IOC Report
rComprobantedepago.exe

loading gif

Files

File Path
Type
Category
Malicious
rComprobantedepago.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\peaks
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rComprobantedepago.exe
"C:\Users\user\Desktop\rComprobantedepago.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\rComprobantedepago.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A50000
heap
page read and write
A13000
heap
page read and write
3642000
direct allocation
page execute and read and write
32FF000
stack
page read and write
9FE000
stack
page read and write
3FF8000
heap
page read and write
3FE8000
heap
page read and write
A13000
heap
page read and write
3D00000
heap
page read and write
4849000
direct allocation
page read and write
46A3000
direct allocation
page read and write
85D000
stack
page read and write
48BE000
direct allocation
page read and write
8AF000
stack
page read and write
4580000
direct allocation
page read and write
2E6E000
heap
page read and write
A13000
heap
page read and write
4720000
direct allocation
page read and write
8F0000
heap
page read and write
35CD000
direct allocation
page execute and read and write
4A7000
unkown
page read and write
AC0000
heap
page read and write
920000
heap
page read and write
A35000
heap
page read and write
400000
system
page execute and read and write
A13000
heap
page read and write
ACA000
heap
page read and write
2FF4000
heap
page read and write
A30000
heap
page read and write
AFA000
heap
page read and write
46A3000
direct allocation
page read and write
A13000
heap
page read and write
46A3000
direct allocation
page read and write
4580000
direct allocation
page read and write
C05000
heap
page read and write
AFB000
heap
page read and write
4AB000
unkown
page readonly
3300000
direct allocation
page execute and read and write
E8E000
stack
page read and write
46A3000
direct allocation
page read and write
1E0000
heap
page read and write
3B43000
heap
page read and write
AFE000
heap
page read and write
48BE000
direct allocation
page read and write
484D000
direct allocation
page read and write
A13000
heap
page read and write
4580000
direct allocation
page read and write
3F6B000
heap
page read and write
A13000
heap
page read and write
490000
unkown
page read and write
4580000
direct allocation
page read and write
A13000
heap
page read and write
C00000
heap
page read and write
A13000
heap
page read and write
E00000
heap
page read and write
3E00000
heap
page read and write
A13000
heap
page read and write
A13000
heap
page read and write
4000000
heap
page read and write
3229000
heap
page read and write
3EF6000
heap
page read and write
C05000
heap
page read and write
484D000
direct allocation
page read and write
4849000
direct allocation
page read and write
D01000
heap
page read and write
48BE000
direct allocation
page read and write
490000
unkown
page write copy
A13000
heap
page read and write
3FD5000
heap
page read and write
8B4000
stack
page read and write
9AE000
stack
page read and write
A13000
heap
page read and write
4720000
direct allocation
page read and write
402B000
heap
page read and write
2FC0000
direct allocation
page read and write
48BE000
direct allocation
page read and write
48BE000
direct allocation
page read and write
3650000
direct allocation
page read and write
3F83000
heap
page read and write
C17000
heap
page read and write
A13000
heap
page read and write
3EEC000
heap
page read and write
46A3000
direct allocation
page read and write
401000
unkown
page execute read
3B3F000
stack
page read and write
12BF000
stack
page read and write
401000
unkown
page execute read
46A3000
direct allocation
page read and write
482000
unkown
page readonly
A13000
heap
page read and write
4AB000
unkown
page readonly
100000
heap
page read and write
3FF8000
heap
page execute and read and write
3001000
heap
page read and write
4849000
direct allocation
page read and write
2FC0000
direct allocation
page read and write
A13000
heap
page read and write
4406000
heap
page read and write
484D000
direct allocation
page read and write
484D000
direct allocation
page read and write
322D000
heap
page read and write
2F00000
heap
page read and write
A90000
heap
page read and write
4076000
heap
page read and write
3FBC000
heap
page read and write
3FF2000
heap
page read and write
402B000
heap
page read and write
48BE000
direct allocation
page read and write
A13000
heap
page read and write
329E000
heap
page read and write
A13000
heap
page read and write
342D000
direct allocation
page execute and read and write
E10000
direct allocation
page read and write
8D0000
heap
page read and write
E4E000
stack
page read and write
4849000
direct allocation
page read and write
484D000
direct allocation
page read and write
A13000
heap
page read and write
2FC0000
direct allocation
page read and write
A02000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
4720000
direct allocation
page read and write
373E000
stack
page read and write
A13000
heap
page read and write
3EFF000
heap
page read and write
940000
heap
page read and write
4720000
direct allocation
page read and write
16BE000
stack
page read and write
A13000
heap
page read and write
349E000
direct allocation
page execute and read and write
C12000
heap
page read and write
2FBF000
stack
page read and write
A13000
heap
page read and write
A13000
heap
page read and write
C17000
heap
page read and write
3F10000
heap
page read and write
3023000
heap
page read and write
3F0E000
heap
page read and write
A13000
heap
page read and write
2FC0000
direct allocation
page read and write
3F4C000
heap
page read and write
35D1000
direct allocation
page execute and read and write
3BF9000
heap
page read and write
4580000
direct allocation
page read and write
4580000
direct allocation
page read and write
3100000
heap
page read and write
3B40000
direct allocation
page read and write
9A000
stack
page read and write
484D000
direct allocation
page read and write
482000
unkown
page readonly
A80000
heap
page read and write
40F5000
heap
page read and write
89F000
stack
page read and write
A00000
heap
page read and write
4849000
direct allocation
page read and write
A13000
heap
page read and write
3B4F000
heap
page read and write
402B000
heap
page read and write
2FF0000
heap
page read and write
4720000
direct allocation
page read and write
40E9000
heap
page read and write
A13000
heap
page read and write
8FE000
stack
page read and write
3EDE000
heap
page read and write
4720000
direct allocation
page read and write
ACE000
heap
page read and write
2FC0000
direct allocation
page read and write
A13000
heap
page read and write
4105000
heap
page read and write
2FC0000
direct allocation
page read and write
3429000
direct allocation
page execute and read and write
4849000
direct allocation
page read and write
A13000
heap
page read and write
93E000
stack
page read and write
89D000
stack
page read and write
There are 166 hidden memdumps, click here to show them.