IOC Report
Salary_Receipt.exe

loading gif

Files

File Path
Type
Category
Malicious
Salary_Receipt.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Maianthemum
data
dropped
C:\Users\user\AppData\Local\Temp\aut72C7.tmp
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Salary_Receipt.exe
"C:\Users\user\Desktop\Salary_Receipt.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Salary_Receipt.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4D0000
system
page execute and read and write
malicious
2D00000
direct allocation
page read and write
malicious
2813000
heap
page read and write
2813000
heap
page read and write
45D000
stack
page read and write
2813000
heap
page read and write
2D50000
direct allocation
page read and write
69E000
stack
page read and write
D0A000
heap
page read and write
B10000
direct allocation
page execute and read and write
2813000
heap
page read and write
3580000
direct allocation
page read and write
371E000
direct allocation
page read and write
BE4000
heap
page read and write
2813000
heap
page read and write
3503000
direct allocation
page read and write
2E00000
heap
page read and write
9CF000
stack
page read and write
36AD000
direct allocation
page read and write
13AF000
stack
page read and write
2813000
heap
page read and write
B94000
heap
page read and write
D28000
heap
page read and write
371E000
direct allocation
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
36A9000
direct allocation
page read and write
141000
unkown
page execute read
2813000
heap
page read and write
2D50000
direct allocation
page read and write
32D1000
direct allocation
page execute and read and write
2A17000
heap
page read and write
2F29000
heap
page read and write
3580000
direct allocation
page read and write
130000
heap
page read and write
1CF000
unkown
page readonly
2F9E000
heap
page read and write
3580000
direct allocation
page read and write
33E0000
direct allocation
page read and write
BB0000
heap
page read and write
2C00000
heap
page read and write
36A9000
direct allocation
page read and write
3A0000
heap
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
2D50000
direct allocation
page read and write
3580000
direct allocation
page read and write
650000
heap
page read and write
3129000
direct allocation
page execute and read and write
2D50000
direct allocation
page read and write
BED000
heap
page read and write
3342000
direct allocation
page execute and read and write
312D000
direct allocation
page execute and read and write
D0A000
heap
page read and write
1FF000
unkown
page write copy
2813000
heap
page read and write
9FD000
stack
page read and write
C5E000
heap
page read and write
2813000
heap
page read and write
3503000
direct allocation
page read and write
2A05000
heap
page read and write
371E000
direct allocation
page read and write
2813000
heap
page read and write
371E000
direct allocation
page read and write
2D50000
direct allocation
page read and write
2E01000
heap
page read and write
C5F000
heap
page read and write
36A9000
direct allocation
page read and write
2813000
heap
page read and write
2D23000
heap
page read and write
2CFF000
stack
page read and write
371E000
direct allocation
page read and write
3503000
direct allocation
page read and write
2D50000
direct allocation
page read and write
36A9000
direct allocation
page read and write
3503000
direct allocation
page read and write
9DB000
stack
page read and write
660000
direct allocation
page read and write
2813000
heap
page read and write
D18000
heap
page read and write
140000
unkown
page readonly
36A9000
direct allocation
page read and write
C5E000
heap
page read and write
36AD000
direct allocation
page read and write
1FF000
unkown
page read and write
3580000
direct allocation
page read and write
2A00000
heap
page read and write
3580000
direct allocation
page read and write
2813000
heap
page read and write
33E0000
direct allocation
page read and write
2A05000
heap
page read and write
2F2D000
heap
page read and write
17AE000
stack
page read and write
36AD000
direct allocation
page read and write
319E000
direct allocation
page execute and read and write
36AD000
direct allocation
page read and write
2A17000
heap
page read and write
27FE000
stack
page read and write
49C000
stack
page read and write
33E0000
direct allocation
page read and write
371E000
direct allocation
page read and write
33E0000
direct allocation
page read and write
2813000
heap
page read and write
B20000
direct allocation
page read and write
AF0000
heap
page read and write
D0A000
heap
page read and write
BB8000
heap
page read and write
BF4000
heap
page read and write
36AD000
direct allocation
page read and write
C37000
heap
page read and write
D28000
heap
page read and write
2800000
heap
page read and write
520000
heap
page read and write
570000
heap
page read and write
BF8000
heap
page read and write
141000
unkown
page execute read
2813000
heap
page read and write
1F5000
unkown
page readonly
3503000
direct allocation
page read and write
3580000
direct allocation
page read and write
3503000
direct allocation
page read and write
36A9000
direct allocation
page read and write
CE6000
heap
page read and write
33E0000
direct allocation
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
2B01000
heap
page read and write
C5E000
heap
page read and write
203000
unkown
page write copy
540000
heap
page read and write
2813000
heap
page read and write
2A12000
heap
page read and write
C5E000
heap
page read and write
1CF000
unkown
page readonly
33E0000
direct allocation
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
B90000
heap
page read and write
208000
unkown
page readonly
27BF000
stack
page read and write
3000000
direct allocation
page execute and read and write
3503000
direct allocation
page read and write
2802000
heap
page read and write
A3E000
stack
page read and write
32CD000
direct allocation
page execute and read and write
2813000
heap
page read and write
1990000
heap
page read and write
9BF000
stack
page read and write
BF4000
heap
page read and write
3EE000
stack
page read and write
36AD000
direct allocation
page read and write
140000
unkown
page readonly
371E000
direct allocation
page read and write
208000
unkown
page readonly
33E0000
direct allocation
page read and write
36A9000
direct allocation
page read and write
CA000
stack
page read and write
370000
heap
page read and write
36AD000
direct allocation
page read and write
2813000
heap
page read and write
2813000
heap
page read and write
1F5000
unkown
page readonly
2813000
heap
page read and write
There are 153 hidden memdumps, click here to show them.