IOC Report
SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpAAF6.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZRuVeAoBoxootS.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1pmywpym.zns.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bf1som1k.bkf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3kx0xm0.jis.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hdijaa0z.5td.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hzahx3fj.qhl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjw0skxy.dk0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w2l1vtjz.ivp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycpcbrzu.p2t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC13D.tmp
XML 1.0 document, ASCII text
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZRuVeAoBoxootS" /XML "C:\Users\user\AppData\Local\Temp\tmpAAF6.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exe"
malicious
C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe
C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZRuVeAoBoxootS" /XML "C:\Users\user\AppData\Local\Temp\tmpC13D.tmp"
malicious
C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe
"C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe"
malicious
C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe
"C:\Users\user\AppData\Roaming\ZRuVeAoBoxootS.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
127.0.0.1
malicious
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/json.gpB
unknown
http://geoplugin.net/json.gp8
unknown
http://geoplugin.net/json.gp/C
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
officerem.duckdns.org
103.186.116.145
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
103.186.116.145
officerem.duckdns.org
unknown
malicious
127.0.0.1
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-6GPUH1
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-6GPUH1
licence
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CEB000
heap
page read and write
malicious
3F99000
trusted library allocation
page read and write
malicious
1017000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
6FAE000
stack
page read and write
471000
remote allocation
page execute and read and write
54C2000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
B70000
unkown
page readonly
3961000
trusted library allocation
page read and write
270D000
trusted library allocation
page execute and read and write
10D0000
heap
page read and write
5FB0000
heap
page read and write
5120000
trusted library allocation
page read and write
2E10000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
767E000
stack
page read and write
28A0000
heap
page read and write
11D5000
heap
page read and write
990000
heap
page read and write
5610000
heap
page read and write
C30000
trusted library allocation
page read and write
2713000
trusted library allocation
page read and write
144B000
trusted library allocation
page execute and read and write
29C7000
trusted library allocation
page read and write
7DDF000
stack
page read and write
4516000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
2750000
trusted library allocation
page read and write
543E000
heap
page read and write
7B9E000
stack
page read and write
292E000
trusted library allocation
page read and write
1182000
heap
page read and write
2A70000
heap
page read and write
5F80000
heap
page read and write
2703000
trusted library allocation
page execute and read and write
30AF000
stack
page read and write
2726000
trusted library allocation
page execute and read and write
475000
remote allocation
page execute and read and write
33BB000
stack
page read and write
9FAE000
stack
page read and write
3CD5000
trusted library allocation
page read and write
4F70000
heap
page read and write
2950000
heap
page execute and read and write
54C8000
trusted library allocation
page read and write
272A000
trusted library allocation
page execute and read and write
CE9000
stack
page read and write
53D4000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
2E7C000
stack
page read and write
7050000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
D6E000
heap
page read and write
7180000
heap
page read and write
A3C000
stack
page read and write
2710000
trusted library allocation
page read and write
2E30000
heap
page execute and read and write
6B1E000
stack
page read and write
357F000
stack
page read and write
AE1E000
stack
page read and write
54B0000
heap
page read and write
DE7000
stack
page read and write
7FDE000
stack
page read and write
2A6F000
stack
page read and write
AC3E000
stack
page read and write
CD0000
heap
page read and write
279E000
stack
page read and write
2D78000
trusted library allocation
page read and write
5850000
heap
page read and write
108A000
heap
page read and write
4E60000
trusted library allocation
page read and write
46E000
remote allocation
page execute and read and write
1430000
trusted library allocation
page read and write
2737000
trusted library allocation
page execute and read and write
52A0000
heap
page read and write
E15000
heap
page read and write
E5D000
stack
page read and write
85F000
unkown
page read and write
1432000
trusted library allocation
page read and write
3F91000
trusted library allocation
page read and write
6D5E000
stack
page read and write
53F1000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
ECF000
stack
page read and write
3E0000
heap
page read and write
80E0000
heap
page read and write
9F0000
heap
page read and write
EB5000
heap
page read and write
71B0000
trusted library allocation
page read and write
55FC000
stack
page read and write
6C1F000
stack
page read and write
5280000
trusted library allocation
page read and write
367F000
unkown
page read and write
6F60000
trusted library allocation
page read and write
3CE000
unkown
page read and write
27E0000
heap
page read and write
6F50000
trusted library allocation
page read and write
508C000
stack
page read and write
3969000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
EB0000
heap
page read and write
111E000
stack
page read and write
2910000
trusted library allocation
page read and write
780000
heap
page read and write
7FB000
heap
page read and write
517B000
stack
page read and write
3C5F000
trusted library allocation
page read and write
100F000
stack
page read and write
53F6000
trusted library allocation
page read and write
8BE000
stack
page read and write
117F000
heap
page read and write
5445000
trusted library allocation
page read and write
327E000
stack
page read and write
6D9E000
stack
page read and write
5730000
trusted library allocation
page read and write
BB0000
heap
page read and write
1174000
heap
page read and write
5470000
trusted library allocation
page read and write
3A2D000
trusted library allocation
page read and write
71C0000
heap
page read and write
4EFB000
trusted library allocation
page read and write
273B000
trusted library allocation
page execute and read and write
4EF8000
trusted library allocation
page read and write
E0C000
stack
page read and write
775E000
stack
page read and write
5710000
heap
page read and write
5402000
trusted library allocation
page read and write
2732000
trusted library allocation
page read and write
7F410000
trusted library allocation
page execute and read and write
F5F000
stack
page read and write
3160000
heap
page read and write
63D000
stack
page read and write
1442000
trusted library allocation
page read and write
2914000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
9E0000
heap
page read and write
3AE4000
trusted library allocation
page read and write
E60000
heap
page read and write
57F0000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
C47000
heap
page read and write
4F10000
trusted library allocation
page read and write
2960000
heap
page read and write
2900000
trusted library allocation
page read and write
4968000
trusted library allocation
page read and write
A45D000
stack
page read and write
5580000
trusted library allocation
page read and write
E03000
heap
page read and write
1010000
heap
page read and write
A55E000
stack
page read and write
5720000
heap
page read and write
4F00000
trusted library allocation
page execute and read and write
74F000
stack
page read and write
E24000
heap
page read and write
A31C000
stack
page read and write
5760000
heap
page execute and read and write
2931000
trusted library allocation
page read and write
2F8F000
stack
page read and write
81E000
unkown
page read and write
2D6E000
stack
page read and write
AE5C000
stack
page read and write
1707000
heap
page read and write
2CEC000
trusted library allocation
page read and write
1083000
heap
page read and write
5413000
heap
page read and write
FBE000
stack
page read and write
5855000
heap
page read and write
4E44000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
71A000
stack
page read and write
6F6A000
trusted library allocation
page read and write
2A80000
heap
page read and write
7080000
heap
page read and write
4E50000
trusted library allocation
page read and write
67A000
stack
page read and write
2D20000
trusted library allocation
page read and write
960000
heap
page read and write
52B0000
heap
page read and write
1050000
heap
page read and write
763D000
stack
page read and write
27DB000
stack
page read and write
CFB000
stack
page read and write
155E000
stack
page read and write
5840000
trusted library allocation
page read and write
7CDE000
stack
page read and write
28F0000
trusted library allocation
page execute and read and write
4F50000
trusted library section
page readonly
4E46000
trusted library allocation
page read and write
4AFC000
stack
page read and write
3CEC000
trusted library allocation
page read and write
737E000
stack
page read and write
9DAD000
stack
page read and write
471000
remote allocation
page execute and read and write
CCE000
stack
page read and write
3BA8000
trusted library allocation
page read and write
785E000
stack
page read and write
C40000
heap
page read and write
AF7000
stack
page read and write
A0AF000
stack
page read and write
7F0000
heap
page read and write
271D000
trusted library allocation
page execute and read and write
1423000
trusted library allocation
page read and write
7C9E000
stack
page read and write
55A0000
trusted library allocation
page execute and read and write
36E0000
heap
page read and write
1436000
trusted library allocation
page execute and read and write
3170000
heap
page read and write
3D0000
heap
page read and write
4B46000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
7150000
trusted library allocation
page execute and read and write
143A000
trusted library allocation
page execute and read and write
C0E000
stack
page read and write
7C0000
heap
page read and write
29D000
stack
page read and write
52A5000
heap
page read and write
D87000
heap
page read and write
4F30000
trusted library allocation
page execute and read and write
36D0000
heap
page read and write
5430000
heap
page read and write
1055000
heap
page read and write
7782000
trusted library allocation
page read and write
1700000
heap
page read and write
80DF000
stack
page read and write
6F40000
trusted library allocation
page read and write
81E0000
trusted library section
page read and write
4E40000
trusted library allocation
page read and write
722E000
stack
page read and write
4E65000
trusted library allocation
page read and write
B3C000
stack
page read and write
347E000
stack
page read and write
340000
heap
page read and write
3D16000
trusted library allocation
page read and write
5130000
heap
page read and write
4EC0000
heap
page execute and read and write
D68000
heap
page read and write
1413000
trusted library allocation
page execute and read and write
5830000
trusted library section
page read and write
5F90000
heap
page read and write
5750000
trusted library allocation
page execute and read and write
CD7000
heap
page read and write
4E70000
trusted library allocation
page read and write
D94000
heap
page read and write
5290000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
7B0000
heap
page read and write
7D0000
heap
page read and write
1060000
heap
page read and write
2C6F000
stack
page read and write
1410000
trusted library allocation
page read and write
527E000
stack
page read and write
140E000
stack
page read and write
2F91000
trusted library allocation
page read and write
7F210000
trusted library allocation
page execute and read and write
53FD000
trusted library allocation
page read and write
28C0000
heap
page read and write
A21C000
stack
page read and write
2936000
trusted library allocation
page read and write
D5E000
stack
page read and write
D9F000
heap
page read and write
DA1000
heap
page read and write
FFE000
stack
page read and write
2DA000
stack
page read and write
2942000
trusted library allocation
page read and write
2722000
trusted library allocation
page read and write
70E000
stack
page read and write
291B000
trusted library allocation
page read and write
3F0000
heap
page read and write
38E000
unkown
page read and write
AF5C000
stack
page read and write
B90000
heap
page read and write
790000
heap
page read and write
30EC000
stack
page read and write
7FE000
stack
page read and write
5110000
heap
page read and write
B80000
heap
page read and write
A320000
heap
page read and write
9DED000
stack
page read and write
293D000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
2E80000
heap
page read and write
142D000
trusted library allocation
page execute and read and write
4F73000
heap
page read and write
C56000
heap
page read and write
4F5F000
trusted library section
page readonly
B72000
unkown
page readonly
114E000
heap
page read and write
1440000
trusted library allocation
page read and write
5410000
heap
page read and write
80E7000
heap
page read and write
317B000
heap
page read and write
11C0000
heap
page read and write
53DB000
trusted library allocation
page read and write
1414000
trusted library allocation
page read and write
6C5E000
stack
page read and write
6E9E000
stack
page read and write
5450000
trusted library allocation
page read and write
141D000
trusted library allocation
page execute and read and write
C50000
heap
page read and write
595E000
stack
page read and write
1450000
heap
page read and write
1073000
heap
page read and write
3B59000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
6E0000
heap
page read and write
1065000
heap
page read and write
AD1E000
stack
page read and write
AB3E000
stack
page read and write
1140000
heap
page read and write
52C0000
heap
page read and write
293E000
stack
page read and write
2FF7000
trusted library allocation
page read and write
1447000
trusted library allocation
page execute and read and write
7E1E000
stack
page read and write
4EE0000
heap
page read and write
839F000
stack
page read and write
F0E000
stack
page read and write
7F1E000
stack
page read and write
5430000
trusted library allocation
page read and write
7196000
heap
page read and write
11D7000
heap
page read and write
5600000
trusted library section
page readonly
28EE000
stack
page read and write
71E0000
trusted library allocation
page execute and read and write
4F60000
heap
page read and write
8FF000
stack
page read and write
1167000
heap
page read and write
99A000
heap
page read and write
4EF2000
trusted library allocation
page read and write
2704000
trusted library allocation
page read and write
10AE000
stack
page read and write
2966000
heap
page read and write
97C000
stack
page read and write
There are 327 hidden memdumps, click here to show them.