IOC Report
PO1038854.exe

loading gif

Files

File Path
Type
Category
Malicious
PO1038854.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO1038854.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5dkr3tbb.vhm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dqn1tp34.0dg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdxuiqie.alq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5g0fnvv.pm2.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO1038854.exe
"C:\Users\user\Desktop\PO1038854.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO1038854.exe"
malicious
C:\Users\user\Desktop\PO1038854.exe
"C:\Users\user\Desktop\PO1038854.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1CE0000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
148B000
trusted library allocation
page execute and read and write
A140000
trusted library section
page read and write
1150000
heap
page read and write
5460000
trusted library section
page readonly
D758000
heap
page read and write
2F67000
trusted library allocation
page read and write
73C3000
trusted library allocation
page read and write
AC0000
unkown
page readonly
7530000
trusted library allocation
page execute and read and write
1480000
trusted library allocation
page read and write
3EF1000
trusted library allocation
page read and write
DD6E000
stack
page read and write
5770000
heap
page read and write
D34D000
stack
page read and write
5610000
heap
page read and write
7250000
trusted library allocation
page read and write
144F000
stack
page read and write
1990000
direct allocation
page execute and read and write
5370000
trusted library allocation
page read and write
DAEE000
stack
page read and write
11F6000
heap
page read and write
1470000
trusted library allocation
page read and write
D60F000
stack
page read and write
316E000
trusted library allocation
page read and write
474A000
trusted library allocation
page read and write
152E000
stack
page read and write
1192000
heap
page read and write
116F000
heap
page read and write
1476000
trusted library allocation
page execute and read and write
1454000
trusted library allocation
page read and write
11DD000
heap
page read and write
152C000
stack
page read and write
1AB9000
direct allocation
page execute and read and write
2E20000
trusted library allocation
page read and write
1CD8000
direct allocation
page execute and read and write
10E0000
heap
page read and write
533B000
trusted library allocation
page read and write
F37000
stack
page read and write
1630000
heap
page read and write
124D000
heap
page read and write
1237000
heap
page read and write
D8AE000
stack
page read and write
53B0000
trusted library allocation
page read and write
7230000
trusted library section
page read and write
DC2E000
stack
page read and write
1C5D000
direct allocation
page execute and read and write
196F000
stack
page read and write
53D3000
heap
page read and write
5356000
trusted library allocation
page read and write
D9EE000
stack
page read and write
587E000
stack
page read and write
145D000
trusted library allocation
page execute and read and write
1538000
heap
page read and write
5400000
heap
page read and write
3EF9000
trusted library allocation
page read and write
1550000
heap
page read and write
B84000
unkown
page readonly
1ABD000
direct allocation
page execute and read and write
147A000
trusted library allocation
page execute and read and write
5334000
trusted library allocation
page read and write
1472000
trusted library allocation
page read and write
1482000
trusted library allocation
page read and write
5620000
heap
page execute and read and write
1190000
heap
page read and write
10BE000
stack
page read and write
5360000
trusted library allocation
page read and write
7268000
trusted library allocation
page read and write
1070000
heap
page read and write
D26D000
stack
page read and write
115E000
heap
page read and write
D730000
heap
page read and write
7642000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
F85000
heap
page read and write
DB2E000
stack
page read and write
14E0000
heap
page read and write
E3A000
stack
page read and write
D22D000
stack
page read and write
1453000
trusted library allocation
page execute and read and write
2E00000
trusted library allocation
page execute and read and write
14A0000
trusted library allocation
page read and write
2DFF000
stack
page read and write
5330000
trusted library allocation
page read and write
1C41000
direct allocation
page execute and read and write
7260000
trusted library allocation
page read and write
1487000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
713E000
stack
page read and write
576E000
stack
page read and write
D9AF000
stack
page read and write
5351000
trusted library allocation
page read and write
186E000
stack
page read and write
1B2E000
direct allocation
page execute and read and write
DC6E000
stack
page read and write
5665000
heap
page read and write
4FEC000
stack
page read and write
2EF1000
trusted library allocation
page read and write
11F1000
heap
page read and write
1E20000
heap
page read and write
73C0000
trusted library allocation
page read and write
5880000
heap
page read and write
5470000
heap
page read and write
6F40000
heap
page read and write
5414000
trusted library allocation
page read and write
73BE000
stack
page read and write
56AC000
stack
page read and write
2E10000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
1557000
heap
page read and write
535D000
trusted library allocation
page read and write
DEAC000
stack
page read and write
136D000
stack
page read and write
DDAB000
stack
page read and write
5430000
trusted library allocation
page execute and read and write
2E30000
heap
page execute and read and write
146D000
trusted library allocation
page execute and read and write
5380000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
7140000
trusted library section
page read and write
2E48000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
7270000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
58B0000
heap
page read and write
F90000
heap
page read and write
1530000
heap
page read and write
5390000
trusted library allocation
page read and write
2EE0000
heap
page read and write
D50E000
stack
page read and write
5630000
trusted library allocation
page execute and read and write
DFAE000
stack
page read and write
5890000
heap
page read and write
5980000
trusted library allocation
page read and write
112E000
stack
page read and write
126D000
stack
page read and write
182E000
stack
page read and write
1530000
heap
page read and write
73D0000
trusted library allocation
page read and write
72BE000
stack
page read and write
AC2000
unkown
page readonly
53D0000
heap
page read and write
14B0000
heap
page read and write
1450000
trusted library allocation
page read and write
14EE000
stack
page read and write
1C56000
direct allocation
page execute and read and write
5660000
heap
page read and write
134F000
stack
page read and write
5410000
trusted library allocation
page read and write
There are 141 hidden memdumps, click here to show them.