Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Attendance list.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\autE4E0.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autE51F.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\benting
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\conged
|
ASCII text, with very long lines (28756), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Attendance list.exe
|
"C:\Users\user\Desktop\Attendance list.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\Attendance list.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3570000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
4149000
|
direct allocation
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
3FA3000
|
direct allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2E02000
|
heap
|
page read and write
|
||
3F53000
|
direct allocation
|
page read and write
|
||
40F9000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
39A0000
|
heap
|
page read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
35B0000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
1CCE000
|
stack
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
1024000
|
heap
|
page read and write
|
||
251000
|
unkown
|
page execute read
|
||
109E000
|
heap
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
416E000
|
direct allocation
|
page read and write
|
||
32F0000
|
direct allocation
|
page read and write
|
||
41BE000
|
direct allocation
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
305000
|
unkown
|
page readonly
|
||
2E13000
|
heap
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
41BE000
|
direct allocation
|
page read and write
|
||
11E9000
|
heap
|
page read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
2B7D000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3DE0000
|
direct allocation
|
page read and write
|
||
3FA3000
|
direct allocation
|
page read and write
|
||
318000
|
unkown
|
page readonly
|
||
F7E000
|
stack
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
369E000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
3E30000
|
direct allocation
|
page read and write
|
||
4149000
|
direct allocation
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
11E9000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
3FD0000
|
direct allocation
|
page read and write
|
||
41BE000
|
direct allocation
|
page read and write
|
||
3012000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
A89000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3FA3000
|
direct allocation
|
page read and write
|
||
3423000
|
heap
|
page read and write
|
||
3F53000
|
direct allocation
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
3940000
|
heap
|
page read and write
|
||
2DF000
|
unkown
|
page readonly
|
||
3829000
|
direct allocation
|
page execute and read and write
|
||
2E13000
|
heap
|
page read and write
|
||
389E000
|
direct allocation
|
page execute and read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3C01000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
110F000
|
heap
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
416E000
|
direct allocation
|
page read and write
|
||
2DF000
|
unkown
|
page readonly
|
||
10B5000
|
heap
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
3700000
|
direct allocation
|
page execute and read and write
|
||
416E000
|
direct allocation
|
page read and write
|
||
251000
|
unkown
|
page execute read
|
||
2E13000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
10B6000
|
heap
|
page read and write
|
||
362D000
|
heap
|
page read and write
|
||
3629000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
40FD000
|
direct allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
40F9000
|
direct allocation
|
page read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
40FD000
|
direct allocation
|
page read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
3F53000
|
direct allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
3017000
|
heap
|
page read and write
|
||
30F000
|
unkown
|
page write copy
|
||
2E13000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
39A4000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
382D000
|
direct allocation
|
page execute and read and write
|
||
10B5000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
2B3D000
|
stack
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
40FD000
|
direct allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
20CF000
|
stack
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
30F000
|
unkown
|
page read and write
|
||
40F9000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
4149000
|
direct allocation
|
page read and write
|
||
35B0000
|
direct allocation
|
page read and write
|
||
3FD0000
|
direct allocation
|
page read and write
|
||
E8C000
|
stack
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
414D000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
35C0000
|
direct allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
E6B000
|
stack
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
305000
|
unkown
|
page readonly
|
||
10B5000
|
heap
|
page read and write
|
||
103D000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
3E30000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
3A42000
|
direct allocation
|
page execute and read and write
|
||
2E13000
|
heap
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
39D1000
|
direct allocation
|
page execute and read and write
|
||
1033000
|
heap
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
313000
|
unkown
|
page write copy
|
||
318000
|
unkown
|
page readonly
|
||
414D000
|
direct allocation
|
page read and write
|
||
3960000
|
direct allocation
|
page execute and read and write
|
||
414D000
|
direct allocation
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
3101000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
3017000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
3FD0000
|
direct allocation
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
39CD000
|
direct allocation
|
page execute and read and write
|
||
119E000
|
heap
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
11BC000
|
heap
|
page read and write
|
||
3E30000
|
direct allocation
|
page read and write
|
There are 175 hidden memdumps, click here to show them.