IOC Report
P87unxnF4t4DSrTt43.exe

loading gif

Files

File Path
Type
Category
Malicious
P87unxnF4t4DSrTt43.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\edefdefffff\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\P87unxnF4t4DSrTt43.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fpvoot1b.eeu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k0vj2alo.4fb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l00yxfxh.rkr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wuc2hjpp.f05.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
"C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
malicious
C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
"C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
www.kposlifestyle.design
malicious
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/
unknown
http://geoplugin.net/json.gp/C
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
www.kposlifestyle.design
154.216.16.38
malicious
geoplugin.net
178.237.33.50
171.39.242.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
154.216.16.38
www.kposlifestyle.design
Seychelles
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-OH1QS4
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-OH1QS4
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-OH1QS4
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-OH1QS4
UID
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4B23000
trusted library allocation
page read and write
malicious
42B9000
trusted library allocation
page read and write
malicious
13C7000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
EDAF000
stack
page read and write
1600000
trusted library allocation
page read and write
1840000
trusted library allocation
page execute and read and write
113B000
stack
page read and write
5700000
trusted library allocation
page read and write
E8EE000
stack
page read and write
143B000
heap
page read and write
3F30000
heap
page read and write
1350000
heap
page read and write
32F8000
trusted library allocation
page read and write
73C86000
unkown
page readonly
1602000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
31DF000
stack
page read and write
14CD000
trusted library allocation
page execute and read and write
2F5F000
stack
page read and write
5790000
trusted library allocation
page read and write
1638000
heap
page read and write
16C3000
heap
page read and write
1830000
trusted library allocation
page read and write
8C70000
heap
page read and write
3060000
trusted library allocation
page execute and read and write
6300000
heap
page read and write
12A0000
heap
page read and write
161E000
heap
page read and write
73FE000
heap
page read and write
5760000
heap
page read and write
1654000
heap
page read and write
3ADB000
heap
page read and write
327E000
trusted library allocation
page read and write
EC6E000
stack
page read and write
143E000
stack
page read and write
73C70000
unkown
page readonly
14C4000
trusted library allocation
page read and write
3550000
heap
page read and write
30DE000
stack
page read and write
1606000
trusted library allocation
page execute and read and write
5720000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
1610000
heap
page read and write
3EDE000
stack
page read and write
5A10000
trusted library allocation
page read and write
763F000
stack
page read and write
3087000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
12D0000
heap
page read and write
AEC5000
trusted library allocation
page read and write
8E8F000
stack
page read and write
73C8F000
unkown
page readonly
5810000
heap
page read and write
42B1000
trusted library allocation
page read and write
5770000
trusted library allocation
page execute and read and write
1810000
trusted library allocation
page read and write
8CDA000
heap
page read and write
345F000
stack
page read and write
168A000
heap
page read and write
3CDE000
stack
page read and write
73C8D000
unkown
page read and write
14B0000
trusted library allocation
page read and write
180E000
stack
page read and write
57D0000
trusted library allocation
page execute and read and write
B4C0000
trusted library section
page read and write
30CE000
stack
page read and write
326B000
trusted library allocation
page read and write
3AC0000
heap
page read and write
ECAE000
stack
page read and write
15FD000
trusted library allocation
page execute and read and write
5A20000
heap
page execute and read and write
57C0000
trusted library allocation
page read and write
3F40000
heap
page read and write
1646000
heap
page read and write
E12000
unkown
page readonly
1812000
trusted library allocation
page read and write
59FB000
stack
page read and write
34CB000
stack
page read and write
1870000
heap
page read and write
354B000
stack
page read and write
15F3000
trusted library allocation
page read and write
15DE000
stack
page read and write
FAA000
stack
page read and write
57AD000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
160A000
trusted library allocation
page execute and read and write
8CD5000
heap
page read and write
5792000
trusted library allocation
page read and write
14C3000
trusted library allocation
page execute and read and write
305E000
stack
page read and write
335E000
stack
page read and write
13C0000
heap
page read and write
474000
remote allocation
page execute and read and write
330C000
trusted library allocation
page read and write
73F0000
heap
page read and write
56F5000
trusted library allocation
page read and write
E9EE000
stack
page read and write
15BF000
stack
page read and write
3110000
heap
page read and write
73C71000
unkown
page execute read
E67E000
stack
page read and write
EB2E000
stack
page read and write
EB6E000
stack
page read and write
1434000
heap
page read and write
2E5F000
stack
page read and write
E77E000
stack
page read and write
1817000
trusted library allocation
page execute and read and write
39DD000
stack
page read and write
1310000
heap
page read and write
1860000
trusted library allocation
page read and write
15E0000
heap
page read and write
321E000
stack
page read and write
16F1000
heap
page read and write
309F000
stack
page read and write
5D20000
trusted library section
page read and write
331F000
stack
page read and write
57F0000
trusted library section
page readonly
8CB8000
heap
page read and write
62F0000
heap
page read and write
321E000
stack
page read and write
E10000
unkown
page readonly
5CED000
stack
page read and write
3AD0000
heap
page read and write
5780000
heap
page read and write
16BC000
heap
page read and write
579B000
trusted library allocation
page read and write
325C000
stack
page read and write
EEEC000
stack
page read and write
8D8E000
stack
page read and write
3070000
trusted library allocation
page read and write
2F9C000
stack
page read and write
5BE0000
heap
page read and write
1431000
heap
page read and write
53AC000
stack
page read and write
139B000
stack
page read and write
5783000
heap
page read and write
1424000
heap
page read and write
135A000
heap
page read and write
3281000
trusted library allocation
page read and write
1180000
heap
page read and write
5805000
heap
page read and write
12F7000
stack
page read and write
3080000
trusted library allocation
page read and write
1877000
heap
page read and write
3DDF000
stack
page read and write
32A0000
heap
page execute and read and write
8C9B000
heap
page read and write
350E000
stack
page read and write
1850000
trusted library allocation
page read and write
32B1000
trusted library allocation
page read and write
1404000
heap
page read and write
129C000
stack
page read and write
13F0000
heap
page read and write
328D000
trusted library allocation
page read and write
330A000
trusted library allocation
page read and write
3286000
trusted library allocation
page read and write
3BDF000
stack
page read and write
7FD80000
trusted library allocation
page execute and read and write
79CD000
stack
page read and write
147E000
stack
page read and write
5AC0000
trusted library allocation
page execute and read and write
1651000
heap
page read and write
74F0000
trusted library allocation
page read and write
103C000
stack
page read and write
477000
remote allocation
page execute and read and write
13F6000
heap
page read and write
EDEC000
stack
page read and write
8CC7000
heap
page read and write
1618000
heap
page read and write
14D0000
heap
page read and write
5800000
heap
page read and write
5820000
heap
page read and write
181B000
trusted library allocation
page execute and read and write
34C2000
trusted library allocation
page read and write
131E000
stack
page read and write
15F0000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
753E000
stack
page read and write
14C0000
trusted library allocation
page read and write
EA2E000
stack
page read and write
There are 171 hidden memdumps, click here to show them.