IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\TechMind360 Innovations Co\L
data
dropped
malicious
C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\812297\g
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Acoustic
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Almost
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bb
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bee
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Do
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Dot
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Extreme
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Gnome
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Praise
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Predict
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Random
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ready
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Sandra
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Shannon
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Wright
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\After
data
dropped
C:\Users\user\AppData\Local\Temp\Anticipated
data
dropped
C:\Users\user\AppData\Local\Temp\Anyone
ASCII text, with very long lines (1797), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Anyone.cmd
ASCII text, with very long lines (1797), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Blessed
data
dropped
C:\Users\user\AppData\Local\Temp\Cargo
data
dropped
C:\Users\user\AppData\Local\Temp\Chase
data
dropped
C:\Users\user\AppData\Local\Temp\Commercial
data
dropped
C:\Users\user\AppData\Local\Temp\Complicated
data
dropped
C:\Users\user\AppData\Local\Temp\Continental
data
dropped
C:\Users\user\AppData\Local\Temp\Cunt
data
dropped
C:\Users\user\AppData\Local\Temp\Dominant
data
dropped
C:\Users\user\AppData\Local\Temp\Essential
data
dropped
C:\Users\user\AppData\Local\Temp\Expenses
data
dropped
C:\Users\user\AppData\Local\Temp\Halloween
data
dropped
C:\Users\user\AppData\Local\Temp\Hdtv
data
dropped
C:\Users\user\AppData\Local\Temp\Janet
data
dropped
C:\Users\user\AppData\Local\Temp\Melissa
data
dropped
C:\Users\user\AppData\Local\Temp\Opposite
data
dropped
C:\Users\user\AppData\Local\Temp\Petersburg
data
dropped
C:\Users\user\AppData\Local\Temp\Prisoners
data
dropped
C:\Users\user\AppData\Local\Temp\Purchasing
data
dropped
C:\Users\user\AppData\Local\Temp\Silk
data
dropped
C:\Users\user\AppData\Local\Temp\Stadium
data
dropped
C:\Users\user\AppData\Local\Temp\Stands
data
dropped
C:\Users\user\AppData\Local\Temp\Success
data
dropped
C:\Users\user\AppData\Local\Temp\Textile
data
dropped
C:\Users\user\AppData\Local\Temp\Tolerance
data
dropped
C:\Users\user\AppData\Local\Temp\nsb6504.tmp
data
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 812297
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "IndieBeachesHonIo" Janet
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Praise + Bee + Random + Acoustic + Predict + Shannon + Extreme + Gnome + Sandra + Wright + Ready + Bb + Dot + Almost + Do + Continental 812297\g
malicious
C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
812297\Shopzilla.pif 812297\g
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'" /sc onlogon /F /RL HIGHEST
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js"
malicious
C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif
"C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif" "C:\Users\user\AppData\Local\TechMind360 Innovations Co\L"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 15
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.autoitscript.com/autoit3/J
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.autoitscript.com/autoit3/0
unknown

Domains

Name
IP
Malicious
JzyWtlVaDZyw.JzyWtlVaDZyw
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
27FD000
heap
page read and write
3DA1000
heap
page read and write
1FE71BD5000
heap
page read and write
7BC000
stack
page read and write
C51000
heap
page read and write
47FF000
stack
page read and write
8DF22FA000
stack
page read and write
924000
heap
page read and write
1FE7186E000
heap
page read and write
1FE71856000
heap
page read and write
8DF28FE000
stack
page read and write
36B1000
heap
page read and write
51A0000
heap
page read and write
317E000
heap
page read and write
3050000
heap
page read and write
3417000
heap
page read and write
40A000
unkown
page write copy
39A0000
heap
page read and write
27FD000
heap
page read and write
292E000
heap
page read and write
924000
heap
page read and write
2DEC000
stack
page read and write
DF6000
heap
page read and write
3083000
heap
page read and write
1FE71856000
heap
page read and write
2670000
heap
page read and write
1FE71BDC000
heap
page read and write
27B0000
heap
page read and write
36B1000
heap
page read and write
36B1000
heap
page read and write
728000
heap
page read and write
3DA1000
heap
page read and write
19A000
stack
page read and write
3DA1000
heap
page read and write
3364000
heap
page read and write
40A000
unkown
page read and write
309B000
heap
page read and write
1FE71884000
heap
page read and write
1FE71856000
heap
page read and write
36B1000
heap
page read and write
19E0000
trusted library allocation
page read and write
C5F000
unkown
page write copy
27FD000
heap
page read and write
28EF000
stack
page read and write
30C0000
heap
page read and write
6F0000
heap
page read and write
36B1000
heap
page read and write
1FE736D0000
heap
page read and write
3BB4000
heap
page read and write
3DA1000
heap
page read and write
3080000
heap
page read and write
3E0000
heap
page read and write
C90000
trusted library allocation
page read and write
924000
heap
page read and write
3AD4000
heap
page read and write
D54000
heap
page read and write
3B9A000
heap
page read and write
DB9000
heap
page read and write
27EA000
heap
page read and write
2780000
heap
page read and write
2990000
heap
page read and write
1FE71848000
heap
page read and write
43B000
unkown
page readonly
D43000
heap
page read and write
3DA1000
heap
page read and write
D1D000
heap
page read and write
36B1000
heap
page read and write
691000
unkown
page execute read
3DA1000
heap
page read and write
F23000
heap
page read and write
36B1000
heap
page read and write
3DA1000
heap
page read and write
3DA1000
heap
page read and write
D0E000
stack
page read and write
5C0000
heap
page read and write
267F000
stack
page read and write
3DA1000
heap
page read and write
3DA1000
heap
page read and write
3DA1000
heap
page read and write
100F000
heap
page read and write
91F000
stack
page read and write
3E4000
heap
page read and write
3B16000
heap
page read and write
B4E000
stack
page read and write
2640000
heap
page read and write
3570000
heap
page read and write
36B1000
heap
page read and write
B3F000
stack
page read and write
401000
unkown
page execute read
19E0000
trusted library allocation
page read and write
36B1000
heap
page read and write
48A000
stack
page read and write
36B1000
heap
page read and write
319E000
stack
page read and write
AD0000
heap
page read and write
27CF000
heap
page read and write
3E4000
heap
page read and write
420B000
trusted library allocation
page read and write
1FE7183C000
heap
page read and write
924000
heap
page read and write
36B1000
heap
page read and write
340F000
stack
page read and write
BA1000
unkown
page execute read
309000
stack
page read and write
3B6F000
heap
page read and write
E22000
heap
page read and write
924000
heap
page read and write
8F0000
heap
page read and write
27FD000
heap
page read and write
1FE7186C000
heap
page read and write
EBC000
heap
page read and write
1FE71886000
heap
page read and write
A90000
heap
page read and write
3DA1000
heap
page read and write
27ED000
heap
page read and write
BA0000
unkown
page readonly
19B4000
heap
page read and write
691000
unkown
page execute read
309B000
heap
page read and write
3BC8000
heap
page read and write
26BE000
stack
page read and write
31DF000
stack
page read and write
8DF26FE000
stack
page read and write
1A30000
heap
page read and write
408000
unkown
page readonly
36B1000
heap
page read and write
18D0000
heap
page read and write
99E000
stack
page read and write
400000
unkown
page readonly
31F6000
heap
page read and write
3DA1000
heap
page read and write
3DA1000
heap
page read and write
3E4000
heap
page read and write
36B1000
heap
page read and write
3DA1000
heap
page read and write
401000
unkown
page execute read
C68000
unkown
page readonly
433000
unkown
page read and write
C55000
unkown
page readonly
C90000
trusted library allocation
page read and write
3DA1000
heap
page read and write
296F000
stack
page read and write
3DA1000
heap
page read and write
720000
unkown
page readonly
9F0000
heap
page read and write
C90000
trusted library allocation
page read and write
924000
heap
page read and write
3DA1000
heap
page read and write
37A0000
heap
page read and write
36B1000
heap
page read and write
26FE000
stack
page read and write
3DA1000
heap
page read and write
C4F000
heap
page read and write
3AA8000
heap
page read and write
1FE71BD0000
heap
page read and write
3DA1000
heap
page read and write
31BE000
stack
page read and write
C90000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
B5D000
stack
page read and write
924000
heap
page read and write
C3F000
heap
page read and write
D07000
heap
page read and write
19E0000
trusted library allocation
page read and write
437000
unkown
page read and write
1FE7188E000
heap
page read and write
27EE000
heap
page read and write
279E000
stack
page read and write
3892000
heap
page read and write
8DF2BFF000
stack
page read and write
36B1000
heap
page read and write
36B1000
heap
page read and write
3850000
heap
page read and write
307F000
heap
page read and write
307F000
heap
page read and write
9B000
stack
page read and write
50FE000
stack
page read and write
4113000
trusted library allocation
page read and write
36B1000
heap
page read and write
C55000
unkown
page readonly
30C5000
heap
page read and write
88C000
stack
page read and write
3A2E000
heap
page read and write
C90000
trusted library allocation
page read and write
400000
unkown
page readonly
85E000
stack
page read and write
27CF000
heap
page read and write
36B1000
heap
page read and write
37E2000
heap
page read and write
30AD000
heap
page read and write
33CE000
stack
page read and write
3DA1000
heap
page read and write
3850000
heap
page read and write
1FE7188E000
heap
page read and write
3DA1000
heap
page read and write
3B0E000
heap
page read and write
6CF000
stack
page read and write
330E000
stack
page read and write
38D4000
heap
page read and write
43FF000
stack
page read and write
24DC000
stack
page read and write
2DF0000
heap
page read and write
427000
unkown
page read and write
1FE7187E000
heap
page read and write
1FE719F0000
heap
page read and write
309B000
heap
page read and write
FA5000
heap
page read and write
D99000
heap
page read and write
2DCF000
stack
page read and write
8DF24FF000
stack
page read and write
720000
heap
page read and write
36B1000
heap
page read and write
3C0000
heap
page read and write
27B9000
heap
page read and write
19E0000
trusted library allocation
page read and write
3DA1000
heap
page read and write
924000
heap
page read and write
414A000
trusted library allocation
page read and write
334E000
stack
page read and write
3370000
heap
page read and write
3DA1000
heap
page read and write
3068000
heap
page read and write
32FE000
stack
page read and write
2997000
heap
page read and write
4640000
heap
page read and write
312A000
heap
page read and write
296E000
stack
page read and write
BA0000
unkown
page readonly
3E4000
heap
page read and write
19E0000
trusted library allocation
page read and write
DEF000
heap
page read and write
440000
heap
page read and write
1FE7188E000
heap
page read and write
3DA0000
heap
page read and write
19E0000
heap
page read and write
309B000
heap
page read and write
B60000
heap
page read and write
EFB000
heap
page read and write
1FE71887000
heap
page read and write
36B1000
heap
page read and write
EF7000
heap
page read and write
19E0000
trusted library allocation
page read and write
19E0000
trusted library allocation
page read and write
C00000
heap
page read and write
C68000
unkown
page readonly
19E0000
trusted library allocation
page read and write
D20000
heap
page read and write
19E0000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
2DAC000
stack
page read and write
309F000
heap
page read and write
273F000
stack
page read and write
3866000
heap
page read and write
4105000
trusted library allocation
page read and write
F41000
heap
page read and write
1FE71810000
heap
page read and write
E83000
heap
page read and write
C40000
heap
page read and write
758000
unkown
page readonly
50BF000
stack
page read and write
3BBE000
heap
page read and write
463F000
stack
page read and write
1FE7186C000
heap
page read and write
D28000
heap
page read and write
27FD000
heap
page read and write
30A8000
heap
page read and write
309E000
heap
page read and write
924000
heap
page read and write
680000
heap
page read and write
E1B000
heap
page read and write
2520000
heap
page read and write
C90000
trusted library allocation
page read and write
74F000
unkown
page write copy
27EA000
heap
page read and write
3A40000
heap
page read and write
8DF23FF000
stack
page read and write
1FE71847000
heap
page read and write
396E000
heap
page read and write
B80000
heap
page read and write
5C5000
heap
page read and write
95E000
stack
page read and write
F7A000
heap
page read and write
330D000
stack
page read and write
1FE71A10000
heap
page read and write
1992000
heap
page read and write
3DA1000
heap
page read and write
745000
unkown
page readonly
84E000
stack
page read and write
249C000
stack
page read and write
4830000
heap
page read and write
1FE7187B000
heap
page read and write
74F000
unkown
page read and write
3DA1000
heap
page read and write
36B1000
heap
page read and write
3060000
heap
page read and write
3DA1000
heap
page read and write
3DA1000
heap
page read and write
C90000
trusted library allocation
page read and write
3DA1000
heap
page read and write
4670000
heap
page read and write
39DC000
heap
page read and write
42E000
unkown
page read and write
924000
heap
page read and write
3A24000
heap
page read and write
41FD000
trusted library allocation
page read and write
690000
unkown
page readonly
86D000
stack
page read and write
3410000
heap
page read and write
2F68000
heap
page read and write
36B1000
heap
page read and write
19E0000
trusted library allocation
page read and write
392C000
heap
page read and write
263E000
stack
page read and write
38EA000
heap
page read and write
1FE7188E000
heap
page read and write
C90000
trusted library allocation
page read and write
32BF000
heap
page read and write
32A0000
heap
page read and write
5170000
heap
page read and write
55E000
stack
page read and write
40C000
unkown
page read and write
36B1000
heap
page read and write
3DA1000
heap
page read and write
36B1000
heap
page read and write
1FE71841000
heap
page read and write
920000
heap
page read and write
30A7000
heap
page read and write
F36000
heap
page read and write
3DA1000
heap
page read and write
924000
heap
page read and write
32BF000
stack
page read and write
43B000
unkown
page readonly
3A50000
heap
page read and write
30AD000
heap
page read and write
3916000
heap
page read and write
29AF000
stack
page read and write
765000
heap
page read and write
19E0000
trusted library allocation
page read and write
27D0000
heap
page read and write
399A000
heap
page read and write
3DA1000
heap
page read and write
720000
unkown
page readonly
5A0000
heap
page read and write
27F3000
heap
page read and write
370000
heap
page read and write
710000
heap
page read and write
3DA1000
heap
page read and write
39E2000
heap
page read and write
38A8000
heap
page read and write
36B0000
heap
page read and write
36B1000
heap
page read and write
C30000
unkown
page readonly
924000
heap
page read and write
C63000
unkown
page write copy
36B1000
heap
page read and write
30AD000
heap
page read and write
77C000
stack
page read and write
36B1000
heap
page read and write
3958000
heap
page read and write
36B1000
heap
page read and write
3E4000
heap
page read and write
820000
heap
page read and write
690000
unkown
page readonly
1FE71820000
heap
page read and write
30AD000
heap
page read and write
513F000
stack
page read and write
283D000
heap
page read and write
507E000
stack
page read and write
75E000
heap
page read and write
900000
heap
page read and write
C08000
heap
page read and write
45FE000
stack
page read and write
27EA000
heap
page read and write
924000
heap
page read and write
B7D000
stack
page read and write
8DF27FF000
stack
page read and write
3E4000
heap
page read and write
3BF3000
heap
page read and write
444F000
stack
page read and write
399E000
heap
page read and write
C5F000
unkown
page read and write
3360000
heap
page read and write
3AEA000
heap
page read and write
27D3000
heap
page read and write
33FF000
stack
page read and write
3BE1000
heap
page read and write
CCE000
stack
page read and write
27FD000
heap
page read and write
36B1000
heap
page read and write
19E0000
trusted library allocation
page read and write
C3F000
heap
page read and write
484F000
stack
page read and write
1FE71889000
heap
page read and write
36B1000
heap
page read and write
31E0000
heap
page read and write
924000
heap
page read and write
36B1000
heap
page read and write
3A92000
heap
page read and write
753000
unkown
page write copy
36B1000
heap
page read and write
8DF29FF000
stack
page read and write
C90000
trusted library allocation
page read and write
3DA1000
heap
page read and write
C90000
trusted library allocation
page read and write
3DA1000
heap
page read and write
C30000
unkown
page readonly
292E000
stack
page read and write
3A66000
heap
page read and write
D2A000
heap
page read and write
BA1000
unkown
page execute read
2676000
heap
page read and write
1FE73200000
heap
page read and write
3DA1000
heap
page read and write
29FE000
stack
page read and write
334E000
stack
page read and write
36B1000
heap
page read and write
31F0000
heap
page read and write
3E4000
heap
page read and write
36B1000
heap
page read and write
408000
unkown
page readonly
36B1000
heap
page read and write
36B1000
heap
page read and write
343C000
stack
page read and write
8DF2AFF000
stack
page read and write
745000
unkown
page readonly
353D000
stack
page read and write
316C000
heap
page read and write
27F4000
heap
page read and write
4052000
trusted library allocation
page read and write
3824000
heap
page read and write
31AA000
heap
page read and write
C90000
trusted library allocation
page read and write
E4F000
heap
page read and write
59E000
stack
page read and write
3B16000
heap
page read and write
924000
heap
page read and write
900000
heap
page read and write
277F000
stack
page read and write
3188000
heap
page read and write
30AE000
heap
page read and write
2F60000
heap
page read and write
32A4000
heap
page read and write
1FE7188E000
heap
page read and write
758000
unkown
page readonly
3DA1000
heap
page read and write
27EA000
heap
page read and write
There are 436 hidden memdumps, click here to show them.