Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ 3100185 MAHAD.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\autE378.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\indivisibility
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe
|
"C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3160000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
27F0000
|
heap
|
page read and write
|
||
3D39000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3D3D000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3D5E000
|
direct allocation
|
page read and write
|
||
52A000
|
unkown
|
page write copy
|
||
301F000
|
stack
|
page read and write
|
||
3B93000
|
direct allocation
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
31B0000
|
direct allocation
|
page read and write
|
||
3642000
|
direct allocation
|
page execute and read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2D01000
|
heap
|
page read and write
|
||
4FD000
|
unkown
|
page readonly
|
||
3A20000
|
direct allocation
|
page read and write
|
||
31B0000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
329E000
|
heap
|
page read and write
|
||
3D3D000
|
direct allocation
|
page read and write
|
||
3D39000
|
direct allocation
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1105000
|
heap
|
page execute and read and write
|
||
1148000
|
heap
|
page read and write
|
||
3B93000
|
direct allocation
|
page read and write
|
||
3C10000
|
direct allocation
|
page read and write
|
||
A59000
|
stack
|
page read and write
|
||
3D39000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
51E000
|
unkown
|
page readonly
|
||
35D1000
|
direct allocation
|
page execute and read and write
|
||
2A13000
|
heap
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
1152000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
3B43000
|
direct allocation
|
page read and write
|
||
3B43000
|
direct allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
3C10000
|
direct allocation
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
3CED000
|
direct allocation
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
35E0000
|
direct allocation
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
276D000
|
stack
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
3023000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3CE9000
|
direct allocation
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
3BC0000
|
direct allocation
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3A70000
|
direct allocation
|
page read and write
|
||
E1B000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
534000
|
unkown
|
page readonly
|
||
3DAE000
|
direct allocation
|
page read and write
|
||
3D5E000
|
direct allocation
|
page read and write
|
||
3634000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
272D000
|
stack
|
page read and write
|
||
3BC0000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3429000
|
direct allocation
|
page execute and read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3BC0000
|
direct allocation
|
page read and write
|
||
10FB000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
1CBF000
|
stack
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
3B93000
|
direct allocation
|
page read and write
|
||
10CE000
|
heap
|
page read and write
|
||
2A02000
|
heap
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
349E000
|
direct allocation
|
page execute and read and write
|
||
3630000
|
heap
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
31C0000
|
direct allocation
|
page read and write
|
||
3300000
|
direct allocation
|
page execute and read and write
|
||
2A13000
|
heap
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
1114000
|
heap
|
page read and write
|
||
3CE9000
|
direct allocation
|
page read and write
|
||
3A70000
|
direct allocation
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
52A000
|
unkown
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
3D3D000
|
direct allocation
|
page read and write
|
||
E5D000
|
stack
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3987000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
3DAE000
|
direct allocation
|
page read and write
|
||
10FA000
|
heap
|
page read and write
|
||
11F9000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
342D000
|
direct allocation
|
page execute and read and write
|
||
470000
|
unkown
|
page readonly
|
||
3229000
|
heap
|
page read and write
|
||
3CED000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
3A20000
|
direct allocation
|
page read and write
|
||
51E000
|
unkown
|
page readonly
|
||
3DAE000
|
direct allocation
|
page read and write
|
||
3CE9000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
12B1000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
3A70000
|
direct allocation
|
page read and write
|
||
FED000
|
stack
|
page read and write
|
||
471000
|
unkown
|
page execute read
|
||
2A13000
|
heap
|
page read and write
|
||
35CD000
|
direct allocation
|
page execute and read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
52F000
|
unkown
|
page write copy
|
||
3C10000
|
direct allocation
|
page read and write
|
||
3A20000
|
direct allocation
|
page read and write
|
||
3801000
|
heap
|
page read and write
|
||
534000
|
unkown
|
page readonly
|
||
3CED000
|
direct allocation
|
page read and write
|
||
3D5E000
|
direct allocation
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
4FD000
|
unkown
|
page readonly
|
||
3100000
|
heap
|
page read and write
|
||
2C12000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
3B43000
|
direct allocation
|
page read and write
|
There are 153 hidden memdumps, click here to show them.