IOC Report
New Quote 50029741830.exe

loading gif

Files

File Path
Type
Category
Malicious
New Quote 50029741830.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpD371.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\yqlOaUZZYhEp.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\New Quote 50029741830.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\yqlOaUZZYhEp.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ovwtzm5.kok.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4i33nfam.oo3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ev5kicve.sg5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fk2kyu3e.mmv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmovjg2h.lmt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nt5gvfwt.si1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_un41lb2p.0a5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yoiqw0fr.vqx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEA93.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\yqlOaUZZYhEp.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\New Quote 50029741830.exe
"C:\Users\user\Desktop\New Quote 50029741830.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Quote 50029741830.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\yqlOaUZZYhEp.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yqlOaUZZYhEp" /XML "C:\Users\user\AppData\Local\Temp\tmpD371.tmp"
malicious
C:\Users\user\Desktop\New Quote 50029741830.exe
"C:\Users\user\Desktop\New Quote 50029741830.exe"
malicious
C:\Users\user\AppData\Roaming\yqlOaUZZYhEp.exe
C:\Users\user\AppData\Roaming\yqlOaUZZYhEp.exe
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yqlOaUZZYhEp" /XML "C:\Users\user\AppData\Local\Temp\tmpEA93.tmp"
malicious
C:\Users\user\AppData\Roaming\yqlOaUZZYhEp.exe
C:\Users\user\AppData\Roaming\yqlOaUZZYhEp.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7948 -s 12
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7200 -s 12
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 18 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
142E9000
trusted library allocation
page read and write
malicious
15C73000
trusted library allocation
page read and write
malicious
1D384000
heap
page read and write
malicious
1FC0E000
stack
page read and write
BF5000
heap
page read and write
1E160000
trusted library section
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
1D13D000
stack
page read and write
A02000
heap
page read and write
9CC000
heap
page read and write
131AD000
trusted library allocation
page read and write
1DF6F000
stack
page read and write
14011000
trusted library allocation
page read and write
1F00F000
stack
page read and write
14C23000
trusted library allocation
page read and write
7FFD9B956000
trusted library allocation
page read and write
3BA0000
trusted library section
page readonly
15EC000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1FC9F000
stack
page read and write
13233000
trusted library allocation
page read and write
A2A000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
3BB0000
heap
page execute and read and write
1CBEC000
heap
page read and write
BFC000
stack
page read and write
14001000
trusted library allocation
page read and write
1500000
heap
page read and write
1BD45000
heap
page read and write
C42000
unkown
page readonly
1AD9A430000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
A31000
heap
page read and write
4486000
trusted library allocation
page read and write
9C0000
heap
page read and write
1CD30000
heap
page read and write
1B0000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
3441000
trusted library allocation
page read and write
1F80F000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1AD9A370000
heap
page read and write
1CD35000
heap
page read and write
3FFE000
stack
page read and write
1EA2B000
heap
page read and write
1601000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
47B539F000
stack
page read and write
343D000
trusted library allocation
page read and write
1DB6D000
stack
page read and write
14D0000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2000B000
stack
page read and write
BF0000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
1332C000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1BD50000
heap
page read and write
15CC000
heap
page read and write
900000
heap
page execute and read and write
1530000
trusted library allocation
page read and write
1AFE0000
trusted library allocation
page read and write
133A2000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1E140000
trusted library section
page read and write
1EB6B000
stack
page read and write
2FAF000
stack
page read and write
B40000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
4489000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
AB6000
heap
page read and write
16429635000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
CF2000
unkown
page readonly
14113000
trusted library allocation
page read and write
1F36E000
stack
page read and write
9E6F279000
stack
page read and write
343F000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1505000
heap
page read and write
22BE000
stack
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1C15D000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
140E000
stack
page read and write
1ABE000
stack
page read and write
13367000
trusted library allocation
page read and write
13F2000
stack
page read and write
1D260000
heap
page read and write
162F000
heap
page read and write
341C000
trusted library allocation
page read and write
1F40E000
stack
page read and write
9FF000
heap
page read and write
162D000
heap
page read and write
16429668000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
BC0000
heap
page read and write
C05000
heap
page read and write
30C2000
trusted library allocation
page read and write
1604000
heap
page read and write
1AD9A390000
heap
page read and write
141FD000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
AAF000
heap
page read and write
16429630000
heap
page read and write
1BD53000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
12FB8000
trusted library allocation
page read and write
3B70000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
9C6000
heap
page read and write
1E1C2000
trusted library allocation
page read and write
100E000
stack
page read and write
1560000
heap
page read and write
1BD40000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B840000
trusted library allocation
page execute and read and write
12FD9000
trusted library allocation
page read and write
1E970000
trusted library section
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
160000
heap
page read and write
2FB1000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1C77C000
stack
page read and write
9E6F37F000
stack
page read and write
47B5299000
stack
page read and write
1563000
heap
page read and write
1E5A0000
heap
page read and write
3420000
trusted library allocation
page read and write
1B83C000
stack
page read and write
3BF0000
heap
page read and write
1E5B1000
heap
page read and write
14008000
trusted library allocation
page read and write
47B531F000
unkown
page read and write
7FFD9B95E000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
1C030000
trusted library allocation
page read and write
13299000
trusted library allocation
page read and write
DC0000
heap
page read and write
9A4000
trusted library section
page readonly
16429610000
heap
page read and write
3445000
trusted library allocation
page read and write
1D360000
heap
page read and write
DC5000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1AD9A6F0000
heap
page read and write
1F88B000
stack
page read and write
3443000
trusted library allocation
page read and write
12FB1000
trusted library allocation
page read and write
2080D000
stack
page read and write
1E36F000
stack
page read and write
3BC0000
heap
page read and write
1EA20000
heap
page read and write
9E6F2FF000
unkown
page read and write
A2C000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
950000
heap
page execute and read and write
130C3000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B774000
trusted library allocation
page read and write
7FF441DF0000
trusted library allocation
page execute and read and write
8D0000
trusted library allocation
page read and write
970000
heap
page read and write
9A0000
trusted library section
page readonly
343B000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B793000
trusted library allocation
page read and write
3436000
trusted library allocation
page read and write
D80000
heap
page read and write
409B000
trusted library allocation
page read and write
D90000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
170000
heap
page read and write
AAA000
heap
page read and write
1580000
heap
page execute and read and write
7FFD9B830000
trusted library allocation
page execute and read and write
164295F0000
heap
page read and write
1CBB0000
heap
page read and write
DD0000
heap
page read and write
190000
heap
page read and write
1AD9A6F5000
heap
page read and write
1AD9A360000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1AD9A438000
heap
page read and write
8F0000
trusted library allocation
page read and write
B50000
heap
page read and write
9EA000
heap
page read and write
3136000
trusted library allocation
page read and write
20CBF000
stack
page read and write
132B0000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
412B000
trusted library allocation
page read and write
7FFD9B946000
trusted library allocation
page read and write
13FC000
stack
page read and write
16429660000
heap
page read and write
1E9F0000
heap
page read and write
C00000
heap
page read and write
13423000
trusted library allocation
page read and write
12FC1000
trusted library allocation
page read and write
1EF6E000
stack
page read and write
1E170000
trusted library allocation
page read and write
44E9000
trusted library allocation
page read and write
1C160000
heap
page read and write
2040E000
stack
page read and write
3499000
trusted library allocation
page read and write
15C0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1EBE000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7F2000
stack
page read and write
133A7000
trusted library allocation
page read and write
210BB000
stack
page read and write
C40000
unkown
page readonly
7FFD9B7AD000
trusted library allocation
page execute and read and write
1C170000
heap
page read and write
1E76E000
stack
page read and write
1E1A0000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
16429510000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
15C6000
heap
page read and write
1CBC0000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
1CBDB000
heap
page read and write
15B0000
heap
page read and write
7FFD9B783000
trusted library allocation
page read and write
1EA15000
heap
page read and write
There are 232 hidden memdumps, click here to show them.