Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
7.5RabbitFix_V9.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ixkyfz5h.ovy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0s0kxo5.nzp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\7.5RabbitFix_V9.exe
|
"C:\Users\user\Desktop\7.5RabbitFix_V9.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D4F000
|
heap
|
page read and write
|
||
7F2000
|
unkown
|
page readonly
|
||
7FF849020000
|
trusted library allocation
|
page execute and read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
1B550000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
D39000
|
heap
|
page read and write
|
||
1B77D000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7F8000
|
unkown
|
page readonly
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1BD5B000
|
stack
|
page read and write
|
||
7FF848FC6000
|
trusted library allocation
|
page read and write
|
||
7FF4C4470000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
7F4000
|
unkown
|
page readonly
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1BB5E000
|
stack
|
page read and write
|
||
3005000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
heap
|
page execute and read and write
|
||
2D54000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
2EEF000
|
trusted library allocation
|
page read and write
|
||
7FF848E28000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1B4E0000
|
heap
|
page execute and read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
3098000
|
trusted library allocation
|
page read and write
|
||
7FF000
|
unkown
|
page readonly
|
||
3036000
|
trusted library allocation
|
page read and write
|
||
12B7F000
|
trusted library allocation
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
1C6E8000
|
stack
|
page read and write
|
||
D81000
|
heap
|
page read and write
|
||
30A4000
|
trusted library allocation
|
page read and write
|
||
1B78A000
|
heap
|
page read and write
|
||
7FF848FF7000
|
trusted library allocation
|
page read and write
|
||
12B11000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
3094000
|
trusted library allocation
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
7FF848FC9000
|
trusted library allocation
|
page read and write
|
||
1B7F8000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
954000
|
stack
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
1B09D000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
1B7D8000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
F53000
|
trusted library allocation
|
page read and write
|
||
1B4DE000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1BA5E000
|
stack
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
trusted library allocation
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
D7B000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
1B7DB000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
heap
|
page read and write
|
||
7E2000
|
unkown
|
page readonly
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848FB8000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
12B1F000
|
trusted library allocation
|
page read and write
|
||
1B680000
|
heap
|
page read and write
|
||
1B7E2000
|
heap
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
FE0000
|
heap
|
page read and write
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1AE96000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1B77F000
|
heap
|
page read and write
|
There are 110 hidden memdumps, click here to show them.