Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp920A.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\nCPTBp.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\nCPTBp.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nCPTBp.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_glgfvxai.gnl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hfi2qzmj.fh5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jkmzknnd.dj3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmbxhxgo.axb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdspk5hw.32y.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uwe0eix0.t0z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vhvhbu5n.t4h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x4xzhacs.mmk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpAC0B.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe
|
"C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA
_ SOA_Payment Reference TR-37827392-2024-07.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\nCPTBp.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nCPTBp" /XML "C:\Users\user\AppData\Local\Temp\tmp920A.tmp"
|
||
C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe
|
"C:\Users\user\Desktop\JPG_TTRN101921929240724_PDA _ SOA_Payment Reference TR-37827392-2024-07.exe"
|
||
C:\Users\user\AppData\Roaming\nCPTBp.exe
|
C:\Users\user\AppData\Roaming\nCPTBp.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nCPTBp" /XML "C:\Users\user\AppData\Local\Temp\tmpAC0B.tmp"
|
||
C:\Users\user\AppData\Roaming\nCPTBp.exe
|
"C:\Users\user\AppData\Roaming\nCPTBp.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
AB0000
|
direct allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
11BD000
|
direct allocation
|
page execute and read and write
|
||
D6A000
|
stack
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
90A000
|
trusted library allocation
|
page execute and read and write
|
||
8B9C000
|
stack
|
page read and write
|
||
5704000
|
heap
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7AA000
|
stack
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
8A1F000
|
stack
|
page read and write
|
||
29F6000
|
trusted library allocation
|
page read and write
|
||
240F000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
122E000
|
direct allocation
|
page execute and read and write
|
||
7C3000
|
heap
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
CC3000
|
trusted library allocation
|
page execute and read and write
|
||
1120000
|
heap
|
page read and write
|
||
252F000
|
stack
|
page read and write
|
||
13D8000
|
direct allocation
|
page execute and read and write
|
||
86B3000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
13C0000
|
direct allocation
|
page execute and read and write
|
||
842F000
|
stack
|
page read and write
|
||
4F50000
|
heap
|
page execute and read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
33DC000
|
heap
|
page read and write
|
||
4A1B000
|
trusted library allocation
|
page read and write
|
||
F2F000
|
stack
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
86AC000
|
stack
|
page read and write
|
||
2F4E000
|
unkown
|
page read and write
|
||
F2F000
|
stack
|
page read and write
|
||
7FD000
|
stack
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
29D4000
|
trusted library allocation
|
page read and write
|
||
23F6000
|
trusted library allocation
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
5003000
|
heap
|
page read and write
|
||
8C9C000
|
stack
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
A90000
|
trusted library allocation
|
page execute and read and write
|
||
890000
|
heap
|
page read and write
|
||
2A7A000
|
trusted library allocation
|
page read and write
|
||
4A42000
|
trusted library allocation
|
page read and write
|
||
1090000
|
direct allocation
|
page execute and read and write
|
||
B40000
|
heap
|
page read and write
|
||
2F8F000
|
unkown
|
page read and write
|
||
6EDA1000
|
unkown
|
page execute read
|
||
10AE000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
CF7000
|
trusted library allocation
|
page execute and read and write
|
||
540B000
|
stack
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
35C5000
|
trusted library allocation
|
page read and write
|
||
3539000
|
trusted library allocation
|
page read and write
|
||
CEA000
|
trusted library allocation
|
page execute and read and write
|
||
D00000
|
heap
|
page read and write
|
||
278B000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
stack
|
page read and write
|
||
56CF000
|
heap
|
page read and write
|
||
8E3000
|
trusted library allocation
|
page execute and read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
2415000
|
trusted library allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
823000
|
heap
|
page read and write
|
||
81E0000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
CCD000
|
trusted library allocation
|
page execute and read and write
|
||
1469000
|
direct allocation
|
page execute and read and write
|
||
7FCD0000
|
trusted library allocation
|
page execute and read and write
|
||
1366000
|
direct allocation
|
page execute and read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
86A0000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
4BCC000
|
stack
|
page read and write
|
||
13C6000
|
direct allocation
|
page execute and read and write
|
||
2583000
|
trusted library allocation
|
page read and write
|
||
9AD000
|
stack
|
page read and write
|
||
8B5F000
|
stack
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
3A39000
|
trusted library allocation
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
5C00000
|
trusted library section
|
page read and write
|
||
23F4000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
heap
|
page execute and read and write
|
||
357F000
|
trusted library allocation
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
81EE000
|
stack
|
page read and write
|
||
CE6000
|
trusted library allocation
|
page execute and read and write
|
||
1463000
|
direct allocation
|
page execute and read and write
|
||
6EDBD000
|
unkown
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
88DE000
|
stack
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
CD3000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
heap
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
5ED000
|
stack
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
869E000
|
stack
|
page read and write
|
||
33CB000
|
heap
|
page read and write
|
||
29EE000
|
trusted library allocation
|
page read and write
|
||
4A14000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
heap
|
page execute and read and write
|
||
3C0E000
|
trusted library allocation
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
859D000
|
stack
|
page read and write
|
||
912000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
59DF000
|
stack
|
page read and write
|
||
891E000
|
stack
|
page read and write
|
||
1606000
|
direct allocation
|
page execute and read and write
|
||
665000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page execute and read and write
|
||
6EDA0000
|
unkown
|
page readonly
|
||
4A50000
|
heap
|
page read and write
|
||
2A15000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
1341000
|
direct allocation
|
page execute and read and write
|
||
4E5B000
|
stack
|
page read and write
|
||
80AE000
|
stack
|
page read and write
|
||
2531000
|
trusted library allocation
|
page read and write
|
||
4CA1000
|
trusted library allocation
|
page read and write
|
||
B4B000
|
heap
|
page read and write
|
||
D2D000
|
stack
|
page read and write
|
||
46CC000
|
stack
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
stack
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
832E000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
8CB0000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
trusted library allocation
|
page execute and read and write
|
||
4A38000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
2A02000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
8F3000
|
trusted library allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
D20000
|
trusted library allocation
|
page execute and read and write
|
||
4FA0000
|
trusted library allocation
|
page execute and read and write
|
||
12F1000
|
direct allocation
|
page read and write
|
||
1340000
|
direct allocation
|
page execute and read and write
|
||
D66000
|
heap
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
6EDBD000
|
unkown
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
130A000
|
direct allocation
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
29DB000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
1347000
|
direct allocation
|
page execute and read and write
|
||
8E4000
|
trusted library allocation
|
page read and write
|
||
6EDBF000
|
unkown
|
page readonly
|
||
5590000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
1402000
|
direct allocation
|
page execute and read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
902000
|
trusted library allocation
|
page read and write
|
||
1129000
|
heap
|
page read and write
|
||
4A36000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
stack
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
2EA000
|
stack
|
page read and write
|
||
5390000
|
trusted library section
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
42D000
|
remote allocation
|
page execute and read and write
|
||
D9E000
|
stack
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
4A3D000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
11B9000
|
direct allocation
|
page execute and read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
6EDB6000
|
unkown
|
page readonly
|
||
5BEE000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
86B5000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
906000
|
trusted library allocation
|
page execute and read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
C38000
|
heap
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
83BE000
|
stack
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
direct allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
EE7000
|
heap
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
CC4000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
AEE000
|
unkown
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
3E7000
|
stack
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page execute and read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
29FD000
|
trusted library allocation
|
page read and write
|
||
D71000
|
heap
|
page read and write
|
||
662000
|
unkown
|
page readonly
|
||
111F000
|
trusted library allocation
|
page read and write
|
||
581D000
|
stack
|
page read and write
|
||
84BE000
|
stack
|
page read and write
|
||
3B23000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
4A2E000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
135D000
|
direct allocation
|
page execute and read and write
|
||
2420000
|
heap
|
page execute and read and write
|
||
2572000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
CE2000
|
trusted library allocation
|
page read and write
|
||
91B000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
15F1000
|
direct allocation
|
page execute and read and write
|
||
AF7000
|
stack
|
page read and write
|
||
550D000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
8A5E000
|
stack
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
5140000
|
trusted library allocation
|
page execute and read and write
|
||
56C0000
|
heap
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page execute and read and write
|
||
E1C000
|
heap
|
page read and write
|
||
53B0000
|
trusted library section
|
page read and write
|
||
846E000
|
stack
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
7F780000
|
trusted library allocation
|
page execute and read and write
|
||
DD2000
|
heap
|
page read and write
|
||
917000
|
trusted library allocation
|
page execute and read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
5BAE000
|
stack
|
page read and write
|
||
81AE000
|
stack
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
10EB000
|
stack
|
page read and write
|
||
CFB000
|
trusted library allocation
|
page execute and read and write
|
||
856F000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
4A53000
|
heap
|
page read and write
|
||
8FD000
|
trusted library allocation
|
page execute and read and write
|
||
CF2000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
D3E000
|
heap
|
page read and write
|
||
7B42000
|
trusted library allocation
|
page read and write
|
||
87AF000
|
stack
|
page read and write
|
||
1356000
|
direct allocation
|
page execute and read and write
|
||
5120000
|
trusted library section
|
page read and write
|
||
CDD000
|
trusted library allocation
|
page execute and read and write
|
||
7B6000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
3A31000
|
trusted library allocation
|
page read and write
|
||
82EF000
|
stack
|
page read and write
|
||
160D000
|
direct allocation
|
page execute and read and write
|
||
85AC000
|
stack
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
23EE000
|
stack
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
D4F000
|
unkown
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
There are 313 hidden memdumps, click here to show them.