IOC Report
Quotation____________________________________pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
Quotation____________________________________pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quotation____________________________________pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp85B3.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\qlOtJNH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\qlOtJNH.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\qlOtJNH.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2neaqg3y.rqr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mfuj3qit.beh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4ylfoxl.jok.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnmlsegf.02g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8F48.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\LogfirelessHrvQSXEgnfSYYboorishly
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\user-PC-user\WebData
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quotation____________________________________pdf.exe
"C:\Users\user\Desktop\Quotation____________________________________pdf.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\qlOtJNH.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qlOtJNH" /XML "C:\Users\user\AppData\Local\Temp\tmp85B3.tmp"
malicious
C:\Users\user\Desktop\Quotation____________________________________pdf.exe
"C:\Users\user\Desktop\Quotation____________________________________pdf.exe"
malicious
C:\Users\user\AppData\Roaming\qlOtJNH.exe
C:\Users\user\AppData\Roaming\qlOtJNH.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qlOtJNH" /XML "C:\Users\user\AppData\Local\Temp\tmp8F48.tmp"
malicious
C:\Users\user\AppData\Roaming\qlOtJNH.exe
"C:\Users\user\AppData\Roaming\qlOtJNH.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wbem\WmiPrvSE.exe
C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4D22000
trusted library allocation
page read and write
malicious
4CB9000
trusted library allocation
page read and write
malicious
401000
remote allocation
page execute and read and write
malicious
1400000
heap
page read and write
67D8000
trusted library allocation
page read and write
1937000
trusted library allocation
page execute and read and write
33A0000
heap
page read and write
175F000
heap
page read and write
2C54000
heap
page read and write
BA0000
heap
page read and write
17B6000
heap
page read and write
2D75000
trusted library allocation
page read and write
1250000
heap
page read and write
814D000
heap
page read and write
140E000
stack
page read and write
FD0000
heap
page read and write
834F000
stack
page read and write
2DA0000
trusted library allocation
page read and write
CDFF000
stack
page read and write
59C0000
trusted library allocation
page execute and read and write
6810000
heap
page read and write
B4B000
stack
page read and write
F2D000
trusted library allocation
page execute and read and write
9B7E000
trusted library allocation
page read and write
F20000
trusted library allocation
page execute read
5B6E000
stack
page read and write
D5B000
stack
page read and write
F30000
heap
page read and write
1040000
heap
page read and write
17CB000
heap
page read and write
7F3A0000
trusted library allocation
page execute and read and write
191F000
stack
page read and write
4599000
trusted library allocation
page read and write
152E000
stack
page read and write
32E0000
heap
page execute and read and write
D07C000
stack
page read and write
2D91000
trusted library allocation
page read and write
2D6B000
stack
page read and write
412000
remote allocation
page execute and read and write
2B1E000
stack
page read and write
F7B000
heap
page read and write
5BE0000
heap
page read and write
7570000
heap
page read and write
456000
remote allocation
page execute and read and write
F13000
trusted library allocation
page execute and read and write
1246000
trusted library allocation
page execute and read and write
11FE000
heap
page read and write
59D0000
trusted library allocation
page read and write
46DA000
trusted library allocation
page read and write
1180000
heap
page read and write
7619000
heap
page read and write
1420000
heap
page read and write
2AC0000
heap
page read and write
3390000
trusted library allocation
page read and write
54AE000
stack
page read and write
124A000
trusted library allocation
page execute and read and write
A37F000
trusted library allocation
page read and write
5916000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
1A60000
heap
page read and write
4906000
trusted library allocation
page read and write
37CF000
stack
page read and write
EF0000
heap
page read and write
BE5000
heap
page read and write
11C0000
heap
page read and write
17B1000
heap
page read and write
1703000
trusted library allocation
page execute and read and write
123F000
stack
page read and write
2A39000
heap
page read and write
2C60000
trusted library allocation
page read and write
115E000
stack
page read and write
1460000
trusted library allocation
page read and write
F3E000
heap
page read and write
5922000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
5810000
heap
page read and write
7860000
trusted library allocation
page execute and read and write
2B90000
heap
page read and write
1762000
heap
page read and write
156E000
stack
page read and write
400000
remote allocation
page execute and read and write
2D2E000
stack
page read and write
1920000
trusted library allocation
page read and write
4602000
trusted library allocation
page read and write
52D0000
heap
page read and write
DC0000
heap
page read and write
306E000
trusted library allocation
page read and write
6820000
heap
page read and write
32F0000
trusted library allocation
page read and write
F30000
heap
page read and write
14E0000
heap
page read and write
5911000
trusted library allocation
page read and write
36CF000
stack
page read and write
425000
remote allocation
page execute and read and write
1440000
heap
page read and write
5330000
trusted library allocation
page execute and read and write
32A0000
trusted library allocation
page execute and read and write
5B23000
heap
page read and write
54F0000
heap
page read and write
2BB0000
heap
page read and write
7528000
trusted library allocation
page read and write
5BBB000
stack
page read and write
7A10000
trusted library section
page read and write
8154000
heap
page read and write
172E000
heap
page read and write
7200000
heap
page read and write
5ECE000
stack
page read and write
527B000
trusted library allocation
page read and write
1464000
trusted library allocation
page read and write
7023F000
unkown
page readonly
7AC0000
trusted library allocation
page read and write
58FB000
trusted library allocation
page read and write
6065000
heap
page read and write
122F000
heap
page read and write
5BC0000
trusted library section
page readonly
6800000
heap
page read and write
600E000
stack
page read and write
3310000
trusted library allocation
page read and write
6010000
trusted library allocation
page execute and read and write
5920000
trusted library allocation
page read and write
5E4F000
stack
page read and write
1950000
heap
page read and write
17EC000
heap
page read and write
5945000
trusted library allocation
page read and write
1A5F000
stack
page read and write
428000
remote allocation
page execute and read and write
44B9000
trusted library allocation
page read and write
C62F000
stack
page read and write
120B000
heap
page read and write
4DC2000
trusted library allocation
page read and write
F37000
heap
page read and write
390F000
stack
page read and write
17DB000
heap
page read and write
4DC0000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
664E000
stack
page read and write
5BD0000
heap
page read and write
13BF000
stack
page read and write
F6F000
heap
page read and write
494B000
trusted library allocation
page read and write
7023D000
unkown
page read and write
116E000
stack
page read and write
3210000
trusted library allocation
page read and write
5343000
trusted library allocation
page read and write
2CDE000
stack
page read and write
70221000
unkown
page execute read
15E0000
trusted library allocation
page read and write
654F000
stack
page read and write
2C29000
heap
page read and write
C3ED000
stack
page read and write
A8D0000
trusted library section
page read and write
5800000
heap
page read and write
2DDC000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
7A30000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
544E000
stack
page read and write
1720000
heap
page read and write
5BF0000
heap
page read and write
1050000
heap
page read and write
15F6000
heap
page read and write
46B1000
trusted library allocation
page read and write
458000
remote allocation
page execute and read and write
4CEF000
trusted library allocation
page read and write
45F8000
trusted library allocation
page read and write
1487000
heap
page read and write
101E000
stack
page read and write
70236000
unkown
page readonly
5270000
trusted library allocation
page read and write
6060000
heap
page read and write
528E000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
4804000
trusted library allocation
page read and write
5C00000
trusted library allocation
page execute and read and write
427000
remote allocation
page execute and read and write
5B1E000
stack
page read and write
C52E000
stack
page read and write
2C0E000
stack
page read and write
52B0000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
45D000
remote allocation
page execute and read and write
52E0000
trusted library allocation
page read and write
15AE000
stack
page read and write
459000
remote allocation
page execute and read and write
15F0000
heap
page read and write
172B000
heap
page read and write
2A40000
heap
page read and write
75E9000
heap
page read and write
1811000
heap
page read and write
EF7000
stack
page read and write
6805000
heap
page read and write
71FE000
heap
page read and write
380E000
stack
page read and write
1932000
trusted library allocation
page read and write
2B90000
heap
page read and write
13A7000
trusted library allocation
page execute and read and write
52D3000
heap
page read and write
32D0000
trusted library allocation
page read and write
C5B000
stack
page read and write
79AE000
stack
page read and write
529D000
trusted library allocation
page read and write
F4E000
heap
page read and write
76AE000
stack
page read and write
2D70000
trusted library allocation
page read and write
C76C000
stack
page read and write
1213000
heap
page read and write
45A000
remote allocation
page execute and read and write
757E000
heap
page read and write
FA1000
heap
page read and write
34B1000
trusted library allocation
page read and write
139E000
stack
page read and write
4DA0000
trusted library allocation
page execute and read and write
1A67000
heap
page read and write
1922000
trusted library allocation
page read and write
7598000
heap
page read and write
325E000
stack
page read and write
1466000
trusted library allocation
page read and write
11DC000
heap
page read and write
1242000
trusted library allocation
page read and write
F14000
trusted library allocation
page read and write
C4EE000
stack
page read and write
7AD0000
trusted library allocation
page execute and read and write
1099000
stack
page read and write
5C50000
heap
page execute and read and write
7523000
trusted library allocation
page read and write
57F0000
trusted library section
page readonly
EFB000
stack
page read and write
57EE000
stack
page read and write
1930000
trusted library allocation
page read and write
77AE000
stack
page read and write
CF7C000
stack
page read and write
45C000
remote allocation
page execute and read and write
457000
remote allocation
page execute and read and write
11C8000
heap
page read and write
38CF000
stack
page read and write
70220000
unkown
page readonly
CCFE000
stack
page read and write
411000
remote allocation
page execute and read and write
193B000
trusted library allocation
page execute and read and write
CCBE000
stack
page read and write
2A30000
heap
page read and write
1410000
trusted library allocation
page execute and read and write
16FF000
stack
page read and write
674E000
stack
page read and write
2D90000
heap
page read and write
1240000
trusted library allocation
page read and write
4760000
trusted library allocation
page read and write
FA2000
heap
page read and write
3D99000
trusted library allocation
page read and write
F85000
heap
page read and write
5320000
heap
page read and write
BB0000
heap
page read and write
192A000
trusted library allocation
page execute and read and write
1450000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
7023D000
unkown
page read and write
13C0000
trusted library allocation
page read and write
E15000
heap
page read and write
493A000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
1926000
trusted library allocation
page execute and read and write
52A2000
trusted library allocation
page read and write
1056000
heap
page read and write
34E8000
trusted library allocation
page read and write
112F000
stack
page read and write
1480000
heap
page read and write
368F000
stack
page read and write
5970000
trusted library allocation
page read and write
1160000
trusted library allocation
page execute read
F10000
unkown
page readonly
413000
remote allocation
page execute and read and write
527E000
trusted library allocation
page read and write
BFE000
stack
page read and write
5291000
trusted library allocation
page read and write
5B20000
heap
page read and write
2D50000
heap
page read and write
F1D000
trusted library allocation
page execute and read and write
5C10000
trusted library allocation
page read and write
2AB0000
heap
page read and write
F00000
trusted library allocation
page read and write
E0E000
stack
page read and write
BB0000
heap
page read and write
7910000
heap
page read and write
791E000
heap
page read and write
7C1E000
stack
page read and write
56EE000
stack
page read and write
45E000
remote allocation
page execute and read and write
2BA0000
heap
page read and write
55AC000
stack
page read and write
591D000
trusted library allocation
page read and write
2C50000
heap
page read and write
424000
remote allocation
page execute and read and write
71F0000
heap
page read and write
7FB90000
trusted library allocation
page execute and read and write
1210000
heap
page read and write
2B94000
heap
page read and write
329C000
stack
page read and write
36CE000
stack
page read and write
2DD8000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
5950000
trusted library allocation
page read and write
FD9000
heap
page read and write
113E000
stack
page read and write
81C3000
heap
page read and write
590E000
trusted library allocation
page read and write
78AE000
stack
page read and write
52A0000
trusted library allocation
page read and write
48A7000
trusted library allocation
page read and write
1197000
stack
page read and write
129E000
stack
page read and write
100C000
heap
page read and write
6080000
heap
page read and write
C86C000
stack
page read and write
1710000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
819F000
heap
page read and write
34FE000
trusted library allocation
page read and write
5F0B000
stack
page read and write
59B0000
heap
page read and write
2D80000
heap
page execute and read and write
414000
remote allocation
page execute and read and write
F23000
trusted library allocation
page read and write
4F2C000
stack
page read and write
1713000
trusted library allocation
page read and write
8110000
heap
page read and write
E10000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
58FE000
trusted library allocation
page read and write
7B1E000
stack
page read and write
7023D000
unkown
page read and write
13A2000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
F71000
heap
page read and write
7850000
trusted library allocation
page read and write
32B0000
heap
page read and write
126F000
stack
page read and write
58F4000
trusted library allocation
page read and write
F3A000
heap
page read and write
170D000
trusted library allocation
page execute and read and write
45B000
remote allocation
page execute and read and write
5296000
trusted library allocation
page read and write
824E000
stack
page read and write
F64000
heap
page read and write
7595000
heap
page read and write
13AB000
trusted library allocation
page execute and read and write
7023D000
unkown
page read and write
378E000
trusted library allocation
page read and write
BE0000
heap
page read and write
5ADE000
stack
page read and write
11A0000
heap
page read and write
33A0000
heap
page read and write
CBBE000
stack
page read and write
34AF000
stack
page read and write
3300000
trusted library allocation
page execute and read and write
54EE000
stack
page read and write
34F4000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
2C20000
heap
page read and write
5A80000
trusted library allocation
page read and write
6070000
heap
page read and write
2DC8000
trusted library allocation
page read and write
5460000
heap
page execute and read and write
13A0000
trusted library allocation
page read and write
1704000
trusted library allocation
page read and write
F12000
unkown
page readonly
5340000
trusted library allocation
page read and write
B39000
stack
page read and write
5274000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
3313000
trusted library allocation
page read and write
There are 363 hidden memdumps, click here to show them.