Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DHL_734825514200.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_734825514200.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_14d1iv1g.4xt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_20mui45p.w2d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2wzepedb.r4c.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcxw0qdb.yvy.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DHL_734825514200.exe
|
"C:\Users\user\Desktop\DHL_734825514200.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DHL_734825514200.exe"
|
||
C:\Users\user\Desktop\DHL_734825514200.exe
|
"C:\Users\user\Desktop\DHL_734825514200.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.dyn.com/
|
unknown
|
||
http://mail.saludsanjuan.cl
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://saludsanjuan.cl
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
saludsanjuan.cl
|
138.186.9.97
|
||
mail.saludsanjuan.cl
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
138.186.9.97
|
saludsanjuan.cl
|
Chile
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E46000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
273E000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library section
|
page read and write
|
||
3811000
|
trusted library allocation
|
page read and write
|
||
4131000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
4E1C000
|
heap
|
page read and write
|
||
10DA000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
6E3000
|
heap
|
page read and write
|
||
10AD000
|
trusted library allocation
|
page execute and read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
6941000
|
trusted library allocation
|
page read and write
|
||
86DE000
|
stack
|
page read and write
|
||
138D000
|
trusted library allocation
|
page execute and read and write
|
||
34D1000
|
trusted library allocation
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
7E5D000
|
stack
|
page read and write
|
||
5C0000
|
trusted library allocation
|
page read and write
|
||
3E59000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
99B000
|
trusted library allocation
|
page read and write
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
98C000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
994000
|
trusted library allocation
|
page read and write
|
||
3E19000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
heap
|
page execute and read and write
|
||
63EC000
|
trusted library allocation
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
2E5A000
|
trusted library allocation
|
page read and write
|
||
58FF000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page execute and read and write
|
||
12000
|
unkown
|
page readonly
|
||
68C0000
|
heap
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
6540000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
trusted library allocation
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
53C4000
|
trusted library allocation
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
2E3C000
|
trusted library allocation
|
page read and write
|
||
36AE000
|
trusted library allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
6902000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page execute and read and write
|
||
64E000
|
heap
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
3527000
|
trusted library allocation
|
page read and write
|
||
C85000
|
trusted library allocation
|
page read and write
|
||
10A4000
|
trusted library allocation
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
580000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page execute and read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
2568000
|
trusted library allocation
|
page read and write
|
||
610000
|
trusted library allocation
|
page execute and read and write
|
||
2B62000
|
trusted library allocation
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
5D2000
|
trusted library allocation
|
page read and write
|
||
821F000
|
stack
|
page read and write
|
||
4BB0000
|
trusted library section
|
page read and write
|
||
5A3000
|
trusted library allocation
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page execute and read and write
|
||
3575000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page execute and read and write
|
||
9B6000
|
trusted library allocation
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
10E6000
|
heap
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
6547000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
45CC000
|
stack
|
page read and write
|
||
845E000
|
stack
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
5DB000
|
trusted library allocation
|
page execute and read and write
|
||
811E000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page execute and read and write
|
||
4A03000
|
heap
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
C7F000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
2E53000
|
trusted library allocation
|
page read and write
|
||
5460000
|
heap
|
page execute and read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
10A3000
|
trusted library allocation
|
page execute and read and write
|
||
4EED000
|
stack
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
6460000
|
trusted library allocation
|
page execute and read and write
|
||
8AA2000
|
trusted library allocation
|
page read and write
|
||
14A000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
24CE000
|
stack
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
stack
|
page read and write
|
||
3DF9000
|
trusted library allocation
|
page read and write
|
||
869E000
|
stack
|
page read and write
|
||
37D1000
|
trusted library allocation
|
page read and write
|
||
593000
|
trusted library allocation
|
page execute and read and write
|
||
34D9000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
35C3000
|
trusted library allocation
|
page read and write
|
||
2B5A000
|
trusted library allocation
|
page execute and read and write
|
||
57E000
|
stack
|
page read and write
|
||
4E44000
|
heap
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page execute and read and write
|
||
F89000
|
stack
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
6406000
|
trusted library allocation
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
6550000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
5C6000
|
trusted library allocation
|
page execute and read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
heap
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
4AB2000
|
trusted library allocation
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
9C2000
|
trusted library allocation
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
630000
|
trusted library allocation
|
page read and write
|
||
542C000
|
stack
|
page read and write
|
||
10B8000
|
heap
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
831D000
|
stack
|
page read and write
|
||
566D000
|
stack
|
page read and write
|
||
8AED000
|
stack
|
page read and write
|
||
54B3000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
6B30000
|
heap
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
68C4000
|
heap
|
page read and write
|
||
9BD000
|
trusted library allocation
|
page read and write
|
||
594000
|
trusted library allocation
|
page read and write
|
||
801E000
|
stack
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
6410000
|
trusted library allocation
|
page execute and read and write
|
||
10000
|
unkown
|
page readonly
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
645D000
|
stack
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
2B56000
|
trusted library allocation
|
page execute and read and write
|
||
10E3000
|
heap
|
page read and write
|
||
2B6B000
|
trusted library allocation
|
page execute and read and write
|
||
5CA000
|
trusted library allocation
|
page execute and read and write
|
||
2C80000
|
heap
|
page execute and read and write
|
||
137E000
|
stack
|
page read and write
|
||
58B0000
|
trusted library section
|
page read and write
|
||
9B1000
|
trusted library allocation
|
page read and write
|
||
232E000
|
stack
|
page read and write
|
||
8AA0000
|
trusted library allocation
|
page read and write
|
||
8330000
|
heap
|
page read and write
|
||
9AE000
|
trusted library allocation
|
page read and write
|
||
E89000
|
stack
|
page read and write
|
||
8320000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
64FE000
|
stack
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
5D7000
|
trusted library allocation
|
page execute and read and write
|
||
5A3F000
|
stack
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
5AD000
|
trusted library allocation
|
page execute and read and write
|
||
1B0000
|
heap
|
page read and write
|
||
859E000
|
stack
|
page read and write
|
||
895C000
|
stack
|
page read and write
|
||
855F000
|
stack
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
2B67000
|
trusted library allocation
|
page execute and read and write
|
||
4D8C000
|
stack
|
page read and write
|
||
2BD8000
|
trusted library allocation
|
page read and write
|
||
59D000
|
trusted library allocation
|
page execute and read and write
|
||
7E1E000
|
stack
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
8A5C000
|
stack
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
8BEE000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
5C2000
|
trusted library allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page read and write
|
||
8A60000
|
heap
|
page read and write
|
||
6B6F000
|
stack
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
3DF1000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
There are 226 hidden memdumps, click here to show them.