IOC Report
O06_SWIFT PAYMENT.exe

loading gif

Files

File Path
Type
Category
Malicious
O06_SWIFT PAYMENT.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autCB37.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\uppishly
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\O06_SWIFT PAYMENT.exe
"C:\Users\user\Desktop\O06_SWIFT PAYMENT.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\O06_SWIFT PAYMENT.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
3440000
direct allocation
page read and write
malicious
3620000
direct allocation
page read and write
3600000
direct allocation
page execute and read and write
B7F000
stack
page read and write
B8B000
stack
page read and write
3017000
heap
page read and write
3490000
direct allocation
page read and write
2E13000
heap
page read and write
37E3000
direct allocation
page read and write
CC4000
heap
page read and write
2E13000
heap
page read and write
32FE000
stack
page read and write
2E13000
heap
page read and write
39AE000
direct allocation
page read and write
2E13000
heap
page read and write
630000
unkown
page readonly
398D000
direct allocation
page read and write
2E13000
heap
page read and write
39FE000
direct allocation
page read and write
3000000
heap
page read and write
2E13000
heap
page read and write
D80000
heap
page read and write
343F000
stack
page read and write
CD3000
heap
page read and write
2C60000
heap
page read and write
CC0000
heap
page read and write
3793000
direct allocation
page read and write
29ED000
stack
page read and write
6EF000
unkown
page read and write
3490000
direct allocation
page read and write
36C0000
direct allocation
page read and write
D2C000
heap
page read and write
3989000
direct allocation
page read and write
3529000
heap
page read and write
19C0000
heap
page read and write
E84000
heap
page read and write
39AE000
direct allocation
page read and write
2D90000
heap
page read and write
398D000
direct allocation
page read and write
C60000
heap
page read and write
DB1000
heap
page read and write
2E13000
heap
page read and write
3793000
direct allocation
page read and write
38CD000
direct allocation
page execute and read and write
3012000
heap
page read and write
2E13000
heap
page read and write
EF3000
heap
page read and write
630000
unkown
page readonly
C80000
heap
page read and write
C40000
heap
page read and write
CC0000
heap
page read and write
2E13000
heap
page read and write
154E000
stack
page read and write
1980000
heap
page read and write
3860000
direct allocation
page read and write
2E13000
heap
page read and write
3005000
heap
page read and write
3942000
direct allocation
page execute and read and write
CBC000
heap
page read and write
CB3000
heap
page read and write
2E13000
heap
page read and write
3860000
direct allocation
page read and write
6F3000
unkown
page write copy
BAD000
stack
page read and write
3490000
direct allocation
page read and write
BB0000
heap
page read and write
393D000
direct allocation
page read and write
6EF000
unkown
page write copy
352D000
heap
page read and write
B6F000
stack
page read and write
3490000
direct allocation
page read and write
3810000
direct allocation
page read and write
3490000
direct allocation
page read and write
3939000
direct allocation
page read and write
39FE000
direct allocation
page read and write
3490000
direct allocation
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
C88000
heap
page read and write
3200000
heap
page read and write
6E5000
unkown
page readonly
C3E000
stack
page read and write
393D000
direct allocation
page read and write
3939000
direct allocation
page read and write
39AE000
direct allocation
page read and write
3810000
direct allocation
page read and write
6F8000
unkown
page readonly
D14000
heap
page read and write
2E13000
heap
page read and write
3670000
direct allocation
page read and write
3400000
heap
page read and write
6E5000
unkown
page readonly
2E13000
heap
page read and write
6BF000
unkown
page readonly
D0D000
heap
page read and write
3729000
direct allocation
page execute and read and write
2E13000
heap
page read and write
2DA0000
direct allocation
page read and write
398D000
direct allocation
page read and write
3810000
direct allocation
page read and write
3005000
heap
page read and write
2DDE000
stack
page read and write
2E13000
heap
page read and write
3670000
direct allocation
page read and write
2CB0000
heap
page read and write
3860000
direct allocation
page read and write
BFE000
stack
page read and write
CC0000
heap
page read and write
3A01000
heap
page read and write
D80000
heap
page read and write
2C80000
heap
page read and write
2E13000
heap
page read and write
6BF000
unkown
page readonly
3017000
heap
page read and write
2E00000
heap
page read and write
2C3D000
stack
page read and write
2E13000
heap
page read and write
3989000
direct allocation
page read and write
19A0000
heap
page read and write
359E000
heap
page read and write
2E13000
heap
page read and write
2E02000
heap
page read and write
36C0000
direct allocation
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
6F8000
unkown
page readonly
2E13000
heap
page read and write
D92000
heap
page read and write
3323000
heap
page read and write
372D000
direct allocation
page execute and read and write
7A9000
stack
page read and write
2E13000
heap
page read and write
37E3000
direct allocation
page read and write
3670000
direct allocation
page read and write
39FE000
direct allocation
page read and write
631000
unkown
page execute read
194E000
stack
page read and write
393D000
direct allocation
page read and write
3989000
direct allocation
page read and write
2E13000
heap
page read and write
631000
unkown
page execute read
1984000
heap
page read and write
2E13000
heap
page read and write
37E3000
direct allocation
page read and write
CC4000
heap
page read and write
379E000
direct allocation
page execute and read and write
CBF000
heap
page execute and read and write
CB4000
heap
page read and write
36C0000
direct allocation
page read and write
333E000
stack
page read and write
38D1000
direct allocation
page execute and read and write
D81000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
3939000
direct allocation
page read and write
3101000
heap
page read and write
3793000
direct allocation
page read and write
There are 148 hidden memdumps, click here to show them.