IOC Report
payment details.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
payment details.pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment details.pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\payment details.pdf.exe
"C:\Users\user\Desktop\payment details.pdf.exe"
malicious
C:\Users\user\Desktop\payment details.pdf.exe
"C:\Users\user\Desktop\payment details.pdf.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
BC0000
direct allocation
page read and write
malicious
53AE000
stack
page read and write
AD0000
heap
page read and write
C20000
heap
page read and write
4635000
trusted library allocation
page read and write
6DD000
stack
page read and write
2D70000
trusted library allocation
page execute and read and write
13C1000
direct allocation
page execute and read and write
5700000
trusted library section
page read and write
2C90000
trusted library allocation
page read and write
FDD000
trusted library allocation
page execute and read and write
EE0000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
D20000
heap
page read and write
2D10000
heap
page read and write
DBE000
heap
page read and write
52E0000
heap
page read and write
6084000
heap
page read and write
1421000
trusted library allocation
page read and write
7F050000
trusted library allocation
page execute and read and write
FF0000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
9AA000
stack
page read and write
ACE000
stack
page read and write
7E6E000
stack
page read and write
5710000
heap
page read and write
FED000
trusted library allocation
page execute and read and write
1239000
direct allocation
page execute and read and write
2D22000
trusted library allocation
page read and write
773D000
stack
page read and write
2CA0000
trusted library allocation
page read and write
1426000
trusted library allocation
page read and write
2D80000
heap
page execute and read and write
CF7000
stack
page read and write
FF2000
trusted library allocation
page read and write
2DF7000
trusted library allocation
page read and write
AE0000
heap
page read and write
100B000
trusted library allocation
page execute and read and write
52B0000
trusted library section
page readonly
2C00000
trusted library allocation
page read and write
604F000
stack
page read and write
4E8C000
stack
page read and write
FE0000
trusted library allocation
page read and write
822000
unkown
page readonly
13FB000
stack
page read and write
7150000
heap
page read and write
11BF000
stack
page read and write
5715000
heap
page read and write
7F6E000
stack
page read and write
2C40000
trusted library allocation
page read and write
E29000
heap
page read and write
5410000
trusted library section
page read and write
2CA5000
trusted library allocation
page read and write
1110000
direct allocation
page execute and read and write
52D0000
heap
page read and write
FE3000
trusted library allocation
page read and write
DB0000
heap
page read and write
1400000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
CB8000
heap
page read and write
D6E000
stack
page read and write
7640000
trusted library section
page read and write
2D30000
trusted library allocation
page execute and read and write
1080000
trusted library allocation
page execute and read and write
2D20000
trusted library allocation
page read and write
13BE000
stack
page read and write
53C0000
heap
page read and write
2CB0000
trusted library allocation
page read and write
DE4000
heap
page read and write
7E2E000
stack
page read and write
1440000
heap
page read and write
142D000
trusted library allocation
page read and write
A40000
heap
page read and write
2D26000
trusted library allocation
page read and write
52AB000
stack
page read and write
DF3000
heap
page read and write
FD3000
trusted library allocation
page execute and read and write
13DD000
direct allocation
page execute and read and write
5F4E000
stack
page read and write
10AF000
stack
page read and write
EF0000
heap
page read and write
FD4000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
10B0000
heap
page read and write
1002000
trusted library allocation
page read and write
DF5000
heap
page read and write
12BE000
stack
page read and write
7DC000
stack
page read and write
DB0000
heap
page read and write
2DE2000
trusted library allocation
page read and write
2C60000
trusted library allocation
page execute and read and write
1448000
heap
page read and write
2D91000
trusted library allocation
page read and write
DAE000
stack
page read and write
562D000
stack
page read and write
53D0000
trusted library allocation
page read and write
2BF0000
trusted library section
page read and write
3FF2000
trusted library allocation
page read and write
12AE000
direct allocation
page execute and read and write
532E000
stack
page read and write
3D99000
trusted library allocation
page read and write
1458000
direct allocation
page execute and read and write
581F000
stack
page read and write
CB0000
heap
page read and write
3D91000
trusted library allocation
page read and write
FAF000
stack
page read and write
52E3000
heap
page read and write
7C30000
heap
page read and write
4683000
trusted library allocation
page read and write
FF6000
trusted library allocation
page execute and read and write
1070000
heap
page read and write
123D000
direct allocation
page execute and read and write
FFA000
trusted library allocation
page execute and read and write
2DE4000
trusted library allocation
page read and write
476E000
trusted library allocation
page read and write
DD7000
heap
page read and write
10A0000
trusted library allocation
page read and write
6050000
heap
page read and write
45E7000
trusted library allocation
page read and write
5430000
heap
page execute and read and write
6060000
heap
page read and write
B6EE000
stack
page read and write
1007000
trusted library allocation
page execute and read and write
106E000
stack
page read and write
820000
unkown
page readonly
13D6000
direct allocation
page execute and read and write
A8E000
stack
page read and write
52C0000
heap
page read and write
D10000
heap
page read and write
A160000
trusted library allocation
page read and write
7852000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
141E000
trusted library allocation
page read and write
56F0000
trusted library allocation
page execute and read and write
56EE000
stack
page read and write
536E000
stack
page read and write
1090000
trusted library allocation
page read and write
There are 130 hidden memdumps, click here to show them.