IOC Report
PO-inv-CQV20(92315).exe

loading gif

Files

File Path
Type
Category
Malicious
PO-inv-CQV20(92315).exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PO-inv-CQV20(923_25af6cb37987c1b4fafb61129ddc3c7a259c196_dbe8db34_f6eb4cc2-0f7f-4d1f-88d3-66a87cf07164\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8AB.tmp.dmp
Mini DuMP crash report, 16 streams, Fri Apr 26 05:39:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAA0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAD0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO-inv-CQV20(92315).exe
"C:\Users\user\Desktop\PO-inv-CQV20(92315).exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5040 -s 1080

URLs

Name
IP
Malicious
https://api.telegram.org/bot7017233680:AAEfWTUjfiK5hxLLRkmgitv57SQZuFap4nQ/sendDocument
149.154.167.220
https://api.telegram.org/bot7017233680:AAEfWTUjfiK5hxLLRkmgitv57SQZuFap4nQ/
unknown
http://upx.sf.net
unknown
https://account.dyn.com/
unknown
https://api.telegram.org
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
FileDirectory
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
ProgramId
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
FileId
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
LowerCaseLongPath
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
LongPathHash
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
Name
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
OriginalFileName
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
Publisher
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
Version
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
BinFileVersion
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
BinaryType
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
ProductName
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
ProductVersion
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
LinkDate
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
BinProductVersion
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
AppxPackageFullName
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
AppxPackageRelativeId
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
Size
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
Language
\REGISTRY\A\{0e8e7e96-aa53-25de-2052-1deef7234a46}\Root\InventoryApplicationFile\po-inv-cqv20(923|72db4f17b3ad0a0e
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2AFA000
trusted library allocation
page read and write
malicious
233470CB000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
23356C97000
trusted library allocation
page read and write
malicious
2ADE000
trusted library allocation
page read and write
malicious
2A91000
trusted library allocation
page read and write
malicious
F60000
trusted library allocation
page execute and read and write
10B6000
heap
page read and write
5E3A000
heap
page read and write
67B7000
trusted library allocation
page read and write
C7C000
heap
page read and write
4EEE000
trusted library allocation
page read and write
2335F538000
heap
page read and write
23345153000
heap
page read and write
23346DD9000
trusted library allocation
page read and write
F70000
heap
page read and write
2334514B000
heap
page read and write
AB982FA000
stack
page read and write
F10000
trusted library allocation
page read and write
B90000
heap
page read and write
5EF6000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
6040000
trusted library allocation
page execute and read and write
7FFD34920000
trusted library allocation
page read and write
4EF1000
trusted library allocation
page read and write
632E000
stack
page read and write
EDD000
trusted library allocation
page execute and read and write
EF2000
trusted library allocation
page read and write
289C000
stack
page read and write
B95000
heap
page read and write
23345050000
heap
page read and write
50CE000
stack
page read and write
6030000
trusted library allocation
page read and write
23345104000
heap
page read and write
BF3000
trusted library allocation
page execute and read and write
7FFD34910000
trusted library allocation
page read and write
6810000
trusted library allocation
page execute and read and write
C38000
heap
page read and write
2334510E000
heap
page read and write
2335F4D0000
heap
page read and write
2ADC000
trusted library allocation
page read and write
233450E0000
heap
page read and write
4F02000
trusted library allocation
page read and write
C36000
heap
page read and write
7FFD34939000
trusted library allocation
page read and write
233450A0000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
EF5000
trusted library allocation
page execute and read and write
7FFD34770000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
2335ECC0000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
23346B50000
trusted library section
page read and write
3A91000
trusted library allocation
page read and write
4F80000
heap
page read and write
AB981FD000
stack
page read and write
23345123000
heap
page read and write
AB97CFE000
stack
page read and write
C08000
heap
page read and write
C00000
heap
page read and write
5E62000
heap
page read and write
4B8D000
stack
page read and write
521C000
stack
page read and write
4F70000
heap
page read and write
BE0000
trusted library allocation
page read and write
EF7000
trusted library allocation
page execute and read and write
AB97DFC000
stack
page read and write
23345330000
heap
page execute and read and write
67B0000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
23346C80000
heap
page read and write
4EE2000
trusted library allocation
page read and write
545E000
stack
page read and write
4ED0000
trusted library allocation
page read and write
799000
stack
page read and write
656E000
stack
page read and write
233450EC000
heap
page read and write
28D0000
heap
page execute and read and write
10B0000
heap
page read and write
23356C91000
trusted library allocation
page read and write
23344F62000
unkown
page readonly
54F9000
trusted library allocation
page read and write
2334514D000
heap
page read and write
6800000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
28C0000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
531E000
stack
page read and write
2335F013000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
AB97EFF000
stack
page read and write
AB97BFE000
stack
page read and write
66AE000
stack
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
AB97793000
stack
page read and write
C2B000
heap
page read and write
EE2000
trusted library allocation
page read and write
5FED000
stack
page read and write
4ED6000
trusted library allocation
page read and write
23345530000
heap
page read and write
2AF6000
trusted library allocation
page read and write
7FFD34934000
trusted library allocation
page read and write
5EE0000
heap
page read and write
4EDB000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
5DE0000
heap
page read and write
233451AE000
heap
page read and write
652F000
stack
page read and write
4EDE000
trusted library allocation
page read and write
EFB000
trusted library allocation
page execute and read and write
23345120000
heap
page read and write
B50000
heap
page read and write
2B17000
trusted library allocation
page read and write
5E72000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
3AB9000
trusted library allocation
page read and write
23345340000
heap
page read and write
7FFD3479B000
trusted library allocation
page execute and read and write
642E000
stack
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
BFD000
trusted library allocation
page execute and read and write
ED0000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
67C0000
trusted library allocation
page read and write
AB983FD000
stack
page read and write
28E8000
trusted library allocation
page read and write
23346D23000
trusted library allocation
page read and write
233452F0000
trusted library allocation
page read and write
EE6000
trusted library allocation
page execute and read and write
2AE2000
trusted library allocation
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
23344F60000
unkown
page readonly
2335F51F000
heap
page read and write
2B09000
trusted library allocation
page read and write
2980000
heap
page read and write
EEA000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
23345060000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
233452E0000
trusted library allocation
page read and write
541F000
stack
page read and write
7FFD34783000
trusted library allocation
page read and write
1090000
heap
page read and write
666E000
stack
page read and write
602E000
stack
page read and write
5F4E000
stack
page read and write
C95000
heap
page read and write
7FFD34772000
trusted library allocation
page read and write
CDB000
heap
page read and write
4F5C000
stack
page read and write
5F00000
trusted library allocation
page execute and read and write
2AE6000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
510E000
stack
page read and write
3AF5000
trusted library allocation
page read and write
CC3000
heap
page read and write
4EEA000
trusted library allocation
page read and write
B00000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
7FFD34913000
trusted library allocation
page read and write
C1F000
heap
page read and write
AB980FE000
stack
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
2B1B000
trusted library allocation
page read and write
7F090000
trusted library allocation
page execute and read and write
AF9000
stack
page read and write
23346C20000
heap
page execute and read and write
23345535000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
AB97FFF000
stack
page read and write
23345345000
heap
page read and write
552C000
trusted library allocation
page read and write
23346C91000
trusted library allocation
page read and write
2A8E000
stack
page read and write
67AF000
stack
page read and write
6A80000
heap
page read and write
5E76000
heap
page read and write
EE0000
trusted library allocation
page read and write
4F73000
heap
page read and write
7FFD34966000
trusted library allocation
page read and write
5BDF000
stack
page read and write
5110000
heap
page execute and read and write
233452C0000
trusted library allocation
page read and write
7FFD34826000
trusted library allocation
page read and write
AB97AFE000
stack
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
233452F3000
trusted library allocation
page read and write
7FF4FD610000
trusted library allocation
page execute and read and write
4EFD000
trusted library allocation
page read and write
23345080000
heap
page read and write
F5E000
stack
page read and write
There are 189 hidden memdumps, click here to show them.