IOC Report
C3KzPHU3UG.exe

loading gif

Files

File Path
Type
Category
Malicious
C3KzPHU3UG.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\SyncTech Innovations\EchoSync.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\SyncTech Innovations\EchoSync.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\585723\Designing.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EchoSync.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\SyncTech Innovations\EchoSync.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\SyncTech Innovations\p
data
dropped
C:\Users\user\AppData\Local\Temp\585723\F
data
dropped
C:\Users\user\AppData\Local\Temp\Hate
data
dropped
C:\Users\user\AppData\Local\Temp\Invitations
data
dropped
C:\Users\user\AppData\Local\Temp\Keep
data
dropped
C:\Users\user\AppData\Local\Temp\Prep
data
dropped
C:\Users\user\AppData\Local\Temp\Rod
data
dropped
C:\Users\user\AppData\Local\Temp\Sexuality
ASCII text, with very long lines (969), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Sexuality.cmd (copy)
ASCII text, with very long lines (969), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Statute
data
dropped
C:\Users\user\AppData\Local\Temp\Tsunami
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\C3KzPHU3UG.exe
"C:\Users\user\Desktop\C3KzPHU3UG.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k move Sexuality Sexuality.cmd & Sexuality.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 585723
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "TranscriptHousesConstitutesMedicaid" Hate
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Rod + ..\Keep + ..\Prep + ..\Tsunami + ..\Invitations F
malicious
C:\Users\user\AppData\Local\Temp\585723\Designing.pif
Designing.pif F
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EchoSync.url" & echo URL="C:\Users\user\AppData\Local\SyncTech Innovations\EchoSync.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EchoSync.url" & exit
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\SyncTech Innovations\EchoSync.js"
malicious
C:\Users\user\AppData\Local\SyncTech Innovations\EchoSync.pif
"C:\Users\user\AppData\Local\SyncTech Innovations\EchoSync.pif" "C:\Users\user\AppData\Local\SyncTech Innovations\p"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.autoitscript.com/autoit3/J
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.autoitscript.com/autoit3/
unknown

Domains

Name
IP
Malicious
XfYprRGwPXpYAiIF.XfYprRGwPXpYAiIF
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
B30000
unkown
page readonly
322E000
unkown
page read and write
600000
heap
page read and write
2800000
heap
page read and write
4201000
heap
page read and write
3CC1000
heap
page read and write
4B40000
heap
page read and write
1174000
heap
page read and write
1BDC000
heap
page read and write
469000
unkown
page read and write
759000
unkown
page readonly
1D17CFE000
stack
page read and write
1930000
heap
page read and write
401000
unkown
page execute read
7DE000
stack
page read and write
AD3000
heap
page read and write
1373000
heap
page read and write
1FEA836A000
heap
page read and write
18D0000
trusted library allocation
page read and write
AC8000
heap
page read and write
4201000
heap
page read and write
4FD000
unkown
page readonly
D50000
heap
page read and write
3CC1000
heap
page read and write
432000
unkown
page read and write
BF0000
unkown
page write copy
1174000
heap
page read and write
18D0000
trusted library allocation
page read and write
4653000
trusted library allocation
page read and write
129A000
heap
page read and write
66D000
heap
page read and write
ADB000
heap
page read and write
1754000
heap
page read and write
332F000
unkown
page read and write
17C4000
heap
page read and write
1953000
heap
page read and write
18D0000
trusted library allocation
page read and write
21CE000
stack
page read and write
794000
heap
page read and write
75A000
heap
page read and write
13A6000
heap
page read and write
4569000
trusted library allocation
page read and write
3CC1000
heap
page read and write
1FEA84C5000
heap
page read and write
1242000
heap
page read and write
40A000
unkown
page read and write
3CC1000
heap
page read and write
1A08000
heap
page read and write
1FEA832C000
heap
page read and write
4201000
heap
page read and write
1CD3000
heap
page read and write
1AB2000
heap
page read and write
79B000
heap
page read and write
1174000
heap
page read and write
683000
heap
page read and write
1C62000
heap
page read and write
67A000
heap
page read and write
ABD000
heap
page read and write
3CC1000
heap
page read and write
ACC000
heap
page read and write
5AE000
stack
page read and write
1B00000
trusted library allocation
page read and write
408000
unkown
page readonly
1CC5000
heap
page read and write
15BF000
stack
page read and write
1AC0000
heap
page read and write
D4F000
stack
page read and write
FBF000
stack
page read and write
17C4000
heap
page read and write
1FEA8337000
heap
page read and write
1FEA9D80000
heap
page read and write
17C4000
heap
page read and write
1174000
heap
page read and write
6AC000
stack
page read and write
2DAE000
stack
page read and write
10C000
stack
page read and write
1174000
heap
page read and write
1FEA8338000
heap
page read and write
720000
unkown
page readonly
67C000
heap
page read and write
3D50000
heap
page read and write
750000
unkown
page read and write
4201000
heap
page read and write
690000
unkown
page readonly
3CC1000
heap
page read and write
145C000
heap
page read and write
13E8000
heap
page read and write
2E8E000
stack
page read and write
6EC000
stack
page read and write
4201000
heap
page read and write
11B0000
heap
page read and write
4201000
heap
page read and write
17C0000
heap
page read and write
BC0000
unkown
page readonly
A7F000
stack
page read and write
17C4000
heap
page read and write
68C000
heap
page read and write
AD1000
heap
page read and write
2C6F000
stack
page read and write
2720000
heap
page read and write
3250000
heap
page read and write
12D9000
heap
page read and write
4577000
trusted library allocation
page read and write
691000
unkown
page execute read
4201000
heap
page read and write
30C0000
heap
page read and write
1ADB000
heap
page read and write
605000
heap
page read and write
526000
heap
page read and write
4201000
heap
page read and write
B31000
unkown
page execute read
2DAF000
stack
page read and write
1FEA8331000
heap
page read and write
ADB000
heap
page read and write
1D03000
heap
page read and write
691000
unkown
page execute read
3CC1000
heap
page read and write
1130000
heap
page read and write
2F6D000
stack
page read and write
1B00000
trusted library allocation
page read and write
746000
unkown
page readonly
15CF000
stack
page read and write
C8E000
stack
page read and write
17C4000
heap
page read and write
17C4000
heap
page read and write
B31000
unkown
page execute read
3CC1000
heap
page read and write
2EE0000
heap
page read and write
3CC1000
heap
page read and write
1B00000
trusted library allocation
page read and write
67C000
heap
page read and write
AC0000
heap
page read and write
13B1000
heap
page read and write
4201000
heap
page read and write
1FEA84C0000
heap
page read and write
4201000
heap
page read and write
170000
heap
page read and write
4201000
heap
page read and write
AC0000
heap
page read and write
BA6000
heap
page read and write
1C6D000
heap
page read and write
BF9000
unkown
page readonly
1174000
heap
page read and write
27FF000
stack
page read and write
2150000
heap
page read and write
1200000
heap
page read and write
18D0000
trusted library allocation
page read and write
1559000
heap
page read and write
65E000
heap
page read and write
17D5000
heap
page read and write
400000
unkown
page readonly
18D0000
heap
page read and write
346F000
stack
page read and write
600000
heap
page read and write
1D176FF000
stack
page read and write
1D17BFF000
stack
page read and write
690000
unkown
page readonly
FCE000
stack
page read and write
1D17EFE000
stack
page read and write
D0E000
stack
page read and write
41E000
unkown
page read and write
4201000
heap
page read and write
1223000
heap
page read and write
BE6000
unkown
page readonly
4201000
heap
page read and write
1FEA8230000
heap
page read and write
4661000
trusted library allocation
page read and write
19A000
stack
page read and write
FDD000
stack
page read and write
66E000
heap
page read and write
2CFC000
stack
page read and write
3CC1000
heap
page read and write
1D17AFE000
stack
page read and write
4201000
heap
page read and write
30E2000
heap
page read and write
ABB000
heap
page read and write
1FEAA0F0000
heap
page read and write
152A000
heap
page read and write
88E000
stack
page read and write
AB4000
heap
page read and write
17C4000
heap
page read and write
1B00000
trusted library allocation
page read and write
ADB000
heap
page read and write
26FE000
stack
page read and write
510000
heap
page read and write
CBE000
stack
page read and write
17C4000
heap
page read and write
2DEC000
stack
page read and write
3CC1000
heap
page read and write
1232000
heap
page read and write
2D60000
heap
page read and write
1FEA8372000
heap
page read and write
B30000
unkown
page readonly
4201000
heap
page read and write
D8F000
stack
page read and write
1CE5000
heap
page read and write
1C93000
heap
page read and write
17C4000
heap
page read and write
1416000
heap
page read and write
1964000
heap
page read and write
5F0000
heap
page read and write
640000
heap
page read and write
3CC1000
heap
page read and write
1CD0000
heap
page read and write
1FEA8430000
heap
page read and write
1B00000
trusted library allocation
page read and write
3CC1000
heap
page read and write
4201000
heap
page read and write
3CC1000
heap
page read and write
1174000
heap
page read and write
4201000
heap
page read and write
67C000
heap
page read and write
1010000
heap
page read and write
754000
unkown
page write copy
520000
heap
page read and write
1D179FF000
stack
page read and write
56E000
stack
page read and write
18D0000
trusted library allocation
page read and write
3CC1000
heap
page read and write
4201000
heap
page read and write
68C000
heap
page read and write
5EE000
stack
page read and write
1FEA8331000
heap
page read and write
2CBC000
stack
page read and write
A90000
heap
page read and write
64E000
stack
page read and write
9B000
stack
page read and write
4201000
heap
page read and write
4201000
heap
page read and write
2FE0000
heap
page read and write
4201000
heap
page read and write
1FF000
stack
page read and write
18D0000
trusted library allocation
page read and write
387E000
stack
page read and write
3310000
heap
page read and write
1FEA8377000
heap
page read and write
19BA000
heap
page read and write
30E0000
heap
page read and write
1FEA84CC000
heap
page read and write
CCF000
stack
page read and write
1B00000
trusted library allocation
page read and write
22B0000
heap
page read and write
40A000
unkown
page write copy
1D17DFE000
stack
page read and write
143F000
heap
page read and write
1D177FF000
stack
page read and write
AC0000
heap
page read and write
3CC1000
heap
page read and write
3CC1000
heap
page read and write
3D9E000
heap
page read and write
4201000
heap
page read and write
4200000
heap
page read and write
FFC000
stack
page read and write
1B00000
heap
page read and write
476F000
stack
page read and write
3CC1000
heap
page read and write
1FEA834D000
heap
page read and write
1FEA834E000
heap
page read and write
D70000
heap
page read and write
1244000
heap
page read and write
400000
unkown
page readonly
2ECF000
stack
page read and write
98F000
stack
page read and write
1FEA837D000
heap
page read and write
FD0000
heap
page read and write
30F0000
heap
page read and write
3CC1000
heap
page read and write
65E000
heap
page read and write
3CC1000
heap
page read and write
336E000
stack
page read and write
436F000
stack
page read and write
F6A000
stack
page read and write
401000
unkown
page execute read
1BE000
stack
page read and write
67C000
heap
page read and write
4A3E000
stack
page read and write
3CC1000
heap
page read and write
2E4F000
stack
page read and write
4201000
heap
page read and write
BC0000
unkown
page readonly
C4F000
stack
page read and write
12B9000
heap
page read and write
17C4000
heap
page read and write
720000
unkown
page readonly
660000
heap
page read and write
3CC1000
heap
page read and write
AC8000
heap
page read and write
79E000
stack
page read and write
4201000
heap
page read and write
2CAE000
stack
page read and write
AB1000
heap
page read and write
4A7F000
stack
page read and write
15FC000
stack
page read and write
1242000
heap
page read and write
3D40000
heap
page read and write
746000
unkown
page readonly
1FEA8355000
heap
page read and write
3CC1000
heap
page read and write
9AA000
stack
page read and write
ACB000
heap
page read and write
684000
heap
page read and write
2FC0000
heap
page read and write
2B6E000
stack
page read and write
408000
unkown
page readonly
1FEA8355000
heap
page read and write
30FC000
heap
page read and write
1750000
heap
page read and write
4201000
heap
page read and write
18D0000
trusted library allocation
page read and write
1FEA8345000
heap
page read and write
1BF8000
heap
page read and write
75E000
heap
page read and write
18D0000
trusted library allocation
page read and write
662000
heap
page read and write
15B2000
heap
page read and write
18D0000
trusted library allocation
page read and write
14CF000
heap
page read and write
AD2000
heap
page read and write
1FEA8345000
heap
page read and write
1170000
heap
page read and write
1B60000
heap
page read and write
1FEA8355000
heap
page read and write
34B0000
heap
page read and write
2E6D000
stack
page read and write
AC0000
heap
page read and write
4201000
heap
page read and write
7B0000
heap
page read and write
3CC1000
heap
page read and write
3339000
heap
page read and write
BE6000
unkown
page readonly
18D0000
trusted library allocation
page read and write
3CC1000
heap
page read and write
AC8000
heap
page read and write
30E0000
heap
page read and write
1242000
heap
page read and write
1B00000
trusted library allocation
page read and write
4201000
heap
page read and write
BF9000
unkown
page readonly
3CC1000
heap
page read and write
1B00000
trusted library allocation
page read and write
1FEA8410000
heap
page read and write
4201000
heap
page read and write
1FEA8375000
heap
page read and write
4201000
heap
page read and write
74F000
stack
page read and write
4201000
heap
page read and write
18D0000
trusted library allocation
page read and write
1174000
heap
page read and write
750000
unkown
page write copy
750000
heap
page read and write
1FEA8355000
heap
page read and write
4201000
heap
page read and write
1D173BA000
stack
page read and write
17B0000
heap
page read and write
1FEA836C000
heap
page read and write
4D0000
heap
page read and write
7E0000
heap
page read and write
68C000
heap
page read and write
4201000
heap
page read and write
BF0000
unkown
page read and write
AB0000
heap
page read and write
48AF000
stack
page read and write
A98000
heap
page read and write
FE0000
heap
page read and write
4201000
heap
page read and write
789000
heap
page read and write
2EEC000
stack
page read and write
AC8000
heap
page read and write
18D0000
trusted library allocation
page read and write
3120000
heap
page read and write
1FEA837A000
heap
page read and write
3CC1000
heap
page read and write
4FD000
unkown
page readonly
15CB000
heap
page read and write
4201000
heap
page read and write
18D0000
trusted library allocation
page read and write
4B10000
heap
page read and write
26FE000
stack
page read and write
648000
heap
page read and write
34B4000
heap
page read and write
3CC1000
heap
page read and write
750000
heap
page read and write
18D0000
trusted library allocation
page read and write
608000
heap
page read and write
1B00000
trusted library allocation
page read and write
D4E000
stack
page read and write
17C4000
heap
page read and write
3322000
heap
page read and write
44B4000
trusted library allocation
page read and write
3CC1000
heap
page read and write
17C4000
heap
page read and write
4201000
heap
page read and write
19D9000
heap
page read and write
4201000
heap
page read and write
ADB000
heap
page read and write
1384000
heap
page read and write
17C4000
heap
page read and write
1FEA8345000
heap
page read and write
3CC1000
heap
page read and write
3CC1000
heap
page read and write
21F0000
heap
page read and write
AD5000
heap
page read and write
1FEA8379000
heap
page read and write
68C000
heap
page read and write
48EE000
stack
page read and write
1FEA8310000
heap
page read and write
3CC1000
heap
page read and write
17C4000
heap
page read and write
CFF000
stack
page read and write
3CC1000
heap
page read and write
3CC1000
heap
page read and write
1B00000
trusted library allocation
page read and write
4201000
heap
page read and write
2DF0000
heap
page read and write
BF4000
unkown
page write copy
1B00000
trusted library allocation
page read and write
2EE8000
heap
page read and write
2E0E000
stack
page read and write
3CC1000
heap
page read and write
1FEA835F000
heap
page read and write
1398000
heap
page read and write
3CC1000
heap
page read and write
17C4000
heap
page read and write
3CC1000
heap
page read and write
1B00000
trusted library allocation
page read and write
3128000
heap
page read and write
A3E000
stack
page read and write
4CEF000
stack
page read and write
383E000
stack
page read and write
1938000
heap
page read and write
1FEA8345000
heap
page read and write
AC8000
heap
page read and write
223E000
stack
page read and write
1FEA836D000
heap
page read and write
3470000
heap
page read and write
1208000
heap
page read and write
1FEA8378000
heap
page read and write
17C4000
heap
page read and write
459E000
trusted library allocation
page read and write
1FEA835D000
heap
page read and write
15DD000
stack
page read and write
12CA000
heap
page read and write
BA0000
heap
page read and write
15AB000
heap
page read and write
17C4000
heap
page read and write
2180000
heap
page read and write
2DEF000
stack
page read and write
1C16000
heap
page read and write
3CC0000
heap
page read and write
CC000
stack
page read and write
AB0000
heap
page read and write
1A62000
heap
page read and write
759000
unkown
page readonly
There are 443 hidden memdumps, click here to show them.