Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
66WXq58R0I.exe
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g5elpwno.kpw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tlxxxkea.ncw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\66WXq58R0I.exe
|
"C:\Users\user\Desktop\66WXq58R0I.exe"
|
||
C:\Users\user\Desktop\66WXq58R0I.exe
|
C:\Users\user\Desktop\66wxq58r0i.exe 2580
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
153C3300000
|
trusted library allocation
|
page read and write
|
||
25EAC4D4000
|
direct allocation
|
page read and write
|
||
153C32A3000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
7FF78E433000
|
unkown
|
page write copy
|
||
153C17FF000
|
direct allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
25EAC8E0000
|
heap
|
page read and write
|
||
25EAC521000
|
direct allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
7FF78E446000
|
unkown
|
page readonly
|
||
25EAE290000
|
heap
|
page read and write
|
||
153C1921000
|
heap
|
page read and write
|
||
153C45EE000
|
trusted library allocation
|
page read and write
|
||
7FF78E446000
|
unkown
|
page readonly
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C1880000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF78E446000
|
unkown
|
page readonly
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
25EAC4A0000
|
heap
|
page read and write
|
||
7FF78E410000
|
unkown
|
page readonly
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
153D4071000
|
trusted library allocation
|
page read and write
|
||
25EAC4E8000
|
direct allocation
|
page read and write
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
7FF78E411000
|
unkown
|
page execute read
|
||
153C1919000
|
heap
|
page read and write
|
||
25EAC4C6000
|
direct allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C19F3000
|
direct allocation
|
page read and write
|
||
153C35ED000
|
heap
|
page read and write
|
||
7FF78E434000
|
unkown
|
page readonly
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
153C17D0000
|
heap
|
page read and write
|
||
7FF78E411000
|
unkown
|
page execute read
|
||
153C3290000
|
trusted library allocation
|
page read and write
|
||
153C17F6000
|
direct allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153DC9A0000
|
heap
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
25EAEDDA000
|
heap
|
page read and write
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
92A3FE000
|
stack
|
page read and write
|
||
92A1EE000
|
stack
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
25EAC920000
|
heap
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
7FF78E433000
|
unkown
|
page read and write
|
||
153C3270000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
153C1920000
|
heap
|
page read and write
|
||
153C32A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
153C18EE000
|
heap
|
page read and write
|
||
25EAC730000
|
heap
|
page read and write
|
||
25EAE5D9000
|
heap
|
page read and write
|
||
7FF78E448000
|
unkown
|
page read and write
|
||
25EAC506000
|
direct allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
153C3475000
|
heap
|
page read and write
|
||
153C32D0000
|
heap
|
page execute and read and write
|
||
25EADF52000
|
direct allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C3270000
|
trusted library section
|
page read and write
|
||
153C1822000
|
direct allocation
|
page read and write
|
||
7FF78E434000
|
unkown
|
page readonly
|
||
153C182B000
|
direct allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
25EAC490000
|
heap
|
page read and write
|
||
153C45D2000
|
trusted library allocation
|
page read and write
|
||
153C1818000
|
direct allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B938000
|
trusted library allocation
|
page read and write
|
||
92B3FB000
|
stack
|
page read and write
|
||
153C32B0000
|
trusted library allocation
|
page read and write
|
||
92B1FE000
|
stack
|
page read and write
|
||
25EADF4D000
|
direct allocation
|
page read and write
|
||
153DC956000
|
heap
|
page read and write
|
||
92A5FD000
|
stack
|
page read and write
|
||
153C3310000
|
trusted library allocation
|
page read and write
|
||
7FF78E45E000
|
unkown
|
page write copy
|
||
25EAC4EE000
|
direct allocation
|
page read and write
|
||
153C3283000
|
trusted library allocation
|
page read and write
|
||
153DC940000
|
heap
|
page read and write
|
||
153C45B3000
|
trusted library allocation
|
page read and write
|
||
7FF78E434000
|
unkown
|
page readonly
|
||
153C1928000
|
heap
|
page read and write
|
||
A363BFB000
|
stack
|
page read and write
|
||
153C1801000
|
direct allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FF78E410000
|
unkown
|
page readonly
|
||
153C19B0000
|
heap
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C1980000
|
heap
|
page read and write
|
||
153C3676000
|
heap
|
page read and write
|
||
7FF78E410000
|
unkown
|
page readonly
|
||
153C181D000
|
direct allocation
|
page read and write
|
||
153C32A3000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
92AFFE000
|
stack
|
page read and write
|
||
153C3250000
|
trusted library allocation
|
page read and write
|
||
7FF78E448000
|
unkown
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C3293000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
153C40EC000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
25EAC540000
|
direct allocation
|
page read and write
|
||
153C1888000
|
heap
|
page read and write
|
||
153C33A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
153DC986000
|
heap
|
page read and write
|
||
153C32C3000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
7FF78E411000
|
unkown
|
page execute read
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
153C3270000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
153C1A95000
|
heap
|
page read and write
|
||
153D40E3000
|
trusted library allocation
|
page read and write
|
||
153C3A7A000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FF78E446000
|
unkown
|
page readonly
|
||
7FF78E434000
|
unkown
|
page readonly
|
||
153C19FB000
|
direct allocation
|
page read and write
|
||
7FF78E45E000
|
unkown
|
page write copy
|
||
153C16F0000
|
heap
|
page read and write
|
||
7FF78E461000
|
unkown
|
page readonly
|
||
25EAE450000
|
heap
|
page execute read
|
||
25EAC4EB000
|
direct allocation
|
page read and write
|
||
153C32A0000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
929D5E000
|
stack
|
page read and write
|
||
153C33D0000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FF78E433000
|
unkown
|
page write copy
|
||
25EAC56C000
|
heap
|
page read and write
|
||
7FFD9B966000
|
trusted library allocation
|
page read and write
|
||
7FF78E461000
|
unkown
|
page readonly
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
153DC860000
|
heap
|
page read and write
|
||
25EAEFD8000
|
heap
|
page read and write
|
||
25EAC566000
|
heap
|
page read and write
|
||
92ABFF000
|
stack
|
page read and write
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
25EAE7E3000
|
heap
|
page read and write
|
||
153D407F000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C1A90000
|
heap
|
page read and write
|
||
153C3303000
|
trusted library allocation
|
page read and write
|
||
153C3260000
|
trusted library allocation
|
page read and write
|
||
25EAE9DA000
|
heap
|
page read and write
|
||
153C456F000
|
trusted library allocation
|
page read and write
|
||
153C32B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
153C1842000
|
direct allocation
|
page read and write
|
||
153C1929000
|
heap
|
page read and write
|
||
153C3FEC000
|
heap
|
page read and write
|
||
153C32C0000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
7FF78E410000
|
unkown
|
page readonly
|
||
25EAC510000
|
direct allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
25EAC53C000
|
direct allocation
|
page read and write
|
||
153C32A3000
|
trusted library allocation
|
page read and write
|
||
153C32A3000
|
trusted library allocation
|
page read and write
|
||
153C3293000
|
trusted library allocation
|
page read and write
|
||
153C42C4000
|
trusted library allocation
|
page read and write
|
||
153C1920000
|
heap
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C3460000
|
heap
|
page execute read
|
||
153C1926000
|
heap
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
25EAE862000
|
heap
|
page read and write
|
||
153C32C0000
|
trusted library allocation
|
page read and write
|
||
153C1A70000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
25EAC560000
|
heap
|
page read and write
|
||
7FF78E455000
|
unkown
|
page read and write
|
||
153C33B0000
|
trusted library allocation
|
page read and write
|
||
153C3BF2000
|
heap
|
page read and write
|
||
153C3310000
|
trusted library allocation
|
page read and write
|
||
25EAC4C0000
|
direct allocation
|
page read and write
|
||
153C39F7000
|
heap
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
153C3320000
|
heap
|
page read and write
|
||
153C32A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
153C32A0000
|
trusted library allocation
|
page read and write
|
||
7FF78E458000
|
unkown
|
page read and write
|
||
153C3400000
|
heap
|
page read and write
|
||
153C3310000
|
trusted library allocation
|
page read and write
|
||
153C32F9000
|
trusted library allocation
|
page read and write
|
||
153C1803000
|
direct allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C33E0000
|
heap
|
page execute and read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
153C1870000
|
direct allocation
|
page read and write
|
||
153C4543000
|
trusted library allocation
|
page read and write
|
||
153C184F000
|
direct allocation
|
page read and write
|
||
153DC0A0000
|
trusted library allocation
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
153C32C0000
|
trusted library allocation
|
page read and write
|
||
25EAC4CF000
|
direct allocation
|
page read and write
|
||
153C191A000
|
heap
|
page read and write
|
||
25EAE66B000
|
heap
|
page read and write
|
||
153C32B0000
|
trusted library allocation
|
page read and write
|
||
92A7FE000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
153C1A60000
|
trusted library section
|
page read and write
|
||
153C3E74000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
153C3310000
|
trusted library allocation
|
page read and write
|
||
7FFD9B785000
|
trusted library allocation
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
153C186F000
|
direct allocation
|
page read and write
|
||
153C3310000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page execute and read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153DC3FE000
|
heap
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
7FF78E411000
|
unkown
|
page execute read
|
||
153C33C0000
|
trusted library allocation
|
page read and write
|
||
153C3290000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
25EAEE60000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
153C1A75000
|
heap
|
page read and write
|
||
153D40E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF78E461000
|
unkown
|
page readonly
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
7FF78E461000
|
unkown
|
page readonly
|
||
25EAE461000
|
heap
|
page read and write
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
153C18C3000
|
heap
|
page read and write
|
||
153C1A80000
|
trusted library allocation
|
page read and write
|
||
25EAC50A000
|
direct allocation
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
153DC9B2000
|
heap
|
page read and write
|
||
153C3C70000
|
heap
|
page read and write
|
||
153C45F0000
|
trusted library allocation
|
page read and write
|
||
153C4071000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
153C1A50000
|
trusted library section
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C37EE000
|
heap
|
page read and write
|
||
92A9FE000
|
stack
|
page read and write
|
||
25EAEA6A000
|
heap
|
page read and write
|
||
153C1831000
|
direct allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C17F0000
|
direct allocation
|
page read and write
|
||
153C32A3000
|
trusted library allocation
|
page read and write
|
||
25EAE0D0000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
153DC999000
|
heap
|
page read and write
|
||
7FF78E433000
|
unkown
|
page read and write
|
||
25EAEC62000
|
heap
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
153C33A0000
|
trusted library allocation
|
page read and write
|
||
153C3300000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C1A99000
|
heap
|
page read and write
|
||
153C191A000
|
heap
|
page read and write
|
||
153C3310000
|
trusted library allocation
|
page read and write
|
||
153C191F000
|
heap
|
page read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
153C1917000
|
heap
|
page read and write
|
||
153C18C1000
|
heap
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
25EAC4FB000
|
direct allocation
|
page read and write
|
||
153C16D0000
|
remote allocation
|
page execute read
|
||
153C32F3000
|
trusted library allocation
|
page read and write
|
||
153C32E3000
|
trusted library allocation
|
page read and write
|
||
153C387F000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
153C1927000
|
heap
|
page read and write
|
||
153C32E0000
|
trusted library allocation
|
page read and write
|
||
153C19E2000
|
direct allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FF78E458000
|
unkown
|
page read and write
|
||
153C181B000
|
direct allocation
|
page read and write
|
||
153C32A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
153C33A0000
|
trusted library allocation
|
page read and write
|
||
25EAEBE2000
|
heap
|
page read and write
|
||
153C3280000
|
trusted library allocation
|
page read and write
|
||
153C32B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
7FF4B1120000
|
trusted library allocation
|
page execute and read and write
|
||
153C32F0000
|
trusted library allocation
|
page read and write
|
||
7FF78E455000
|
unkown
|
page read and write
|
||
153C1947000
|
heap
|
page read and write
|
||
153C32A0000
|
trusted library allocation
|
page read and write
|
||
92ADFE000
|
stack
|
page read and write
|
||
153C3DE8000
|
heap
|
page read and write
|
There are 327 hidden memdumps, click here to show them.