Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
65567 DHL 647765656798860.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\epistemology
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\65567 DHL 647765656798860.exe
|
"C:\Users\user\Desktop\65567 DHL 647765656798860.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\65567 DHL 647765656798860.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
49BD000
|
direct allocation
|
page read and write
|
||
3023000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
3C32000
|
heap
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
3FA2000
|
heap
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
813000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
B01000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
690000
|
system
|
page execute and read and write
|
||
6E0000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
67C000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3E50000
|
heap
|
page read and write
|
||
4186000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
C9A000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
3229000
|
heap
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
3F40000
|
heap
|
page read and write
|
||
3001000
|
heap
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
4A2E000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
3429000
|
direct allocation
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
3642000
|
direct allocation
|
page execute and read and write
|
||
349E000
|
direct allocation
|
page execute and read and write
|
||
813000
|
heap
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
35CD000
|
direct allocation
|
page execute and read and write
|
||
3100000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
456E000
|
heap
|
page read and write
|
||
3C30000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
4051000
|
heap
|
page read and write
|
||
402D000
|
heap
|
page read and write
|
||
445F000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
46F0000
|
direct allocation
|
page read and write
|
||
4A2E000
|
direct allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
4A2E000
|
direct allocation
|
page read and write
|
||
3F3D000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
329E000
|
heap
|
page read and write
|
||
46F0000
|
direct allocation
|
page read and write
|
||
2F79000
|
heap
|
page read and write
|
||
4048000
|
heap
|
page execute and read and write
|
||
813000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4A2E000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
145F000
|
stack
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
46F0000
|
direct allocation
|
page read and write
|
||
4A2E000
|
direct allocation
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
4A2E000
|
direct allocation
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
A12000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
813000
|
heap
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
35D1000
|
direct allocation
|
page execute and read and write
|
||
3300000
|
direct allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page write copy
|
||
46F0000
|
direct allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
402D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A05000
|
heap
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
46F0000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
C6E000
|
heap
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4051000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
400E000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
3FE9000
|
heap
|
page read and write
|
||
4051000
|
heap
|
page read and write
|
||
46F0000
|
direct allocation
|
page read and write
|
||
3065000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
410F000
|
heap
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
3FDF000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
46F0000
|
direct allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
410E000
|
heap
|
page read and write
|
||
4813000
|
direct allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
4050000
|
heap
|
page read and write
|
||
342D000
|
direct allocation
|
page execute and read and write
|
||
A85000
|
heap
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
4067000
|
heap
|
page read and write
|
||
49BD000
|
direct allocation
|
page read and write
|
||
ECF000
|
stack
|
page read and write
|
||
4038000
|
heap
|
page read and write
|
||
3F94000
|
heap
|
page read and write
|
||
4A2E000
|
direct allocation
|
page read and write
|
||
3FD1000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4890000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
3F52000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
C20000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
There are 172 hidden memdumps, click here to show them.