Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Wind0ws7l0aderV3.4875.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\WindowsLoader.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut2507.tmp
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Wind0ws7l0aderV3.4875.exe
|
C:\Users\user\Desktop\Wind0ws7l0aderV3.4875.exe
|
||
C:\Users\user\AppData\Local\Temp\WindowsLoader.exe
|
C:\Users\user\AppData\Local\Temp\WindowsLoader.exe
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6E1000
|
unkown
|
page execute read
|
||
6C7000
|
heap
|
page read and write
|
||
26B7000
|
direct allocation
|
page readonly
|
||
8CA000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
26E0000
|
direct allocation
|
page read and write
|
||
79E000
|
unkown
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
938000
|
heap
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
5C4000
|
unkown
|
page execute and read and write
|
||
29DE000
|
heap
|
page read and write
|
||
53D2000
|
heap
|
page read and write
|
||
269B000
|
direct allocation
|
page read and write
|
||
5FA000
|
unkown
|
page execute and read and write
|
||
61C000
|
unkown
|
page read and write
|
||
58B000
|
unkown
|
page execute and write copy
|
||
9A8000
|
heap
|
page read and write
|
||
540A000
|
heap
|
page read and write
|
||
1C2E000
|
stack
|
page read and write
|
||
2FD1000
|
heap
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
2707000
|
direct allocation
|
page read and write
|
||
610000
|
unkown
|
page execute and read and write
|
||
26F7000
|
direct allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
3906000
|
heap
|
page read and write
|
||
2701000
|
direct allocation
|
page execute read
|
||
3817000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
270F000
|
direct allocation
|
page read and write
|
||
DA8000
|
direct allocation
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
C40000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
3819000
|
heap
|
page read and write
|
||
29A6000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
26D6000
|
direct allocation
|
page readonly
|
||
270B000
|
direct allocation
|
page read and write
|
||
2698000
|
direct allocation
|
page readonly
|
||
202E000
|
stack
|
page read and write
|
||
2140000
|
heap
|
page read and write
|
||
978000
|
heap
|
page read and write
|
||
617000
|
unkown
|
page execute and read and write
|
||
DA7000
|
direct allocation
|
page readonly
|
||
2730000
|
direct allocation
|
page execute and read and write
|
||
61A000
|
unkown
|
page execute and write copy
|
||
9AC000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
927000
|
heap
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
26FF000
|
direct allocation
|
page read and write
|
||
26D0000
|
direct allocation
|
page read and write
|
||
6A5000
|
heap
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
DAF000
|
direct allocation
|
page read and write
|
||
3816000
|
heap
|
page read and write
|
||
3811000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
28FD000
|
heap
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
53DB000
|
heap
|
page read and write
|
||
10012000
|
direct allocation
|
page readonly
|
||
8CE000
|
heap
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
10020000
|
direct allocation
|
page read and write
|
||
3904000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
2691000
|
direct allocation
|
page execute read
|
||
9AB000
|
heap
|
page read and write
|
||
1451000
|
heap
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
2FA3000
|
direct allocation
|
page read and write
|
||
2690000
|
direct allocation
|
page read and write
|
||
794000
|
unkown
|
page readonly
|
||
D60000
|
heap
|
page read and write
|
||
794000
|
unkown
|
page readonly
|
||
11CF000
|
stack
|
page read and write
|
||
10014000
|
direct allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
917000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
144D000
|
heap
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
145E000
|
heap
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
6E1000
|
unkown
|
page execute read
|
||
1438000
|