Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
A2028041200SD..exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut164B.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\pensum
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\A2028041200SD..exe
|
"C:\Users\user\Desktop\A2028041200SD..exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\A2028041200SD..exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2F80000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3400000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
3B9E000
|
direct allocation
|
page execute and read and write
|
||
15CF000
|
stack
|
page read and write
|
||
4130000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
E6A000
|
unkown
|
page write copy
|
||
3F90000
|
direct allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
15FC000
|
stack
|
page read and write
|
||
1679000
|
heap
|
page read and write
|
||
425D000
|
direct allocation
|
page read and write
|
||
425D000
|
direct allocation
|
page read and write
|
||
15BB000
|
stack
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
E3D000
|
unkown
|
page readonly
|
||
D2D000
|
stack
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page read and write
|
||
4259000
|
direct allocation
|
page read and write
|
||
4259000
|
direct allocation
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
3CD1000
|
direct allocation
|
page execute and read and write
|
||
163E000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
42CE000
|
direct allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1679000
|
heap
|
page read and write
|
||
3D42000
|
direct allocation
|
page execute and read and write
|
||
3417000
|
heap
|
page read and write
|
||
D3D000
|
stack
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
399E000
|
heap
|
page read and write
|
||
E6A000
|
unkown
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
3CCD000
|
direct allocation
|
page execute and read and write
|
||
3213000
|
heap
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
4130000
|
direct allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
3424000
|
heap
|
page read and write
|
||
4130000
|
direct allocation
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page execute and read and write
|
||
1728000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
E6F000
|
unkown
|
page write copy
|
||
3B2D000
|
direct allocation
|
page execute and read and write
|
||
3213000
|
heap
|
page read and write
|
||
16C2000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
DB1000
|
unkown
|
page execute read
|
||
16DF000
|
heap
|
page read and write
|
||
3B29000
|
direct allocation
|
page execute and read and write
|
||
3405000
|
heap
|
page read and write
|
||
E74000
|
unkown
|
page readonly
|
||
4130000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
22A4000
|
heap
|
page read and write
|
||
4130000
|
direct allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page read and write
|
||
1858000
|
heap
|
page read and write
|
||
425D000
|
direct allocation
|
page read and write
|
||
15DD000
|
stack
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
4130000
|
direct allocation
|
page read and write
|
||
DB0000
|
unkown
|
page readonly
|
||
3213000
|
heap
|
page read and write
|
||
3929000
|
heap
|
page read and write
|
||
E5E000
|
unkown
|
page readonly
|
||
222F000
|
stack
|
page read and write
|
||
E5E000
|
unkown
|
page readonly
|
||
3213000
|
heap
|
page read and write
|
||
42CE000
|
direct allocation
|
page read and write
|
||
2F00000
|
direct allocation
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
42CE000
|
direct allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
40B3000
|
direct allocation
|
page read and write
|
||
3202000
|
heap
|
page read and write
|
||
D6D000
|
stack
|
page read and write
|
||
40B3000
|
direct allocation
|
page read and write
|
||
40B3000
|
direct allocation
|
page read and write
|
||
165D000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page read and write
|
||
42CE000
|
direct allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
1729000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
425D000
|
direct allocation
|
page read and write
|
||
4259000
|
direct allocation
|
page read and write
|
||
3F90000
|
direct allocation
|
page read and write
|
||
C7A000
|
stack
|
page read and write
|
||
3801000
|
heap
|
page read and write
|
||
425D000
|
direct allocation
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
E3D000
|
unkown
|
page readonly
|
||
40B3000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
392D000
|
heap
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
3A00000
|
direct allocation
|
page execute and read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
3F90000
|
direct allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
4259000
|
direct allocation
|
page read and write
|
||
42CE000
|
direct allocation
|
page read and write
|
||
DB1000
|
unkown
|
page execute read
|
||
166D000
|
heap
|
page read and write
|
||
17D2000
|
heap
|
page read and write
|
||
4259000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
E74000
|
unkown
|
page readonly
|
||
3213000
|
heap
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
1E2F000
|
stack
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
2230000
|
direct allocation
|
page read and write
|
||
42CE000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
40B3000
|
direct allocation
|
page read and write
|
||
3723000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
4259000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
40B3000
|
direct allocation
|
page read and write
|
||
3213000
|
heap
|
page read and write
|
||
425D000
|
direct allocation
|
page read and write
|
There are 143 hidden memdumps, click here to show them.