IOC Report
66WXq58R0I.exe

loading gif

Files

File Path
Type
Category
Malicious
66WXq58R0I.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g5elpwno.kpw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tlxxxkea.ncw.psm1
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\66WXq58R0I.exe
"C:\Users\user\Desktop\66WXq58R0I.exe"
malicious
C:\Users\user\Desktop\66WXq58R0I.exe
C:\Users\user\Desktop\66wxq58r0i.exe 2580
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
153C3300000
trusted library allocation
page read and write
25EAC4D4000
direct allocation
page read and write
153C32A3000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C32E3000
trusted library allocation
page read and write
7FF78E433000
unkown
page write copy
153C17FF000
direct allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
25EAC8E0000
heap
page read and write
25EAC521000
direct allocation
page read and write
153C3300000
trusted library allocation
page read and write
7FF78E446000
unkown
page readonly
25EAE290000
heap
page read and write
153C1921000
heap
page read and write
153C45EE000
trusted library allocation
page read and write
7FF78E446000
unkown
page readonly
153C32F0000
trusted library allocation
page read and write
153C1880000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
7FF78E446000
unkown
page readonly
7FFD9B77D000
trusted library allocation
page execute and read and write
25EAC4A0000
heap
page read and write
7FF78E410000
unkown
page readonly
153C3300000
trusted library allocation
page read and write
7FFD9B927000
trusted library allocation
page read and write
153D4071000
trusted library allocation
page read and write
25EAC4E8000
direct allocation
page read and write
153C32E3000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
7FF78E411000
unkown
page execute read
153C1919000
heap
page read and write
25EAC4C6000
direct allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C19F3000
direct allocation
page read and write
153C35ED000
heap
page read and write
7FF78E434000
unkown
page readonly
153C3300000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
153C17D0000
heap
page read and write
7FF78E411000
unkown
page execute read
153C3290000
trusted library allocation
page read and write
153C17F6000
direct allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153DC9A0000
heap
page read and write
153C32F0000
trusted library allocation
page read and write
25EAEDDA000
heap
page read and write
153C32E3000
trusted library allocation
page read and write
92A3FE000
stack
page read and write
92A1EE000
stack
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
25EAC920000
heap
page read and write
153C32F0000
trusted library allocation
page read and write
7FF78E433000
unkown
page read and write
153C3270000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
153C1920000
heap
page read and write
153C32A0000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
153C18EE000
heap
page read and write
25EAC730000
heap
page read and write
25EAE5D9000
heap
page read and write
7FF78E448000
unkown
page read and write
25EAC506000
direct allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
153C3475000
heap
page read and write
153C32D0000
heap
page execute and read and write
25EADF52000
direct allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C3270000
trusted library section
page read and write
153C1822000
direct allocation
page read and write
7FF78E434000
unkown
page readonly
153C182B000
direct allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
25EAC490000
heap
page read and write
153C45D2000
trusted library allocation
page read and write
153C1818000
direct allocation
page read and write
153C3300000
trusted library allocation
page read and write
7FFD9B938000
trusted library allocation
page read and write
92B3FB000
stack
page read and write
153C32B0000
trusted library allocation
page read and write
92B1FE000
stack
page read and write
25EADF4D000
direct allocation
page read and write
153DC956000
heap
page read and write
92A5FD000
stack
page read and write
153C3310000
trusted library allocation
page read and write
7FF78E45E000
unkown
page write copy
25EAC4EE000
direct allocation
page read and write
153C3283000
trusted library allocation
page read and write
153DC940000
heap
page read and write
153C45B3000
trusted library allocation
page read and write
7FF78E434000
unkown
page readonly
153C1928000
heap
page read and write
A363BFB000
stack
page read and write
153C1801000
direct allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FF78E410000
unkown
page readonly
153C19B0000
heap
page read and write
153C32F0000
trusted library allocation
page read and write
153C1980000
heap
page read and write
153C3676000
heap
page read and write
7FF78E410000
unkown
page readonly
153C181D000
direct allocation
page read and write
153C32A3000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C3300000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
92AFFE000
stack
page read and write
153C3250000
trusted library allocation
page read and write
7FF78E448000
unkown
page read and write
153C32F3000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C3293000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
153C40EC000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C3300000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
25EAC540000
direct allocation
page read and write
153C1888000
heap
page read and write
153C33A0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
153DC986000
heap
page read and write
153C32C3000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C32E0000
trusted library allocation
page read and write
7FF78E411000
unkown
page execute read
7FFD9B9F0000
trusted library allocation
page read and write
153C3270000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C3300000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
153C1A95000
heap
page read and write
153D40E3000
trusted library allocation
page read and write
153C3A7A000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FF78E446000
unkown
page readonly
7FF78E434000
unkown
page readonly
153C19FB000
direct allocation
page read and write
7FF78E45E000
unkown
page write copy
153C16F0000
heap
page read and write
7FF78E461000
unkown
page readonly
25EAE450000
heap
page execute read
25EAC4EB000
direct allocation
page read and write
153C32A0000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
929D5E000
stack
page read and write
153C33D0000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FF78E433000
unkown
page write copy
25EAC56C000
heap
page read and write
7FFD9B966000
trusted library allocation
page read and write
7FF78E461000
unkown
page readonly
153C32E3000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
153DC860000
heap
page read and write
25EAEFD8000
heap
page read and write
25EAC566000
heap
page read and write
92ABFF000
stack
page read and write
153C32E3000
trusted library allocation
page read and write
25EAE7E3000
heap
page read and write
153D407F000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C1A90000
heap
page read and write
153C3303000
trusted library allocation
page read and write
153C3260000
trusted library allocation
page read and write
25EAE9DA000
heap
page read and write
153C456F000
trusted library allocation
page read and write
153C32B0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
153C1842000
direct allocation
page read and write
153C1929000
heap
page read and write
153C3FEC000
heap
page read and write
153C32C0000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
7FF78E410000
unkown
page readonly
25EAC510000
direct allocation
page read and write
153C32F3000
trusted library allocation
page read and write
25EAC53C000
direct allocation
page read and write
153C32A3000
trusted library allocation
page read and write
153C32A3000
trusted library allocation
page read and write
153C3293000
trusted library allocation
page read and write
153C42C4000
trusted library allocation
page read and write
153C1920000
heap
page read and write
153C32F0000
trusted library allocation
page read and write
153C3460000
heap
page execute read
153C1926000
heap
page read and write
153C32F3000
trusted library allocation
page read and write
153C32E3000
trusted library allocation
page read and write
25EAE862000
heap
page read and write
153C32C0000
trusted library allocation
page read and write
153C1A70000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C3300000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
25EAC560000
heap
page read and write
7FF78E455000
unkown
page read and write
153C33B0000
trusted library allocation
page read and write
153C3BF2000
heap
page read and write
153C3310000
trusted library allocation
page read and write
25EAC4C0000
direct allocation
page read and write
153C39F7000
heap
page read and write
153C3300000
trusted library allocation
page read and write
153C3320000
heap
page read and write
153C32A0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
153C32A0000
trusted library allocation
page read and write
7FF78E458000
unkown
page read and write
153C3400000
heap
page read and write
153C3310000
trusted library allocation
page read and write
153C32F9000
trusted library allocation
page read and write
153C1803000
direct allocation
page read and write
153C32F0000
trusted library allocation
page read and write
153C33E0000
heap
page execute and read and write
153C32E0000
trusted library allocation
page read and write
153C1870000
direct allocation
page read and write
153C4543000
trusted library allocation
page read and write
153C184F000
direct allocation
page read and write
153DC0A0000
trusted library allocation
page read and write
153C32E0000
trusted library allocation
page read and write
153C3300000
trusted library allocation
page read and write
153C32C0000
trusted library allocation
page read and write
25EAC4CF000
direct allocation
page read and write
153C191A000
heap
page read and write
25EAE66B000
heap
page read and write
153C32B0000
trusted library allocation
page read and write
92A7FE000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
153C1A60000
trusted library section
page read and write
153C3E74000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
153C3310000
trusted library allocation
page read and write
7FFD9B785000
trusted library allocation
page read and write
153C32E0000
trusted library allocation
page read and write
153C186F000
direct allocation
page read and write
153C3310000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page execute and read and write
153C32F0000
trusted library allocation
page read and write
153DC3FE000
heap
page read and write
153C32E0000
trusted library allocation
page read and write
7FF78E411000
unkown
page execute read
153C33C0000
trusted library allocation
page read and write
153C3290000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C32E0000
trusted library allocation
page read and write
25EAEE60000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
153C1A75000
heap
page read and write
153D40E1000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FF78E461000
unkown
page readonly
153C3300000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C32F0000
trusted library allocation
page read and write
7FF78E461000
unkown
page readonly
25EAE461000
heap
page read and write
153C32E3000
trusted library allocation
page read and write
153C18C3000
heap
page read and write
153C1A80000
trusted library allocation
page read and write
25EAC50A000
direct allocation
page read and write
153C32E0000
trusted library allocation
page read and write
153DC9B2000
heap
page read and write
153C3C70000
heap
page read and write
153C45F0000
trusted library allocation
page read and write
153C4071000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B856000
trusted library allocation
page execute and read and write
153C1A50000
trusted library section
page read and write
153C32F0000
trusted library allocation
page read and write
153C37EE000
heap
page read and write
92A9FE000
stack
page read and write
25EAEA6A000
heap
page read and write
153C1831000
direct allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C17F0000
direct allocation
page read and write
153C32A3000
trusted library allocation
page read and write
25EAE0D0000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
153DC999000
heap
page read and write
7FF78E433000
unkown
page read and write
25EAEC62000
heap
page read and write
153C32E0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
153C33A0000
trusted library allocation
page read and write
153C3300000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C32F3000
trusted library allocation
page read and write
153C1A99000
heap
page read and write
153C191A000
heap
page read and write
153C3310000
trusted library allocation
page read and write
153C191F000
heap
page read and write
153C32F0000
trusted library allocation
page read and write
153C1917000
heap
page read and write
153C18C1000
heap
page read and write
153C32E0000
trusted library allocation
page read and write
25EAC4FB000
direct allocation
page read and write
153C16D0000
remote allocation
page execute read
153C32F3000
trusted library allocation
page read and write
153C32E3000
trusted library allocation
page read and write
153C387F000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
153C1927000
heap
page read and write
153C32E0000
trusted library allocation
page read and write
153C19E2000
direct allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FF78E458000
unkown
page read and write
153C181B000
direct allocation
page read and write
153C32A0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
153C33A0000
trusted library allocation
page read and write
25EAEBE2000
heap
page read and write
153C3280000
trusted library allocation
page read and write
153C32B0000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FF4B1120000
trusted library allocation
page execute and read and write
153C32F0000
trusted library allocation
page read and write
7FF78E455000
unkown
page read and write
153C1947000
heap
page read and write
153C32A0000
trusted library allocation
page read and write
92ADFE000
stack
page read and write
153C3DE8000
heap
page read and write
There are 327 hidden memdumps, click here to show them.