IOC Report
RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0py1rknh.fvk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2llasbzi.3wh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pskvzsmn.kjo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qtqjww2z.i31.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe
"C:\Users\user\Desktop\RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe"
malicious
C:\Users\user\Desktop\RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe
"C:\Users\user\Desktop\RFQ Ref. No CRCCRFQHAFJIHDG2-KSU001 REV.01..exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
193.122.6.168
https://reallyfreegeoip.orgp
unknown
http://checkip.dyndns.com
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ Ref_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3C87000
trusted library allocation
page read and write
malicious
2941000
trusted library allocation
page read and write
malicious
2B09000
trusted library allocation
page read and write
malicious
5B10000
heap
page read and write
3941000
trusted library allocation
page read and write
2A87000
trusted library allocation
page read and write
2FC2000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
CEE000
stack
page read and write
51D0000
trusted library allocation
page read and write
2A47000
trusted library allocation
page read and write
2EF3000
trusted library allocation
page read and write
51AE000
stack
page read and write
10C0000
trusted library allocation
page read and write
2A97000
trusted library allocation
page read and write
3C29000
trusted library allocation
page read and write
5012000
trusted library allocation
page read and write
EA2000
trusted library allocation
page read and write
26DB000
trusted library allocation
page execute and read and write
27D0000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
B06000
heap
page read and write
9E7F000
stack
page read and write
310D000
trusted library allocation
page read and write
26CA000
trusted library allocation
page execute and read and write
E83000
trusted library allocation
page read and write
648E000
stack
page read and write
5558000
trusted library allocation
page read and write
26D5000
trusted library allocation
page execute and read and write
E92000
trusted library allocation
page read and write
64CE000
stack
page read and write
AAA000
heap
page read and write
7410000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
2F08000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
D6F000
stack
page read and write
25BE000
stack
page read and write
26D7000
trusted library allocation
page execute and read and write
39CC000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
27F1000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3E4D000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
72BC000
heap
page read and write
11C0000
trusted library allocation
page read and write
E73000
trusted library allocation
page execute and read and write
4FA3000
heap
page read and write
547E000
stack
page read and write
B48000
heap
page read and write
2B72000
trusted library allocation
page read and write
39C3000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
11D0000
heap
page read and write
314B000
trusted library allocation
page read and write
714E000
stack
page read and write
3000000
trusted library allocation
page read and write
110E000
stack
page read and write
273E000
stack
page read and write
CA0000
heap
page read and write
30F8000
trusted library allocation
page read and write
293E000
stack
page read and write
6610000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
39D8000
trusted library allocation
page read and write
A8CC000
stack
page read and write
319E000
trusted library allocation
page read and write
2F5A000
trusted library allocation
page read and write
11B0000
trusted library allocation
page execute and read and write
2AE9000
trusted library allocation
page read and write
F3D000
heap
page read and write
2EB5000
trusted library allocation
page read and write
F63000
heap
page read and write
2ACD000
trusted library allocation
page read and write
2A02000
trusted library allocation
page read and write
A20000
heap
page read and write
BA0000
heap
page read and write
60AA000
heap
page read and write
2790000
trusted library allocation
page read and write
A3CD000
stack
page read and write
B90000
heap
page read and write
A3A000
stack
page read and write
2FEB000
trusted library allocation
page read and write
74DE000
stack
page read and write
3DF2000
trusted library allocation
page read and write
A80000
heap
page read and write
2BC0000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
A610000
heap
page read and write
AA0F000
stack
page read and write
7370000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F1D000
trusted library allocation
page read and write
5000000
heap
page read and write
4ADE000
stack
page read and write
2F31000
trusted library allocation
page read and write
A07E000
stack
page read and write
5200000
trusted library allocation
page execute and read and write
3091000
trusted library allocation
page read and write
7F270000
trusted library allocation
page execute and read and write
751E000
stack
page read and write
27EE000
trusted library allocation
page read and write
7B7000
stack
page read and write
2BFC000
stack
page read and write
A37F000
stack
page read and write
3D96000
trusted library allocation
page read and write
F01000
heap
page read and write
EC0000
heap
page read and write
2A3B000
trusted library allocation
page read and write
11D7000
heap
page read and write
A17D000
stack
page read and write
2AA5000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
73A0000
trusted library section
page read and write
2E11000
trusted library allocation
page read and write
2A43000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
D20000
heap
page read and write
4FB0000
heap
page read and write
E8D000
trusted library allocation
page execute and read and write
2A83000
trusted library allocation
page read and write
7250000
trusted library section
page read and write
603C000
heap
page read and write
6C10000
heap
page read and write
DB4000
trusted library allocation
page read and write
65D0000
trusted library allocation
page execute and read and write
3067000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
E7D000
trusted library allocation
page execute and read and write
31D4000
trusted library allocation
page read and write
E9A000
trusted library allocation
page execute and read and write
B6E000
heap
page read and write
6620000
trusted library allocation
page read and write
31D9000
trusted library allocation
page read and write
F42000
heap
page read and write
4E7E000
stack
page read and write
AB6000
heap
page read and write
2A7F000
trusted library allocation
page read and write
ECE000
heap
page read and write
D10000
trusted library allocation
page read and write
555B000
trusted library allocation
page read and write
5490000
heap
page read and write
4FA3000
heap
page read and write
5556000
trusted library allocation
page read and write
5B20000
heap
page read and write
4F8D000
trusted library allocation
page read and write
27DE000
trusted library allocation
page read and write
2A7E000
stack
page read and write
722000
unkown
page readonly
2A93000
trusted library allocation
page read and write
26C6000
trusted library allocation
page execute and read and write
27A4000
trusted library allocation
page read and write
52DB000
stack
page read and write
A70000
heap
page read and write
5530000
trusted library allocation
page execute and read and write
3160000
trusted library allocation
page read and write
E96000
trusted library allocation
page execute and read and write
2B82000
trusted library allocation
page read and write
640F000
stack
page read and write
65EF000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
749E000
stack
page read and write
75CE000
stack
page read and write
30CF000
trusted library allocation
page read and write
C80000
heap
page read and write
2AA0000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
2EA1000
trusted library allocation
page read and write
2AB0000
heap
page read and write
6018000
heap
page read and write
624E000
stack
page read and write
3189000
trusted library allocation
page read and write
65F0000
trusted library allocation
page execute and read and write
2A90000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
F03000
heap
page read and write
26C0000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
2AFB000
trusted library allocation
page read and write
7419000
trusted library allocation
page read and write
EA7000
trusted library allocation
page execute and read and write
E70000
trusted library allocation
page read and write
A88000
heap
page read and write
2780000
trusted library allocation
page execute and read and write
DCD000
trusted library allocation
page execute and read and write
5370000
heap
page read and write
54D5000
heap
page read and write
26D2000
trusted library allocation
page read and write
4F81000
trusted library allocation
page read and write
EF4000
heap
page read and write
3175000
trusted library allocation
page read and write
5480000
heap
page read and write
30BA000
trusted library allocation
page read and write
2E78000
trusted library allocation
page read and write
755E000
stack
page read and write
DD0000
heap
page read and write
2A32000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
E2E000
stack
page read and write
B37000
stack
page read and write
2B90000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
2FAD000
trusted library allocation
page read and write
9F7F000
stack
page read and write
7420000
trusted library allocation
page read and write
630E000
stack
page read and write
5030000
trusted library allocation
page read and write
277E000
stack
page read and write
27F6000
trusted library allocation
page read and write
65E3000
trusted library allocation
page read and write
554E000
trusted library allocation
page read and write
77FE000
stack
page read and write
2E25000
trusted library allocation
page read and write
7270000
heap
page read and write
A6E000
stack
page read and write
728D000
heap
page read and write
2B6E000
trusted library allocation
page read and write
27EA000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
62CE000
stack
page read and write
26BE000
stack
page read and write
2A8B000
trusted library allocation
page read and write
A19A000
heap
page read and write
2A3F000
trusted library allocation
page read and write
2830000
heap
page read and write
A60E000
stack
page read and write
4F64000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
EAB000
trusted library allocation
page execute and read and write
6058000
heap
page read and write
2A80000
trusted library allocation
page read and write
52E0000
trusted library section
page readonly
DC0000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
6690000
heap
page read and write
3C49000
trusted library allocation
page read and write
6010000
heap
page read and write
ECB000
heap
page read and write
A90D000
stack
page read and write
2B8C000
trusted library allocation
page read and write
2ECA000
trusted library allocation
page read and write
A180000
heap
page read and write
2A8F000
trusted library allocation
page read and write
1118000
trusted library allocation
page read and write
DB3000
trusted library allocation
page execute and read and write
2CCB000
trusted library allocation
page read and write
DA0000
heap
page read and write
51E0000
heap
page execute and read and write
26D0000
trusted library allocation
page read and write
27DB000
trusted library allocation
page read and write
5B3E000
heap
page read and write
2CC7000
trusted library allocation
page read and write
5220000
heap
page execute and read and write
F40000
heap
page read and write
3969000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
614E000
stack
page read and write
644E000
stack
page read and write
2C21000
trusted library allocation
page read and write
EEB000
heap
page read and write
7390000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
66C0000
heap
page read and write
6012000
heap
page read and write
724E000
stack
page read and write
2B95000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
A4CE000
stack
page read and write
F7E000
heap
page read and write
65CF000
stack
page read and write
10BE000
stack
page read and write
2AED000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
EF8000
heap
page read and write
4FC0000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
3014000
trusted library allocation
page read and write
6BA000
stack
page read and write
A7CC000
stack
page read and write
2D15000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
2802000
trusted library allocation
page read and write
4FA0000
heap
page read and write
65EA000
trusted library allocation
page read and write
A50E000
stack
page read and write
2A1D000
trusted library allocation
page read and write
2C10000
heap
page execute and read and write
3C21000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
7450000
trusted library allocation
page execute and read and write
4FA0000
heap
page read and write
3029000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
27D6000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
760E000
stack
page read and write
2F98000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
E6E000
stack
page read and write
2BB8000
trusted library allocation
page read and write
720000
unkown
page readonly
6710000
trusted library allocation
page execute and read and write
7375000
trusted library allocation
page read and write
7299000
heap
page read and write
27C0000
heap
page execute and read and write
54D0000
heap
page read and write
E80000
trusted library allocation
page read and write
6D32000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
628D000
stack
page read and write
2AFB000
stack
page read and write
6600000
trusted library allocation
page execute and read and write
31B8000
trusted library allocation
page read and write
7A6000
unkown
page readonly
5020000
trusted library allocation
page execute and read and write
There are 328 hidden memdumps, click here to show them.