title: QuarksPwDump Dump File status: experimental description: Detects a dump file written by QuarksPwDump password dumper references: - https://jpcertcc.github.io/ToolAnalysisResultSheet/details/QuarksPWDump.htm author: Florian Roth date: 2018/02/10 level: critical logsource: product: windows service: sysmon detection: selection: # Sysmon: File Creation (ID 11) EventID: 11 TargetFilename: '*\AppData\Local\Temp\SAM-*.dmp*' condition: selection falsepositives: - Unknown