IOC Report
proforma invoice.exe

loading gif

Files

File Path
Type
Category
Malicious
proforma invoice.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nonagglutinant
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\proforma invoice.exe
"C:\Users\user\Desktop\proforma invoice.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\proforma invoice.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
3240000
direct allocation
page read and write
malicious
2C13000
heap
page read and write
1A0000
heap
page read and write
3EF2000
heap
page read and write
3EF2000
heap
page read and write
3E6C000
heap
page read and write
3C80000
heap
page read and write
2C13000
heap
page read and write
352D000
direct allocation
page execute and read and write
3EA8000
heap
page read and write
1630000
heap
page read and write
A50000
heap
page read and write
3FCD000
heap
page read and write
2C13000
heap
page read and write
30FE000
stack
page read and write
47E0000
direct allocation
page read and write
3742000
direct allocation
page execute and read and write
2C13000
heap
page read and write
497E000
direct allocation
page read and write
4640000
direct allocation
page read and write
3FCD000
heap
page read and write
11BF000
stack
page read and write
3F44000
heap
page read and write
4909000
direct allocation
page read and write
4763000
direct allocation
page read and write
3D80000
heap
page read and write
47E0000
direct allocation
page read and write
2AB0000
heap
page read and write
4AB000
unkown
page readonly
4640000
direct allocation
page read and write
4AB000
unkown
page readonly
3FCD000
heap
page read and write
8F0000
heap
page read and write
359E000
direct allocation
page execute and read and write
3EF2000
heap
page read and write
4A7000
unkown
page read and write
400000
unkown
page readonly
2FA5000
heap
page read and write
3EF2000
heap
page read and write
1660000
heap
page read and write
490D000
direct allocation
page read and write
2C13000
heap
page read and write
4763000
direct allocation
page read and write
490D000
direct allocation
page read and write
3EF2000
heap
page read and write
3E5D000
heap
page read and write
1634000
heap
page read and write
4014000
heap
page read and write
3EF2000
heap
page read and write
2C13000
heap
page read and write
313E000
stack
page read and write
3000000
heap
page read and write
3F02000
heap
page read and write
3FCD000
heap
page read and write
3E92000
heap
page read and write
A3D000
stack
page read and write
3F80000
heap
page read and write
4909000
direct allocation
page read and write
3290000
direct allocation
page read and write
2F01000
heap
page read and write
2C13000
heap
page read and write
3FCD000
heap
page read and write
2BDE000
stack
page read and write
323F000
stack
page read and write
2C13000
heap
page read and write
100000
heap
page read and write
2C13000
heap
page read and write
490000
unkown
page read and write
4640000
direct allocation
page read and write
4909000
direct allocation
page read and write
490D000
direct allocation
page read and write
3290000
direct allocation
page read and write
7DD000
stack
page read and write
3290000
direct allocation
page read and write
3AF3000
heap
page read and write
2E12000
heap
page read and write
3EF2000
heap
page read and write
3EF2000
heap
page read and write
8FE000
heap
page read and write
3EF2000
heap
page read and write
2C13000
heap
page read and write
497E000
direct allocation
page read and write
2C13000
heap
page read and write
497E000
direct allocation
page read and write
400000
unkown
page readonly
2C13000
heap
page read and write
497E000
direct allocation
page read and write
3290000
direct allocation
page read and write
4763000
direct allocation
page read and write
482000
unkown
page readonly
2C13000
heap
page read and write
2E05000
heap
page read and write
3FCD000
heap
page read and write
3B78000
heap
page read and write
2E4E000
stack
page read and write
490D000
direct allocation
page read and write
3F81000
heap
page read and write
44A1000
heap
page read and write
110000
heap
page read and write
3AEF000
stack
page read and write
89F000
stack
page read and write
3529000
direct allocation
page execute and read and write
A70000
heap
page read and write
4763000
direct allocation
page read and write
2C13000
heap
page read and write
2C13000
heap
page read and write
2E17000
heap
page read and write
2C00000
heap
page read and write
1C0000
heap
page read and write
3F81000
heap
page read and write
3290000
direct allocation
page read and write
4640000
direct allocation
page read and write
3EB7000
heap
page read and write
497E000
direct allocation
page read and write
36EE000
stack
page read and write
3F2D000
heap
page read and write
2C13000
heap
page read and write
497E000
direct allocation
page read and write
3EF2000
heap
page read and write
3329000
heap
page read and write
3F42000
heap
page read and write
490D000
direct allocation
page read and write
4909000
direct allocation
page read and write
3F3D000
heap
page execute and read and write
4640000
direct allocation
page read and write
2C13000
heap
page read and write
3FCD000
heap
page read and write
2C13000
heap
page read and write
3200000
heap
page read and write
4763000
direct allocation
page read and write
2E00000
heap
page read and write
3FCD000
heap
page read and write
2C13000
heap
page read and write
929000
heap
page read and write
339E000
heap
page read and write
2E17000
heap
page read and write
2C13000
heap
page read and write
4909000
direct allocation
page read and write
9A000
stack
page read and write
3EF2000
heap
page read and write
19E000
stack
page read and write
3FCD000
heap
page read and write
2C13000
heap
page read and write
3F03000
heap
page read and write
490D000
direct allocation
page read and write
1610000
heap
page read and write
8AF000
stack
page read and write
4640000
direct allocation
page read and write
3123000
heap
page read and write
2E05000
heap
page read and write
3F3E000
heap
page read and write
3EF2000
heap
page read and write
438B000
heap
page read and write
482000
unkown
page readonly
8FA000
heap
page read and write
47E0000
direct allocation
page read and write
401000
unkown
page execute read
2BA0000
direct allocation
page read and write
3EF2000
heap
page read and write
47E0000
direct allocation
page read and write
2C13000
heap
page read and write
3400000
direct allocation
page execute and read and write
2B90000
heap
page read and write
47E0000
direct allocation
page read and write
15E000
stack
page read and write
332D000
heap
page read and write
8B4000
stack
page read and write
2C02000
heap
page read and write
4909000
direct allocation
page read and write
15BF000
stack
page read and write
2C13000
heap
page read and write
47E0000
direct allocation
page read and write
36D1000
direct allocation
page execute and read and write
2FA0000
heap
page read and write
2C13000
heap
page read and write
2F40000
direct allocation
page read and write
3E54000
heap
page read and write
490000
unkown
page write copy
36CD000
direct allocation
page execute and read and write
3E62000
heap
page read and write
3FCD000
heap
page read and write
3EF2000
heap
page read and write
4763000
direct allocation
page read and write
3FCD000
heap
page read and write
2C13000
heap
page read and write
3FCC000
heap
page read and write
15FE000
stack
page read and write
401000
unkown
page execute read
3801000
heap
page read and write
2E55000
heap
page read and write
3290000
direct allocation
page read and write
2C13000
heap
page read and write
2C13000
heap
page read and write
3FCD000
heap
page read and write
2C13000
heap
page read and write
There are 186 hidden memdumps, click here to show them.