IOC Report
PO#4200000866.exe

loading gif

Files

File Path
Type
Category
Malicious
PO#4200000866.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\DeviceServicePlugin.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Galvanosurgery9.hom
data
dropped
C:\Users\user\AppData\Local\Temp\KUNDSKABSRIGESTES.Ina
data
dropped
C:\Users\user\AppData\Local\Temp\ac-adapter-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\csv.c
C source, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\emoji-travel-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\iso_3166.xml
XML 1.0 document, UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\library.dll
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\network-cellular-signal-excellent-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsn105D.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\user-trash-full-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
modified
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO#4200000866.exe
"C:\Users\user\Desktop\PO#4200000866.exe"
malicious

URLs

Name
IP
Malicious
http://finseb.com/qwer/COrg_ZBOJvB194.bin
malicious
https://www.asus.com/campaign/aura/global/download.php
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://subca.ocsp-certum.com05
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.iso.org/iso/country_codes
unknown
http://www.certum.pl/CPS0
unknown
There are 4 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3AA0000
direct allocation
page execute and read and write
malicious
1F904913000
heap
page read and write
E9E61FE000
stack
page read and write
16AECCD0000
heap
page read and write
468BFF000
stack
page read and write
29BD6FE0000
trusted library allocation
page read and write
1C11FF02000
heap
page read and write
1C11F6A5000
heap
page read and write
16AECE6E000
heap
page read and write
16AECE2A000
heap
page read and write
17B97213000
heap
page read and write
7C1F7FC000
stack
page read and write
30000
heap
page read and write
26DE3240000
heap
page read and write
212E000
stack
page read and write
2569D685000
heap
page read and write
7C1F97B000
stack
page read and write
1C124EF0000
heap
page read and write
14FEC43D000
heap
page read and write
16AECE00000
heap
page read and write
23F0000
trusted library allocation
page read and write
256E53FE000
heap
page read and write
1C11F714000
heap
page read and write
16AECF00000
heap
page read and write
2569D63C000
heap
page read and write
1C124E0C000
heap
page read and write
E9E5E7C000
stack
page read and write
28704B00000
heap
page read and write
2569D410000
heap
page read and write
26DE3246000
heap
page read and write
14FEC502000
heap
page read and write
28704A53000
heap
page read and write
14FEC380000
heap
page read and write
28704A2C000
heap
page read and write
2569D713000
heap
page read and write
256E53B8000
heap
page read and write
408000
unkown
page readonly
17B97229000
heap
page read and write
2250000
heap
page read and write
16AECD70000
trusted library allocation
page read and write
256E51A0000
heap
page read and write
72E56000
unkown
page readonly
26DE3231000
heap
page read and write
16AECE6D000
heap
page read and write
16AECD40000
heap
page read and write
29BD6FB0000
heap
page read and write
9175A7B000
stack
page read and write
91BC3DB000
stack
page read and write
F6E347E000
stack
page read and write
1C11FE00000
heap
page read and write
17B97278000
heap
page read and write
17B97180000
heap
page read and write
26DE324D000
heap
page read and write
222F000
stack
page read and write
29BD7100000
heap
page read and write
16AEE8F0000
remote allocation
page read and write
1F9048BF000
heap
page read and write
9175E77000
stack
page read and write
E9E572B000
stack
page read and write
29BD7040000
heap
page read and write
1C11FF18000
heap
page read and write
1C124EAB000
heap
page read and write
BC50578000
stack
page read and write
17B9726F000
heap
page read and write
26DE3275000
heap
page read and write
14FEC455000
heap
page read and write
1C124EB1000
heap
page read and write
1C124ED8000
heap
page read and write
28704A63000
heap
page read and write
FE0587E000
stack
page read and write
26DE3247000
heap
page read and write
1C120583000
trusted library allocation
page read and write
91BC97E000
stack
page read and write
1F0A4FF0000
remote allocation
page read and write
1F905100000
heap
page read and write
26DE3200000
heap
page read and write
1C11FE02000
heap
page read and write
1C11F6FD000
heap
page read and write
17B9726D000
heap
page read and write
99000
stack
page read and write
14FEC45A000
heap
page read and write
19A000
stack
page read and write
7C1FB7F000
stack
page read and write
2773000
trusted library allocation
page read and write
1C124CB0000
trusted library allocation
page read and write
1F904700000
heap
page read and write
26DE3265000
heap
page read and write
2569D654000
heap
page read and write
1C124F00000
heap
page read and write
26DE3268000
heap
page read and write
2569D702000
heap
page read and write
4690FE000
stack
page read and write
17B97265000
heap
page read and write
239F000
stack
page read and write
17B97120000
heap
page read and write
26DE3A70000
trusted library allocation
page read and write
1C124C90000
trusted library allocation
page read and write
876017D000
stack
page read and write
875FEFE000
stack
page read and write
39FE000
stack
page read and write
680000
heap
page read and write
1C11F692000
heap
page read and write
4691FE000
stack
page read and write
1F90486E000
heap
page read and write
14FEC390000
heap
page read and write
30C0000
trusted library allocation
page read and write
40A000
unkown
page read and write
1C124D60000
trusted library allocation
page read and write
BC5087E000
stack
page read and write
1C124C9E000
trusted library allocation
page read and write
26DE3242000
heap
page read and write
2569D580000
trusted library allocation
page read and write
14FEC472000
heap
page read and write
2569D700000
heap
page read and write
1C11F629000
heap
page read and write
468FFF000
stack
page read and write
287049A0000
trusted library allocation
page read and write
1F0A4FF0000
remote allocation
page read and write
E9E5F7C000
stack
page read and write
2569D420000
heap
page read and write
1C124B80000
trusted library allocation
page read and write
1C124E3C000
heap
page read and write
FE0531B000
stack
page read and write
28704A83000
heap
page read and write
16AEE8F0000
remote allocation
page read and write
1C11F6A9000
heap
page read and write
1C11F5F0000
trusted library allocation
page read and write
618000
heap
page read and write
1C11FE15000
heap
page read and write
28704B13000
heap
page read and write
1C124DE0000
trusted library allocation
page read and write
1C124DD0000
trusted library allocation
page read and write
875FDFC000
stack
page read and write
1C124D60000
trusted library allocation
page read and write
F6E367E000
stack
page read and write
1C11F658000
heap
page read and write
28704B08000
heap
page read and write
26DE325F000
heap
page read and write
401000
unkown
page execute read
256E55A0000
trusted library allocation
page read and write
1C124EA3000
heap
page read and write
E9E63FF000
stack
page read and write
256E5530000
heap
page readonly
1C124E49000
heap
page read and write
256E5550000
trusted library allocation
page read and write
9175D7B000
stack
page read and write
16AECCE0000
heap
page read and write
16AEE870000
trusted library allocation
page read and write
1C11F600000
heap
page read and write
14FEC513000
heap
page read and write
2424000
heap
page read and write
BC5067A000
stack
page read and write
FE0577D000
stack
page read and write
16AECDC0000
trusted library allocation
page read and write
91BC87E000
stack
page read and write
1C124F03000
heap
page read and write
1F0A4720000
heap
page read and write
875FC7B000
stack
page read and write
E9E5CFF000
stack
page read and write
29BD7079000
heap
page read and write
26DE327F000
heap
page read and write
26DE3229000
heap
page read and write
1C124EDE000
heap
page read and write
F6E337B000
stack
page read and write
1F904829000
heap
page read and write
17B97302000
heap
page read and write
2569D678000
heap
page read and write
1C11F702000
heap
page read and write
26DE3258000
heap
page read and write
BC50D7A000
stack
page read and write
256E5600000
heap
page read and write
667000
heap
page read and write
1C11F676000
heap
page read and write
9175AFE000
stack
page read and write
2569D600000
heap
page read and write
1F0A4840000
heap
page read and write
17B9728C000
heap
page read and write
16AECF02000
heap
page read and write
72E50000
unkown
page readonly
17B97265000
heap
page read and write
29BD7080000
heap
page read and write
256E52E0000
heap
page read and write
26DE3244000
heap
page read and write
940000
heap
page read and write
14FEC425000
heap
page read and write
38FD000
stack
page read and write
16AECE6B000
heap
page read and write
29BD7028000
heap
page read and write
1F0A4829000
heap
page read and write
1C124DF0000
trusted library allocation
page read and write
1F9046A0000
heap
page read and write
1C11F674000
heap
page read and write
29BD7000000
heap
page read and write
400000
unkown
page readonly
875FF7C000
stack
page read and write
256E51B0000
trusted library allocation
page read and write
1C11F679000
heap
page read and write
91BCB7F000
stack
page read and write
1C11F68B000
heap
page read and write
1F905002000
heap
page read and write
1C11F613000
heap
page read and write
73377C000
stack
page read and write
4685CC000
stack
page read and write
1C11F6FD000
heap
page read and write
1C124CC0000
trusted library allocation
page read and write
1F0A4858000
heap
page read and write
917607F000
stack
page read and write
44B000
unkown
page read and write
653000
heap
page read and write
26DE3262000
heap
page read and write
2569D708000
heap
page read and write
29BD7064000
heap
page read and write
1C124EF9000
heap
page read and write
1F0A4FF0000
remote allocation
page read and write
1F9048C7000
heap
page read and write
1C124C98000
trusted library allocation
page read and write
256E5610000
trusted library allocation
page read and write
26DE325C000
heap
page read and write
29BD7A02000
trusted library allocation
page read and write
28704A77000
heap
page read and write
28704A00000
heap
page read and write
7C1FC7C000
stack
page read and write
26DE3261000
heap
page read and write
26DE3213000
heap
page read and write
17B9724A000
heap
page read and write
1C124D60000
trusted library allocation
page read and write
28704A63000
heap
page read and write
26DE3260000
heap
page read and write
29BD7013000
heap
page read and write
795A3FF000
stack
page read and write
14FEC400000
heap
page read and write
26DE3278000
heap
page read and write
26DE3270000
heap
page read and write
400000
unkown
page readonly
1C124CC0000
trusted library allocation
page read and write
29BD7002000
heap
page read and write
7959B8E000
stack
page read and write
26DE3276000
heap
page read and write
FE0597B000
stack
page read and write
1F0A5002000
trusted library allocation
page read and write
256E5370000
trusted library allocation
page read and write
29BD7102000
heap
page read and write
72E54000
unkown
page readonly
17B97281000
heap
page read and write
91BC6FE000
stack
page read and write
26DE326E000
heap
page read and write
BC5015B000
stack
page read and write
1C11FF59000
heap
page read and write
14FEC476000
heap
page read and write
17B9724B000
heap
page read and write
28705202000
trusted library allocation
page read and write
17B97308000
heap
page read and write
4693FF000
stack
page read and write
14FECC90000
trusted library allocation
page read and write
256E5380000
trusted library allocation
page read and write
16AEE8F0000
remote allocation
page read and write
610000
heap
page read and write
1C124CB4000
trusted library allocation
page read and write
2420000
heap
page read and write
1C11FF18000
heap
page read and write
16AECE13000
heap
page read and write
26DE3160000
heap
page read and write
29BD7059000
heap
page read and write
E9E5B7B000
stack
page read and write
1F0A4902000
heap
page read and write
1C11F63E000
heap
page read and write
91BC67E000
stack
page read and write
1F9048E2000
heap
page read and write
44D000
unkown
page readonly
1C11FF00000
heap
page read and write
29BD7068000
heap
page read and write
1C120680000
trusted library allocation
page read and write
87602FD000
stack
page read and write
26DE3C02000
trusted library allocation
page read and write
1C124DF0000
remote allocation
page read and write
256E6106000
trusted library allocation
page read and write
66D000
heap
page read and write
64F000
heap
page read and write
1F9048D0000
heap
page read and write
26DE3264000
heap
page read and write
7C1FD7F000
stack
page read and write
28704840000
heap
page read and write
1F0A46C0000
heap
page read and write
1C124DF0000
remote allocation
page read and write
16AECE5B000
heap
page read and write
946000
heap
page read and write
28704A6A000
heap
page read and write
1C11F480000
heap
page read and write
14FEC41F000
heap
page read and write
91BCA7F000
stack
page read and write
1C11FF04000
heap
page read and write
468EFD000
stack
page read and write
1F904FA0000
trusted library allocation
page read and write
1F0A4802000
heap
page read and write
468DFE000
stack
page read and write
2569D480000
heap
page read and write
16AECF13000
heap
page read and write
14FEC467000
heap
page read and write
16AECE5E000
heap
page read and write
9175B7F000
stack
page read and write
17B97200000
heap
page read and write
F6E307C000
stack
page read and write
4C0000
trusted library allocation
page read and write
1C125100000
trusted library allocation
page read and write
26DE323D000
heap
page read and write
732D8C000
stack
page read and write
7C1FA77000
stack
page read and write
26DE323A000
heap
page read and write
1F0A4813000
heap
page read and write
1C11F707000
heap
page read and write
795A2FE000
stack
page read and write
1C11F6AB000
heap
page read and write
1C124DC0000
trusted library allocation
page read and write
E9E60FD000
stack
page read and write
16AECE3E000
heap
page read and write
17B97313000
heap
page read and write
87601FF000
stack
page read and write
26DE325A000
heap
page read and write
26DE3284000
heap
page read and write
17B97110000
heap
page read and write
14FEC469000
heap
page read and write
17B9724E000
heap
page read and write
2569DE02000
trusted library allocation
page read and write
16AECE75000
heap
page read and write
14FEC413000
heap
page read and write
9175F7D000
stack
page read and write
26DE3241000
heap
page read and write
256E5520000
trusted library allocation
page read and write
17B971B0000
trusted library allocation
page read and write
1C1250E0000
trusted library allocation
page read and write
1C120580000
trusted library allocation
page read and write
29BD6F40000
heap
page read and write
73337F000
stack
page read and write
401000
unkown
page execute read
1C11F69D000
heap
page read and write
28704830000
heap
page read and write
26DE31D0000
heap
page read and write
14FECE02000
trusted library allocation
page read and write
1C120B00000
trusted library allocation
page read and write
67D000
heap
page read and write
1C124DA0000
trusted library allocation
page read and write
26DE3267000
heap
page read and write
1C124B70000
trusted library allocation
page read and write
16AEEA02000
trusted library allocation
page read and write
BC50F7F000
stack
page read and write
1F904902000
heap
page read and write
73347F000
stack
page read and write
26DE3259000
heap
page read and write
468AFC000
stack
page read and write
1C124B00000
trusted library allocation
page read and write
7959B0C000
stack
page read and write
408000
unkown
page readonly
1F90483E000
heap
page read and write
1C124CB1000
trusted library allocation
page read and write
795A07B000
stack
page read and write
17B97C02000
trusted library allocation
page read and write
28704A13000
heap
page read and write
1C124DF0000
remote allocation
page read and write
BC5077A000
stack
page read and write
26DE3245000
heap
page read and write
2400000
trusted library allocation
page read and write
BC5097B000
stack
page read and write
7C1F6FE000
stack
page read and write
256E53FE000
heap
page read and write
44D000
unkown
page readonly
1C124D80000
trusted library allocation
page read and write
1C124CD0000
trusted library allocation
page read and write
FE057F9000
stack
page read and write
1C11F702000
heap
page read and write
670000
heap
page read and write
256E5390000
trusted library allocation
page read and write
26DE3170000
heap
page read and write
1F0A4800000
heap
page read and write
E9E62FD000
stack
page read and write
256E6100000
trusted library allocation
page read and write
72E51000
unkown
page execute read
3040000
trusted library allocation
page read and write
28704A29000
heap
page read and write
28704A48000
heap
page read and write
28704A4D000
heap
page read and write
2569D629000
heap
page read and write
256E5605000
heap
page read and write
7C1F67F000
stack
page read and write
73367C000
stack
page read and write
7C1F87F000
stack
page read and write
14FEC3F0000
heap
page read and write
256E5540000
trusted library allocation
page read and write
E9E5DFE000
stack
page read and write
16AECE4F000
heap
page read and write
1C11F66F000
heap
page read and write
7C1F3DB000
stack
page read and write
1C124EE4000
heap
page read and write
2569D64E000
heap
page read and write
1F90488A000
heap
page read and write
14FEC402000
heap
page read and write
29BD6F50000
heap
page read and write
28704A3C000
heap
page read and write
435000
unkown
page read and write
16AECF18000
heap
page read and write
229E000
stack
page read and write
4692FF000
stack
page read and write
17B97249000
heap
page read and write
1C120590000
trusted library allocation
page read and write
FE058F9000
stack
page read and write
1C11F4F0000
heap
page read and write
E9E5FFB000
stack
page read and write
1C124CD4000
trusted library allocation
page read and write
256E540F000
heap
page read and write
427000
unkown
page read and write
287048A0000
heap
page read and write
17B97300000
heap
page read and write
256E5300000
heap
page read and write
1F904690000
heap
page read and write
795A1FF000
stack
page read and write
1C124E2B000
heap
page read and write
2569D613000
heap
page read and write
256E53FF000
heap
page read and write
16AECE02000
heap
page read and write
17B9724D000
heap
page read and write
26DE3257000
heap
page read and write
1C124CD0000
trusted library allocation
page read and write
7959E7E000
stack
page read and write
26DE326A000
heap
page read and write
1C11FF13000
heap
page read and write
1C124E00000
heap
page read and write
6A2000
heap
page read and write
1F0A46B0000
heap
page read and write
795A177000
stack
page read and write
1C124E1D000
heap
page read and write
64B000
heap
page read and write
520000
heap
page read and write
26DE3302000
heap
page read and write
256E53B0000
heap
page read and write
4689FB000
stack
page read and write
17B9723C000
heap
page read and write
16AECD90000
trusted library allocation
page read and write
1F0A4FC0000
trusted library allocation
page read and write
256E5423000
heap
page read and write
14FEC429000
heap
page read and write
2569D66F000
heap
page read and write
9175C7B000
stack
page read and write
1C124DB0000
trusted library allocation
page read and write
73357F000
stack
page read and write
1F904800000
heap
page read and write
28704B02000
heap
page read and write
1C124E5F000
heap
page read and write
16AECF1C000
heap
page read and write
73397D000
stack
page read and write
1C11FF59000
heap
page read and write
26DE327C000
heap
page read and write
256E53F7000
heap
page read and write
949000
heap
page read and write
16AECE5D000
heap
page read and write
40A000
unkown
page write copy
F6E357B000
stack
page read and write
1C124C90000
trusted library allocation
page read and write
29BD7113000
heap
page read and write
17B97250000
heap
page read and write
1F905132000
heap
page read and write
1F904813000
heap
page read and write
256E541C000
heap
page read and write
1C11F490000
heap
page read and write
256E5609000
heap
page read and write
26DE3263000
heap
page read and write
There are 454 hidden memdumps, click here to show them.