IOC Report
PI_2024.exe

loading gif

Files

File Path
Type
Category
Malicious
PI_2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Hymenophyllaceae
data
dropped
C:\Users\user\AppData\Local\Temp\aut3E51.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3E80.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\orographically
ASCII text, with very long lines (28674), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PI_2024.exe
"C:\Users\user\Desktop\PI_2024.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\PI_2024.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
3840000
direct allocation
page read and write
malicious
26C000
unkown
page readonly
DFA000
stack
page read and write
2360000
heap
page read and write
3B2D000
direct allocation
page execute and read and write
373F000
stack
page read and write
292000
unkown
page readonly
13FF000
stack
page read and write
3F50000
direct allocation
page read and write
1621000
heap
page read and write
3213000
heap
page read and write
1745000
heap
page read and write
3213000
heap
page read and write
3890000
direct allocation
page read and write
3FA0000
direct allocation
page read and write
3CCD000
direct allocation
page execute and read and write
4219000
direct allocation
page read and write
3213000
heap
page read and write
1560000
heap
page read and write
3213000
heap
page read and write
16FD000
heap
page read and write
2370000
heap
page read and write
2DFD000
stack
page read and write
40C3000
direct allocation
page read and write
2A4000
unkown
page readonly
13BF000
stack
page read and write
1765000
heap
page read and write
428E000
direct allocation
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
3600000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
30C0000
heap
page read and write
1638000
heap
page read and write
3405000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
3A00000
direct allocation
page execute and read and write
3213000
heap
page read and write
3070000
heap
page read and write
26C000
unkown
page readonly
421D000
direct allocation
page read and write
3213000
heap
page read and write
426D000
direct allocation
page read and write
1657000
heap
page read and write
428E000
direct allocation
page read and write
3405000
heap
page read and write
4073000
direct allocation
page read and write
3417000
heap
page read and write
3213000
heap
page read and write
3929000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
22E0000
direct allocation
page execute and read and write
3723000
heap
page read and write
3F50000
direct allocation
page read and write
3213000
heap
page read and write
303D000
stack
page read and write
3213000
heap
page read and write
2A4000
unkown
page readonly
3213000
heap
page read and write
1580000
heap
page read and write
3F50000
direct allocation
page read and write
3213000
heap
page read and write
3890000
direct allocation
page read and write
3202000
heap
page read and write
22F0000
direct allocation
page read and write
40F0000
direct allocation
page read and write
1622000
heap
page read and write
3501000
heap
page read and write
1745000
heap
page read and write
292000
unkown
page readonly
3CD1000
direct allocation
page execute and read and write
1637000
heap
page read and write
1460000
heap
page read and write
3090000
heap
page read and write
4140000
direct allocation
page read and write
31EE000
stack
page read and write
29C000
unkown
page read and write
383F000
stack
page read and write
3800000
heap
page read and write
16C7000
heap
page read and write
40C3000
direct allocation
page read and write
173F000
heap
page read and write
42DE000
direct allocation
page read and write
15BE000
heap
page read and write
1623000
heap
page read and write
42DE000
direct allocation
page read and write
4219000
direct allocation
page read and write
40F0000
direct allocation
page read and write
15BB000
heap
page read and write
13EF000
stack
page read and write
1D0000
unkown
page readonly
3FA0000
direct allocation
page read and write
15B2000
heap
page read and write
3213000
heap
page read and write
3B9E000
direct allocation
page execute and read and write
3B29000
direct allocation
page execute and read and write
1D1000
unkown
page execute read
399E000
heap
page read and write
426D000
direct allocation
page read and write
3890000
direct allocation
page read and write
428E000
direct allocation
page read and write
3200000
heap
page read and write
421D000
direct allocation
page read and write
3213000
heap
page read and write
4140000
direct allocation
page read and write
3213000
heap
page read and write
15B4000
heap
page read and write
21FE000
stack
page read and write
4269000
direct allocation
page read and write
13DB000
stack
page read and write
1D0000
unkown
page readonly
1DBE000
stack
page read and write
31B0000
direct allocation
page read and write
3400000
heap
page read and write
363E000
stack
page read and write
1637000
heap
page read and write
3213000
heap
page read and write
3412000
heap
page read and write
426D000
direct allocation
page read and write
1540000
heap
page read and write
3213000
heap
page read and write
13CF000
stack
page read and write
1722000
heap
page read and write
3FA0000
direct allocation
page read and write
3417000
heap
page read and write
4269000
direct allocation
page read and write
15BE000
heap
page read and write
31A0000
heap
page read and write
421D000
direct allocation
page read and write
3213000
heap
page read and write
4140000
direct allocation
page read and write
1588000
heap
page read and write
2364000
heap
page read and write
19BE000
stack
page read and write
3890000
direct allocation
page read and write
3D42000
direct allocation
page execute and read and write
40F0000
direct allocation
page read and write
3890000
direct allocation
page read and write
4073000
direct allocation
page read and write
4073000
direct allocation
page read and write
1DFE000
stack
page read and write
1765000
heap
page read and write
3213000
heap
page read and write
1D1000
unkown
page execute read
29C000
unkown
page write copy
3E01000
heap
page read and write
42DE000
direct allocation
page read and write
4219000
direct allocation
page read and write
3213000
heap
page read and write
392D000
heap
page read and write
22C0000
heap
page read and write
3890000
direct allocation
page read and write
40C3000
direct allocation
page read and write
3213000
heap
page read and write
2A0000
unkown
page write copy
4269000
direct allocation
page read and write
There are 150 hidden memdumps, click here to show them.