Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Quote35664776.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote35664776.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_auxzxpwz.0ck.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_if0mrgnt.uxi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_op5bbgn2.ayq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t32hqeow.beo.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Quote35664776.exe
|
"C:\Users\user\Desktop\Quote35664776.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote35664776.exe"
|
||
C:\Users\user\Desktop\Quote35664776.exe
|
"C:\Users\user\Desktop\Quote35664776.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1340000
|
direct allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
D61000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
D31E000
|
stack
|
page read and write
|
||
9BC0000
|
trusted library section
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
5BDD000
|
stack
|
page read and write
|
||
5420000
|
trusted library allocation
|
page execute and read and write
|
||
163E000
|
direct allocation
|
page execute and read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
1057000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
heap
|
page read and write
|
||
CC50000
|
trusted library allocation
|
page execute and read and write
|
||
3AA1000
|
trusted library allocation
|
page read and write
|
||
D69F000
|
stack
|
page read and write
|
||
103D000
|
trusted library allocation
|
page execute and read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
433A000
|
trusted library allocation
|
page read and write
|
||
1024000
|
trusted library allocation
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
4FD2000
|
trusted library allocation
|
page read and write
|
||
97DD000
|
stack
|
page read and write
|
||
6CE0000
|
heap
|
page read and write
|
||
52B0000
|
heap
|
page execute and read and write
|
||
2A90000
|
heap
|
page read and write
|
||
7045D000
|
unkown
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
D7DC000
|
stack
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
7FD30000
|
trusted library allocation
|
page execute and read and write
|
||
10D0000
|
heap
|
page execute and read and write
|
||
6EDE000
|
stack
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page execute and read and write
|
||
682000
|
unkown
|
page readonly
|
||
C10000
|
heap
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
9970000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
105B000
|
trusted library allocation
|
page execute and read and write
|
||
1167000
|
heap
|
page read and write
|
||
C3D000
|
stack
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
D1DE000
|
stack
|
page read and write
|
||
133F000
|
stack
|
page read and write
|
||
42F7000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
1766000
|
direct allocation
|
page execute and read and write
|
||
DA7000
|
heap
|
page read and write
|
||
D05E000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
2A1B000
|
trusted library allocation
|
page read and write
|
||
D7E0000
|
trusted library allocation
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
2D2D000
|
trusted library allocation
|
page read and write
|
||
9560000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page execute and read and write
|
||
7C9000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
1155000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
17E8000
|
direct allocation
|
page execute and read and write
|
||
70456000
|
unkown
|
page readonly
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
CEFE000
|
stack
|
page read and write
|
||
9460000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
CDFD000
|
stack
|
page read and write
|
||
9476000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
DBD000
|
heap
|
page read and write
|
||
2D36000
|
trusted library allocation
|
page read and write
|
||
D6DB000
|
stack
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
70441000
|
unkown
|
page execute read
|
||
969D000
|
stack
|
page read and write
|
||
50FC000
|
stack
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
heap
|
page read and write
|
||
176D000
|
direct allocation
|
page execute and read and write
|
||
D3C000
|
stack
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
5270000
|
trusted library section
|
page read and write
|
||
5100000
|
trusted library section
|
page readonly
|
||
CC9E000
|
stack
|
page read and write
|
||
1751000
|
direct allocation
|
page execute and read and write
|
||
C6E000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
70440000
|
unkown
|
page readonly
|
||
14A0000
|
direct allocation
|
page execute and read and write
|
||
3AA9000
|
trusted library allocation
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
F1E000
|
stack
|
page read and write
|
||
1042000
|
trusted library allocation
|
page read and write
|
||
7045F000
|
unkown
|
page readonly
|
||
D20000
|
heap
|
page read and write
|
||
D2DF000
|
stack
|
page read and write
|
||
D41E000
|
stack
|
page read and write
|
||
15C9000
|
direct allocation
|
page execute and read and write
|
||
AF7000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
4C3C000
|
stack
|
page read and write
|
||
D59E000
|
stack
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
979D000
|
stack
|
page read and write
|
||
1047000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
2A3D000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
104A000
|
trusted library allocation
|
page execute and read and write
|
||
98DD000
|
stack
|
page read and write
|
||
1033000
|
trusted library allocation
|
page read and write
|
||
111B000
|
stack
|
page read and write
|
||
2A36000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page execute and read and write
|
||
D2E000
|
heap
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
4AA8000
|
trusted library allocation
|
page read and write
|
||
D55E000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1046000
|
trusted library allocation
|
page execute and read and write
|
||
10BE000
|
stack
|
page read and write
|
||
1023000
|
trusted library allocation
|
page execute and read and write
|
||
CD9E000
|
stack
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
1052000
|
trusted library allocation
|
page read and write
|
||
94AF000
|
heap
|
page read and write
|
||
D15F000
|
stack
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
5445000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2A73000
|
heap
|
page read and write
|
||
2A2E000
|
trusted library allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
15CD000
|
direct allocation
|
page execute and read and write
|
||
EBE000
|
stack
|
page read and write
|
||
102D000
|
trusted library allocation
|
page execute and read and write
|
||
736000
|
unkown
|
page readonly
|
||
CAE000
|
stack
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
D45E000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
There are 152 hidden memdumps, click here to show them.