IOC Report
QuickTextPaste.exe

loading gif

Files

File Path
Type
Category
Malicious
QuickTextPaste.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Nov 25 16:03:22 2024, mtime=Mon Nov 25 16:03:22 2024, atime=Mon Nov 25 16:03:22 2024, length=2141552, window=hide
dropped
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QuickTextPaste.exe
"C:\Users\user\Desktop\QuickTextPaste.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
malicious

URLs

Name
IP
Malicious
45.32.146.65
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
45.32.146.65
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DesktopInfo

Memdumps

Base Address
Regiontype
Protect
Malicious
2182000
direct allocation
page execute and read and write
malicious
5002000
remote allocation
page execute and read and write
malicious
49E000
unkown
page execute and read and write
malicious
70C1000
trusted library allocation
page read and write
malicious
96C0000
trusted library allocation
page read and write
198000
stack
page read and write
9D40000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
2240000
heap
page read and write
A5B0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
22EC000
direct allocation
page read and write
6DAE000
stack
page read and write
80E6000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
5567000
trusted library allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
9D50000
trusted library allocation
page read and write
5750000
heap
page read and write
444000
unkown
page write copy
AFBE000
stack
page read and write
400000
unkown
page readonly
9D40000
trusted library allocation
page read and write
4AA000
unkown
page execute and write copy
499000
unkown
page readonly
9AFE000
stack
page read and write
B3FD000
stack
page read and write
A2C0000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
4B6000
unkown
page execute and write copy
610000
heap
page read and write
9D40000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
A4D9000
heap
page read and write
5040000
heap
page read and write
6EA0000
trusted library allocation
page read and write
A2B9000
stack
page read and write
231E000
direct allocation
page read and write
96C0000
trusted library allocation
page read and write
FEE20000
trusted library allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
9E7E000
stack
page read and write
A5B0000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
481000
unkown
page readonly
43C000
unkown
page readonly
96C0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
522C000
stack
page read and write
96E3000
heap
page read and write
96C0000
trusted library allocation
page read and write
22BC000
direct allocation
page read and write
A5B0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
43C000
unkown
page readonly
96C0000
trusted library allocation
page read and write
4FF7000
stack
page read and write
6DC0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
50D5000
heap
page read and write
7DE000
heap
page read and write
54FF000
stack
page read and write
5543000
trusted library allocation
page read and write
5580000
heap
page read and write
6DC0000
trusted library allocation
page read and write
4CD000
unkown
page execute and read and write
6EA0000
trusted library allocation
page read and write
9D40000
heap
page read and write
51EE000
stack
page read and write
499000
unkown
page readonly
A5B0000
trusted library allocation
page read and write
A83E000
stack
page read and write
96C0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
A5B1000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
481000
unkown
page readonly
A2D0000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
5050000
heap
page readonly
6DC0000
trusted library allocation
page read and write
76F000
stack
page read and write
A07D000
stack
page read and write
52AE000
stack
page read and write
A4B0000
heap
page read and write
9C000
stack
page read and write
6DC0000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
53A5000
heap
page read and write
96C0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
4C9000
unkown
page execute and write copy
A5B0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
6DE0000
heap
page read and write
96C0000
trusted library allocation
page read and write
90FC000
stack
page read and write
A5B0000
trusted library allocation
page read and write
AFFC000
stack
page read and write
A87F000
stack
page read and write
5556000
trusted library allocation
page execute and read and write
96C0000
trusted library allocation
page read and write
4BCB000
stack
page read and write
6EA0000
trusted library allocation
page read and write
A3B0000
heap
page read and write
96D0000
trusted library allocation
page read and write
22D9000
direct allocation
page read and write
A5B0000
trusted library allocation
page read and write
B1FE000
stack
page read and write
96C0000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
A2C0000
trusted library allocation
page read and write
967E000
stack
page read and write
A5B0000
trusted library allocation
page read and write
52C0000
heap
page read and write
96C0000
trusted library allocation
page read and write
538D000
heap
page read and write
96D0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
6EB0000
heap
page execute and read and write
80C1000
trusted library allocation
page read and write
A7BE000
stack
page read and write
96C0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
B200000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
401000
unkown
page execute read
4AD000
unkown
page execute and read and write
96C0000
trusted library allocation
page read and write
4FE000
unkown
page execute and read and write
9CFE000
stack
page read and write
96C0000
trusted library allocation
page read and write
7D0000
heap
page read and write
52F5000
heap
page read and write
52F8000
heap
page read and write
96C0000
trusted library allocation
page read and write
4AA000
unkown
page readonly
6DF8000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
50A0000
heap
page read and write
4B9000
unkown
page execute and read and write
5730000
trusted library allocation
page execute and read and write
5533000
trusted library allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
4FB000
unkown
page execute and write copy
5500000
heap
page read and write
526E000
stack
page read and write
96C0000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
22CD000
direct allocation
page read and write
65E000
stack
page read and write
96C5000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
7AE000
stack
page read and write
555A000
trusted library allocation
page execute and read and write
A5B0000
trusted library allocation
page read and write
AB7C000
stack
page read and write
96C0000
trusted library allocation
page read and write
4C9000
unkown
page readonly
9CF000
stack
page read and write
96C0000
trusted library allocation
page read and write
52C8000
heap
page read and write
6DC0000
trusted library allocation
page read and write
92FD000
stack
page read and write
6DB0000
trusted library allocation
page read and write
AD7D000
stack
page read and write
96C0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
A0BC000
stack
page read and write
4FB000
unkown
page readonly
A2F0000
heap
page read and write
96C0000
trusted library allocation
page read and write
96E0000
heap
page read and write
96C0000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
22E1000
direct allocation
page read and write
5000000
remote allocation
page execute and read and write
5756000
heap
page read and write
4B6000
unkown
page readonly
4BE000
unkown
page readonly
2180000
direct allocation
page execute and read and write
7606000
trusted library allocation
page read and write
400000
unkown
page readonly
4BE000
unkown
page execute and write copy
6DD0000
trusted library allocation
page read and write
52EA000
heap
page read and write
6DC0000
trusted library allocation
page read and write
50D0000
heap
page read and write
53FE000
stack
page read and write
96C0000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
530000
heap
page read and write
6DB0000
trusted library allocation
page read and write
509E000
stack
page read and write
6EA0000
trusted library allocation
page read and write
2250000
direct allocation
page read and write
5562000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
98F0000
heap
page execute and read and write
556B000
trusted library allocation
page execute and read and write
660000
heap
page read and write
9D40000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
ADBC000
stack
page read and write
70BF000
stack
page read and write
6EA0000
trusted library allocation
page read and write
553D000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
96C0000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
4C1000
unkown
page execute and read and write
A2C0000
heap
page read and write
A5B0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
96C0000
trusted library allocation
page read and write
9E40000
trusted library allocation
page read and write
444000
unkown
page write copy
7DA000
heap
page read and write
96C0000
trusted library allocation
page read and write
There are 238 hidden memdumps, click here to show them.