IOC Report
PO_287104.exe

loading gif

Files

File Path
Type
Category
Malicious
PO_287104.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PO_287104.exe_41d43b594d7cb5ea74a54d3af42e9753d59ab813_4299c286_754bdea6-dd56-46d5-91b0-ccfe1137052e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D13.tmp.dmp
Mini DuMP crash report, 15 streams, Thu May 2 06:06:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F27.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F67.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO_287104.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 05:06:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 05:06:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 05:06:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 05:06:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 05:06:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 71
ASCII text, with very long lines (797)
downloaded
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO_287104.exe
"C:\Users\user\Desktop\PO_287104.exe"
malicious
C:\Users\user\Desktop\PO_287104.exe
"C:\Users\user\Desktop\PO_287104.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2056,i,8737495624509298634,17865193719586568122,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6196 -s 1516

URLs

Name
IP
Malicious
https://www.google.com/async/ddljson?async=ntp:2
142.251.35.164
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGMrazLEGIjBZUN1Vqkwi12TG-vYHko3v5bGLhfMhQg1bQ3rJ4hZy5IkSprSYJZZ7YfDKBTYYOVsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.35.164
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.35.164
http://checkip.dyndns.org/
193.122.130.0
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGMrazLEGIjAtDLKtaW7imy5MSBR16Nr2fdKnHvcFaleWOY1c1TY4DlJgIX8p-mGA1aAPz9kdujYyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.35.164
http://checkip.dyndns.org/q
unknown
https://scratchdreams.tk
unknown
https://www.google.com/async/newtab_promos
142.251.35.164
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.35.164
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.org
unknown
malicious
www.google.com
142.251.35.164
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
193.122.130.0
checkip.dyndns.com
United States
192.168.2.4
unknown
unknown
192.168.2.6
unknown
unknown
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
142.251.35.164
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO_287104_RASMANCS
FileDirectory
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
ProgramId
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
FileId
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
LowerCaseLongPath
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
LongPathHash
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
Name
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
OriginalFileName
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
Publisher
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
Version
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
BinFileVersion
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
BinaryType
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
ProductName
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
ProductVersion
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
LinkDate
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
BinProductVersion
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
AppxPackageFullName
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
AppxPackageRelativeId
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
Size
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
Language
\REGISTRY\A\{7ff7d681-bc71-2da7-4909-65182490bdc8}\Root\InventoryApplicationFile\po_287104.exe|530db9ce0969727a
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2DB1000
trusted library allocation
page read and write
malicious
390E000
trusted library allocation
page read and write
malicious
2C05000
trusted library allocation
page read and write
malicious
5310000
trusted library section
page read and write
malicious
4D00000
trusted library allocation
page execute and read and write
C04000
trusted library allocation
page read and write
6E4E000
stack
page read and write
3787000
trusted library allocation
page read and write
4C06000
trusted library allocation
page read and write
E60000
heap
page read and write
4CC0000
trusted library allocation
page read and write
E3E000
stack
page read and write
4BEB000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page execute and read and write
15B0000
heap
page read and write
835000
heap
page read and write
13B0000
trusted library allocation
page read and write
270F000
stack
page read and write
9D5000
heap
page read and write
10C0000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
12D6000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
C13000
trusted library allocation
page read and write
A1D000
heap
page read and write
BF0000
trusted library allocation
page read and write
10D0000
heap
page read and write
C32000
trusted library allocation
page read and write
4F3C000
stack
page read and write
C50000
heap
page read and write
2D45000
trusted library allocation
page read and write
6C10000
trusted library section
page read and write
52C0000
trusted library section
page read and write
9E6000
heap
page read and write
2E5B000
trusted library allocation
page read and write
6AE0000
heap
page read and write
4C20000
trusted library allocation
page read and write
632E000
stack
page read and write
830000
heap
page read and write
2CD0000
heap
page read and write
C37000
trusted library allocation
page execute and read and write
6D8F000
stack
page read and write
2CFB000
trusted library allocation
page read and write
2E56000
trusted library allocation
page read and write
E67000
heap
page read and write
10B3000
trusted library allocation
page execute and read and write
642E000
stack
page read and write
DF5000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
4D50000
heap
page read and write
656E000
stack
page read and write
4CB0000
heap
page read and write
F05000
heap
page read and write
4EA000
stack
page read and write
4C50000
trusted library allocation
page read and write
C1D000
trusted library allocation
page execute and read and write
4BD0000
trusted library allocation
page read and write
4BFE000
trusted library allocation
page read and write
4C01000
trusted library allocation
page read and write
C3B000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
5E7000
stack
page read and write
4CE0000
trusted library allocation
page read and write
12EB000
trusted library allocation
page execute and read and write
9A4E000
stack
page read and write
12D0000
trusted library allocation
page read and write
5300000
trusted library section
page read and write
2720000
heap
page read and write
408000
unkown
page readonly
15A6000
trusted library allocation
page read and write
1060000
heap
page read and write
10BD000
trusted library allocation
page execute and read and write
4FD0000
trusted library allocation
page read and write
2E5E000
trusted library allocation
page read and write
C0D000
trusted library allocation
page execute and read and write
C26000
trusted library allocation
page execute and read and write
4D20000
trusted library section
page readonly
58CE000
stack
page read and write
6ACF000
stack
page read and write
4CC2000
trusted library allocation
page read and write
6AEF000
heap
page read and write
2731000
trusted library allocation
page read and write
138E000
stack
page read and write
E50000
heap
page execute and read and write
10A0000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
27A7000
trusted library allocation
page read and write
13A0000
trusted library allocation
page execute and read and write
5160000
heap
page read and write
97E000
stack
page read and write
52E0000
trusted library allocation
page execute and read and write
2CCE000
stack
page read and write
564E000
stack
page read and write
2E77000
trusted library allocation
page read and write
27AE000
trusted library allocation
page read and write
5680000
heap
page execute and read and write
13C0000
heap
page read and write
61EE000
stack
page read and write
646E000
stack
page read and write
4F4E000
stack
page read and write
12CF000
stack
page read and write
279D000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
9A8000
heap
page read and write
C2A000
trusted library allocation
page execute and read and write
4F40000
heap
page execute and read and write
A32000
heap
page read and write
10FA000
heap
page read and write
11C6000
heap
page read and write
53CD000
stack
page read and write
476C000
stack
page read and write
5150000
heap
page read and write
1182000
heap
page read and write
60EE000
stack
page read and write
4D40000
heap
page read and write
362000
unkown
page readonly
105E000
stack
page read and write
6AE7000
heap
page read and write
850000
heap
page read and write
9B4E000
stack
page read and write
A62000
heap
page read and write
12E0000
trusted library allocation
page read and write
4D63000
heap
page read and write
6BD0000
trusted library allocation
page execute and read and write
C03000
trusted library allocation
page execute and read and write
2D00000
heap
page execute and read and write
54D0000
heap
page read and write
6FD2000
trusted library allocation
page read and write
538F000
stack
page read and write
12E7000
trusted library allocation
page execute and read and write
4CD0000
trusted library allocation
page execute and read and write
3823000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
4D30000
heap
page read and write
4D60000
heap
page read and write
9AE000
heap
page read and write
1390000
heap
page read and write
37D5000
trusted library allocation
page read and write
159E000
stack
page read and write
360000
unkown
page readonly
F40000
heap
page read and write
4BB0000
heap
page read and write
DAE000
stack
page read and write
5045000
heap
page read and write
F00000
heap
page read and write
1106000
heap
page read and write
BDE000
stack
page read and write
B9F000
stack
page read and write
2DA0000
heap
page read and write
9C4E000
stack
page read and write
A4E000
heap
page read and write
4C70000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
486C000
stack
page read and write
3739000
trusted library allocation
page read and write
83C7000
trusted library allocation
page read and write
68D0000
heap
page read and write
3731000
trusted library allocation
page read and write
12DA000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
2710000
trusted library allocation
page execute and read and write
930000
heap
page read and write
5040000
heap
page read and write
134E000
stack
page read and write
D60000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
560D000
stack
page read and write
10B4000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
3DD9000
trusted library allocation
page read and write
BDB000
stack
page read and write
5FEF000
stack
page read and write
5180000
heap
page read and write
540E000
stack
page read and write
62EF000
stack
page read and write
2D60000
trusted library allocation
page read and write
DEE000
stack
page read and write
6C00000
trusted library allocation
page read and write
D5F000
stack
page read and write
4BE4000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
502E000
stack
page read and write
DFE000
trusted library allocation
page read and write
40C000
unkown
page readonly
10D8000
heap
page read and write
12E2000
trusted library allocation
page read and write
514D000
stack
page read and write
6DCE000
stack
page read and write
590E000
stack
page read and write
4C0D000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
4C12000
trusted library allocation
page read and write
9E8000
heap
page read and write
15A4000
trusted library allocation
page read and write
11BB000
heap
page read and write
C22000
trusted library allocation
page read and write
3DB7000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
EF7000
stack
page read and write
There are 194 hidden memdumps, click here to show them.