IOC Report
LOI REQUEST.exe

loading gif

Files

File Path
Type
Category
Malicious
LOI REQUEST.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut9044.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\poufs
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LOI REQUEST.exe
"C:\Users\user\Desktop\LOI REQUEST.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\LOI REQUEST.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3A0000
system
page execute and read and write
malicious
3350000
direct allocation
page read and write
malicious
1610000
heap
page read and write
2C00000
heap
page read and write
2813000
heap
page read and write
33A0000
direct allocation
page read and write
13DD000
stack
page read and write
2813000
heap
page read and write
4D4000
unkown
page readonly
419D000
direct allocation
page read and write
3E80000
direct allocation
page read and write
2A05000
heap
page read and write
2813000
heap
page read and write
49D000
unkown
page readonly
410000
unkown
page readonly
420E000
direct allocation
page read and write
3ED0000
direct allocation
page read and write
640000
heap
page read and write
3E80000
direct allocation
page read and write
2A12000
heap
page read and write
4020000
direct allocation
page read and write
2813000
heap
page read and write
720000
heap
page read and write
3FF3000
direct allocation
page read and write
2813000
heap
page read and write
27BE000
stack
page read and write
4149000
direct allocation
page read and write
2DFF000
stack
page read and write
2813000
heap
page read and write
13BB000
stack
page read and write
32D000
stack
page read and write
1655000
heap
page read and write
1708000
heap
page read and write
2CFF000
stack
page read and write
312D000
direct allocation
page execute and read and write
14D0000
heap
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
41BE000
direct allocation
page read and write
27C0000
direct allocation
page read and write
3FF3000
direct allocation
page read and write
4BE000
unkown
page readonly
163B000
heap
page read and write
4070000
direct allocation
page read and write
2813000
heap
page read and write
2D23000
heap
page read and write
1707000
heap
page read and write
410000
unkown
page readonly
3F0000
heap
page read and write
3B30000
heap
page read and write
2A17000
heap
page read and write
3FA3000
direct allocation
page read and write
165A000
heap
page read and write
1655000
heap
page read and write
2A05000
heap
page read and write
610000
heap
page read and write
2813000
heap
page read and write
165A000
heap
page read and write
13CE000
stack
page read and write
3B34000
heap
page read and write
420E000
direct allocation
page read and write
4020000
direct allocation
page read and write
4199000
direct allocation
page read and write
41BE000
direct allocation
page read and write
27C0000
direct allocation
page read and write
2A17000
heap
page read and write
33A0000
direct allocation
page read and write
161E000
heap
page read and write
1661000
heap
page read and write
2813000
heap
page read and write
DFE000
stack
page read and write
2813000
heap
page read and write
2F9E000
heap
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
16A1000
heap
page read and write
730000
direct allocation
page read and write
319E000
direct allocation
page execute and read and write
2F2D000
heap
page read and write
1655000
heap
page execute and read and write
4CA000
unkown
page read and write
3AE0000
direct allocation
page read and write
3000000
direct allocation
page execute and read and write
3E80000
direct allocation
page read and write
4CF000
unkown
page write copy
411000
unkown
page execute read
4020000
direct allocation
page read and write
414D000
direct allocation
page read and write
13FC000
stack
page read and write
4199000
direct allocation
page read and write
32CD000
direct allocation
page execute and read and write
2A00000
heap
page read and write
2813000
heap
page read and write
161A000
heap
page read and write
2813000
heap
page read and write
2E00000
heap
page read and write
D3A000
stack
page read and write
2813000
heap
page read and write
3E80000
direct allocation
page read and write
3FF3000
direct allocation
page read and write
3ED0000
direct allocation
page read and write
3FA3000
direct allocation
page read and write
3ED0000
direct allocation
page read and write
1E0E000
stack
page read and write
36D000
stack
page read and write
33A0000
direct allocation
page read and write
414D000
direct allocation
page read and write
151E000
stack
page read and write
2B01000
heap
page read and write
3342000
direct allocation
page execute and read and write
DB0000
heap
page read and write
2813000
heap
page read and write
2E01000
heap
page read and write
2802000
heap
page read and write
4070000
direct allocation
page read and write
41BE000
direct allocation
page read and write
76E000
stack
page read and write
420E000
direct allocation
page read and write
3FA3000
direct allocation
page read and write
4149000
direct allocation
page read and write
2813000
heap
page read and write
4199000
direct allocation
page read and write
2813000
heap
page read and write
33A0000
direct allocation
page read and write
1655000
heap
page read and write
411000
unkown
page execute read
2813000
heap
page read and write
3FA3000
direct allocation
page read and write
419D000
direct allocation
page read and write
164B000
heap
page read and write
2F29000
heap
page read and write
4BE000
unkown
page readonly
4D4000
unkown
page readonly
4020000
direct allocation
page read and write
2813000
heap
page read and write
4070000
direct allocation
page read and write
3129000
direct allocation
page execute and read and write
4149000
direct allocation
page read and write
4149000
direct allocation
page read and write
2800000
heap
page read and write
2813000
heap
page read and write
1686000
heap
page read and write
2813000
heap
page read and write
414D000
direct allocation
page read and write
49D000
unkown
page readonly
23D0000
heap
page read and write
1600000
heap
page read and write
4CA000
unkown
page write copy
DA0000
heap
page read and write
414D000
direct allocation
page read and write
1707000
heap
page read and write
41BE000
direct allocation
page read and write
1654000
heap
page read and write
16A8000
heap
page read and write
2813000
heap
page read and write
32D1000
direct allocation
page execute and read and write
419D000
direct allocation
page read and write
2813000
heap
page read and write
220E000
stack
page read and write
1663000
heap
page read and write
There are 152 hidden memdumps, click here to show them.