Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PDT_7367027738832_789257820__________________________.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut6466.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut6503.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\electicism
|
ASCII text, with very long lines (29744), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\phytographical
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe
|
"C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://sectigo.com/CPS0
|
unknown
|
||
http://mail.worlorderbillions.top
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://worlorderbillions.top
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.worlorderbillions.top
|
unknown
|
||
worlorderbillions.top
|
185.244.151.84
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.244.151.84
|
worlorderbillions.top
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28FE000
|
trusted library allocation
|
page read and write
|
||
292A000
|
trusted library allocation
|
page read and write
|
||
1080000
|
direct allocation
|
page read and write
|
||
28B1000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
770000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
4AED000
|
stack
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
7C5000
|
unkown
|
page readonly
|
||
5C20000
|
heap
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
E28000
|
heap
|
page read and write
|
||
70A000
|
stack
|
page read and write
|
||
7E8000
|
unkown
|
page readonly
|
||
C04000
|
trusted library allocation
|
page read and write
|
||
5C7C000
|
heap
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
9F0000
|
direct allocation
|
page execute and read and write
|
||
3933000
|
direct allocation
|
page read and write
|
||
3933000
|
direct allocation
|
page read and write
|
||
4EB3000
|
heap
|
page read and write
|
||
3933000
|
direct allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
5C26000
|
heap
|
page read and write
|
||
79F000
|
unkown
|
page readonly
|
||
C2D000
|
trusted library allocation
|
page execute and read and write
|
||
27C8000
|
trusted library allocation
|
page read and write
|
||
5EBD000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
C36000
|
trusted library allocation
|
page execute and read and write
|
||
1DCE000
|
stack
|
page read and write
|
||
4CA000
|
stack
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
2918000
|
trusted library allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
3ADD000
|
direct allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
7D8000
|
unkown
|
page readonly
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
518C000
|
stack
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
1331000
|
heap
|
page read and write
|
||
3ADD000
|
direct allocation
|
page read and write
|
||
3B4E000
|
direct allocation
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
1241000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
4E36000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
trusted library allocation
|
page execute and read and write
|
||
5C81000
|
heap
|
page read and write
|
||
4E4E000
|
trusted library allocation
|
page read and write
|
||
3AD9000
|
direct allocation
|
page read and write
|
||
136E000
|
heap
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
1231000
|
heap
|
page read and write
|
||
3933000
|
direct allocation
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
3ADD000
|
direct allocation
|
page read and write
|
||
3ADD000
|
direct allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
2932000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3B4E000
|
direct allocation
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
7F910000
|
trusted library allocation
|
page execute and read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
5E70000
|
trusted library allocation
|
page execute and read and write
|
||
1258000
|
heap
|
page read and write
|
||
4E4A000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
38D9000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
C45000
|
trusted library allocation
|
page execute and read and write
|
||
615D000
|
stack
|
page read and write
|
||
C32000
|
trusted library allocation
|
page read and write
|
||
1231000
|
heap
|
page read and write
|
||
7E8000
|
unkown
|
page readonly
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
38B1000
|
trusted library allocation
|
page read and write
|
||
49EC000
|
stack
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page execute and read and write
|
||
EC5000
|
heap
|
page read and write
|
||
3AD9000
|
direct allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
C0D000
|
trusted library allocation
|
page execute and read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
7CF000
|
unkown
|
page read and write
|
||
5FA7000
|
trusted library allocation
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
4E3B000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
unkown
|
page write copy
|
||
79F000
|
unkown
|
page readonly
|
||
7E0000
|
heap
|
page read and write
|
||
6710000
|
heap
|
page read and write
|
||
E3E000
|
heap
|
page read and write
|
||
2926000
|
trusted library allocation
|
page read and write
|
||
4E42000
|
trusted library allocation
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
5C22000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
5C40000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
3B4E000
|
direct allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
3B4E000
|
direct allocation
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
5C7E000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
3AD9000
|
direct allocation
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page execute and read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
39B0000
|
direct allocation
|
page read and write
|
||
5F9E000
|
stack
|
page read and write
|
||
3AD9000
|
direct allocation
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
C03000
|
trusted library allocation
|
page execute and read and write
|
||
12DD000
|
heap
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
5E66000
|
trusted library allocation
|
page read and write
|
||
3AD9000
|
direct allocation
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
3B4E000
|
direct allocation
|
page read and write
|
||
3933000
|
direct allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
7DA000
|
unkown
|
page readonly
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3933000
|
direct allocation
|
page read and write
|
||
12B4000
|
heap
|
page read and write
|
||
4E3E000
|
trusted library allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
1258000
|
heap
|
page read and write
|
||
7C5000
|
unkown
|
page readonly
|
||
4E56000
|
trusted library allocation
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
1278000
|
heap
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
7DA000
|
unkown
|
page readonly
|
||
7D8000
|
unkown
|
page readonly
|
||
3AD9000
|
direct allocation
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
3ADD000
|
direct allocation
|
page read and write
|
||
1332000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
1241000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
7D3000
|
unkown
|
page write copy
|
||
124E000
|
heap
|
page read and write
|
||
711000
|
unkown
|
page execute read
|
||
C42000
|
trusted library allocation
|
page read and write
|
||
57D000
|
stack
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
5F5F000
|
stack
|
page read and write
|
||
3B4E000
|
direct allocation
|
page read and write
|
||
6720000
|
trusted library allocation
|
page execute and read and write
|
||
11F5000
|
heap
|
page read and write
|
||
C4B000
|
trusted library allocation
|
page execute and read and write
|
||
4E62000
|
trusted library allocation
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
C47000
|
trusted library allocation
|
page execute and read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
3ADD000
|
direct allocation
|
page read and write
|
||
711000
|
unkown
|
page execute read
|
||
39B0000
|
direct allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
D80000
|
trusted library allocation
|
page execute and read and write
|
||
10E0000
|
heap
|
page read and write
|
||
19CE000
|
stack
|
page read and write
|
||
2870000
|
heap
|
page execute and read and write
|
||
EF3000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
There are 214 hidden memdumps, click here to show them.