IOC Report
SWH_67367383992_939930039003___________________________.exe

loading gif

Files

File Path
Type
Category
Malicious
SWH_67367383992_939930039003___________________________.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Gehman
ASCII text, with very long lines (28720), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut9DC1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut9E10.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\roundups
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SWH_67367383992_939930039003___________________________.exe
"C:\Users\user\Desktop\SWH_67367383992_939930039003___________________________.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\SWH_67367383992_939930039003___________________________.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
3AE0000
direct allocation
page read and write
malicious
3E09000
direct allocation
page read and write
3E4E000
direct allocation
page read and write
3E0D000
direct allocation
page read and write
340000
unkown
page readonly
3C33000
direct allocation
page read and write
55C0000
heap
page read and write
3E7E000
direct allocation
page read and write
3C63000
direct allocation
page read and write
1484000
trusted library allocation
page read and write
11E3000
heap
page read and write
3B10000
direct allocation
page read and write
341000
unkown
page execute read
12A1000
heap
page read and write
1236000
heap
page read and write
2E6B000
trusted library allocation
page execute and read and write
12E0000
heap
page read and write
5572000
trusted library allocation
page read and write
2F40000
heap
page execute and read and write
58CE000
stack
page read and write
11F0000
heap
page read and write
3CE0000
direct allocation
page read and write
11A0000
heap
page read and write
14AA000
trusted library allocation
page execute and read and write
FFC000
stack
page read and write
19AF000
stack
page read and write
6580000
trusted library allocation
page read and write
400000
system
page execute and read and write
3147000
trusted library allocation
page read and write
2F1C000
stack
page read and write
6385000
heap
page read and write
12AF000
heap
page read and write
11EB000
heap
page read and write
1470000
trusted library allocation
page read and write
3E0D000
direct allocation
page read and write
40BC000
trusted library allocation
page read and write
3CB0000
direct allocation
page read and write
66C0000
heap
page read and write
11E0000
heap
page read and write
1236000
heap
page read and write
3AD0000
direct allocation
page execute and read and write
314D000
trusted library allocation
page read and write
14A6000
trusted library allocation
page execute and read and write
3133000
trusted library allocation
page read and write
556D000
trusted library allocation
page read and write
3B40000
direct allocation
page read and write
133F000
heap
page read and write
5B70000
trusted library allocation
page read and write
6587000
trusted library allocation
page read and write
3DDD000
direct allocation
page read and write
1236000
heap
page read and write
1236000
heap
page read and write
65E0000
heap
page read and write
5546000
trusted library allocation
page read and write
1190000
heap
page read and write
575E000
stack
page read and write
12BF000
heap
page read and write
120F000
heap
page read and write
3FF000
unkown
page write copy
65B0000
trusted library allocation
page execute and read and write
570C000
stack
page read and write
403000
unkown
page write copy
304F000
stack
page read and write
5058000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
7F9C0000
trusted library allocation
page execute and read and write
3F5000
unkown
page readonly
1236000
heap
page read and write
12F3000
heap
page read and write
1322000
heap
page read and write
11D4000
heap
page read and write
FDB000
stack
page read and write
65A0000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
1331000
heap
page read and write
3C33000
direct allocation
page read and write
3CF000
unkown
page readonly
121F000
heap
page read and write
3E09000
direct allocation
page read and write
5561000
trusted library allocation
page read and write
3CE0000
direct allocation
page read and write
1138000
stack
page read and write
1430000
heap
page read and write
3DD9000
direct allocation
page read and write
408000
unkown
page readonly
11B0000
heap
page read and write
3E4E000
direct allocation
page read and write
554B000
trusted library allocation
page read and write
1237000
heap
page read and write
1215000
heap
page read and write
3E7E000
direct allocation
page read and write
3B10000
direct allocation
page read and write
9FA000
stack
page read and write
341000
unkown
page execute read
555A000
trusted library allocation
page read and write
2F20000
trusted library allocation
page execute and read and write
3AB0000
heap
page read and write
4079000
trusted library allocation
page read and write
6590000
trusted library allocation
page execute and read and write
1218000
heap
page read and write
3B10000
direct allocation
page read and write
121F000
heap
page read and write
3E7E000
direct allocation
page read and write
11B8000
heap
page read and write
555E000
trusted library allocation
page read and write
120F000
heap
page read and write
5566000
trusted library allocation
page read and write
1256000
heap
page read and write
1A30000
heap
page read and write
1312000
heap
page read and write
59CE000
stack
page read and write
2E62000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
19F0000
heap
page read and write
51EE000
stack
page read and write
11E8000
heap
page read and write
103A000
stack
page read and write
3CF000
unkown
page readonly
1331000
heap
page read and write
55C3000
heap
page read and write
5B77000
trusted library allocation
page read and write
11F0000
heap
page read and write
3FF000
unkown
page read and write
2E60000
trusted library allocation
page read and write
6370000
heap
page read and write
1236000
heap
page read and write
588E000
stack
page read and write
1490000
trusted library allocation
page read and write
3C63000
direct allocation
page read and write
5540000
trusted library allocation
page read and write
5A0E000
stack
page read and write
FCE000
stack
page read and write
3DD9000
direct allocation
page read and write
120A000
heap
page read and write
5580000
trusted library allocation
page read and write
3E0D000
direct allocation
page read and write
6570000
trusted library allocation
page read and write
1236000
heap
page read and write
3CB0000
direct allocation
page read and write
5B0E000
stack
page read and write
5590000
trusted library allocation
page read and write
2E90000
heap
page read and write
1300000
heap
page read and write
560C000
stack
page read and write
3E09000
direct allocation
page read and write
6640000
trusted library allocation
page read and write
35DE000
stack
page read and write
5552000
trusted library allocation
page read and write
11E2000
heap
page read and write
2EDE000
stack
page read and write
3E4E000
direct allocation
page read and write
3CE0000
direct allocation
page read and write
11FE000
heap
page read and write
408000
unkown
page readonly
340000
unkown
page readonly
12C1000
heap
page read and write
1060000
heap
page read and write
554E000
trusted library allocation
page read and write
1312000
heap
page read and write
11E4000
heap
page read and write
120F000
heap
page read and write
117E000
stack
page read and write
3CB0000
direct allocation
page read and write
12A9000
heap
page read and write
3C63000
direct allocation
page read and write
1305000
heap
page read and write
5770000
trusted library allocation
page read and write
19EE000
stack
page read and write
148D000
trusted library allocation
page execute and read and write
11EB000
heap
page read and write
FBF000
stack
page read and write
1236000
heap
page read and write
3DD9000
direct allocation
page read and write
1483000
trusted library allocation
page execute and read and write
3C33000
direct allocation
page read and write
14A2000
trusted library allocation
page read and write
2E67000
trusted library allocation
page execute and read and write
1292000
heap
page read and write
19F4000
heap
page read and write
3137000
trusted library allocation
page read and write
11F0000
heap
page read and write
1480000
trusted library allocation
page read and write
3B40000
direct allocation
page read and write
1322000
heap
page read and write
3B40000
direct allocation
page read and write
12E9000
heap
page read and write
3F5000
unkown
page readonly
3DDD000
direct allocation
page read and write
1440000
heap
page read and write
149D000
trusted library allocation
page execute and read and write
14A0000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
6470000
heap
page read and write
5530000
trusted library allocation
page read and write
42C000
system
page execute and read and write
14B0000
heap
page read and write
3DDD000
direct allocation
page read and write
1180000
heap
page read and write
2F30000
trusted library allocation
page read and write
5780000
heap
page execute and read and write
30C0000
trusted library allocation
page read and write
There are 192 hidden memdumps, click here to show them.