IOC Report
rPO50018137-14_pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
rPO50018137-14_pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ctsdvwT.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Hymenophyllaceae
ASCII text, with very long lines (28690), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut47B0.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut481E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\inhumation
data
dropped
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rPO50018137-14_pdf.exe
"C:\Users\user\Desktop\rPO50018137-14_pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\rPO50018137-14_pdf.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
mail.musabody.com
malicious
https://account.dyn.com/
unknown
http://mail.musabody.com
unknown

Domains

Name
IP
Malicious
mail.musabody.com
108.167.140.123
malicious

IPs

IP
Domain
Country
Malicious
108.167.140.123
mail.musabody.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ctsdvwT

Memdumps

Base Address
Regiontype
Protect
Malicious
1810000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
2FFF000
heap
page read and write
malicious
5850000
trusted library section
page read and write
malicious
4401000
trusted library allocation
page read and write
malicious
5910000
trusted library section
page read and write
malicious
C66000
heap
page read and write
58C2000
trusted library allocation
page read and write
781F000
stack
page read and write
D3A000
heap
page read and write
6A5E000
trusted library allocation
page read and write
3110000
heap
page read and write
3104000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
1F5000
heap
page read and write
C64000
heap
page read and write
20B0000
trusted library allocation
page execute and read and write
354C000
trusted library allocation
page read and write
471000
unkown
page execute read
E9D000
trusted library allocation
page execute and read and write
C8E000
heap
page read and write
3120000
trusted library allocation
page read and write
37C9000
direct allocation
page read and write
30F0000
trusted library allocation
page read and write
6B7D000
stack
page read and write
E40000
heap
page read and write
C8E000
heap
page read and write
AAD000
stack
page read and write
2AEC000
stack
page read and write
13CC000
heap
page read and write
58D6000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
480000
heap
page read and write
2B2E000
stack
page read and write
C56000
heap
page read and write
E84000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
D5A000
stack
page read and write
C44000
heap
page read and write
532000
unkown
page readonly
2FD7000
heap
page read and write
58D1000
trusted library allocation
page read and write
532000
unkown
page readonly
5D2C000
stack
page read and write
2100000
heap
page read and write
99F000
stack
page read and write
2F90000
heap
page read and write
20E0000
heap
page execute and read and write
5F8F000
stack
page read and write
488000
heap
page read and write
7F0000
heap
page read and write
C56000
heap
page read and write
20D0000
trusted library allocation
page read and write
E94000
trusted library allocation
page read and write
2F4C000
unkown
page read and write
47E000
stack
page read and write
430000
heap
page read and write
59CE000
stack
page read and write
3B51000
trusted library allocation
page read and write
50C000
unkown
page readonly
3190000
heap
page read and write
37C9000
direct allocation
page read and write
6D70000
heap
page read and write
48D0000
heap
page execute and read and write
355F000
trusted library allocation
page read and write
CE3000
heap
page read and write
5C2C000
stack
page read and write
B50000
direct allocation
page execute and read and write
C3E000
heap
page read and write
58A0000
trusted library allocation
page read and write
C8E000
heap
page read and write
338E000
stack
page read and write
34A1000
trusted library allocation
page read and write
1920000
heap
page read and write
3136000
trusted library allocation
page execute and read and write
160E000
stack
page read and write
604C000
stack
page read and write
4A1E000
stack
page read and write
34D3000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
420000
heap
page read and write
54CE000
stack
page read and write
1FAB000
trusted library allocation
page execute and read and write
58BB000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
36A0000
direct allocation
page read and write
180E000
stack
page read and write
3485000
trusted library allocation
page read and write
C8E000
heap
page read and write
4CEE000
stack
page read and write
313A000
trusted library allocation
page execute and read and write
36A0000
direct allocation
page read and write
5AF0000
heap
page read and write
140E000
stack
page read and write
13BF000
heap
page read and write
3500000
direct allocation
page read and write
3123000
trusted library allocation
page read and write
544000
unkown
page readonly
36A0000
direct allocation
page read and write
1490000
heap
page read and write
3140000
trusted library allocation
page read and write
540000
unkown
page write copy
3142000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
C45000
heap
page read and write
DB0000
heap
page read and write
7F120000
trusted library allocation
page execute and read and write
6AE0000
heap
page read and write
72DC000
stack
page read and write
95E000
stack
page read and write
58B0000
trusted library allocation
page read and write
B30000
heap
page read and write
EFB000
heap
page read and write
13C9000
heap
page read and write
3147000
trusted library allocation
page execute and read and write
3280000
heap
page read and write
6D8A000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
6A60000
trusted library allocation
page execute and read and write
71DE000
stack
page read and write
200E000
stack
page read and write
37CD000
direct allocation
page read and write
58DD000
trusted library allocation
page read and write
59D0000
heap
page execute and read and write
97B000
stack
page read and write
D3A000
heap
page read and write
3465000
trusted library allocation
page read and write
761C000
stack
page read and write
D3A000
heap
page read and write
6AA0000
trusted library allocation
page read and write
550E000
stack
page read and write
1FC0000
trusted library allocation
page read and write
D3B000
heap
page read and write
C3E000
heap
page read and write
98F000
stack
page read and write
5ADE000
stack
page read and write
15CE000
stack
page read and write
143A000
heap
page read and write
18C4000
heap
page read and write
36A0000
direct allocation
page read and write
37CD000
direct allocation
page read and write
164E000
stack
page read and write
434E000
stack
page read and write
DFE000
stack
page read and write
1FA0000
trusted library allocation
page read and write
C8E000
heap
page read and write
C66000
heap
page read and write
7B0000
trusted library allocation
page read and write
4B5E000
stack
page read and write
C47000
heap
page read and write
2FD0000
heap
page read and write
33CC000
stack
page read and write
C8E000
heap
page read and write
D2B000
heap
page read and write
312D000
trusted library allocation
page execute and read and write
ED8000
heap
page read and write
E45000
heap
page read and write
ED0000
heap
page read and write
2990000
trusted library allocation
page execute and read and write
58E2000
trusted library allocation
page read and write
440000
heap
page read and write
5D50000
heap
page read and write
73DC000
stack
page read and write
18C0000
heap
page read and write
47CF000
stack
page read and write
3623000
direct allocation
page read and write
2F8C000
unkown
page read and write
7C3000
trusted library allocation
page execute and read and write
471000
unkown
page execute read
3532000
trusted library allocation
page read and write
37C9000
direct allocation
page read and write
E60000
trusted library allocation
page read and write
5130000
heap
page read and write
5980000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
D2B000
heap
page read and write
6A90000
trusted library allocation
page execute and read and write
430000
heap
page read and write
C8E000
heap
page read and write
383E000
direct allocation
page read and write
9BA000
unkown
page readonly
1380000
heap
page read and write
58CE000
trusted library allocation
page read and write
4B6000
heap
page read and write
3500000
direct allocation
page read and write
3495000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
3538000
trusted library allocation
page read and write
44C3000
trusted library allocation
page read and write
E10000
heap
page read and write
426000
system
page execute and read and write
3170000
trusted library allocation
page execute and read and write
D3A000
heap
page read and write
1CA000
stack
page read and write
347D000
trusted library allocation
page read and write
36A0000
direct allocation
page read and write
C8E000
heap
page read and write
37C9000
direct allocation
page read and write
3623000
direct allocation
page read and write
C18000
heap
page read and write
C57000
heap
page read and write
6BC0000
trusted library allocation
page read and write
7C4000
trusted library allocation
page read and write
C47000
heap
page read and write
E00000
heap
page read and write
C8E000
heap
page read and write
9B0000
unkown
page readonly
C44000
heap
page read and write
424C000
stack
page read and write
2AAF000
stack
page read and write
50C000
unkown
page readonly
123A000
stack
page read and write
7D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
3623000
direct allocation
page read and write
4E1000
heap
page read and write
58BE000
trusted library allocation
page read and write
36A0000
direct allocation
page read and write
5D6C000
heap
page read and write
53C0000
heap
page execute and read and write
D3B000
heap
page read and write
6F5E000
stack
page read and write
C6C000
heap
page read and write
CE3000
heap
page read and write
5DC6000
heap
page read and write
770000
heap
page read and write
D3A000
heap
page read and write
560F000
stack
page read and write
298E000
stack
page read and write
96E000
stack
page read and write
74F000
stack
page read and write
EF4000
heap
page read and write
2B40000
heap
page execute and read and write
C76000
heap
page read and write
14B5000
heap
page read and write
20C0000
trusted library allocation
page read and write
E8D000
trusted library allocation
page execute and read and write
383E000
direct allocation
page read and write
4504000
trusted library allocation
page read and write
470000
unkown
page readonly
20F0000
trusted library allocation
page execute and read and write
16CE000
stack
page read and write
37C9000
direct allocation
page read and write
31E8000
trusted library allocation
page read and write
37CD000
direct allocation
page read and write
3116000
heap
page read and write
2211000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
4C5E000
stack
page read and write
4A4000
heap
page read and write
C8E000
heap
page read and write
3194000
heap
page read and write
E70000
heap
page read and write
544000
unkown
page readonly
3623000
direct allocation
page read and write
58F0000
trusted library allocation
page read and write
470000
unkown
page readonly
46CE000
stack
page read and write
383E000
direct allocation
page read and write
2FB0000
heap
page read and write
512F000
stack
page read and write
37CD000
direct allocation
page read and write
7CD000
trusted library allocation
page execute and read and write
30E0000
trusted library section
page read and write
EBB000
trusted library allocation
page execute and read and write
C44000
heap
page read and write
3100000
trusted library allocation
page read and write
54FD000
stack
page read and write
33F0000
heap
page execute and read and write
445000
system
page execute and read and write
7D4000
trusted library allocation
page read and write
48CE000
stack
page read and write
3623000
direct allocation
page read and write
5D92000
heap
page read and write
C45000
heap
page read and write
49DE000
stack
page read and write
D3B000
heap
page read and write
E83000
trusted library allocation
page execute and read and write
6BD0000
trusted library allocation
page execute and read and write
C57000
heap
page read and write
3103000
trusted library allocation
page execute and read and write
673F000
stack
page read and write
C73000
heap
page read and write
C92000
heap
page read and write
383E000
direct allocation
page read and write
33D0000
heap
page read and write
9B2000
unkown
page readonly
3500000
direct allocation
page read and write
1338000
stack
page read and write
C61000
heap
page read and write
D3A000
heap
page read and write
53C000
unkown
page read and write
119F000
stack
page read and write
C8E000
heap
page read and write
C76000
heap
page read and write
F07000
heap
page read and write
310D000
trusted library allocation
page execute and read and write
37C9000
direct allocation
page read and write
37CD000
direct allocation
page read and write
750000
heap
page read and write
1390000
heap
page read and write
29A0000
heap
page read and write
EB7000
trusted library allocation
page execute and read and write
37CD000
direct allocation
page read and write
C10000
heap
page read and write
C56000
heap
page read and write
C37000
heap
page read and write
1398000
heap
page read and write
34D0000
trusted library allocation
page read and write
C5C000
stack
page read and write
C47000
heap
page read and write
C76000
heap
page read and write
C73000
heap
page read and write
34CA000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
31DE000
stack
page read and write
314B000
trusted library allocation
page execute and read and write
220F000
stack
page read and write
6D82000
trusted library allocation
page read and write
AC000
stack
page read and write
14B0000
heap
page read and write
6BBE000
stack
page read and write
53C000
unkown
page write copy
6A53000
trusted library allocation
page read and write
51F0000
trusted library allocation
page execute and read and write
2FC0000
trusted library section
page read and write
3623000
direct allocation
page read and write
C57000
heap
page read and write
3471000
trusted library allocation
page read and write
1AA000
stack
page read and write
5E8E000
stack
page read and write
5150000
trusted library allocation
page read and write
B70000
heap
page read and write
7DD000
trusted library allocation
page execute and read and write
4B1F000
stack
page read and write
539E000
stack
page read and write
349B000
trusted library allocation
page read and write
AEE000
stack
page read and write
535E000
stack
page read and write
383E000
direct allocation
page read and write
525E000
stack
page read and write
C8E000
heap
page read and write
3500000
direct allocation
page read and write
3500000
direct allocation
page read and write
4F5000
heap
page read and write
34C5000
trusted library allocation
page read and write
C56000
heap
page read and write
3130000
trusted library allocation
page read and write
1F0000
heap
page read and write
3500000
direct allocation
page read and write
383E000
direct allocation
page read and write
1FA7000
trusted library allocation
page execute and read and write
3565000
trusted library allocation
page read and write
6DD0000
heap
page read and write
There are 347 hidden memdumps, click here to show them.