IOC Report
5yv6ZxNaTP.exe

loading gif

Files

File Path
Type
Category
Malicious
5yv6ZxNaTP.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 5 07:36:25 2023, mtime=Thu Oct 31 19:42:11 2024, atime=Thu Oct 31 19:42:08 2024, length=3255296, window=hide
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kooj2ijd.zhe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v5e0kluk.1fy.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5yv6ZxNaTP.exe
"C:\Users\user\Desktop\5yv6ZxNaTP.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Users\user\Desktop\5yv6ZxNaTP.exe'; $s.Save()"
malicious
C:\Users\user\Desktop\5yv6ZxNaTP.exe
"C:\Users\user\Desktop\5yv6ZxNaTP.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
malicious
https://go.micro
unknown
malicious
https://github.com/Pester/Pester
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://oneget.org
unknown
There are 4 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.196.10.218
unknown
Switzerland

Memdumps

Base Address
Regiontype
Protect
Malicious
839000
unkown
page readonly
C000012000
direct allocation
page read and write
C000128000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
F41E9FF000
stack
page read and write
26723A15000
heap
page read and write
C00004D000
direct allocation
page read and write
C000092000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
7FFB4B260000
trusted library allocation
page read and write
2763A350000
heap
page read and write
7FFB4B40A000
trusted library allocation
page read and write
C000067000
direct allocation
page read and write
C000052000
direct allocation
page read and write
26726F64000
trusted library allocation
page read and write
7FFB4B490000
trusted library allocation
page read and write
C00001A000
direct allocation
page read and write
2227DD50000
heap
page read and write
C00015D000
direct allocation
page read and write
C000006000
direct allocation
page read and write
2227DF88000
direct allocation
page read and write
C000044000
direct allocation
page read and write
2673D7C2000
heap
page read and write
7FFB4B5B0000
trusted library allocation
page read and write
C00002C000
direct allocation
page read and write
26727338000
trusted library allocation
page read and write
26723990000
heap
page execute and read and write
7FFB4B300000
trusted library allocation
page read and write
7FFB4B540000
trusted library allocation
page read and write
267253B0000
heap
page read and write
26723913000
trusted library allocation
page read and write
7CD000
unkown
page read and write
C000063000
direct allocation
page read and write
2673D700000
heap
page read and write
7A0000
unkown
page write copy
26723620000
heap
page read and write
2673D970000
heap
page read and write
835000
unkown
page read and write
C000112000
direct allocation
page read and write
7A8000
unkown
page read and write
2673D75A000
heap
page read and write
F41E8F7000
stack
page read and write
F41E18E000
stack
page read and write
C00000A000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
2763A1D4000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
2673D7C9000
heap
page read and write
C000098000
direct allocation
page read and write
2227DE54000
heap
page read and write
C000022000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C000150000
direct allocation
page read and write
7FFB4B3F0000
trusted library allocation
page read and write
26735701000
trusted library allocation
page read and write
7FFB4B252000
trusted library allocation
page read and write
7FFB4B500000
trusted library allocation
page read and write
7FFB4B590000
trusted library allocation
page read and write
7FFB4B4B0000
trusted library allocation
page read and write
C000049000
direct allocation
page read and write
F2815FE000
stack
page read and write
C000138000
direct allocation
page read and write
C000056000
direct allocation
page read and write
7FFB4B530000
trusted library allocation
page read and write
2672381E000
heap
page read and write
7FFB4B254000
trusted library allocation
page read and write
5D59DFE000
stack
page read and write
C00000C000
direct allocation
page read and write
2767F4A0000
direct allocation
page read and write
267237D2000
heap
page read and write
267237A2000
heap
page read and write
F41EB7B000
stack
page read and write
7A2000
unkown
page write copy
C00010E000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C000018000
direct allocation
page read and write
26735710000
trusted library allocation
page read and write
921000
unkown
page readonly
C0000C8000
direct allocation
page read and write
7FFB4B560000
trusted library allocation
page read and write
7FFB4B306000
trusted library allocation
page read and write
C000180000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C000094000
direct allocation
page read and write
26723700000
heap
page read and write
C0000C6000
direct allocation
page read and write
7FFB4B4F0000
trusted library allocation
page read and write
5D59BFE000
stack
page read and write
C00009C000
direct allocation
page read and write
5A0000
unkown
page readonly
C00012C000
direct allocation
page read and write
26735773000
trusted library allocation
page read and write
7FFB4B5A0000
trusted library allocation
page read and write
C000169000
direct allocation
page read and write
F281DFE000
stack
page read and write
267238D0000
heap
page readonly
2673D711000
heap
page read and write
87F000
unkown
page readonly
2763A1D8000
direct allocation
page read and write
7FFB4B4E0000
trusted library allocation
page read and write
F41E779000
stack
page read and write
2673D9A1000
heap
page read and write
2227E001000
direct allocation
page read and write
5A1000
unkown
page execute read
2763A330000
direct allocation
page read and write
7FFB4B510000
trusted library allocation
page read and write
F41E7F7000
stack
page read and write
5D59FFE000
stack
page read and write
C0000CE000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
7FFB4B580000
trusted library allocation
page read and write
2672578A000
trusted library allocation
page read and write
920000
unkown
page write copy
C000090000
direct allocation
page read and write
7FFB4B4A0000
trusted library allocation
page read and write
C000198000
direct allocation
page read and write
C000069000
direct allocation
page read and write
267237F0000
heap
page read and write
C000136000
direct allocation
page read and write
5A1000
unkown
page execute read
7FFB4B26B000
trusted library allocation
page read and write
C000038000
direct allocation
page read and write
C000159000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
7AD000
unkown
page write copy
7FFB4B434000
trusted library allocation
page read and write
F41E6FD000
stack
page read and write
C000096000
direct allocation
page read and write
C000086000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
C000031000
direct allocation
page read and write
C000148000
direct allocation
page read and write
26723760000
heap
page read and write
7A0000
unkown
page write copy
921000
unkown
page readonly
2763A390000
heap
page read and write
87F000
unkown
page readonly
87F000
unkown
page readonly
7AE000
unkown
page read and write
835000
unkown
page read and write
2227E044000
direct allocation
page read and write
267237DA000
heap
page read and write
921000
unkown
page readonly
7FFB4B480000
trusted library allocation
page read and write
7FFB4B30C000
trusted library allocation
page execute and read and write
C000118000
direct allocation
page read and write
26726DBC000
trusted library allocation
page read and write
267358B6000
trusted library allocation
page read and write
2673DD30000
heap
page read and write
7FFB4B25D000
trusted library allocation
page execute and read and write
267237D0000
heap
page read and write
2672726E000
trusted library allocation
page read and write
5A0000
unkown
page readonly
C0000E8000
direct allocation
page read and write
2227DF8A000
direct allocation
page read and write
2673D726000
heap
page read and write
2227DFE0000
direct allocation
page read and write
26726D31000
trusted library allocation
page read and write
C000028000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
87F000
unkown
page readonly
C000002000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
C000120000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
C000134000
direct allocation
page read and write
F41E10E000
stack
page read and write
2763A1D0000
direct allocation
page read and write
5A1000
unkown
page execute read
2227DF40000
heap
page read and write
7FFB4B437000
trusted library allocation
page read and write
C00003F000
direct allocation
page read and write
7FFB4B470000
trusted library allocation
page read and write
C000012000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
267270DA000
trusted library allocation
page read and write
C00001A000
direct allocation
page read and write
27639FC0000
heap
page read and write
C00005E000
direct allocation
page read and write
F281FFE000
stack
page read and write
5D595FC000
stack
page read and write
C000073000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
26723950000
trusted library allocation
page read and write
2673D74A000
heap
page read and write
7FFB4B370000
trusted library allocation
page execute and read and write
2763A1DC000
direct allocation
page read and write
F281BFF000
stack
page read and write
2227DF84000
direct allocation
page read and write
F41E083000
stack
page read and write
27639FF0000
heap
page read and write
5A1000
unkown
page execute read
C00005E000
direct allocation
page read and write
26723720000
heap
page read and write
C00005A000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
68E000
unkown
page readonly
C000002000
direct allocation
page read and write
2227E048000
direct allocation
page read and write
7A0000
unkown
page read and write
C00014A000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C000144000
direct allocation
page read and write
26725701000
trusted library allocation
page read and write
F41E5FE000
stack
page read and write
C000100000
direct allocation
page read and write
C000184000
direct allocation
page read and write
7A0000
unkown
page read and write
C000080000
direct allocation
page read and write
26723819000
heap
page read and write
F41E1CE000
stack
page read and write
2227DE40000
heap
page read and write
C0000C0000
direct allocation
page read and write
267252F0000
heap
page execute and read and write
C000186000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
F41E57D000
stack
page read and write
5A0000
unkown
page readonly
2673D7FA000
heap
page read and write
7FFB4B550000
trusted library allocation
page read and write
7FFB4B401000
trusted library allocation
page read and write
267238C0000
trusted library allocation
page read and write
C00009A000
direct allocation
page read and write
267251CB000
heap
page read and write
C00001E000
direct allocation
page read and write
C000086000
direct allocation
page read and write
C000004000
direct allocation
page read and write
26723888000
heap
page read and write
921000
unkown
page readonly
2767F522000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
2227E040000
direct allocation
page read and write
7A8000
unkown
page read and write
C000014000
direct allocation
page read and write
26726331000
trusted library allocation
page read and write
C000010000
direct allocation
page read and write
C000190000
direct allocation
page read and write
C0000DF000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C0000E1000
direct allocation
page read and write
26723997000
heap
page execute and read and write
839000
unkown
page readonly
F2817FE000
stack
page read and write
267253B5000
heap
page read and write
7FFB4B460000
trusted library allocation
page read and write
7FFB4B310000
trusted library allocation
page execute and read and write
2673D7BE000
heap
page read and write
267237DC000
heap
page read and write
C00013A000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
920000
unkown
page write copy
C000088000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
27639FD0000
heap
page read and write
C000010000
direct allocation
page read and write
F41E4FE000
stack
page read and write
C000104000
direct allocation
page read and write
26723822000
heap
page read and write
26727334000
trusted library allocation
page read and write
C000122000
direct allocation
page read and write
F41E67E000
stack
page read and write
C000114000
direct allocation
page read and write
7FFB4B253000
trusted library allocation
page execute and read and write
C00016B000
direct allocation
page read and write
920000
unkown
page write copy
2673D9AA000
heap
page read and write
C000084000
direct allocation
page read and write
2673D890000
heap
page read and write
7FFB4B520000
trusted library allocation
page read and write
F41E97E000
stack
page read and write
C000124000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
7DF4A1690000
trusted library allocation
page execute and read and write
7FFB4B4C0000
trusted library allocation
page read and write
F41F54E000
stack
page read and write
7AD000
unkown
page write copy
C00010C000
direct allocation
page read and write
7FFB4B4D0000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
F41E878000
stack
page read and write
7FFB4B410000
trusted library allocation
page execute and read and write
2767F4A8000
direct allocation
page read and write
920000
unkown
page write copy
C00002A000
direct allocation
page read and write
C00015F000
direct allocation
page read and write
C000052000
direct allocation
page read and write
26723A10000
heap
page read and write
26723825000
heap
page read and write
C00018A000
direct allocation
page read and write
F41EAFE000
stack
page read and write
C0000D8000
direct allocation
page read and write
F2811FD000
stack
page read and write
26723910000
trusted library allocation
page read and write
2673D7EF000
heap
page read and write
C00019C000
direct allocation
page read and write
C000108000
direct allocation
page read and write
7FFB4B450000
trusted library allocation
page read and write
C000038000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
2227DF80000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
27639FF8000
heap
page read and write
2227E080000
heap
page read and write
2673D984000
heap
page read and write
F41E47E000
stack
page read and write
C00013E000
direct allocation
page read and write
2673577F000
trusted library allocation
page read and write
5D599FF000
stack
page read and write
267237D8000
heap
page read and write
26726FED000
trusted library allocation
page read and write
C000132000
direct allocation
page read and write
2673D870000
heap
page read and write
C000080000
direct allocation
page read and write
2227E085000
heap
page read and write
C000146000
direct allocation
page read and write
267238A0000
trusted library allocation
page read and write
7FFB4B336000
trusted library allocation
page execute and read and write
68E000
unkown
page readonly
7FFB4B570000
trusted library allocation
page read and write
C000014000
direct allocation
page read and write
839000
unkown
page readonly
7FFB4B420000
trusted library allocation
page execute and read and write
839000
unkown
page readonly
7AE000
unkown
page read and write
2227DF8C000
direct allocation
page read and write
26723790000
heap
page read and write
26725310000
heap
page execute and read and write
C000018000
direct allocation
page read and write
C0000B7000
direct allocation
page read and write
7CD000
unkown
page read and write
5A0000
unkown
page readonly
2763A1DA000
direct allocation
page read and write
2673D720000
heap
page read and write
2673D75C000
heap
page read and write
7FFB4B432000
trusted library allocation
page read and write
C000023000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C0000DD000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
26723817000
heap
page read and write
7FFB4B440000
trusted library allocation
page execute and read and write
68E000
unkown
page readonly
2227DE4C000
heap
page read and write
68E000
unkown
page readonly
C000056000
direct allocation
page read and write
2227DF60000
heap
page read and write
7A2000
unkown
page write copy
26725931000
trusted library allocation
page read and write
26726F90000
trusted library allocation
page read and write
2763A395000
heap
page read and write
26725350000
heap
page read and write
C000102000
direct allocation
page read and write
C000126000
direct allocation
page read and write
There are 356 hidden memdumps, click here to show them.