Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z37CurriculumVitaeIsabelGonzalez.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Archimago
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut69DA.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut6A77.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\teres
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\z37CurriculumVitaeIsabelGonzalez.exe
|
"C:\Users\user\Desktop\z37CurriculumVitaeIsabelGonzalez.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\z37CurriculumVitaeIsabelGonzalez.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
system
|
page execute and read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
3200000
|
direct allocation
|
page execute and read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
3693000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2E00000
|
direct allocation
|
page read and write
|
||
3329000
|
direct allocation
|
page execute and read and write
|
||
2A13000
|
heap
|
page read and write
|
||
194E000
|
stack
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
CC2000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
312D000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
CB4000
|
heap
|
page read and write
|
||
38AE000
|
direct allocation
|
page read and write
|
||
B6E000
|
unkown
|
page write copy
|
||
34D1000
|
direct allocation
|
page execute and read and write
|
||
9CF000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
38AE000
|
direct allocation
|
page read and write
|
||
3570000
|
direct allocation
|
page read and write
|
||
383D000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
2D01000
|
heap
|
page read and write
|
||
3129000
|
heap
|
page read and write
|
||
2C12000
|
heap
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
B3F000
|
unkown
|
page readonly
|
||
3839000
|
direct allocation
|
page read and write
|
||
3520000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
C20000
|
direct allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
3570000
|
direct allocation
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
3643000
|
direct allocation
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
CC3000
|
heap
|
page read and write
|
||
3542000
|
direct allocation
|
page execute and read and write
|
||
9FC000
|
stack
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
332D000
|
direct allocation
|
page execute and read and write
|
||
C74000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
319E000
|
heap
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
D1A000
|
heap
|
page read and write
|
||
38AE000
|
direct allocation
|
page read and write
|
||
385E000
|
direct allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
385E000
|
direct allocation
|
page read and write
|
||
D03000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
283D000
|
stack
|
page read and write
|
||
339E000
|
direct allocation
|
page execute and read and write
|
||
3C0000
|
heap
|
page read and write
|
||
3693000
|
direct allocation
|
page read and write
|
||
3BE000
|
stack
|
page read and write
|
||
383D000
|
direct allocation
|
page read and write
|
||
3520000
|
direct allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
3839000
|
direct allocation
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
CC2000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
330000
|
heap
|
page read and write
|
||
37ED000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
B3F000
|
unkown
|
page readonly
|
||
B77000
|
unkown
|
page readonly
|
||
B6E000
|
unkown
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
3601000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
D16000
|
heap
|
page execute and read and write
|
||
2A13000
|
heap
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
3643000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
383D000
|
direct allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
3693000
|
direct allocation
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3643000
|
direct allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
3570000
|
direct allocation
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
37E9000
|
direct allocation
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
B72000
|
unkown
|
page write copy
|
||
D1A000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
AB1000
|
unkown
|
page execute read
|
||
CD4000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
287C000
|
stack
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
D1A000
|
heap
|
page read and write
|
||
385E000
|
direct allocation
|
page read and write
|
||
37ED000
|
direct allocation
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
37ED000
|
direct allocation
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
AB1000
|
unkown
|
page execute read
|
||
3D0000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
CF3000
|
heap
|
page read and write
|
||
2CA000
|
stack
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
3520000
|
direct allocation
|
page read and write
|
||
3839000
|
direct allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
B77000
|
unkown
|
page readonly
|
||
37E9000
|
direct allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
37E9000
|
direct allocation
|
page read and write
|
||
34CD000
|
direct allocation
|
page execute and read and write
|
There are 159 hidden memdumps, click here to show them.