IOC Report
QUOTE - FE7191PO154.exe

loading gif

Files

File Path
Type
Category
Malicious
QUOTE - FE7191PO154.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\QUOTE - FE7191PO154.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTE - FE7191PO154.exe
"C:\Users\user\Desktop\QUOTE - FE7191PO154.exe"
malicious
C:\Users\user\Desktop\QUOTE - FE7191PO154.exe
"C:\Users\user\Desktop\QUOTE - FE7191PO154.exe"
malicious
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6672 -s 12

Memdumps

Base Address
Regiontype
Protect
Malicious
105E000
heap
page read and write
179E000
stack
page read and write
1F442000
trusted library allocation
page read and write
1533D000
trusted library allocation
page read and write
1020000
heap
page read and write
1C250000
trusted library section
page readonly
13691000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7FFD346EB000
trusted library allocation
page read and write
7FFD345F6000
trusted library allocation
page execute and read and write
137BA000
trusted library allocation
page read and write
1390000
heap
page read and write
13FC000
stack
page read and write
812000
unkown
page readonly
9A0000
heap
page read and write
1395000
heap
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
7FFD3456C000
trusted library allocation
page execute and read and write
1380000
trusted library allocation
page read and write
1DAC0000
heap
page read and write
31F0000
heap
page execute and read and write
379A000
trusted library allocation
page read and write
1102000
heap
page read and write
7FFD3451D000
trusted library allocation
page execute and read and write
7FFD346C0000
trusted library allocation
page execute and read and write
1094000
heap
page read and write
7FFD345D0000
trusted library allocation
page execute and read and write
7FFD34710000
trusted library allocation
page read and write
1C3F0000
heap
page read and write
1C4C0000
heap
page read and write
7FFD346D0000
trusted library allocation
page read and write
980000
heap
page read and write
7FFD346E0000
trusted library allocation
page read and write
7FFD345C6000
trusted library allocation
page read and write
2087E000
stack
page read and write
FEE000
stack
page read and write
108E000
heap
page read and write
13681000
trusted library allocation
page read and write
1C4D0000
heap
page read and write
138A5000
trusted library allocation
page read and write
7FFD345C0000
trusted library allocation
page read and write
1060000
heap
page read and write
1C4B0000
heap
page read and write
9F5000
heap
page read and write
970000
heap
page read and write
327A000
heap
page read and write
31E0000
heap
page read and write
1C2E0000
trusted library allocation
page read and write
1063000
heap
page read and write
3240000
heap
page read and write
2107E000
stack
page read and write
7FFD34514000
trusted library allocation
page read and write
1FC7F000
stack
page read and write
1F350000
heap
page read and write
2007E000
stack
page read and write
7FFD3453B000
trusted library allocation
page execute and read and write
1105000
heap
page read and write
1F33F000
heap
page read and write
1C2F0000
heap
page execute and read and write
3B42000
trusted library allocation
page read and write
371E000
trusted library allocation
page read and write
1F840000
trusted library section
page read and write
3681000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
7FFD346E8000
trusted library allocation
page read and write
1C6B5000
heap
page read and write
1C6A0000
trusted library section
page read and write
1BF0C000
stack
page read and write
7FFD34512000
trusted library allocation
page read and write
7FFD34630000
trusted library allocation
page execute and read and write
20C7B000
stack
page read and write
9F0000
heap
page read and write
1DEB0000
trusted library section
page read and write
9C0000
heap
page read and write
7FFD34534000
trusted library allocation
page read and write
1C4E6000
heap
page read and write
1B6B0000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page execute and read and write
1CABD000
stack
page read and write
7FFD34513000
trusted library allocation
page execute and read and write
7FF4BF810000
trusted library allocation
page execute and read and write
7FFD346B0000
trusted library allocation
page read and write
1B9E000
stack
page read and write
7FFD34720000
trusted library allocation
page read and write
31E3000
heap
page read and write
13688000
trusted library allocation
page read and write
104B000
heap
page read and write
2047F000
stack
page read and write
1F320000
heap
page read and write
7FFD34530000
trusted library allocation
page read and write
3731000
trusted library allocation
page read and write
1C6B0000
heap
page read and write
1F335000
heap
page read and write
7FFD34523000
trusted library allocation
page read and write
1F860000
heap
page read and write
367E000
stack
page read and write
810000
unkown
page readonly
139B3000
trusted library allocation
page read and write
1C500000
heap
page read and write
1F820000
trusted library section
page read and write
7FFD3452D000
trusted library allocation
page execute and read and write
7FFD34520000
trusted library allocation
page read and write
7FFD34510000
trusted library allocation
page read and write
3270000
heap
page read and write
7FFD3453D000
trusted library allocation
page execute and read and write
There are 95 hidden memdumps, click here to show them.