IOC Report
07lwzQoOuP.bin

loading gif

Files

File Path
Type
Category
Malicious
07lwzQoOuP.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjoqykhp.xg4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jj1wyxh0.ijo.psm1
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\07lwzQoOuP.exe
"C:\Users\user\Desktop\07lwzQoOuP.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9B9B0000
trusted library allocation
page read and write
1BE56000
heap
page read and write
7FFD9B798000
trusted library allocation
page read and write
1C11E000
stack
page read and write
1BEB4000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
17A5000
heap
page read and write
1BEB8000
heap
page read and write
31D0000
trusted library allocation
page read and write
FA4000
unkown
page readonly
30C4000
heap
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1350000
heap
page read and write
3290000
heap
page execute and read and write
1360000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1C21E000
stack
page read and write
1C31E000
stack
page read and write
13E3000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
1380000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
3796000
trusted library allocation
page read and write
1BE20000
heap
page read and write
1BEB2000
heap
page read and write
7FFD9B939000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
331C000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
13E0000
heap
page read and write
141A000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
13AC000
heap
page read and write
1BEC0000
heap
page read and write
1416000
heap
page read and write
1B71C000
stack
page read and write
1385000
heap
page read and write
1C41B000
stack
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9B783000
trusted library allocation
page execute and read and write
17A0000
heap
page read and write
142C000
heap
page read and write
1BE93000
heap
page read and write
364E000
trusted library allocation
page read and write
13A6000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1BC1E000
stack
page read and write
3250000
trusted library allocation
page read and write
35FB000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1313000
stack
page read and write
30AE000
stack
page read and write
13A0000
heap
page read and write
17B0000
heap
page read and write
7FFD9B967000
trusted library allocation
page read and write
142E000
heap
page read and write
13317000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
F90000
unkown
page readonly
7FFD9B9E0000
trusted library allocation
page read and write
FA2000
unkown
page readonly
1BE5B000
heap
page read and write
30B0000
heap
page read and write
1BEC9000
heap
page read and write
31D3000
trusted library allocation
page read and write
3240000
heap
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
7FFD9B9F0000
trusted library allocation
page read and write
1670000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
7FFD9BA10000
trusted library allocation
page read and write
1BD40000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
13CA000
heap
page read and write
7FFD9B928000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B936000
trusted library allocation
page read and write
7FF4F7980000
trusted library allocation
page execute and read and write
132A1000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
2FA0000
trusted library allocation
page read and write
1BB10000
heap
page execute and read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
FAF000
unkown
page readonly
7FFD9B792000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1CDA8000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B836000
trusted library allocation
page read and write
166F000
stack
page read and write
1B2D0000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
FA8000
unkown
page readonly
132AF000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
F92000
unkown
page readonly
F90000
unkown
page readonly
There are 108 hidden memdumps, click here to show them.