IOC Report
Payment confirmaton copy.exe

loading gif

Files

File Path
Type
Category
Malicious
Payment confirmaton copy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ghauts
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payment confirmaton copy.exe
"C:\Users\user\Desktop\Payment confirmaton copy.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Payment confirmaton copy.exe"
malicious

Domains

Name
IP
Malicious
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45

Memdumps

Base Address
Regiontype
Protect
Malicious
3550000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
4064000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
2E13000
heap
page read and write
9CE000
stack
page read and write
4064000
heap
page read and write
8FE000
stack
page read and write
49C9000
direct allocation
page read and write
4011000
heap
page read and write
2E13000
heap
page read and write
2E02000
heap
page read and write
4A3E000
direct allocation
page read and write
2E13000
heap
page read and write
4700000
direct allocation
page read and write
2E13000
heap
page read and write
49C9000
direct allocation
page read and write
4A3E000
direct allocation
page read and write
4011000
heap
page read and write
3EF0000
heap
page read and write
4064000
heap
page read and write
2E13000
heap
page read and write
4064000
heap
page read and write
4064000
heap
page read and write
2BC0000
heap
page read and write
4064000
heap
page read and write
49CD000
direct allocation
page read and write
4064000
heap
page read and write
32D0000
direct allocation
page read and write
4011000
heap
page read and write
49C9000
direct allocation
page read and write
2E13000
heap
page read and write
4011000
heap
page read and write
369E000
heap
page read and write
4823000
direct allocation
page read and write
4064000
heap
page read and write
4065000
heap
page read and write
3F0D000
heap
page read and write
4064000
heap
page read and write
4064000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
49CD000
direct allocation
page read and write
4049000
heap
page read and write
4700000
direct allocation
page read and write
100000
heap
page read and write
3000000
heap
page read and write
4064000
heap
page read and write
2E13000
heap
page read and write
48A0000
direct allocation
page read and write
4064000
heap
page read and write
344E000
stack
page read and write
4064000
heap
page read and write
49CD000
direct allocation
page read and write
4A7000
unkown
page read and write
3700000
direct allocation
page execute and read and write
C10000
heap
page read and write
3012000
heap
page read and write
2F75000
heap
page read and write
4011000
heap
page read and write
3F10000
heap
page read and write
3D10000
heap
page read and write
4064000
heap
page read and write
2E13000
heap
page read and write
4AB000
unkown
page readonly
145E000
stack
page read and write
4064000
heap
page read and write
354F000
stack
page read and write
185F000
stack
page read and write
40A4000
heap
page read and write
4064000
heap
page read and write
4A3E000
direct allocation
page read and write
A60000
heap
page read and write
382D000
direct allocation
page execute and read and write
3005000
heap
page read and write
3BBF000
heap
page read and write
3829000
direct allocation
page execute and read and write
400A000
heap
page execute and read and write
3017000
heap
page read and write
4823000
direct allocation
page read and write
4064000
heap
page read and write
2BD0000
heap
page read and write
49CD000
direct allocation
page read and write
400E000
heap
page read and write
4064000
heap
page read and write
35A0000
direct allocation
page read and write
482000
unkown
page readonly
2E13000
heap
page read and write
4700000
direct allocation
page read and write
4011000
heap
page read and write
4A3E000
direct allocation
page read and write
4011000
heap
page read and write
40A4000
heap
page read and write
3FFA000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
389E000
direct allocation
page execute and read and write
4011000
heap
page read and write
A3E000
stack
page read and write
35A0000
direct allocation
page read and write
4011000
heap
page read and write
490000
unkown
page write copy
4011000
heap
page read and write
4700000
direct allocation
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
4823000
direct allocation
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
2E13000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
89F000
stack
page read and write
4823000
direct allocation
page read and write
4011000
heap
page read and write
4064000
heap
page read and write
4064000
heap
page read and write
4011000
heap
page read and write
4A3E000
direct allocation
page read and write
4011000
heap
page read and write
49C9000
direct allocation
page read and write
4011000
heap
page read and write
401000
unkown
page execute read
35A0000
direct allocation
page read and write
4700000
direct allocation
page read and write
4064000
heap
page read and write
4A3E000
direct allocation
page read and write
400000
unkown
page readonly
4064000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
3423000
heap
page read and write
4011000
heap
page read and write
49C9000
direct allocation
page read and write
3F59000
heap
page read and write
340F000
stack
page read and write
4064000
heap
page read and write
3500000
heap
page read and write
C9A000
heap
page read and write
3F0A000
heap
page read and write
2E13000
heap
page read and write
4064000
heap
page read and write
4011000
heap
page read and write
4064000
heap
page read and write
4011000
heap
page read and write
4064000
heap
page read and write
2E13000
heap
page read and write
4011000
heap
page read and write
2E13000
heap
page read and write
3629000
heap
page read and write
4065000
heap
page read and write
4011000
heap
page read and write
4419000
heap
page read and write
49CD000
direct allocation
page read and write
2F14000
heap
page read and write
1E0000
heap
page read and write
C60000
heap
page read and write
3ABF000
stack
page read and write
3C5F000
heap
page read and write
4065000
heap
page read and write
4011000
heap
page read and write
35A0000
direct allocation
page read and write
2E13000
heap
page read and write
401000
unkown
page execute read
4064000
heap
page read and write
970000
heap
page read and write
4011000
heap
page read and write
2E13000
heap
page read and write
2B3D000
stack
page read and write
4011000
heap
page read and write
36BE000
stack
page read and write
2E13000
heap
page read and write
4064000
heap
page read and write
4011000
heap
page read and write
4064000
heap
page read and write
3EFE000
heap
page read and write
3017000
heap
page read and write
39D1000
direct allocation
page execute and read and write
4064000
heap
page read and write
49CD000
direct allocation
page read and write
3300000
heap
page read and write
4AB000
unkown
page readonly
4064000
heap
page read and write
4064000
heap
page read and write
9F0000
heap
page read and write
4011000
heap
page read and write
48A0000
direct allocation
page read and write
A65000
heap
page read and write
48A0000
direct allocation
page read and write
3A42000
direct allocation
page execute and read and write
4064000
heap
page read and write
3F4A000
heap
page read and write
4011000
heap
page read and write
3C01000
heap
page read and write
8AF000
stack
page read and write
3F00000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
4011000
heap
page read and write
49C9000
direct allocation
page read and write
454D000
heap
page read and write
93E000
stack
page read and write
2F70000
heap
page read and write
490000
unkown
page read and write
4011000
heap
page read and write
4064000
heap
page read and write
2E00000
heap
page read and write
940000
heap
page read and write
4011000
heap
page read and write
C6A000
heap
page read and write
48A0000
direct allocation
page read and write
2E13000
heap
page read and write
4011000
heap
page read and write
48A0000
direct allocation
page read and write
4011000
heap
page read and write
48A0000
direct allocation
page read and write
362D000
heap
page read and write
4011000
heap
page read and write
2E13000
heap
page read and write
4823000
direct allocation
page read and write
35A0000
direct allocation
page read and write
4064000
heap
page read and write
2E13000
heap
page read and write
4064000
heap
page read and write
4064000
heap
page read and write
3ACA000
heap
page read and write
3005000
heap
page read and write
2AFD000
stack
page read and write
400000
unkown
page readonly
2E13000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
4011000
heap
page read and write
2E13000
heap
page read and write
3EDA000
heap
page read and write
9A000
stack
page read and write
3E10000
heap
page read and write
4010000
heap
page read and write
40B7000
heap
page read and write
35A0000
direct allocation
page read and write
4064000
heap
page read and write
4064000
heap
page read and write
2F10000
heap
page read and write
2B90000
heap
page read and write
330E000
stack
page read and write
482000
unkown
page readonly
4064000
heap
page read and write
2B70000
heap
page read and write
2E13000
heap
page read and write
3FD5000
heap
page read and write
C6E000
heap
page read and write
4823000
direct allocation
page read and write
3101000
heap
page read and write
2F20000
direct allocation
page read and write
2E13000
heap
page read and write
4064000
heap
page read and write
39CD000
direct allocation
page execute and read and write
4065000
heap
page read and write
2E13000
heap
page read and write
4065000
heap
page read and write
4700000
direct allocation
page read and write
There are 256 hidden memdumps, click here to show them.