Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
O06_SWIFT PAYMENT.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\autCB37.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\uppishly
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\O06_SWIFT PAYMENT.exe
|
"C:\Users\user\Desktop\O06_SWIFT PAYMENT.exe"
|
||
C:\Windows\SysWOW64\svchost.exe
|
"C:\Users\user\Desktop\O06_SWIFT PAYMENT.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
system
|
page execute and read and write
|
||
3440000
|
direct allocation
|
page read and write
|
||
3620000
|
direct allocation
|
page read and write
|
||
3600000
|
direct allocation
|
page execute and read and write
|
||
B7F000
|
stack
|
page read and write
|
||
B8B000
|
stack
|
page read and write
|
||
3017000
|
heap
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
37E3000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
39AE000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
398D000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
39FE000
|
direct allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
CD3000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
3793000
|
direct allocation
|
page read and write
|
||
29ED000
|
stack
|
page read and write
|
||
6EF000
|
unkown
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
3989000
|
direct allocation
|
page read and write
|
||
3529000
|
heap
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
E84000
|
heap
|
page read and write
|
||
39AE000
|
direct allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
398D000
|
direct allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3793000
|
direct allocation
|
page read and write
|
||
38CD000
|
direct allocation
|
page execute and read and write
|
||
3012000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
EF3000
|
heap
|
page read and write
|
||
630000
|
unkown
|
page readonly
|
||
C80000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
3860000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
3942000
|
direct allocation
|
page execute and read and write
|
||
CBC000
|
heap
|
page read and write
|
||
CB3000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3860000
|
direct allocation
|
page read and write
|
||
6F3000
|
unkown
|
page write copy
|
||
BAD000
|
stack
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
393D000
|
direct allocation
|
page read and write
|
||
6EF000
|
unkown
|
page write copy
|
||
352D000
|
heap
|
page read and write
|
||
B6F000
|
stack
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
3939000
|
direct allocation
|
page read and write
|
||
39FE000
|
direct allocation
|
page read and write
|
||
3490000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
6E5000
|
unkown
|
page readonly
|
||
C3E000
|
stack
|
page read and write
|
||
393D000
|
direct allocation
|
page read and write
|
||
3939000
|
direct allocation
|
page read and write
|
||
39AE000
|
direct allocation
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
6F8000
|
unkown
|
page readonly
|
||
D14000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
6E5000
|
unkown
|
page readonly
|
||
2E13000
|
heap
|
page read and write
|
||
6BF000
|
unkown
|
page readonly
|
||
D0D000
|
heap
|
page read and write
|
||
3729000
|
direct allocation
|
page execute and read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2DA0000
|
direct allocation
|
page read and write
|
||
398D000
|
direct allocation
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
3860000
|
direct allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
3A01000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
6BF000
|
unkown
|
page readonly
|
||
3017000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3989000
|
direct allocation
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
359E000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E02000
|
heap
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
6F8000
|
unkown
|
page readonly
|
||
2E13000
|
heap
|
page read and write
|
||
D92000
|
heap
|
page read and write
|
||
3323000
|
heap
|
page read and write
|
||
372D000
|
direct allocation
|
page execute and read and write
|
||
7A9000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
37E3000
|
direct allocation
|
page read and write
|
||
3670000
|
direct allocation
|
page read and write
|
||
39FE000
|
direct allocation
|
page read and write
|
||
631000
|
unkown
|
page execute read
|
||
194E000
|
stack
|
page read and write
|
||
393D000
|
direct allocation
|
page read and write
|
||
3989000
|
direct allocation
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
631000
|
unkown
|
page execute read
|
||
1984000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
37E3000
|
direct allocation
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
379E000
|
direct allocation
|
page execute and read and write
|
||
CBF000
|
heap
|
page execute and read and write
|
||
CB4000
|
heap
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
38D1000
|
direct allocation
|
page execute and read and write
|
||
D81000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
3939000
|
direct allocation
|
page read and write
|
||
3101000
|
heap
|
page read and write
|
||
3793000
|
direct allocation
|
page read and write
|
There are 148 hidden memdumps, click here to show them.