IOC Report
SPA-198-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
SPA-198-2024.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SPA-198-2024.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SPA-198-2024.exe
"C:\Users\user\Desktop\SPA-198-2024.exe"
malicious
C:\Users\user\Desktop\SPA-198-2024.exe
"C:\Users\user\Desktop\SPA-198-2024.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
1D90000
direct allocation
page read and write
malicious
4F43000
heap
page read and write
C66000
heap
page read and write
C00000
trusted library allocation
page read and write
53A3000
heap
page read and write
CF4000
heap
page read and write
4F50000
trusted library allocation
page read and write
5080000
heap
page execute and read and write
ACE0000
heap
page read and write
2971000
trusted library allocation
page read and write
14FC000
stack
page read and write
6CEE000
stack
page read and write
8C6E000
stack
page read and write
D2A000
heap
page read and write
5160000
trusted library allocation
page execute and read and write
B6F000
stack
page read and write
BE0000
trusted library allocation
page read and write
89EE000
stack
page read and write
8AEE000
stack
page read and write
111D000
stack
page read and write
910000
heap
page read and write
2790000
heap
page read and write
1B6D000
direct allocation
page execute and read and write
28C0000
trusted library allocation
page read and write
2770000
trusted library allocation
page read and write
EC0000
heap
page read and write
8325000
heap
page read and write
BAE000
stack
page read and write
28C5000
trusted library allocation
page read and write
5220000
heap
page read and write
4FEB000
stack
page read and write
5360000
heap
page read and write
B2C0000
trusted library section
page read and write
8512000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
8B2E000
stack
page read and write
BF4000
trusted library allocation
page read and write
54E0000
trusted library allocation
page execute and read and write
5200000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
440000
unkown
page readonly
4A6C000
stack
page read and write
5380000
heap
page read and write
1CF1000
direct allocation
page execute and read and write
29AF000
trusted library allocation
page read and write
C81000
heap
page read and write
BF0000
trusted library allocation
page read and write
BFD000
trusted library allocation
page execute and read and write
54AE000
stack
page read and write
2960000
heap
page execute and read and write
C12000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
EC7000
heap
page read and write
11E0000
heap
page read and write
288B000
trusted library allocation
page read and write
5210000
trusted library allocation
page execute and read and write
C16000
trusted library allocation
page execute and read and write
283E000
stack
page read and write
C40000
heap
page read and write
1B69000
direct allocation
page execute and read and write
A60000
heap
page read and write
CEC000
heap
page read and write
4204000
trusted library allocation
page read and write
C27000
trusted library allocation
page execute and read and write
C0D000
trusted library allocation
page execute and read and write
E3E000
stack
page read and write
28F0000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
5370000
heap
page read and write
CA1000
heap
page read and write
16E0000
heap
page read and write
3979000
trusted library allocation
page read and write
A3D000
stack
page read and write
8D6E000
stack
page read and write
8340000
heap
page read and write
27B0000
trusted library allocation
page execute and read and write
11CE000
stack
page read and write
CDE000
heap
page read and write
15E0000
heap
page read and write
2930000
heap
page read and write
C1A000
trusted library allocation
page execute and read and write
2942000
trusted library allocation
page read and write
51C000
unkown
page readonly
1A40000
direct allocation
page execute and read and write
4F90000
trusted library allocation
page execute and read and write
28AD000
trusted library allocation
page read and write
287B000
stack
page read and write
2950000
trusted library allocation
page execute and read and write
706D000
stack
page read and write
6AB0000
heap
page read and write
8F7000
stack
page read and write
28D0000
trusted library allocation
page read and write
C2B000
trusted library allocation
page execute and read and write
BF3000
trusted library allocation
page execute and read and write
29A9000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
1A1F000
stack
page read and write
AEDD000
stack
page read and write
5130000
heap
page read and write
C10000
trusted library allocation
page read and write
11D0000
heap
page read and write
6DEE000
stack
page read and write
1180000
heap
page read and write
18DE000
stack
page read and write
276E000
stack
page read and write
C30000
heap
page read and write
7F8D0000
trusted library allocation
page execute and read and write
5150000
trusted library allocation
page read and write
BB0000
heap
page read and write
54D0000
trusted library allocation
page read and write
1D0D000
direct allocation
page execute and read and write
1D06000
direct allocation
page execute and read and write
AFDD000
stack
page read and write
5330000
trusted library allocation
page read and write
5140000
heap
page read and write
EA0000
trusted library allocation
page execute and read and write
4FF0000
trusted library section
page readonly
8374000
heap
page read and write
4F40000
heap
page read and write
54B0000
trusted library section
page read and write
28A6000
trusted library allocation
page read and write
A65000
heap
page read and write
41C7000
trusted library allocation
page read and write
2947000
trusted library allocation
page read and write
1E80000
heap
page read and write
6CAE000
stack
page read and write
2C00000
trusted library allocation
page read and write
532D000
stack
page read and write
5365000
heap
page read and write
6ABE000
heap
page read and write
28B2000
trusted library allocation
page read and write
442000
unkown
page readonly
1D88000
direct allocation
page execute and read and write
191E000
stack
page read and write
5AA000
stack
page read and write
15E8000
heap
page read and write
C7F000
heap
page read and write
C74000
heap
page read and write
27FE000
stack
page read and write
289E000
trusted library allocation
page read and write
C85000
heap
page read and write
C4E000
heap
page read and write
CF8000
heap
page read and write
E9E000
stack
page read and write
4F70000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
8C2F000
stack
page read and write
3971000
trusted library allocation
page read and write
CD8000
heap
page read and write
8310000
heap
page read and write
837F000
heap
page read and write
1BDE000
direct allocation
page execute and read and write
702D000
stack
page read and write
A927000
trusted library allocation
page read and write
C22000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
9F0000
heap
page read and write
There are 151 hidden memdumps, click here to show them.