IOC Report
PDT_7367027738832_789257820__________________________.exe

loading gif

Files

File Path
Type
Category
Malicious
PDT_7367027738832_789257820__________________________.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut6466.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut6503.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\electicism
ASCII text, with very long lines (29744), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\phytographical
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe
"C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\PDT_7367027738832_789257820__________________________.exe"
malicious

URLs

Name
IP
Malicious
https://sectigo.com/CPS0
unknown
http://mail.worlorderbillions.top
unknown
https://account.dyn.com/
unknown
http://worlorderbillions.top
unknown

Domains

Name
IP
Malicious
mail.worlorderbillions.top
unknown
malicious
worlorderbillions.top
185.244.151.84

IPs

IP
Domain
Country
Malicious
185.244.151.84
worlorderbillions.top
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
28FE000
trusted library allocation
page read and write
malicious
292A000
trusted library allocation
page read and write
malicious
1080000
direct allocation
page read and write
malicious
28B1000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
770000
heap
page read and write
120C000
heap
page read and write
C60000
heap
page read and write
4AED000
stack
page read and write
503E000
stack
page read and write
7C5000
unkown
page readonly
5C20000
heap
page read and write
68D0000
heap
page read and write
E28000
heap
page read and write
70A000
stack
page read and write
7E8000
unkown
page readonly
C04000
trusted library allocation
page read and write
5C7C000
heap
page read and write
66DE000
stack
page read and write
9F0000
direct allocation
page execute and read and write
3933000
direct allocation
page read and write
3933000
direct allocation
page read and write
4EB3000
heap
page read and write
3933000
direct allocation
page read and write
1212000
heap
page read and write
5C26000
heap
page read and write
79F000
unkown
page readonly
C2D000
trusted library allocation
page execute and read and write
27C8000
trusted library allocation
page read and write
5EBD000
stack
page read and write
1204000
heap
page read and write
C36000
trusted library allocation
page execute and read and write
1DCE000
stack
page read and write
4CA000
stack
page read and write
4E5D000
trusted library allocation
page read and write
FFC000
stack
page read and write
2918000
trusted library allocation
page read and write
538E000
stack
page read and write
FBF000
stack
page read and write
C00000
trusted library allocation
page read and write
3ADD000
direct allocation
page read and write
5E60000
trusted library allocation
page read and write
7D8000
unkown
page readonly
C30000
trusted library allocation
page read and write
1212000
heap
page read and write
5BE000
stack
page read and write
E58000
heap
page read and write
518C000
stack
page read and write
28FC000
trusted library allocation
page read and write
1331000
heap
page read and write
3ADD000
direct allocation
page read and write
3B4E000
direct allocation
page read and write
528E000
stack
page read and write
39B0000
direct allocation
page read and write
1241000
heap
page read and write
FCE000
stack
page read and write
1258000
heap
page read and write
1258000
heap
page read and write
4E36000
trusted library allocation
page read and write
C3A000
trusted library allocation
page execute and read and write
5C81000
heap
page read and write
4E4E000
trusted library allocation
page read and write
3AD9000
direct allocation
page read and write
136E000
heap
page read and write
2860000
trusted library allocation
page read and write
1231000
heap
page read and write
3933000
direct allocation
page read and write
1259000
heap
page read and write
1258000
heap
page read and write
3ADD000
direct allocation
page read and write
3ADD000
direct allocation
page read and write
4EB0000
heap
page read and write
2932000
trusted library allocation
page read and write
5B1E000
stack
page read and write
4FFC000
stack
page read and write
400000
system
page execute and read and write
3B4E000
direct allocation
page read and write
11D8000
heap
page read and write
7F910000
trusted library allocation
page execute and read and write
39B0000
direct allocation
page read and write
710000
unkown
page readonly
5E70000
trusted library allocation
page execute and read and write
1258000
heap
page read and write
4E4A000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
38D9000
trusted library allocation
page read and write
39B0000
direct allocation
page read and write
C45000
trusted library allocation
page execute and read and write
615D000
stack
page read and write
C32000
trusted library allocation
page read and write
1231000
heap
page read and write
7E8000
unkown
page readonly
C20000
trusted library allocation
page read and write
3810000
direct allocation
page read and write
65DE000
stack
page read and write
38B1000
trusted library allocation
page read and write
49EC000
stack
page read and write
5EC0000
trusted library allocation
page execute and read and write
EC5000
heap
page read and write
3AD9000
direct allocation
page read and write
C65000
heap
page read and write
C0D000
trusted library allocation
page execute and read and write
39B0000
direct allocation
page read and write
1258000
heap
page read and write
7CF000
unkown
page read and write
5FA7000
trusted library allocation
page read and write
1341000
heap
page read and write
3810000
direct allocation
page read and write
4E3B000
trusted library allocation
page read and write
7CF000
unkown
page write copy
79F000
unkown
page readonly
7E0000
heap
page read and write
6710000
heap
page read and write
E3E000
heap
page read and write
2926000
trusted library allocation
page read and write
4E42000
trusted library allocation
page read and write
1341000
heap
page read and write
5C22000
heap
page read and write
28A0000
heap
page read and write
27BE000
stack
page read and write
507E000
stack
page read and write
1258000
heap
page read and write
5C40000
heap
page read and write
530000
heap
page read and write
1258000
heap
page read and write
53CE000
stack
page read and write
3B4E000
direct allocation
page read and write
5E0000
heap
page read and write
9D0000
heap
page read and write
3810000
direct allocation
page read and write
3B4E000
direct allocation
page read and write
FDB000
stack
page read and write
4EC0000
heap
page read and write
5C7E000
heap
page read and write
D90000
heap
page read and write
3810000
direct allocation
page read and write
11D0000
heap
page read and write
3AD9000
direct allocation
page read and write
BF0000
trusted library allocation
page read and write
4E51000
trusted library allocation
page read and write
5080000
heap
page execute and read and write
5460000
trusted library allocation
page read and write
39B0000
direct allocation
page read and write
5F9E000
stack
page read and write
3AD9000
direct allocation
page read and write
12CD000
heap
page read and write
C03000
trusted library allocation
page execute and read and write
12DD000
heap
page read and write
1212000
heap
page read and write
5E66000
trusted library allocation
page read and write
3AD9000
direct allocation
page read and write
124E000
heap
page read and write
5E50000
trusted library allocation
page read and write
1258000
heap
page read and write
2880000
trusted library allocation
page read and write
391D000
trusted library allocation
page read and write
3B4E000
direct allocation
page read and write
3933000
direct allocation
page read and write
1350000
heap
page read and write
4E30000
trusted library allocation
page read and write
9C0000
heap
page read and write
DDE000
stack
page read and write
7DA000
unkown
page readonly
2890000
trusted library allocation
page read and write
120C000
heap
page read and write
124F000
heap
page read and write
C10000
heap
page read and write
3933000
direct allocation
page read and write
12B4000
heap
page read and write
4E3E000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
1370000
heap
page read and write
710000
unkown
page readonly
1258000
heap
page read and write
7C5000
unkown
page readonly
4E56000
trusted library allocation
page read and write
3810000
direct allocation
page read and write
E98000
heap
page read and write
1278000
heap
page read and write
1232000
heap
page read and write
7DA000
unkown
page readonly
7D8000
unkown
page readonly
3AD9000
direct allocation
page read and write
135F000
heap
page read and write
3ADD000
direct allocation
page read and write
1332000
heap
page read and write
5468000
trusted library allocation
page read and write
1241000
heap
page read and write
E20000
heap
page read and write
5C0000
heap
page read and write
1205000
heap
page read and write
7D3000
unkown
page write copy
124E000
heap
page read and write
711000
unkown
page execute read
C42000
trusted library allocation
page read and write
57D000
stack
page read and write
E55000
heap
page read and write
5F5F000
stack
page read and write
3B4E000
direct allocation
page read and write
6720000
trusted library allocation
page execute and read and write
11F5000
heap
page read and write
C4B000
trusted library allocation
page execute and read and write
4E62000
trusted library allocation
page read and write
E4A000
heap
page read and write
C47000
trusted library allocation
page execute and read and write
3810000
direct allocation
page read and write
AF9000
stack
page read and write
1350000
heap
page read and write
10E4000
heap
page read and write
66E0000
trusted library allocation
page read and write
7C0000
heap
page read and write
3ADD000
direct allocation
page read and write
711000
unkown
page execute read
39B0000
direct allocation
page read and write
1204000
heap
page read and write
D70000
trusted library allocation
page read and write
D80000
trusted library allocation
page execute and read and write
10E0000
heap
page read and write
19CE000
stack
page read and write
2870000
heap
page execute and read and write
EF3000
heap
page read and write
5E4C000
trusted library allocation
page read and write
There are 214 hidden memdumps, click here to show them.