Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
3.ps1
|
ASCII text, with very long lines (12594), with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5noeq2o4.gsw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngfgu5wb.msr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WMNT3I4XNG9Y59JGGE9M.temp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\3.ps1"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
3.78.244.11
|
|||
http://3.78.244.11:8080/dot.gif
|
3.78.244.11
|
||
http://3.78.244.11:8080/dot.gifG
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://3.78.244.11:8080/dot.gif~
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://3.78.244.11:8080/dot.gif11:8080/dot.gif
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://3.78.244.11:8080/dot.gifD
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://3.78.244.11:8080/dot.gifllV
|
unknown
|
||
http://3.78.244.11:8080/dot.gifPDL
|
unknown
|
||
http://3.78.244.11:8080/dot.gifll
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://3.78.244.11:8080/dot.gifU
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://3.78.244.11:8080/dot.gife
|
unknown
|
||
http://3.78.244.11:8080/dot.gifystem32
|
unknown
|
||
http://3.78.244.11:8080/dot.gif9.0
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://127.0.0.1:%u/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://3.78.244.11:8080/dot.gif1
|
unknown
|
||
http://crl.v
|
unknown
|
||
http://3.78.244.11:8080/dot.gif2
|
unknown
|
There are 18 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.78.244.11
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22EF9EB0000
|
heap
|
page read and write
|
||
22EFA0B0000
|
direct allocation
|
page execute and read and write
|
||
22EF1AEF000
|
trusted library allocation
|
page read and write
|
||
22EF1952000
|
trusted library allocation
|
page read and write
|
||
22EE28B3000
|
trusted library allocation
|
page read and write
|
||
22EF9B10000
|
direct allocation
|
page execute and read and write
|
||
22EDFA90000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
22EE2E6B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B957000
|
trusted library allocation
|
page read and write
|
||
A30D8CC000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
22EF9CD3000
|
heap
|
page read and write
|
||
22EF98E4000
|
heap
|
page read and write
|
||
22EFA103000
|
direct allocation
|
page execute and read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
22EFA0FE000
|
direct allocation
|
page execute and read and write
|
||
22EDF8C0000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
22EE1966000
|
trusted library allocation
|
page read and write
|
||
22EF9D9D000
|
heap
|
page read and write
|
||
A30CCFF000
|
stack
|
page read and write
|
||
22EF9A2A000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
22EF9BA0000
|
heap
|
page execute and read and write
|
||
22EE12A0000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
22EF9CE5000
|
heap
|
page read and write
|
||
22EDF964000
|
heap
|
page read and write
|
||
22EDF9AC000
|
heap
|
page read and write
|
||
22EDF942000
|
heap
|
page read and write
|
||
22EDF966000
|
heap
|
page read and write
|
||
22EF9BA7000
|
heap
|
page execute and read and write
|
||
A30D782000
|
stack
|
page read and write
|
||
22EF9D98000
|
heap
|
page read and write
|
||
22EDFAB0000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
22EF9CE3000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
22EF9A2F000
|
heap
|
page read and write
|
||
A30C8FE000
|
stack
|
page read and write
|
||
22EE1370000
|
trusted library allocation
|
page read and write
|
||
22EE13C5000
|
heap
|
page read and write
|
||
22EDF97E000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
22EF9D9F000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
A30C2B5000
|
stack
|
page read and write
|
||
22EDF8C9000
|
heap
|
page read and write
|
||
22EF9CD6000
|
heap
|
page read and write
|
||
22EE1B08000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
22EE1740000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
22EDFC80000
|
heap
|
page read and write
|
||
22EF9DB2000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
22EF9BD0000
|
heap
|
page read and write
|
||
A30CC7F000
|
stack
|
page read and write
|
||
22EDFC85000
|
heap
|
page read and write
|
||
22EE301D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
22EDF96A000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
22EF18F0000
|
trusted library allocation
|
page read and write
|
||
22EF9A73000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
22EF190A000
|
trusted library allocation
|
page read and write
|
||
22EE3A1D000
|
trusted library allocation
|
page read and write
|
||
22EF9BB0000
|
heap
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
22EE18A3000
|
trusted library allocation
|
page read and write
|
||
22EE1360000
|
trusted library section
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
22EF9AEE000
|
heap
|
page read and write
|
||
22EE13C0000
|
heap
|
page read and write
|
||
22EF18E1000
|
trusted library allocation
|
page read and write
|
||
22EF9D85000
|
heap
|
page read and write
|
||
22EF9CB0000
|
heap
|
page read and write
|
||
22EF9A7D000
|
heap
|
page read and write
|
||
22EE1340000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
22EE18D0000
|
heap
|
page read and write
|
||
22EF9DA2000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
22EE18A0000
|
trusted library allocation
|
page read and write
|
||
22EFA101000
|
direct allocation
|
page execute and read and write
|
||
22EE1350000
|
trusted library section
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
22EE1380000
|
heap
|
page readonly
|
||
22EDF9A6000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
22EE1390000
|
trusted library allocation
|
page read and write
|
||
7DF4B5080000
|
trusted library allocation
|
page execute and read and write
|
||
22EDF95E000
|
heap
|
page read and write
|
||
22EDF8D2000
|
heap
|
page read and write
|
||
22EF1A27000
|
trusted library allocation
|
page read and write
|
||
22EF9CCC000
|
heap
|
page read and write
|
||
22EE2508000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
22EFA0FB000
|
direct allocation
|
page execute and read and write
|
||
A30C97D000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
22EDF8A0000
|
heap
|
page read and write
|
||
22EE3019000
|
trusted library allocation
|
page read and write
|
||
A30D7CF000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
A30CDFB000
|
stack
|
page read and write
|
||
22EF99F0000
|
heap
|
page read and write
|
||
A30C77D000
|
stack
|
page read and write
|
||
22EE18E1000
|
trusted library allocation
|
page read and write
|
||
22EF9A86000
|
heap
|
page read and write
|
||
22EE1820000
|
heap
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
22EE1800000
|
heap
|
page execute and read and write
|
||
22EE2F53000
|
trusted library allocation
|
page read and write
|
||
22EDF947000
|
heap
|
page read and write
|
||
22EF9DBA000
|
heap
|
page read and write
|
||
22EF9DB6000
|
heap
|
page read and write
|
||
A30CD7E000
|
stack
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
22EF9A6F000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
22EE1310000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
22EE1710000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
22EF9D96000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
22EF9D4B000
|
heap
|
page read and write
|
||
22EFA0F8000
|
direct allocation
|
page execute and read and write
|
There are 137 hidden memdumps, click here to show them.