IOC Report
Cotizaci#U00f3n#12643283.exe

loading gif

Files

File Path
Type
Category
Malicious
Cotizaci#U00f3n#12643283.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Cotizaci#U00f3n#12643283.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpAC01.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\SoEOsZIV.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\SoEOsZIV.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SoEOsZIV.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3krzvh1h.pyy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5l2phtpf.2em.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_stkvzaoe.fqi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmmeswp1.5q5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBE22.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Cotizaci#U00f3n#12643283.exe
"C:\Users\user\Desktop\Cotizaci#U00f3n#12643283.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\SoEOsZIV.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SoEOsZIV" /XML "C:\Users\user\AppData\Local\Temp\tmpAC01.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Users\user\AppData\Roaming\SoEOsZIV.exe
C:\Users\user\AppData\Roaming\SoEOsZIV.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SoEOsZIV" /XML "C:\Users\user\AppData\Local\Temp\tmpBE22.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
E50000
direct allocation
page read and write
malicious
7059000
direct allocation
page execute and read and write
1620000
trusted library allocation
page read and write
7AE000
stack
page read and write
FA0000
heap
page read and write
4E10000
heap
page execute and read and write
163E000
heap
page read and write
571B000
trusted library allocation
page read and write
9E7000
trusted library allocation
page execute and read and write
57E0000
trusted library allocation
page execute and read and write
F70000
trusted library allocation
page read and write
1720000
heap
page read and write
B1E000
heap
page read and write
160F000
stack
page read and write
34D000
stack
page read and write
4C80000
trusted library allocation
page execute and read and write
970000
heap
page read and write
9825000
heap
page read and write
4C90000
trusted library allocation
page read and write
6790000
heap
page read and write
2F70000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
1900000
trusted library allocation
page execute and read and write
3280000
heap
page read and write
9EBE000
stack
page read and write
F4D000
trusted library allocation
page read and write
522F000
stack
page read and write
587F000
trusted library section
page readonly
5D10000
heap
page read and write
1672000
heap
page read and write
7710000
heap
page read and write
D5B000
heap
page read and write
172D000
heap
page read and write
6F30000
direct allocation
page execute and read and write
1622000
trusted library allocation
page read and write
4139000
trusted library allocation
page read and write
586B000
stack
page read and write
5E40000
trusted library allocation
page read and write
FA7000
heap
page read and write
572E000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page execute and read and write
9E7E000
stack
page read and write
5CF0000
heap
page read and write
9FFE000
stack
page read and write
750E000
trusted library allocation
page read and write
4DC5000
heap
page read and write
AB9000
heap
page read and write
3F0000
heap
page read and write
71FD000
direct allocation
page execute and read and write
CE0000
trusted library allocation
page read and write
5CF5000
heap
page read and write
6D7D000
stack
page read and write
5742000
trusted library allocation
page read and write
430E000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
48EC000
stack
page read and write
F83000
heap
page read and write
CF0000
trusted library allocation
page read and write
1423000
trusted library allocation
page execute and read and write
A65C000
stack
page read and write
5B30000
heap
page execute and read and write
37A7000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page execute and read and write
5B10000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
49A000
stack
page read and write
760000
heap
page read and write
1370000
heap
page read and write
5B20000
heap
page read and write
408000
unkown
page readonly
33DF000
unkown
page read and write
CD0000
trusted library allocation
page execute and read and write
33F0000
heap
page read and write
A760000
heap
page read and write
97F6000
heap
page read and write
18D7000
trusted library allocation
page execute and read and write
975000
heap
page read and write
A60000
heap
page read and write
771A000
heap
page read and write
18C7000
heap
page read and write
E1E000
stack
page read and write
3751000
trusted library allocation
page read and write
4758000
trusted library allocation
page read and write
1430000
heap
page read and write
A23C000
stack
page read and write
57D0000
heap
page read and write
38A000
stack
page read and write
1610000
trusted library allocation
page read and write
7700000
heap
page read and write
5765000
trusted library allocation
page read and write
9AEE000
stack
page read and write
31A0000
trusted library allocation
page read and write
5310000
heap
page read and write
1656000
heap
page read and write
5AB0000
heap
page read and write
5870000
trusted library section
page readonly
450000
remote allocation
page execute and read and write
5800000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
6C8F000
trusted library allocation
page read and write
A10000
heap
page execute and read and write
A13C000
stack
page read and write
F2B000
trusted library allocation
page read and write
F65000
trusted library allocation
page read and write
5736000
trusted library allocation
page read and write
5F0000
heap
page read and write
75F000
unkown
page read and write
16F1000
heap
page read and write
4462000
trusted library allocation
page read and write
6E92000
trusted library allocation
page read and write
6B7E000
stack
page read and write
76FE000
stack
page read and write
5893000
heap
page read and write
A2E000
heap
page read and write
27DD000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
A22E000
stack
page read and write
AD0000
heap
page read and write
6C90000
trusted library allocation
page execute and read and write
F60000
trusted library allocation
page read and write
30CE000
stack
page read and write
9DA000
trusted library allocation
page execute and read and write
18D2000
trusted library allocation
page read and write
3843000
trusted library allocation
page read and write
71E1000
direct allocation
page execute and read and write
339E000
unkown
page read and write
A9B0000
trusted library allocation
page read and write
70CE000
direct allocation
page execute and read and write
5AD0000
trusted library allocation
page read and write
3120000
heap
page execute and read and write
9CE000
stack
page read and write
70E000
unkown
page read and write
A75C000
stack
page read and write
18C0000
heap
page read and write
8D0000
heap
page read and write
9E2000
trusted library allocation
page read and write
99EE000
stack
page read and write
6A3E000
stack
page read and write
970000
heap
page read and write
757E000
stack
page read and write
18F0000
trusted library allocation
page read and write
A4DF000
stack
page read and write
392E000
trusted library allocation
page read and write
4DF0000
heap
page read and write
4131000
trusted library allocation
page read and write
322000
unkown
page readonly
A3DE000
stack
page read and write
13BE000
stack
page read and write
980000
heap
page readonly
7278000
direct allocation
page execute and read and write
5020000
heap
page read and write
A8F000
heap
page read and write
85B000
heap
page read and write
F46000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
9B4000
trusted library allocation
page read and write
1663000
heap
page read and write
18DB000
trusted library allocation
page execute and read and write
9B3000
trusted library allocation
page execute and read and write
3114000
trusted library allocation
page read and write
F1E000
stack
page read and write
6BBF000
stack
page read and write
F80000
heap
page read and write
A3F000
heap
page read and write
4DE0000
heap
page read and write
4370000
trusted library allocation
page read and write
A20000
heap
page read and write
34FB000
heap
page read and write
CFD000
stack
page read and write
97F0000
heap
page read and write
5731000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
2A56000
trusted library allocation
page read and write
A40000
heap
page read and write
45AA000
trusted library allocation
page read and write
9BEE000
stack
page read and write
6C7F000
stack
page read and write
1410000
trusted library allocation
page read and write
1910000
heap
page read and write
A260000
trusted library allocation
page read and write
161D000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
33E0000
heap
page read and write
7EF000
stack
page read and write
1435000
heap
page read and write
2FDD000
stack
page read and write
308E000
stack
page read and write
597000
stack
page read and write
464D000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
C1E000
stack
page read and write
A9A0000
trusted library allocation
page read and write
142D000
trusted library allocation
page execute and read and write
7505000
trusted library allocation
page read and write
13D0000
heap
page read and write
7510000
trusted library allocation
page execute and read and write
4DAB000
stack
page read and write
4DB0000
trusted library section
page readonly
4E00000
trusted library allocation
page execute and read and write
5040000
heap
page read and write
1670000
heap
page read and write
705D000
direct allocation
page execute and read and write
6DB0000
heap
page read and write
91D000
stack
page read and write
4DC0000
heap
page read and write
9CD000
trusted library allocation
page execute and read and write
9B0000
trusted library allocation
page read and write
5D00000
heap
page read and write
D3E000
stack
page read and write
162A000
trusted library allocation
page execute and read and write
A55000
heap
page read and write
5238000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
53CC000
stack
page read and write
A0FF000
stack
page read and write
A89D000
stack
page read and write
9EB000
trusted library allocation
page execute and read and write
F3E000
trusted library allocation
page read and write
5E3E000
stack
page read and write
2797000
trusted library allocation
page read and write
5010000
heap
page read and write
1424000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
9FBE000
stack
page read and write
1337000
stack
page read and write
D10000
heap
page read and write
3131000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
6D3E000
stack
page read and write
18D0000
trusted library allocation
page read and write
A250000
trusted library allocation
page read and write
A61F000
stack
page read and write
4C70000
heap
page read and write
3110000
trusted library allocation
page read and write
C20000
heap
page read and write
6C85000
trusted library allocation
page read and write
75EE000
stack
page read and write
4223000
trusted library allocation
page read and write
7400000
heap
page read and write
3480000
heap
page read and write
5190000
trusted library allocation
page read and write
90C000
stack
page read and write
2F6E000
stack
page read and write
323A000
stack
page read and write
6C80000
trusted library allocation
page read and write
C40000
heap
page read and write
F41000
trusted library allocation
page read and write
500D000
stack
page read and write
3759000
trusted library allocation
page read and write
693E000
stack
page read and write
164F000
heap
page read and write
9FFE000
stack
page read and write
AC3000
heap
page read and write
A51E000
stack
page read and write
5C3E000
stack
page read and write
6CBF000
stack
page read and write
9D2000
trusted library allocation
page read and write
51B0000
trusted library section
page read and write
51C0000
trusted library section
page read and write
5750000
trusted library allocation
page read and write
CCC000
stack
page read and write
95E000
stack
page read and write
51D0000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
A29E000
stack
page read and write
163A000
heap
page read and write
9D6000
trusted library allocation
page execute and read and write
1626000
trusted library allocation
page execute and read and write
710000
heap
page read and write
F24000
trusted library allocation
page read and write
C8E000
stack
page read and write
B16000
heap
page read and write
1360000
heap
page read and write
34F0000
heap
page read and write
9D0000
trusted library allocation
page read and write
A62000
heap
page read and write
6A90000
trusted library section
page read and write
9D0000
heap
page read and write
9C0000
trusted library allocation
page read and write
310C000
stack
page read and write
9BD000
trusted library allocation
page execute and read and write
D00000
trusted library allocation
page read and write
A39E000
stack
page read and write
4DD0000
heap
page read and write
5210000
heap
page read and write
F52000
trusted library allocation
page read and write
43D2000
trusted library allocation
page read and write
320000
unkown
page readonly
5880000
heap
page read and write
980A000
heap
page read and write
5890000
heap
page read and write
A00000
trusted library allocation
page read and write
4506000
trusted library allocation
page read and write
1630000
heap
page read and write
71F6000
direct allocation
page execute and read and write
2F80000
heap
page read and write
9D7E000
stack
page read and write
A12E000
stack
page read and write
573D000
trusted library allocation
page read and write
79AF000
stack
page read and write
850000
heap
page read and write
37F5000
trusted library allocation
page read and write
6CDE000
stack
page read and write
1239000
stack
page read and write
F20000
trusted library allocation
page read and write
A99F000
stack
page read and write
There are 303 hidden memdumps, click here to show them.