IOC Report
Wind0ws7l0aderV3.4875.exe

loading gif

Files

File Path
Type
Category
Malicious
Wind0ws7l0aderV3.4875.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\WindowsLoader.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
malicious
C:\Users\user\AppData\Local\Temp\aut2507.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Wind0ws7l0aderV3.4875.exe
C:\Users\user\Desktop\Wind0ws7l0aderV3.4875.exe
malicious
C:\Users\user\AppData\Local\Temp\WindowsLoader.exe
C:\Users\user\AppData\Local\Temp\WindowsLoader.exe
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6E1000
unkown
page execute read
6C7000
heap
page read and write
26B7000
direct allocation
page readonly
8CA000
heap
page read and write
348F000
stack
page read and write
26E0000
direct allocation
page read and write
79E000
unkown
page read and write
145E000
heap
page read and write
630000
heap
page read and write
938000
heap
page read and write
144E000
heap
page read and write
8C0000
heap
page read and write
5C4000
unkown
page execute and read and write
29DE000
heap
page read and write
53D2000
heap
page read and write
269B000
direct allocation
page read and write
5FA000
unkown
page execute and read and write
61C000
unkown
page read and write
58B000
unkown
page execute and write copy
9A8000
heap
page read and write
540A000
heap
page read and write
1C2E000
stack
page read and write
2FD1000
heap
page read and write
948000
heap
page read and write
99A000
heap
page read and write
2707000
direct allocation
page read and write
610000
unkown
page execute and read and write
26F7000
direct allocation
page read and write
334F000
stack
page read and write
3906000
heap
page read and write
2701000
direct allocation
page execute read
3817000
heap
page read and write
310E000
stack
page read and write
270F000
direct allocation
page read and write
DA8000
direct allocation
page read and write
6E0000
unkown
page readonly
C40000
heap
page read and write
14A0000
heap
page read and write
3819000
heap
page read and write
29A6000
heap
page read and write
128E000
stack
page read and write
26D6000
direct allocation
page readonly
270B000
direct allocation
page read and write
2698000
direct allocation
page readonly
202E000
stack
page read and write
2140000
heap
page read and write
978000
heap
page read and write
617000
unkown
page execute and read and write
DA7000
direct allocation
page readonly
2730000
direct allocation
page execute and read and write
61A000
unkown
page execute and write copy
9AC000
heap
page read and write
400000
unkown
page readonly
927000
heap
page read and write
1463000
heap
page read and write
19B000
stack
page read and write
26FF000
direct allocation
page read and write
26D0000
direct allocation
page read and write
6A5000
heap
page read and write
958000
heap
page read and write
DAF000
direct allocation
page read and write
3816000
heap
page read and write
3811000
heap
page read and write
324E000
stack
page read and write
11BF000
stack
page read and write
6C0000
heap
page read and write
28FD000
heap
page read and write
6C5000
heap
page read and write
53DB000
heap
page read and write
10012000
direct allocation
page readonly
8CE000
heap
page read and write
2150000
heap
page read and write
10020000
direct allocation
page read and write
3904000
heap
page read and write
2720000
heap
page read and write
2691000
direct allocation
page execute read
9AB000
heap
page read and write
1451000
heap
page read and write
3800000
heap
page read and write
2FA3000
direct allocation
page read and write
2690000
direct allocation
page read and write
794000
unkown
page readonly
D60000
heap
page read and write
794000
unkown
page readonly
11CF000
stack
page read and write
10014000
direct allocation
page read and write
1430000
heap
page read and write
917000
heap
page read and write
1240000
heap
page read and write
144D000
heap
page read and write
6E0000
unkown
page readonly
145E000
heap
page read and write
26B0000
direct allocation
page read and write
6E1000
unkown
page execute read
1438000
heap
page read and write
2F90000
direct allocation
page read and write
DA1000
direct allocation
page execute read
509C000
heap
page read and write
5C2000
unkown
page execute and read and write
2710000
heap
page read and write
DC6000
heap
page read and write
76F000
unkown
page readonly
145E000
heap
page read and write
907000
heap
page read and write
1471000
heap
page read and write
7A2000
unkown
page write copy
14B0000
heap
page read and write
79E000
unkown
page write copy
2144000
heap
page read and write
12C0000
heap
page read and write
1490000
heap
page read and write
26A2000
direct allocation
page read and write
2A50000
heap
page read and write
26C1000
direct allocation
page read and write
320E000
stack
page read and write
BDA000
stack
page read and write
2FAE000
direct allocation
page read and write
26B1000
direct allocation
page execute read
7A7000
unkown
page readonly
2724000
heap
page read and write
145E000
heap
page read and write
1460000
heap
page read and write
29AF000
heap
page read and write
26D1000
direct allocation
page execute read
640000
heap
page read and write
7A7000
unkown
page readonly
145E000
heap
page read and write
61C000
unkown
page write copy
338E000
stack
page read and write
26B9000
direct allocation
page read and write
1420000
heap
page read and write
10001000
direct allocation
page execute read
26F1000
direct allocation
page execute read
76F000
unkown
page readonly
400000
unkown
page readonly
60A000
unkown
page execute and read and write
1451000
heap
page read and write
2FD0000
heap
page read and write
3832000
heap
page read and write
11DC000
stack
page read and write
26F5000
direct allocation
page readonly
30D0000
trusted library allocation
page read and write
DA0000
direct allocation
page read and write
370F000
stack
page read and write
382B000
heap
page read and write
28ED000
heap
page read and write
8A0000
heap
page read and write
26F0000
direct allocation
page read and write
2F91000
direct allocation
page execute read
26D8000
direct allocation
page read and write
6A0000
heap
page read and write
11FD000
stack
page read and write
3D3C000
heap
page read and write
DC0000
heap
page read and write
968000
heap
page read and write
1290000
heap
page read and write
360E000
stack
page read and write
5B0000
unkown
page execute and read and write
10000000
direct allocation
page read and write
3810000
heap
page read and write
95000
stack
page read and write
13DE000
stack
page read and write
401000
unkown
page execute and read and write
35CF000
stack
page read and write
2705000
direct allocation
page readonly
34CE000
stack
page read and write
2FA1000
direct allocation
page readonly
2700000
direct allocation
page read and write
There are 158 hidden memdumps, click here to show them.