugin.net/json.gpq
unknown
http://www.evenbalance.com/index.php?page=pbsvcfaq.phpDisplayVersion%d.%dDisplayNamePunkBuster
unknown
http://geoplugin.net/json.gp:
unknown
http://geoplugin.net/json.gpSystem32
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
formationslistcomplet2.sexidude.com
181.131.217.244
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
181.131.217.244
formationslistcomplet2.sexidude.com
Colombia
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PerfectouinVans
HKEY_CURRENT_USER\SOFTWARE\kkdhhcnbvyrmqyodgffgfdds-SO2AWR
exepath
HKEY_CURRENT_USER\SOFTWARE\kkdhhcnbvyrmqyodgffgfdds-SO2AWR
licence
HKEY_CURRENT_USER\SOFTWARE\kkdhhcnbvyrmqyodgffgfdds-SO2AWR
time
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
700000
unkown
page execute and read and write
malicious
21B0000
direct allocation
page execute and read and write
malicious
C0000
remote allocation
page execute and read and write
malicious
353E000
stack
page read and write
8B6E000
stack
page read and write
FF8000
stack
page read and write
2FE7000
heap
page read and write
3012000
heap
page read and write
353A000
heap
page read and write
400000
unkown
page readonly
1ABC000
stack
page read and write
3029000
heap
page read and write
8EEC000
unkown
page read and write
4E1000
unkown
page readonly
2F60000
heap
page read and write
3026000
heap
page read and write
301B000
heap
page read and write
1AC8000
heap
page read and write
300F000
heap
page read and write
3018000
heap
page read and write
116E000
stack
page read and write
3014000
heap
page read and write
301D000
heap
page read and write
5D8F000
stack
page read and write
3008000
heap
page read and write
300A000
heap
page read and write
34E0000
heap
page read and write
3003000
heap
page read and write
79D000
unkown
page readonly
799E000
stack
page read and write
300E000
heap
page read and write
2226000
direct allocation
page execute and read and write
3D8F000
stack
page read and write
1B32000
heap
page read and write
302E000
heap
page read and write
972E000
stack
page read and write
301E000
heap
page read and write
3029000
heap
page read and write
3031000
heap
page read and write
3DB0000
direct allocation
page read and write
53EF000
stack
page read and write
400000
unkown
page readonly
819F000
stack
page read and write
77B000
unkown
page readonly
300E000
heap
page read and write
791000
unkown
page readonly
400000
unkown
page readonly
301D000
heap
page read and write
3016000
heap
page read and write
2FD8000
heap
page read and write
791000
unkown
page readonly
2FAE000
stack
page read and write
301D000
heap
page read and write
2FF1000
heap
page read and write
3030000
heap
page read and write
1B04000
heap
page read and write
3100000
heap
page read and write
301B000
heap
page read and write
3012000
heap
page read and write
3520000
heap
page read and write
3024000
heap
page read and write
1A2C000
stack
page read and write
301D000
heap
page read and write
79D000
unkown
page execute and write copy
302C000
heap
page read and write
19AE000
stack
page read and write
795F000
stack
page read and write
34FE000
stack
page read and write
21AE000
stack
page read and write
3020000
heap
page read and write
3024000
heap
page read and write
3DA3000
direct allocation
page read and write
791000
unkown
page readonly
3004000
heap
page read and write
3018000
heap
page read and write
458F000
stack
page read and write
34DE000
stack
page read and write
3020000
heap
page read and write
3001000
heap
page read and write
401000
unkown
page execute read
821E000
stack
page read and write
788000
unkown
page readonly
3105000
heap
page read and write
1030000
heap
page read and write
103A000
heap
page read and write
558F000
stack
page read and write
133000
remote allocation
page execute and read and write
54EF000
stack
page read and write
52B000
unkown
page write copy
301D000
heap
page read and write
401000
unkown
page execute read
3035000
heap
page read and write
400000
unkown
page readonly
7D2000
unkown
page readonly
3035000
heap
page read and write
300C000
heap
page read and write
788000
unkown
page readonly
8E0F000
unkown
page read and write
3587000
heap
page read and write
3029000
heap
page read and write
4E1000
unkown
page readonly
300D000
heap
page read and write
301D000
heap
page read and write
9C000
stack
page read and write
1BF0000
heap
page read and write
2290000
heap
page read and write
3B21000
direct allocation
page read and write
401000
unkown
page execute read
18E5000
heap
page read and write
3014000
heap
page read and write
8A1F000
stack
page read and write
32DE000
stack
page read and write
3022000
heap
page read and write
1B55000
heap
page read and write
103E000
heap
page read and write
3035000
heap
page read and write
2FE7000
heap
page read and write
1B25000
heap
page read and write
3016000
heap
page read and write
1AC0000
heap
page read and write
3000000
heap
page read and write
4E1000
unkown
page readonly
3001000
heap
page read and write
982F000
stack
page read and write
17FC000
stack
page read and write
17C000
stack
page read and write
300F000
heap
page read and write
8A6E000
stack
page read and write
3035000
heap
page read and write
1B25000
heap
page read and write
795000
unkown
page execute and read and write
3580000
heap
page read and write
7D2000
unkown
page readonly
77B000
unkown
page readonly
2FC0000
heap
page read and write
3002000
heap
page read and write
79D000
unkown
page readonly
3024000
heap
page read and write
3DB9000
direct allocation
page read and write
1B3A000
heap
page read and write
6E7000
unkown
page readonly
3035000
heap
page read and write
E0000
heap
page read and write
2FC7000
heap
page read and write
77F000
unkown
page execute and read and write
691E000
stack
page read and write
4D8B000
stack
page read and write
6CE000
unkown
page write copy
3024000
heap
page read and write
1C3E000
stack
page read and write
4E1000
unkown
page readonly
52B000
unkown
page write copy
196F000
stack
page read and write
18F0000
heap
page read and write
1B3A000
heap
page read and write
300A000
heap
page read and write
8BAE000
stack
page read and write
78B000
unkown
page execute and read and write
3003000
heap
page read and write
2250000
heap
page read and write
2FB0000
heap
page read and write
96ED000
stack
page read and write
18D0000
heap
page read and write
6E7000
unkown
page readonly
7D5000
unkown
page execute and read and write
3005000
heap
page read and write
3014000
heap
page read and write
4E1E000
stack
page read and write
7D2000
unkown
page readonly
791000
unkown
page execute and write copy
2FEB000
heap
page read and write
52B000
unkown
page write copy
711F000
stack
page read and write
3530000
heap
page read and write
3029000
heap
page read and write
3023000
heap
page read and write
79D000
unkown
page readonly
2FD5000
heap
page read and write
658E000
stack
page read and write
6E7000
unkown
page readonly
2BFB000
stack
page read and write
3490000
heap
page read and write
300F000
heap
page read and write
3017000
heap
page read and write
6E7000
unkown
page readonly
77B000
unkown
page execute and write copy
3470000
heap
page read and write
3017000
heap
page read and write
1B0000
heap
page read and write
301D000
heap
page read and write
2FF0000
heap
page read and write
4EB0000
heap
page read and write
1A7E000
stack
page read and write
52B000
unkown
page write copy
77B000
unkown
page readonly
3A40000
direct allocation
page read and write
3031000
heap
page read and write
1E0000
heap
page read and write
1B3A000
heap
page read and write
100000
heap
page read and write
3028000
heap
page read and write
2EFB000
stack
page read and write
8CAB000
stack
page read and write
3DC5000
direct allocation
page read and write
1900000
heap
page read and write
788000
unkown
page readonly
300A000
heap
page read and write
30FE000
stack
page read and write
2FEA000
heap
page read and write
3010000
heap
page read and write
401000
unkown
page execute read
1FC000
stack
page read and write
3032000
heap
page read and write
3015000
heap
page read and write
715E000
stack
page read and write
3027000
heap
page read and write
7A2000
unkown
page execute and read and write
7D2000
unkown
page execute and write copy
3DFA000
direct allocation
page read and write
33DF000
stack
page read and write
6CD000
unkown
page read and write
302D000
heap
page read and write
18E0000
heap
page read and write
301A000
heap
page read and write
136000
remote allocation
page execute and read and write
788000
unkown
page execute and write copy
There are 216 hidden memdumps, click here to show them.