IOC Report
PO-0Y9005373R664.exe

loading gif

Files

File Path
Type
Category
Malicious
PO-0Y9005373R664.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO-0Y9005373R664.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpB962.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\VvtddClQv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\VvtddClQv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VvtddClQv.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbumgdo1.i4u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gdg3ytxr.0gz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ig1aggtv.1x5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qbb03zfi.soz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rweqh102.h0i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u2nf3jon.4uy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ul5tz4st.ukm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x50tsrpk.imz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD806.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\7ec63eecc011967c28496572961d2a7c_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO-0Y9005373R664.exe
"C:\Users\user\Desktop\PO-0Y9005373R664.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO-0Y9005373R664.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VvtddClQv.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpB962.tmp"
malicious
C:\Users\user\Desktop\PO-0Y9005373R664.exe
"C:\Users\user\Desktop\PO-0Y9005373R664.exe"
malicious
C:\Users\user\AppData\Roaming\VvtddClQv.exe
C:\Users\user\AppData\Roaming\VvtddClQv.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VvtddClQv" /XML "C:\Users\user\AppData\Local\Temp\tmpD806.tmp"
malicious
C:\Users\user\AppData\Roaming\VvtddClQv.exe
"C:\Users\user\AppData\Roaming\VvtddClQv.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://104.248.205.66/index.php/17008709
104.248.205.66
malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.ibsensoftware.com/
unknown

IPs

IP
Domain
Country
Malicious
104.248.205.66
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3E30000
trusted library allocation
page read and write
malicious
1428000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5500000
trusted library section
page read and write
malicious
2991000
trusted library allocation
page read and write
malicious
3E4A000
trusted library allocation
page read and write
malicious
3B73000
trusted library allocation
page read and write
malicious
6C2000
unkown
page readonly
malicious
2A81000
trusted library allocation
page read and write
malicious
AE0000
heap
page read and write
B18000
heap
page read and write
7262000
heap
page read and write
5010000
trusted library allocation
page read and write
E5B000
trusted library allocation
page execute and read and write
27CC000
stack
page read and write
5220000
trusted library allocation
page read and write
2914000
trusted library allocation
page read and write
6B7C000
heap
page read and write
63F000
stack
page read and write
CDE000
stack
page read and write
590000
heap
page read and write
A8D000
trusted library allocation
page execute and read and write
6BD1000
heap
page read and write
94BE000
stack
page read and write
580000
heap
page read and write
E87000
heap
page read and write
4F30000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
547D000
stack
page read and write
3C01000
trusted library allocation
page read and write
E9C000
stack
page read and write
590000
heap
page read and write
7000000
trusted library allocation
page execute and read and write
4ED0000
trusted library allocation
page read and write
B29000
heap
page read and write
4FC3000
heap
page read and write
54DE000
stack
page read and write
286A000
heap
page read and write
54E000
unkown
page read and write
276F000
stack
page read and write
4D24000
trusted library allocation
page read and write
D10000
heap
page read and write
5B30000
heap
page read and write
983E000
stack
page read and write
4F40000
trusted library allocation
page read and write
5040000
trusted library section
page readonly
BDBE000
stack
page read and write
527B000
stack
page read and write
4D10000
heap
page read and write
A73000
trusted library allocation
page execute and read and write
4F70000
trusted library section
page readonly
3BA5000
trusted library allocation
page read and write
3D74000
trusted library allocation
page read and write
10E0000
heap
page read and write
58F000
unkown
page read and write
6D4A000
trusted library allocation
page read and write
4B7C000
stack
page read and write
B71000
heap
page read and write
6B9E000
heap
page read and write
C43E000
stack
page read and write
590000
heap
page read and write
5366000
heap
page read and write
A00000
heap
page read and write
A01E000
stack
page read and write
2960000
trusted library allocation
page read and write
52F0000
heap
page read and write
CFE000
stack
page read and write
4F60000
trusted library allocation
page read and write
A4E000
stack
page read and write
3D9B000
trusted library allocation
page read and write
A7D000
trusted library allocation
page execute and read and write
4F20000
trusted library allocation
page read and write
13BF000
stack
page read and write
4FB0000
trusted library allocation
page execute and read and write
43D000
stack
page read and write
E52000
trusted library allocation
page read and write
E6E000
heap
page read and write
1390000
heap
page read and write
49F000
remote allocation
page execute and read and write
5B47000
heap
page read and write
BA7000
heap
page read and write
570000
heap
page read and write
C03C000
stack
page read and write
2902000
trusted library allocation
page read and write
E24000
trusted library allocation
page read and write
12BF000
stack
page read and write
2A6B000
stack
page read and write
C13C000
stack
page read and write
2980000
heap
page execute and read and write
1070000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
B81C000
stack
page read and write
2930000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
5B0000
heap
page read and write
5060000
heap
page read and write
2998000
trusted library allocation
page read and write
E60000
heap
page read and write
987E000
stack
page read and write
4D37000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
5545000
heap
page read and write
95BF000
stack
page read and write
D28000
trusted library allocation
page read and write
5170000
heap
page read and write
7220000
heap
page read and write
2780000
heap
page read and write
7550000
trusted library section
page read and write
787E000
stack
page read and write
9CD0000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
5B40000
heap
page read and write
BE5000
heap
page read and write
6B46000
heap
page read and write
3D5A000
trusted library allocation
page read and write
B71B000
stack
page read and write
4FC0000
heap
page execute and read and write
1CA000
stack
page read and write
4D2A000
trusted library allocation
page read and write
75B0000
trusted library allocation
page execute and read and write
B08000
heap
page read and write
4A0000
remote allocation
page execute and read and write
4F90000
trusted library allocation
page execute and read and write
12E0000
heap
page read and write
6D60000
trusted library allocation
page execute and read and write
4FE0000
trusted library allocation
page read and write
C70000
heap
page read and write
28DC000
trusted library allocation
page read and write
2939000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
BC7E000
stack
page read and write
4ED4000
trusted library allocation
page read and write
28FD000
trusted library allocation
page read and write
5B60000
heap
page read and write
AAB000
trusted library allocation
page execute and read and write
4F60000
heap
page read and write
4EF6000
trusted library allocation
page read and write
333E000
stack
page read and write
6D50000
trusted library allocation
page read and write
1200000
heap
page read and write
343F000
stack
page read and write
6BA2000
heap
page read and write
C30000
heap
page read and write
B95F000
stack
page read and write
4FC0000
heap
page read and write
4F5B000
stack
page read and write
E2D000
trusted library allocation
page execute and read and write
770E000
stack
page read and write
701A000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
1330000
heap
page read and write
4F35000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
F17000
heap
page read and write
705E000
stack
page read and write
56F000
unkown
page read and write
4EC0000
trusted library allocation
page read and write
A9A000
trusted library allocation
page execute and read and write
75C0000
trusted library allocation
page read and write
4F80000
heap
page read and write
3A83000
trusted library allocation
page read and write
BFFE000
stack
page read and write
3AE6000
trusted library allocation
page read and write
4EFD000
trusted library allocation
page read and write
10C0000
heap
page read and write
EA1000
heap
page read and write
BD7F000
stack
page read and write
4FF0000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
E4A000
trusted library allocation
page execute and read and write
6D40000
trusted library allocation
page read and write
298F000
stack
page read and write
4CD0000
trusted library allocation
page execute and read and write
519000
stack
page read and write
E57000
trusted library allocation
page execute and read and write
B960000
trusted library allocation
page read and write
13EE000
stack
page read and write
B440000
trusted library allocation
page read and write
6D42000
trusted library allocation
page read and write
18D000
stack
page read and write
105E000
stack
page read and write
3DF7000
trusted library allocation
page read and write
2920000
heap
page read and write
EFD000
stack
page read and write
DC0000
heap
page read and write
7E9000
stack
page read and write
AEA000
heap
page read and write
4FD0000
heap
page read and write
AA2000
trusted library allocation
page read and write
75CA000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
5230000
heap
page read and write
4D00000
heap
page read and write
E3D000
trusted library allocation
page execute and read and write
28E1000
trusted library allocation
page read and write
9D0000
heap
page read and write
3C35000
trusted library allocation
page read and write
6C0000
unkown
page readonly
4D30000
trusted library allocation
page read and write
AA7000
trusted library allocation
page execute and read and write
9D00000
trusted library allocation
page execute and read and write
4FEA000
trusted library allocation
page read and write
292B000
heap
page read and write
CBE000
stack
page read and write
E9F000
heap
page read and write
715F000
stack
page read and write
4F65000
heap
page read and write
28EE000
trusted library allocation
page read and write
8F7000
stack
page read and write
3A89000
trusted library allocation
page read and write
516D000
stack
page read and write
3E64000
trusted library allocation
page read and write
5520000
trusted library section
page read and write
4FE4000
trusted library allocation
page read and write
E94000
heap
page read and write
4D3D000
trusted library allocation
page read and write
6E32000
trusted library allocation
page read and write
B7C000
stack
page read and write
729C000
heap
page read and write
4F90000
heap
page read and write
148C000
heap
page read and write
2860000
heap
page read and write
5050000
heap
page read and write
4E23000
heap
page read and write
5570000
trusted library allocation
page execute and read and write
AD0000
trusted library allocation
page execute and read and write
997E000
stack
page read and write
1420000
heap
page read and write
1080000
heap
page read and write
2A70000
heap
page execute and read and write
B49E000
stack
page read and write
2B0B000
trusted library allocation
page read and write
5020000
trusted library allocation
page execute and read and write
6BDB000
heap
page read and write
2760000
heap
page read and write
B15000
heap
page read and write
2920000
trusted library allocation
page read and write
BF0000
heap
page read and write
6EF000
stack
page read and write
9F1E000
stack
page read and write
3B49000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
B27000
heap
page read and write
A90000
trusted library allocation
page read and write
3A81000
trusted library allocation
page read and write
28CC000
stack
page read and write
B00000
heap
page read and write
DC7000
heap
page read and write
28F1000
trusted library allocation
page read and write
5FE000
stack
page read and write
7880000
trusted library section
page read and write
973E000
stack
page read and write
E23000
trusted library allocation
page execute and read and write
96FE000
stack
page read and write
5560000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
5530000
trusted library section
page read and write
2B0D000
trusted library allocation
page read and write
AEE000
heap
page read and write
7230000
heap
page read and write
BEFE000
stack
page read and write
BEBF000
stack
page read and write
4EF1000
trusted library allocation
page read and write
4D60000
trusted library allocation
page execute and read and write
B91000
heap
page read and write
7273000
heap
page read and write
AC60000
trusted library allocation
page read and write
3C1B000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
6D2E000
stack
page read and write
9DDE000
stack
page read and write
132E000
stack
page read and write
28D4000
trusted library allocation
page read and write
47A000
stack
page read and write
10E7000
heap
page read and write
C140000
heap
page read and write
3D40000
trusted library allocation
page read and write
5A0000
heap
page read and write
52BE000
stack
page read and write
52E000
unkown
page read and write
ECE000
stack
page read and write
A74000
trusted library allocation
page read and write
72A4000
heap
page read and write
4E20000
heap
page read and write
9CBE000
stack
page read and write
28E7000
trusted library allocation
page read and write
5540000
heap
page read and write
A96000
trusted library allocation
page execute and read and write
B59E000
stack
page read and write
1070000
heap
page read and write
B50000
heap
page read and write
A70000
trusted library allocation
page read and write
2935000
trusted library allocation
page read and write
1050000
heap
page read and write
4F80000
heap
page execute and read and write
104E000
stack
page read and write
95FE000
stack
page read and write
28E4000
trusted library allocation
page read and write
6AE000
stack
page read and write
3999000
trusted library allocation
page read and write
AF7000
stack
page read and write
4D20000
trusted library allocation
page read and write
10CE000
stack
page read and write
2910000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
A05000
heap
page read and write
32FF000
stack
page read and write
F50000
heap
page read and write
6C30000
heap
page read and write
7267000
heap
page read and write
E40000
trusted library allocation
page read and write
E1E000
stack
page read and write
2A1B000
trusted library allocation
page read and write
430000
heap
page read and write
760E000
stack
page read and write
6B30000
heap
page read and write
BD1000
heap
page read and write
D1E000
stack
page read and write
4F10000
trusted library allocation
page read and write
100E000
stack
page read and write
5B0000
heap
page read and write
E46000
trusted library allocation
page execute and read and write
4E0000
heap
page read and write
10C8000
heap
page read and write
5180000
heap
page read and write
EA5000
heap
page read and write
28F7000
trusted library allocation
page read and write
BE0000
heap
page read and write
10B0000
heap
page read and write
28D7000
trusted library allocation
page read and write
161F000
stack
page read and write
AC0000
trusted library allocation
page read and write
5210000
trusted library allocation
page execute and read and write
7214000
heap
page read and write
3991000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
4F02000
trusted library allocation
page read and write
B85E000
stack
page read and write
5FE000
stack
page read and write
E20000
trusted library allocation
page read and write
9EDE000
stack
page read and write
F9C000
stack
page read and write
518D000
heap
page read and write
10D0000
trusted library allocation
page execute and read and write
There are 335 hidden memdumps, click here to show them.