Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LOI REQUEST.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut9044.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\poufs
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LOI REQUEST.exe
|
"C:\Users\user\Desktop\LOI REQUEST.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\LOI REQUEST.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3A0000
|
system
|
page execute and read and write
|
||
3350000
|
direct allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
13DD000
|
stack
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
4D4000
|
unkown
|
page readonly
|
||
419D000
|
direct allocation
|
page read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
2A05000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
49D000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
420E000
|
direct allocation
|
page read and write
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
2A12000
|
heap
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
3FF3000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
4149000
|
direct allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
13BB000
|
stack
|
page read and write
|
||
32D000
|
stack
|
page read and write
|
||
1655000
|
heap
|
page read and write
|
||
1708000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
312D000
|
direct allocation
|
page execute and read and write
|
||
14D0000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
41BE000
|
direct allocation
|
page read and write
|
||
27C0000
|
direct allocation
|
page read and write
|
||
3FF3000
|
direct allocation
|
page read and write
|
||
4BE000
|
unkown
|
page readonly
|
||
163B000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2D23000
|
heap
|
page read and write
|
||
1707000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
3F0000
|
heap
|
page read and write
|
||
3B30000
|
heap
|
page read and write
|
||
2A17000
|
heap
|
page read and write
|
||
3FA3000
|
direct allocation
|
page read and write
|
||
165A000
|
heap
|
page read and write
|
||
1655000
|
heap
|
page read and write
|
||
2A05000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
165A000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
3B34000
|
heap
|
page read and write
|
||
420E000
|
direct allocation
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
4199000
|
direct allocation
|
page read and write
|
||
41BE000
|
direct allocation
|
page read and write
|
||
27C0000
|
direct allocation
|
page read and write
|
||
2A17000
|
heap
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2F9E000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
16A1000
|
heap
|
page read and write
|
||
730000
|
direct allocation
|
page read and write
|
||
319E000
|
direct allocation
|
page execute and read and write
|
||
2F2D000
|
heap
|
page read and write
|
||
1655000
|
heap
|
page execute and read and write
|
||
4CA000
|
unkown
|
page read and write
|
||
3AE0000
|
direct allocation
|
page read and write
|
||
3000000
|
direct allocation
|
page execute and read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
4CF000
|
unkown
|
page write copy
|
||
411000
|
unkown
|
page execute read
|
||
4020000
|
direct allocation
|
page read and write
|
||
414D000
|
direct allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
4199000
|
direct allocation
|
page read and write
|
||
32CD000
|
direct allocation
|
page execute and read and write
|
||
2A00000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
161A000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
D3A000
|
stack
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
3FF3000
|
direct allocation
|
page read and write
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
3FA3000
|
direct allocation
|
page read and write
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
1E0E000
|
stack
|
page read and write
|
||
36D000
|
stack
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
414D000
|
direct allocation
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
2B01000
|
heap
|
page read and write
|
||
3342000
|
direct allocation
|
page execute and read and write
|
||
DB0000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
2E01000
|
heap
|
page read and write
|
||
2802000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
41BE000
|
direct allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
420E000
|
direct allocation
|
page read and write
|
||
3FA3000
|
direct allocation
|
page read and write
|
||
4149000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
4199000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
33A0000
|
direct allocation
|
page read and write
|
||
1655000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
2813000
|
heap
|
page read and write
|
||
3FA3000
|
direct allocation
|
page read and write
|
||
419D000
|
direct allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
4BE000
|
unkown
|
page readonly
|
||
4D4000
|
unkown
|
page readonly
|
||
4020000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
3129000
|
direct allocation
|
page execute and read and write
|
||
4149000
|
direct allocation
|
page read and write
|
||
4149000
|
direct allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
414D000
|
direct allocation
|
page read and write
|
||
49D000
|
unkown
|
page readonly
|
||
23D0000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
4CA000
|
unkown
|
page write copy
|
||
DA0000
|
heap
|
page read and write
|
||
414D000
|
direct allocation
|
page read and write
|
||
1707000
|
heap
|
page read and write
|
||
41BE000
|
direct allocation
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
16A8000
|
heap
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
32D1000
|
direct allocation
|
page execute and read and write
|
||
419D000
|
direct allocation
|
page read and write
|
||
2813000
|
heap
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
1663000
|
heap
|
page read and write
|
There are 152 hidden memdumps, click here to show them.