Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SPA-198-2024.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SPA-198-2024.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SPA-198-2024.exe
|
"C:\Users\user\Desktop\SPA-198-2024.exe"
|
||
C:\Users\user\Desktop\SPA-198-2024.exe
|
"C:\Users\user\Desktop\SPA-198-2024.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
1D90000
|
direct allocation
|
page read and write
|
||
4F43000
|
heap
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
53A3000
|
heap
|
page read and write
|
||
CF4000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page execute and read and write
|
||
ACE0000
|
heap
|
page read and write
|
||
2971000
|
trusted library allocation
|
page read and write
|
||
14FC000
|
stack
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
8C6E000
|
stack
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page execute and read and write
|
||
B6F000
|
stack
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
89EE000
|
stack
|
page read and write
|
||
8AEE000
|
stack
|
page read and write
|
||
111D000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
1B6D000
|
direct allocation
|
page execute and read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
8325000
|
heap
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
28C5000
|
trusted library allocation
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
4FEB000
|
stack
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
B2C0000
|
trusted library section
|
page read and write
|
||
8512000
|
trusted library allocation
|
page read and write
|
||
29BC000
|
trusted library allocation
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
8B2E000
|
stack
|
page read and write
|
||
BF4000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page execute and read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
4A6C000
|
stack
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
1CF1000
|
direct allocation
|
page execute and read and write
|
||
29AF000
|
trusted library allocation
|
page read and write
|
||
C81000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
trusted library allocation
|
page execute and read and write
|
||
54AE000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page execute and read and write
|
||
C12000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page execute and read and write
|
||
C16000
|
trusted library allocation
|
page execute and read and write
|
||
283E000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
1B69000
|
direct allocation
|
page execute and read and write
|
||
A60000
|
heap
|
page read and write
|
||
CEC000
|
heap
|
page read and write
|
||
4204000
|
trusted library allocation
|
page read and write
|
||
C27000
|
trusted library allocation
|
page execute and read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
E3E000
|
stack
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
3979000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
stack
|
page read and write
|
||
8D6E000
|
stack
|
page read and write
|
||
8340000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page execute and read and write
|
||
11CE000
|
stack
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
C1A000
|
trusted library allocation
|
page execute and read and write
|
||
2942000
|
trusted library allocation
|
page read and write
|
||
51C000
|
unkown
|
page readonly
|
||
1A40000
|
direct allocation
|
page execute and read and write
|
||
4F90000
|
trusted library allocation
|
page execute and read and write
|
||
28AD000
|
trusted library allocation
|
page read and write
|
||
287B000
|
stack
|
page read and write
|
||
2950000
|
trusted library allocation
|
page execute and read and write
|
||
706D000
|
stack
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
C2B000
|
trusted library allocation
|
page execute and read and write
|
||
BF3000
|
trusted library allocation
|
page execute and read and write
|
||
29A9000
|
trusted library allocation
|
page read and write
|
||
28A1000
|
trusted library allocation
|
page read and write
|
||
1A1F000
|
stack
|
page read and write
|
||
AEDD000
|
stack
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
6DEE000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
18DE000
|
stack
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7F8D0000
|
trusted library allocation
|
page execute and read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
1D0D000
|
direct allocation
|
page execute and read and write
|
||
1D06000
|
direct allocation
|
page execute and read and write
|
||
AFDD000
|
stack
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page execute and read and write
|
||
4FF0000
|
trusted library section
|
page readonly
|
||
8374000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
54B0000
|
trusted library section
|
page read and write
|
||
28A6000
|
trusted library allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
41C7000
|
trusted library allocation
|
page read and write
|
||
2947000
|
trusted library allocation
|
page read and write
|
||
1E80000
|
heap
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
532D000
|
stack
|
page read and write
|
||
5365000
|
heap
|
page read and write
|
||
6ABE000
|
heap
|
page read and write
|
||
28B2000
|
trusted library allocation
|
page read and write
|
||
442000
|
unkown
|
page readonly
|
||
1D88000
|
direct allocation
|
page execute and read and write
|
||
191E000
|
stack
|
page read and write
|
||
5AA000
|
stack
|
page read and write
|
||
15E8000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
C74000
|
heap
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
289E000
|
trusted library allocation
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
CF8000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
8C2F000
|
stack
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
8310000
|
heap
|
page read and write
|
||
837F000
|
heap
|
page read and write
|
||
1BDE000
|
direct allocation
|
page execute and read and write
|
||
702D000
|
stack
|
page read and write
|
||
A927000
|
trusted library allocation
|
page read and write
|
||
C22000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
There are 151 hidden memdumps, click here to show them.