IOC Report
Invoice OMS.132.2024 - S10.08 (2).exe

loading gif

Files

File Path
Type
Category
Malicious
Invoice OMS.132.2024 - S10.08 (2).exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut1CB7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\parachronistic
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Invoice OMS.132.2024 - S10.08 (2).exe
"C:\Users\user\Desktop\Invoice OMS.132.2024 - S10.08 (2).exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Invoice OMS.132.2024 - S10.08 (2).exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
620000
direct allocation
page read and write
malicious
410000
system
page execute and read and write
malicious
1DC000
stack
page read and write
3643000
direct allocation
page read and write
AD1000
unkown
page execute read
D2D000
heap
page read and write
2813000
heap
page read and write
480000
heap
page read and write
2813000
heap
page read and write
A7E000
stack
page read and write
2800000
heap
page read and write
900000
heap
page read and write
3643000
direct allocation
page read and write
D8C000
heap
page read and write
2813000
heap
page read and write
37E9000
direct allocation
page read and write
CD4000
heap
page read and write
3839000
direct allocation
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
18A0000
direct allocation
page read and write
2C00000
heap
page read and write
3643000
direct allocation
page read and write
680000
direct allocation
page read and write
3570000
direct allocation
page read and write
4B0000
heap
page read and write
ECC000
heap
page read and write
188E000
stack
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
385E000
direct allocation
page read and write
2A12000
heap
page read and write
460000
heap
page read and write
CCB000
heap
page read and write
2813000
heap
page read and write
5A0000
direct allocation
page read and write
2A05000
heap
page read and write
ECF000
heap
page read and write
38AE000
direct allocation
page read and write
CCA000
heap
page read and write
D2D000
heap
page read and write
385E000
direct allocation
page read and write
2813000
heap
page read and write
312D000
direct allocation
page execute and read and write
3129000
direct allocation
page execute and read and write
2813000
heap
page read and write
37ED000
direct allocation
page read and write
32D1000
direct allocation
page execute and read and write
3643000
direct allocation
page read and write
383D000
direct allocation
page read and write
670000
direct allocation
page read and write
B94000
unkown
page readonly
2F2D000
heap
page read and write
2E00000
heap
page read and write
3000000
direct allocation
page execute and read and write
1920000
heap
page read and write
8F0000
heap
page read and write
AD0000
unkown
page readonly
27CF000
stack
page read and write
3520000
direct allocation
page read and write
36C0000
direct allocation
page read and write
3693000
direct allocation
page read and write
ECC000
heap
page read and write
2813000
heap
page read and write
3570000
direct allocation
page read and write
E3B000
heap
page read and write
3570000
direct allocation
page read and write
B5D000
unkown
page readonly
AD1000
unkown
page execute read
2813000
heap
page read and write
1924000
heap
page read and write
2813000
heap
page read and write
C9E000
heap
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
D2D000
heap
page read and write
2B01000
heap
page read and write
CD4000
heap
page read and write
37E9000
direct allocation
page read and write
C9A000
heap
page read and write
2CFF000
stack
page read and write
32CD000
direct allocation
page execute and read and write
5DE000
stack
page read and write
37E9000
direct allocation
page read and write
385E000
direct allocation
page read and write
37ED000
direct allocation
page read and write
2813000
heap
page read and write
319E000
direct allocation
page execute and read and write
85F000
stack
page read and write
B8A000
unkown
page write copy
2813000
heap
page read and write
D14000
heap
page read and write
D29000
heap
page read and write
F1F000
heap
page read and write
C80000
heap
page read and write
D2D000
heap
page read and write
3839000
direct allocation
page read and write
37ED000
direct allocation
page read and write
B8F000
unkown
page write copy
2F9E000
heap
page read and write
3839000
direct allocation
page read and write
3710000
direct allocation
page read and write
CBB000
heap
page read and write
680000
direct allocation
page read and write
D22000
heap
page read and write
383D000
direct allocation
page read and write
ECC000
heap
page read and write
D3B000
heap
page read and write
3693000
direct allocation
page read and write
2813000
heap
page read and write
38AE000
direct allocation
page read and write
2813000
heap
page read and write
3520000
direct allocation
page read and write
2A05000
heap
page read and write
2813000
heap
page read and write
148E000
stack
page read and write
3693000
direct allocation
page read and write
920000
heap
page read and write
2A00000
heap
page read and write
3520000
direct allocation
page read and write
D8D000
heap
page read and write
680000
direct allocation
page read and write
383D000
direct allocation
page read and write
2802000
heap
page read and write
48A000
stack
page read and write
D2D000
heap
page read and write
680000
direct allocation
page read and write
84B000
stack
page read and write
2813000
heap
page read and write
19D000
stack
page read and write
C90000
heap
page read and write
CD4000
heap
page read and write
2813000
heap
page read and write
B7E000
unkown
page readonly
88C000
stack
page read and write
36C0000
direct allocation
page read and write
ECB000
heap
page execute and read and write
2813000
heap
page read and write
2D23000
heap
page read and write
B8A000
unkown
page read and write
385E000
direct allocation
page read and write
3520000
direct allocation
page read and write
670000
direct allocation
page read and write
D8C000
heap
page read and write
61E000
stack
page read and write
3710000
direct allocation
page read and write
CD4000
heap
page read and write
2813000
heap
page read and write
2F29000
heap
page read and write
2A17000
heap
page read and write
E4C000
heap
page read and write
B94000
unkown
page readonly
CD2000
heap
page read and write
38AE000
direct allocation
page read and write
86B000
stack
page read and write
2A17000
heap
page read and write
D2D000
heap
page read and write
B5D000
unkown
page readonly
2813000
heap
page read and write
36C0000
direct allocation
page read and write
CE8000
heap
page read and write
2E01000
heap
page read and write
590000
heap
page read and write
CB1000
heap
page read and write
B7E000
unkown
page readonly
37ED000
direct allocation
page read and write
36C0000
direct allocation
page read and write
A3E000
stack
page read and write
3342000
direct allocation
page execute and read and write
D2D000
heap
page read and write
2813000
heap
page read and write
3710000
direct allocation
page read and write
1940000
heap
page read and write
D2B000
heap
page read and write
2813000
heap
page read and write
AD0000
unkown
page readonly
37E9000
direct allocation
page read and write
2813000
heap
page read and write
There are 168 hidden memdumps, click here to show them.