IOC Report
Quote35664776.exe

loading gif

Files

File Path
Type
Category
Malicious
Quote35664776.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote35664776.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_auxzxpwz.0ck.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_if0mrgnt.uxi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_op5bbgn2.ayq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t32hqeow.beo.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quote35664776.exe
"C:\Users\user\Desktop\Quote35664776.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote35664776.exe"
malicious
C:\Users\user\Desktop\Quote35664776.exe
"C:\Users\user\Desktop\Quote35664776.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1340000
direct allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
D61000
heap
page read and write
F40000
heap
page read and write
D31E000
stack
page read and write
9BC0000
trusted library section
page read and write
2A0F000
stack
page read and write
5BDD000
stack
page read and write
5420000
trusted library allocation
page execute and read and write
163E000
direct allocation
page execute and read and write
4FE0000
trusted library allocation
page read and write
1057000
trusted library allocation
page execute and read and write
EE0000
heap
page read and write
CC50000
trusted library allocation
page execute and read and write
3AA1000
trusted library allocation
page read and write
D69F000
stack
page read and write
103D000
trusted library allocation
page execute and read and write
2B05000
trusted library allocation
page read and write
5BF0000
heap
page read and write
433A000
trusted library allocation
page read and write
1024000
trusted library allocation
page read and write
123F000
stack
page read and write
4FD2000
trusted library allocation
page read and write
97DD000
stack
page read and write
6CE0000
heap
page read and write
52B0000
heap
page execute and read and write
2A90000
heap
page read and write
7045D000
unkown
page read and write
2A10000
trusted library allocation
page read and write
D46000
heap
page read and write
D7DC000
stack
page read and write
DB9000
heap
page read and write
C20000
heap
page read and write
7FD30000
trusted library allocation
page execute and read and write
10D0000
heap
page execute and read and write
6EDE000
stack
page read and write
4FC0000
trusted library allocation
page execute and read and write
682000
unkown
page readonly
C10000
heap
page read and write
DD9000
heap
page read and write
541E000
stack
page read and write
9970000
trusted library allocation
page read and write
D54000
heap
page read and write
105B000
trusted library allocation
page execute and read and write
1167000
heap
page read and write
C3D000
stack
page read and write
4FD0000
trusted library allocation
page read and write
D1DE000
stack
page read and write
133F000
stack
page read and write
42F7000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
1766000
direct allocation
page execute and read and write
DA7000
heap
page read and write
D05E000
stack
page read and write
1130000
trusted library allocation
page read and write
2A70000
heap
page read and write
2A1B000
trusted library allocation
page read and write
D7E0000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
9560000
heap
page read and write
10C0000
trusted library allocation
page execute and read and write
7C9000
stack
page read and write
B30000
heap
page read and write
1070000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
1155000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
17E8000
direct allocation
page execute and read and write
70456000
unkown
page readonly
1030000
trusted library allocation
page read and write
CEFE000
stack
page read and write
9460000
heap
page read and write
54FE000
stack
page read and write
CDFD000
stack
page read and write
9476000
heap
page read and write
1040000
trusted library allocation
page read and write
DBD000
heap
page read and write
2D36000
trusted library allocation
page read and write
D6DB000
stack
page read and write
2A50000
trusted library allocation
page read and write
70441000
unkown
page execute read
969D000
stack
page read and write
50FC000
stack
page read and write
5290000
trusted library allocation
page read and write
D3F000
heap
page read and write
1120000
trusted library allocation
page read and write
5BE0000
heap
page read and write
176D000
direct allocation
page execute and read and write
D3C000
stack
page read and write
5160000
heap
page read and write
2AA1000
trusted library allocation
page read and write
5270000
trusted library section
page read and write
5100000
trusted library section
page readonly
CC9E000
stack
page read and write
1751000
direct allocation
page execute and read and write
C6E000
stack
page read and write
CD0000
heap
page read and write
6FDE000
stack
page read and write
5000000
trusted library allocation
page read and write
70440000
unkown
page readonly
14A0000
direct allocation
page execute and read and write
3AA9000
trusted library allocation
page read and write
5440000
heap
page read and write
680000
unkown
page readonly
F1E000
stack
page read and write
1042000
trusted library allocation
page read and write
7045F000
unkown
page readonly
D20000
heap
page read and write
D2DF000
stack
page read and write
D41E000
stack
page read and write
15C9000
direct allocation
page execute and read and write
AF7000
stack
page read and write
1160000
heap
page read and write
4C3C000
stack
page read and write
D59E000
stack
page read and write
2A31000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
4FB0000
heap
page read and write
979D000
stack
page read and write
1047000
heap
page read and write
C25000
heap
page read and write
2A3D000
trusted library allocation
page read and write
F30000
heap
page read and write
104A000
trusted library allocation
page execute and read and write
98DD000
stack
page read and write
1033000
trusted library allocation
page read and write
111B000
stack
page read and write
2A36000
trusted library allocation
page read and write
5130000
trusted library allocation
page execute and read and write
D2E000
heap
page read and write
F2E000
stack
page read and write
4AA8000
trusted library allocation
page read and write
D55E000
stack
page read and write
1040000
heap
page read and write
1046000
trusted library allocation
page execute and read and write
10BE000
stack
page read and write
1023000
trusted library allocation
page execute and read and write
CD9E000
stack
page read and write
52A0000
trusted library allocation
page read and write
1052000
trusted library allocation
page read and write
94AF000
heap
page read and write
D15F000
stack
page read and write
101E000
stack
page read and write
1050000
trusted library allocation
page read and write
5445000
heap
page read and write
CE0000
heap
page read and write
2A73000
heap
page read and write
2A2E000
trusted library allocation
page read and write
5110000
heap
page read and write
2A42000
trusted library allocation
page read and write
15CD000
direct allocation
page execute and read and write
EBE000
stack
page read and write
102D000
trusted library allocation
page execute and read and write
736000
unkown
page readonly
CAE000
stack
page read and write
1150000
trusted library allocation
page read and write
EC0000
heap
page read and write
D45E000
stack
page read and write
DA0000
heap
page read and write
5120000
heap
page read and write
There are 152 hidden memdumps, click here to show them.