IOC Report
SCU_9028892992899029_789290929209922________________.exe

loading gif

Files

File Path
Type
Category
Malicious
SCU_9028892992899029_789290929209922________________.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Halitherses
SVr4 curses screen image, big-endian
dropped
C:\Users\user\AppData\Local\Temp\aut9FBD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autA02C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\enterogenous
ASCII text, with very long lines (29732), with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SCU_9028892992899029_789290929209922________________.exe
"C:\Users\user\Desktop\SCU_9028892992899029_789290929209922________________.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\SCU_9028892992899029_789290929209922________________.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
1490000
direct allocation
page read and write
malicious
13CE000
stack
page read and write
561E000
trusted library allocation
page read and write
41FE000
direct allocation
page read and write
13FA000
trusted library allocation
page execute and read and write
5737000
trusted library allocation
page read and write
16F9000
heap
page read and write
CE8000
unkown
page readonly
64B0000
heap
page read and write
4189000
direct allocation
page read and write
D5E000
stack
page read and write
16A8000
heap
page read and write
4189000
direct allocation
page read and write
12F4000
trusted library allocation
page read and write
1600000
trusted library allocation
page execute and read and write
CC5000
unkown
page readonly
5622000
trusted library allocation
page read and write
5A8F000
stack
page read and write
CE8000
unkown
page readonly
13F0000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
1240000
heap
page read and write
5C70000
trusted library allocation
page execute and read and write
3B74000
heap
page read and write
1305000
heap
page read and write
41FE000
direct allocation
page read and write
3EC0000
direct allocation
page read and write
56B0000
heap
page execute and read and write
2FA0000
trusted library allocation
page read and write
CC5000
unkown
page readonly
5636000
trusted library allocation
page read and write
1709000
heap
page read and write
2EE8000
trusted library allocation
page read and write
14B5000
heap
page read and write
5C50000
trusted library allocation
page execute and read and write
3FE3000
direct allocation
page read and write
16F9000
heap
page read and write
1677000
heap
page read and write
1680000
heap
page read and write
5743000
heap
page read and write
1546000
heap
page read and write
173E000
heap
page read and write
5631000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
1630000
heap
page read and write
6EE0D000
unkown
page read and write
3EC0000
direct allocation
page read and write
5BCE000
stack
page read and write
16A8000
heap
page read and write
31D1000
trusted library allocation
page read and write
6EE06000
unkown
page readonly
1680000
heap
page read and write
4060000
direct allocation
page read and write
1680000
heap
page read and write
BE0000
heap
page read and write
6EDF0000
unkown
page readonly
16F9000
heap
page read and write
1693000
heap
page read and write
1680000
heap
page read and write
418D000
direct allocation
page read and write
6600000
heap
page read and write
C9F000
unkown
page readonly
41D1000
trusted library allocation
page read and write
1693000
heap
page read and write
64B5000
heap
page read and write
2FB0000
trusted library allocation
page read and write
41FE000
direct allocation
page read and write
569C000
stack
page read and write
1488000
heap
page read and write
1407000
trusted library allocation
page execute and read and write
561B000
trusted library allocation
page read and write
418D000
direct allocation
page read and write
5720000
trusted library allocation
page read and write
13FC000
stack
page read and write
5ACE000
stack
page read and write
1684000
heap
page read and write
16F9000
heap
page read and write
A9A000
stack
page read and write
64C0000
heap
page read and write
4060000
direct allocation
page read and write
563D000
trusted library allocation
page read and write
41F9000
trusted library allocation
page read and write
FD8000
stack
page read and write
1693000
heap
page read and write
4189000
direct allocation
page read and write
13F6000
trusted library allocation
page execute and read and write
16AC000
heap
page read and write
C11000
unkown
page execute read
16F9000
heap
page read and write
4189000
direct allocation
page read and write
171F000
heap
page read and write
1420000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
167C000
heap
page read and write
1430000
heap
page read and write
16A8000
heap
page read and write
1680000
heap
page read and write
CD8000
unkown
page readonly
5CA0000
heap
page read and write
3FE3000
direct allocation
page read and write
1694000
heap
page read and write
12FD000
trusted library allocation
page execute and read and write
16A8000
heap
page read and write
1680000
heap
page read and write
32AF000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FAE0000
trusted library allocation
page execute and read and write
C9F000
unkown
page readonly
3FE3000
direct allocation
page read and write
3EC0000
direct allocation
page read and write
16A8000
heap
page read and write
4189000
direct allocation
page read and write
2FC0000
heap
page execute and read and write
1E4E000
stack
page read and write
1684000
heap
page read and write
1680000
heap
page read and write
1682000
heap
page read and write
16FA000
heap
page read and write
16F9000
heap
page read and write
16A8000
heap
page read and write
4060000
direct allocation
page read and write
167D000
heap
page read and write
4060000
direct allocation
page read and write
173E000
heap
page read and write
4236000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
14F0000
heap
page read and write
1657000
heap
page read and write
3FE3000
direct allocation
page read and write
13BF000
stack
page read and write
16A8000
heap
page read and write
5616000
trusted library allocation
page read and write
16FA000
heap
page read and write
13ED000
trusted library allocation
page execute and read and write
4189000
direct allocation
page read and write
3EC0000
direct allocation
page read and write
12C0000
heap
page read and write
1555000
heap
page read and write
16A8000
heap
page read and write
3FE3000
direct allocation
page read and write
16A8000
heap
page read and write
1693000
heap
page read and write
12E0000
trusted library allocation
page read and write
3B70000
heap
page read and write
562E000
trusted library allocation
page read and write
ED9000
stack
page read and write
594E000
stack
page read and write
13E0000
trusted library allocation
page read and write
32AB000
trusted library allocation
page read and write
1693000
heap
page read and write
1674000
heap
page read and write
5C40000
trusted library allocation
page read and write
41FE000
direct allocation
page read and write
584C000
stack
page read and write
64D2000
heap
page read and write
5730000
trusted library allocation
page read and write
12F3000
trusted library allocation
page execute and read and write
CD3000
unkown
page write copy
3239000
trusted library allocation
page read and write
1694000
heap
page read and write
5642000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
C10000
unkown
page readonly
3FE3000
direct allocation
page read and write
1709000
heap
page read and write
16F9000
heap
page read and write
41FE000
direct allocation
page read and write
3246000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
1698000
heap
page read and write
418D000
direct allocation
page read and write
1590000
heap
page read and write
30CF000
stack
page read and write
CCF000
unkown
page read and write
16F9000
heap
page read and write
3EC0000
direct allocation
page read and write
16F9000
heap
page read and write
4060000
direct allocation
page read and write
171F000
heap
page read and write
CDA000
unkown
page readonly
14AA000
heap
page read and write
1480000
heap
page read and write
13F2000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
15FC000
stack
page read and write
1300000
heap
page read and write
4060000
direct allocation
page read and write
418D000
direct allocation
page read and write
418D000
direct allocation
page read and write
16F9000
heap
page read and write
6EDF1000
unkown
page execute read
42C000
system
page execute and read and write
52CE000
stack
page read and write
400000
system
page execute and read and write
1480000
direct allocation
page execute and read and write
C10000
unkown
page readonly
B00000
heap
page read and write
16F9000
heap
page read and write
D9E000
stack
page read and write
CDA000
unkown
page readonly
1650000
heap
page read and write
167D000
heap
page read and write
1400000
trusted library allocation
page read and write
16A8000
heap
page read and write
C11000
unkown
page execute read
1694000
heap
page read and write
14B7000
heap
page read and write
1680000
heap
page read and write
1402000
trusted library allocation
page read and write
173E000
heap
page read and write
65B0000
trusted library allocation
page read and write
63B0000
heap
page read and write
598E000
stack
page read and write
418D000
direct allocation
page read and write
224E000
stack
page read and write
3EC0000
direct allocation
page read and write
41FE000
direct allocation
page read and write
13DB000
stack
page read and write
1694000
heap
page read and write
5740000
heap
page read and write
1693000
heap
page read and write
1290000
heap
page read and write
CD8000
unkown
page readonly
140B000
trusted library allocation
page execute and read and write
1684000
heap
page read and write
2F80000
heap
page read and write
570E000
stack
page read and write
CCF000
unkown
page write copy
16F9000
heap
page read and write
32BF000
trusted library allocation
page read and write
16A8000
heap
page read and write
6EE0F000
unkown
page readonly
147E000
stack
page read and write
5610000
trusted library allocation
page read and write
1677000
heap
page read and write
There are 228 hidden memdumps, click here to show them.