Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
QuickTextPaste.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Pictures\DesktopInfo\Bin\DesktopInfo.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Nov 25 16:03:22
2024, mtime=Mon Nov 25 16:03:22 2024, atime=Mon Nov 25 16:03:22 2024, length=2141552, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\QuickTextPaste.exe
|
"C:\Users\user\Desktop\QuickTextPaste.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.32.146.65
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.32.146.65
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
DesktopInfo
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2182000
|
direct allocation
|
page execute and read and write
|
||
5002000
|
remote allocation
|
page execute and read and write
|
||
49E000
|
unkown
|
page execute and read and write
|
||
70C1000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
9D40000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
22EC000
|
direct allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
80E6000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
5567000
|
trusted library allocation
|
page execute and read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
9D50000
|
trusted library allocation
|
page read and write
|
||
5750000
|
heap
|
page read and write
|
||
444000
|
unkown
|
page write copy
|
||
AFBE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
9D40000
|
trusted library allocation
|
page read and write
|
||
4AA000
|
unkown
|
page execute and write copy
|
||
499000
|
unkown
|
page readonly
|
||
9AFE000
|
stack
|
page read and write
|
||
B3FD000
|
stack
|
page read and write
|
||
A2C0000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
4B6000
|
unkown
|
page execute and write copy
|
||
610000
|
heap
|
page read and write
|
||
9D40000
|
trusted library allocation
|
page read and write
|
||
A2C0000
|
trusted library allocation
|
page read and write
|
||
80C9000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
A4D9000
|
heap
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
A2B9000
|
stack
|
page read and write
|
||
231E000
|
direct allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
FEE20000
|
trusted library allocation
|
page execute and read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
9E7E000
|
stack
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
43C000
|
unkown
|
page readonly
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
522C000
|
stack
|
page read and write
|
||
96E3000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
22BC000
|
direct allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
43C000
|
unkown
|
page readonly
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
4FF7000
|
stack
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
50D5000
|
heap
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
4CD000
|
unkown
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
9D40000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
499000
|
unkown
|
page readonly
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
A83E000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
A5B1000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
481000
|
unkown
|
page readonly
|
||
A2D0000
|
trusted library allocation
|
page read and write
|
||
96D0000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page readonly
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
76F000
|
stack
|
page read and write
|
||
A07D000
|
stack
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
A4B0000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
4C9000
|
unkown
|
page execute and write copy
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
90FC000
|
stack
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
AFFC000
|
stack
|
page read and write
|
||
A87F000
|
stack
|
page read and write
|
||
5556000
|
trusted library allocation
|
page execute and read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
4BCB000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
A3B0000
|
heap
|
page read and write
|
||
96D0000
|
trusted library allocation
|
page read and write
|
||
22D9000
|
direct allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
B1FE000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
A2C0000
|
trusted library allocation
|
page read and write
|
||
967E000
|
stack
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
538D000
|
heap
|
page read and write
|
||
96D0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
heap
|
page execute and read and write
|
||
80C1000
|
trusted library allocation
|
page read and write
|
||
A7BE000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
B200000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4AD000
|
unkown
|
page execute and read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
4FE000
|
unkown
|
page execute and read and write
|
||
9CFE000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
52F5000
|
heap
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
4AA000
|
unkown
|
page readonly
|
||
6DF8000
|
trusted library allocation
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
4B9000
|
unkown
|
page execute and read and write
|
||
5730000
|
trusted library allocation
|
page execute and read and write
|
||
5533000
|
trusted library allocation
|
page execute and read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
4FB000
|
unkown
|
page execute and write copy
|
||
5500000
|
heap
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
22CD000
|
direct allocation
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
96C5000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
555A000
|
trusted library allocation
|
page execute and read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
AB7C000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
4C9000
|
unkown
|
page readonly
|
||
9CF000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
52C8000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
92FD000
|
stack
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page read and write
|
||
AD7D000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
A0BC000
|
stack
|
page read and write
|
||
4FB000
|
unkown
|
page readonly
|
||
A2F0000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
96E0000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
22E1000
|
direct allocation
|
page read and write
|
||
5000000
|
remote allocation
|
page execute and read and write
|
||
5756000
|
heap
|
page read and write
|
||
4B6000
|
unkown
|
page readonly
|
||
4BE000
|
unkown
|
page readonly
|
||
2180000
|
direct allocation
|
page execute and read and write
|
||
7606000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4BE000
|
unkown
|
page execute and write copy
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
52EA000
|
heap
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
6DB0000
|
trusted library allocation
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
5562000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
98F0000
|
heap
|
page execute and read and write
|
||
556B000
|
trusted library allocation
|
page execute and read and write
|
||
660000
|
heap
|
page read and write
|
||
9D40000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
ADBC000
|
stack
|
page read and write
|
||
70BF000
|
stack
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
553D000
|
trusted library allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
4C1000
|
unkown
|
page execute and read and write
|
||
A2C0000
|
heap
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
A5B0000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
||
9E40000
|
trusted library allocation
|
page read and write
|
||
444000
|
unkown
|
page write copy
|
||
7DA000
|
heap
|
page read and write
|
||
96C0000
|
trusted library allocation
|
page read and write
|
There are 238 hidden memdumps, click here to show them.