IOC Report
Attendance list.exe

loading gif

Files

File Path
Type
Category
Malicious
Attendance list.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autE4E0.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autE51F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\benting
data
dropped
C:\Users\user\AppData\Local\Temp\conged
ASCII text, with very long lines (28756), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Attendance list.exe
"C:\Users\user\Desktop\Attendance list.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Attendance list.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3570000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
2BB0000
heap
page read and write
10B5000
heap
page read and write
4149000
direct allocation
page read and write
10B5000
heap
page read and write
11C9000
heap
page read and write
3FA3000
direct allocation
page read and write
3200000
heap
page read and write
2E02000
heap
page read and write
3F53000
direct allocation
page read and write
40F9000
direct allocation
page read and write
2E13000
heap
page read and write
109F000
heap
page read and write
39A0000
heap
page read and write
3E80000
direct allocation
page read and write
35B0000
direct allocation
page read and write
2E13000
heap
page read and write
1CCE000
stack
page read and write
E5E000
stack
page read and write
1024000
heap
page read and write
251000
unkown
page execute read
109E000
heap
page read and write
18CE000
stack
page read and write
109E000
heap
page read and write
10AF000
heap
page read and write
2E13000
heap
page read and write
3000000
heap
page read and write
2E13000
heap
page read and write
416E000
direct allocation
page read and write
32F0000
direct allocation
page read and write
41BE000
direct allocation
page read and write
342E000
stack
page read and write
305000
unkown
page readonly
2E13000
heap
page read and write
1008000
heap
page read and write
41BE000
direct allocation
page read and write
11E9000
heap
page read and write
35C0000
direct allocation
page read and write
2B7D000
stack
page read and write
2E13000
heap
page read and write
1033000
heap
page read and write
2E13000
heap
page read and write
3DE0000
direct allocation
page read and write
3FA3000
direct allocation
page read and write
318000
unkown
page readonly
F7E000
stack
page read and write
10AF000
heap
page read and write
4020000
direct allocation
page read and write
369E000
heap
page read and write
332E000
stack
page read and write
3E30000
direct allocation
page read and write
4149000
direct allocation
page read and write
250000
unkown
page readonly
11E9000
heap
page read and write
2E00000
heap
page read and write
3FD0000
direct allocation
page read and write
41BE000
direct allocation
page read and write
3012000
heap
page read and write
2280000
heap
page read and write
2BD0000
heap
page read and write
A89000
stack
page read and write
2E13000
heap
page read and write
3FA3000
direct allocation
page read and write
3423000
heap
page read and write
3F53000
direct allocation
page read and write
1038000
heap
page read and write
103D000
heap
page read and write
3940000
heap
page read and write
2DF000
unkown
page readonly
3829000
direct allocation
page execute and read and write
2E13000
heap
page read and write
389E000
direct allocation
page execute and read and write
2E13000
heap
page read and write
3C01000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
110F000
heap
page read and write
3005000
heap
page read and write
416E000
direct allocation
page read and write
2DF000
unkown
page readonly
10B5000
heap
page read and write
109D000
heap
page read and write
3700000
direct allocation
page execute and read and write
416E000
direct allocation
page read and write
251000
unkown
page execute read
2E13000
heap
page read and write
109E000
heap
page read and write
10B6000
heap
page read and write
362D000
heap
page read and write
3629000
heap
page read and write
2E13000
heap
page read and write
40FD000
direct allocation
page read and write
10A0000
heap
page read and write
10B5000
heap
page read and write
103D000
heap
page read and write
40F9000
direct allocation
page read and write
35C0000
direct allocation
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
3005000
heap
page read and write
40FD000
direct allocation
page read and write
35C0000
direct allocation
page read and write
3E80000
direct allocation
page read and write
1085000
heap
page read and write
10B5000
heap
page read and write
3F53000
direct allocation
page read and write
FA0000
heap
page read and write
3017000
heap
page read and write
30F000
unkown
page write copy
2E13000
heap
page read and write
2E13000
heap
page read and write
11CA000
heap
page read and write
1034000
heap
page read and write
39A4000
heap
page read and write
11CA000
heap
page read and write
32E0000
heap
page read and write
2E13000
heap
page read and write
382D000
direct allocation
page execute and read and write
10B5000
heap
page read and write
F3E000
stack
page read and write
2B3D000
stack
page read and write
10AE000
heap
page read and write
EF0000
heap
page read and write
40FD000
direct allocation
page read and write
E4E000
stack
page read and write
20CF000
stack
page read and write
250000
unkown
page readonly
30F000
unkown
page read and write
40F9000
direct allocation
page read and write
2E13000
heap
page read and write
4149000
direct allocation
page read and write
35B0000
direct allocation
page read and write
3FD0000
direct allocation
page read and write
E8C000
stack
page read and write
4020000
direct allocation
page read and write
2E13000
heap
page read and write
414D000
direct allocation
page read and write
2E13000
heap
page read and write
108E000
heap
page read and write
35C0000
direct allocation
page read and write
115F000
heap
page read and write
FEE000
stack
page read and write
2E13000
heap
page read and write
E6B000
stack
page read and write
10B5000
heap
page read and write
305000
unkown
page readonly
10B5000
heap
page read and write
103D000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
1000000
heap
page read and write
3E30000
direct allocation
page read and write
2E13000
heap
page read and write
356F000
stack
page read and write
10AF000
heap
page read and write
3A42000
direct allocation
page execute and read and write
2E13000
heap
page read and write
11D9000
heap
page read and write
10D5000
heap
page read and write
39D1000
direct allocation
page execute and read and write
1033000
heap
page read and write
11E7000
heap
page read and write
2E13000
heap
page read and write
3300000
heap
page read and write
313000
unkown
page write copy
318000
unkown
page readonly
414D000
direct allocation
page read and write
3960000
direct allocation
page execute and read and write
414D000
direct allocation
page read and write
1038000
heap
page read and write
F80000
heap
page read and write
3101000
heap
page read and write
3500000
heap
page read and write
3017000
heap
page read and write
109E000
heap
page read and write
3FD0000
direct allocation
page read and write
4020000
direct allocation
page read and write
11C9000
heap
page read and write
39CD000
direct allocation
page execute and read and write
119E000
heap
page read and write
346E000
stack
page read and write
3E80000
direct allocation
page read and write
11BC000
heap
page read and write
3E30000
direct allocation
page read and write
There are 175 hidden memdumps, click here to show them.