IOC Report
z71htmivzKAUpOkr2J.exe

loading gif

Files

File Path
Type
Category
Malicious
z71htmivzKAUpOkr2J.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z71htmivzKAUpOkr2J.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3efkhjvs.p3h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ksw4tic.4jw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxo5ki1p.psn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t1dnxjyq.zgz.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z71htmivzKAUpOkr2J.exe
"C:\Users\user\Desktop\z71htmivzKAUpOkr2J.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z71htmivzKAUpOkr2J.exe"
malicious
C:\Users\user\Desktop\z71htmivzKAUpOkr2J.exe
"C:\Users\user\Desktop\z71htmivzKAUpOkr2J.exe"
malicious
C:\Users\user\Desktop\z71htmivzKAUpOkr2J.exe
"C:\Users\user\Desktop\z71htmivzKAUpOkr2J.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://mail.apexrnun.com
unknown
http://r11.o.lencr.org0#
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r11.i.lencr.org/02
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
mail.apexrnun.com
185.196.9.150
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
241.42.69.40.in-addr.arpa
unknown
212.20.149.52.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
185.196.9.150
mail.apexrnun.com
Switzerland
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z71htmivzKAUpOkr2J_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3CED000
trusted library allocation
page read and write
malicious
34D1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
34AD000
trusted library allocation
page read and write
malicious
3AC9000
trusted library allocation
page read and write
malicious
3481000
trusted library allocation
page read and write
malicious
72F0000
trusted library allocation
page execute and read and write
5480000
heap
page read and write
CA9000
heap
page read and write
A0D9000
heap
page read and write
2A80000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
34CD000
trusted library allocation
page read and write
A0B2000
heap
page read and write
2AB0000
heap
page execute and read and write
4AC8000
trusted library allocation
page read and write
9E7E000
stack
page read and write
2B20000
trusted library allocation
page read and write
4C5C000
stack
page read and write
6C80000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
1612000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
A31E000
stack
page read and write
1F20000
trusted library allocation
page read and write
1606000
trusted library allocation
page execute and read and write
1AAE000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
6D02000
trusted library allocation
page read and write
12D2000
heap
page read and write
3451000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
6C70000
trusted library allocation
page execute and read and write
1E1C000
stack
page read and write
2FAD000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
15ED000
trusted library allocation
page execute and read and write
6A2E000
stack
page read and write
168E000
stack
page read and write
1AB2000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
7FBA0000
trusted library allocation
page execute and read and write
1ABA000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
1ACD000
trusted library allocation
page read and write
2D6A000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
5D10000
heap
page read and write
16D0000
trusted library allocation
page execute and read and write
4FF0000
heap
page read and write
5D0E000
stack
page read and write
CB6000
heap
page read and write
16E0000
heap
page read and write
7B2000
unkown
page readonly
3044000
trusted library allocation
page read and write
1615000
trusted library allocation
page execute and read and write
1630000
heap
page read and write
2AC1000
trusted library allocation
page read and write
3029000
trusted library allocation
page read and write
1E60000
heap
page execute and read and write
6DD0000
trusted library allocation
page read and write
6BB2000
heap
page read and write
12E7000
heap
page read and write
5CCF000
stack
page read and write
1AAB000
trusted library allocation
page read and write
A0A0000
heap
page read and write
CC1000
heap
page read and write
B57000
stack
page read and write
2D41000
trusted library allocation
page read and write
1C30000
heap
page read and write
3C92000
trusted library allocation
page read and write
F7D000
trusted library allocation
page execute and read and write
2A40000
trusted library allocation
page read and write
544E000
stack
page read and write
10B0000
trusted library allocation
page read and write
1AA0000
trusted library allocation
page read and write
6B70000
heap
page read and write
51A0000
trusted library allocation
page execute and read and write
A0DB000
heap
page read and write
1610000
trusted library allocation
page read and write
2DBD000
trusted library allocation
page read and write
2E8B000
trusted library allocation
page read and write
C8A000
heap
page read and write
2D2C000
trusted library allocation
page read and write
A1DE000
stack
page read and write
15F0000
trusted library allocation
page read and write
A0AB000
heap
page read and write
1F10000
heap
page read and write
303E000
trusted library allocation
page read and write
728F000
stack
page read and write
FB8000
stack
page read and write
1E80000
heap
page read and write
2E4D000
trusted library allocation
page read and write
1218000
heap
page read and write
6C97000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
6D8E000
stack
page read and write
2EC9000
trusted library allocation
page read and write
66AD000
stack
page read and write
10A2000
trusted library allocation
page read and write
5460000
heap
page read and write
12CE000
heap
page read and write
44BB000
trusted library allocation
page read and write
2F98000
trusted library allocation
page read and write
F73000
trusted library allocation
page execute and read and write
2DA8000
trusted library allocation
page read and write
68EE000
stack
page read and write
2F45000
trusted library allocation
page read and write
1F0E000
stack
page read and write
D30000
heap
page read and write
F70000
trusted library allocation
page read and write
A09E000
stack
page read and write
C0E000
stack
page read and write
2F1C000
trusted library allocation
page read and write
728E000
stack
page read and write
1617000
trusted library allocation
page execute and read and write
10BB000
trusted library allocation
page execute and read and write
6CA0000
trusted library allocation
page execute and read and write
718D000
stack
page read and write
7F650000
trusted library allocation
page execute and read and write
1ECE000
stack
page read and write
15E4000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
1AC6000
trusted library allocation
page read and write
A69C000
stack
page read and write
2D93000
trusted library allocation
page read and write
712000
unkown
page readonly
15FD000
trusted library allocation
page execute and read and write
112E000
stack
page read and write
75BD000
stack
page read and write
775E000
stack
page read and write
2EDE000
trusted library allocation
page read and write
7180000
trusted library section
page read and write
C8E000
heap
page read and write
EBA000
stack
page read and write
2F6F000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
1320000
heap
page read and write
C80000
heap
page read and write
2F5A000
trusted library allocation
page read and write
5220000
heap
page read and write
1180000
heap
page read and write
2FC2000
trusted library allocation
page read and write
1B10000
heap
page execute and read and write
2FD6000
trusted library allocation
page read and write
116B000
stack
page read and write
4FA0000
trusted library allocation
page read and write
C7E000
stack
page read and write
5030000
trusted library allocation
page execute and read and write
2E24000
trusted library allocation
page read and write
C35000
heap
page read and write
34BF000
trusted library allocation
page read and write
2E62000
trusted library allocation
page read and write
123A000
heap
page read and write
3074000
trusted library allocation
page read and write
1C48000
trusted library allocation
page read and write
1210000
heap
page read and write
1245000
heap
page read and write
2D7F000
trusted library allocation
page read and write
1DDD000
stack
page read and write
7209000
trusted library allocation
page read and write
34AB000
trusted library allocation
page read and write
A2DE000
stack
page read and write
4FC0000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
A59000
stack
page read and write
7860000
trusted library section
page read and write
7200000
trusted library allocation
page read and write
15E3000
trusted library allocation
page execute and read and write
5010000
heap
page read and write
160A000
trusted library allocation
page execute and read and write
A55F000
stack
page read and write
5465000
heap
page read and write
5200000
trusted library section
page readonly
1A80000
trusted library allocation
page read and write
6BDF000
heap
page read and write
2EB4000
trusted library allocation
page read and write
1F30000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
5D30000
heap
page read and write
5170000
heap
page read and write
738F000
stack
page read and write
785E000
stack
page read and write
7880000
trusted library allocation
page read and write
55F0000
heap
page read and write
3000000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
2A44000
trusted library allocation
page read and write
F80000
heap
page read and write
51FB000
stack
page read and write
5BCE000
stack
page read and write
6BCA000
heap
page read and write
2E0F000
trusted library allocation
page read and write
1187000
heap
page read and write
C30000
heap
page read and write
3077000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
1AA6000
trusted library allocation
page read and write
5791000
heap
page read and write
108E000
stack
page read and write
5173000
heap
page read and write
5720000
trusted library allocation
page read and write
1E83000
heap
page read and write
2F07000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
34D9000
trusted library allocation
page read and write
6A6E000
stack
page read and write
74D0000
heap
page read and write
2A30000
trusted library allocation
page read and write
2A66000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
549E000
heap
page read and write
2A6D000
trusted library allocation
page read and write
1AC1000
trusted library allocation
page read and write
1170000
trusted library allocation
page execute and read and write
1093000
trusted library allocation
page read and write
7240000
trusted library allocation
page execute and read and write
43E000
remote allocation
page execute and read and write
5250000
heap
page execute and read and write
A41F000
stack
page read and write
5ACC000
stack
page read and write
1AE0000
trusted library allocation
page read and write
1E70000
trusted library allocation
page read and write
72A0000
heap
page read and write
2A4B000
trusted library allocation
page read and write
9C80000
heap
page read and write
F74000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
13E0000
heap
page read and write
2B15000
trusted library allocation
page read and write
757E000
stack
page read and write
10B2000
trusted library allocation
page read and write
1E79000
trusted library allocation
page read and write
67EE000
stack
page read and write
10A6000
trusted library allocation
page execute and read and write
6B6D000
stack
page read and write
10B7000
trusted library allocation
page execute and read and write
2A2F000
stack
page read and write
2DD1000
trusted library allocation
page read and write
1C1E000
stack
page read and write
6CED000
stack
page read and write
10AA000
trusted library allocation
page execute and read and write
6BC3000
heap
page read and write
A59B000
stack
page read and write
6BB8000
heap
page read and write
6C90000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
CC3000
heap
page read and write
2E76000
trusted library allocation
page read and write
2DFA000
trusted library allocation
page read and write
1F2D000
trusted library allocation
page read and write
161B000
trusted library allocation
page execute and read and write
2EF2000
trusted library allocation
page read and write
1A90000
trusted library allocation
page read and write
692D000
stack
page read and write
109D000
trusted library allocation
page execute and read and write
3AC1000
trusted library allocation
page read and write
710000
unkown
page readonly
D18000
heap
page read and write
63EF000
stack
page read and write
2F31000
trusted library allocation
page read and write
1AE4000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
1247000
heap
page read and write
A7AE000
stack
page read and write
67AE000
stack
page read and write
10D0000
trusted library allocation
page read and write
16E7000
heap
page read and write
CA0000
heap
page read and write
1ABE000
trusted library allocation
page read and write
D67000
heap
page read and write
A45E000
stack
page read and write
1AF0000
trusted library allocation
page read and write
BB0000
heap
page read and write
4451000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
6B7C000
heap
page read and write
4479000
trusted library allocation
page read and write
2DE6000
trusted library allocation
page read and write
5022000
trusted library allocation
page read and write
1370000
heap
page read and write
F4F000
stack
page read and write
12A7000
heap
page read and write
16CC000
stack
page read and write
34E0000
trusted library allocation
page read and write
10E0000
heap
page read and write
5470000
heap
page read and write
BC0000
heap
page read and write
1F37000
trusted library allocation
page read and write
9F9D000
stack
page read and write
5210000
heap
page read and write
2AA5000
trusted library allocation
page read and write
1602000
trusted library allocation
page read and write
1600000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
There are 290 hidden memdumps, click here to show them.