IOC Report
DPT_590327839_027838893200_____________________________.exe

loading gif

Files

File Path
Type
Category
Malicious
DPT_590327839_027838893200_____________________________.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut9B87.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut9BE5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\electicism
ASCII text, with very long lines (29744), with no line terminators
modified
C:\Users\user\AppData\Local\Temp\intemeration
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DPT_590327839_027838893200_____________________________.exe
"C:\Users\user\Desktop\DPT_590327839_027838893200_____________________________.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\DPT_590327839_027838893200_____________________________.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2500000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
FC1000
unkown
page execute read
1088000
unkown
page readonly
187F000
heap
page read and write
150C000
stack
page read and write
1434000
trusted library allocation
page read and write
1258000
heap
page read and write
44A9000
direct allocation
page read and write
1720000
trusted library allocation
page execute and read and write
451E000
direct allocation
page read and write
70416000
unkown
page readonly
11F5000
heap
page read and write
1289000
heap
page read and write
1976000
heap
page read and write
4303000
direct allocation
page read and write
44A9000
direct allocation
page read and write
5AFE000
stack
page read and write
1979000
heap
page read and write
70401000
unkown
page execute read
44A9000
direct allocation
page read and write
564E000
stack
page read and write
191A000
heap
page read and write
19BA000
heap
page read and write
41E0000
direct allocation
page read and write
18A6000
heap
page read and write
56CE000
stack
page read and write
186A000
heap
page read and write
17BF000
stack
page read and write
2534000
heap
page read and write
1879000
heap
page read and write
DE9000
stack
page read and write
1430000
trusted library allocation
page read and write
1869000
heap
page read and write
5C90000
trusted library allocation
page read and write
41E0000
direct allocation
page read and write
19BA000
heap
page read and write
451E000
direct allocation
page read and write
1852000
heap
page read and write
127A000
heap
page read and write
7041D000
unkown
page read and write
4279000
trusted library allocation
page read and write
19AA000
heap
page read and write
55C0000
heap
page execute and read and write
1313000
heap
page read and write
1800000
heap
page read and write
1098000
unkown
page readonly
18A6000
heap
page read and write
131E000
heap
page read and write
FC0000
unkown
page readonly
2580000
heap
page read and write
65B0000
trusted library allocation
page read and write
6570000
trusted library allocation
page execute and read and write
1462000
trusted library allocation
page read and write
41E0000
direct allocation
page read and write
44AD000
direct allocation
page read and write
32C6000
trusted library allocation
page read and write
303E000
trusted library allocation
page read and write
1878000
heap
page read and write
303B000
trusted library allocation
page read and write
1150000
heap
page read and write
4380000
direct allocation
page read and write
132B000
heap
page read and write
3329000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
17FC000
stack
page read and write
560C000
stack
page read and write
4380000
direct allocation
page read and write
1210000
heap
page read and write
3051000
trusted library allocation
page read and write
1150000
heap
page read and write
1730000
trusted library allocation
page read and write
3080000
heap
page read and write
6373000
heap
page read and write
1088000
unkown
page readonly
55B7000
trusted library allocation
page read and write
108A000
unkown
page readonly
19AA000
heap
page read and write
17CF000
stack
page read and write
143D000
trusted library allocation
page execute and read and write
19BA000
heap
page read and write
55A0000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
FC1000
unkown
page execute read
3098000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
2530000
heap
page read and write
44AD000
direct allocation
page read and write
14CE000
stack
page read and write
44A9000
direct allocation
page read and write
F7A000
stack
page read and write
FC0000
unkown
page readonly
44A9000
direct allocation
page read and write
4303000
direct allocation
page read and write
6670000
heap
page read and write
1852000
heap
page read and write
119E000
stack
page read and write
400000
system
page execute and read and write
1098000
unkown
page readonly
70400000
unkown
page readonly
305D000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
1286000
heap
page read and write
42C000
system
page execute and read and write
1820000
heap
page read and write
146B000
trusted library allocation
page execute and read and write
145A000
trusted library allocation
page execute and read and write
3042000
trusted library allocation
page read and write
1843000
heap
page read and write
1250000
heap
page read and write
44AD000
direct allocation
page read and write
3036000
trusted library allocation
page read and write
6460000
heap
page read and write
451E000
direct allocation
page read and write
7F670000
trusted library allocation
page execute and read and write
18A5000
heap
page read and write
20EE000
stack
page read and write
24F0000
direct allocation
page execute and read and write
107F000
unkown
page read and write
185B000
heap
page read and write
332E000
trusted library allocation
page read and write
195A000
heap
page read and write
4380000
direct allocation
page read and write
1740000
trusted library allocation
page read and write
1510000
heap
page read and write
1420000
trusted library allocation
page read and write
199A000
heap
page read and write
18A7000
heap
page read and write
58FF000
stack
page read and write
1879000
heap
page read and write
5C87000
trusted library allocation
page read and write
451E000
direct allocation
page read and write
18C6000
heap
page read and write
1852000
heap
page read and write
3344000
trusted library allocation
page read and write
18A6000
heap
page read and write
1979000
heap
page read and write
190A000
heap
page read and write
104F000
unkown
page readonly
6560000
trusted library allocation
page execute and read and write
57FC000
stack
page read and write
42B5000
trusted library allocation
page read and write
1879000
heap
page read and write
44A9000
direct allocation
page read and write
19A8000
heap
page read and write
1945000
heap
page read and write
107F000
unkown
page write copy
3240000
heap
page execute and read and write
1827000
heap
page read and write
451E000
direct allocation
page read and write
3030000
trusted library allocation
page read and write
17DB000
stack
page read and write
4303000
direct allocation
page read and write
1083000
unkown
page write copy
1450000
trusted library allocation
page read and write
185B000
heap
page read and write
1853000
heap
page read and write
197B000
heap
page read and write
1456000
trusted library allocation
page execute and read and write
4303000
direct allocation
page read and write
199A000
heap
page read and write
451E000
direct allocation
page read and write
3251000
trusted library allocation
page read and write
41E0000
direct allocation
page read and write
10F8000
stack
page read and write
1480000
trusted library allocation
page read and write
4251000
trusted library allocation
page read and write
1075000
unkown
page readonly
1780000
heap
page read and write
1075000
unkown
page readonly
56F0000
heap
page read and write
322E000
stack
page read and write
41E0000
direct allocation
page read and write
44AD000
direct allocation
page read and write
65A0000
heap
page read and write
4303000
direct allocation
page read and write
1897000
heap
page read and write
1979000
heap
page read and write
32B9000
trusted library allocation
page read and write
104F000
unkown
page readonly
304A000
trusted library allocation
page read and write
44AD000
direct allocation
page read and write
41E0000
direct allocation
page read and write
44AD000
direct allocation
page read and write
7041F000
unkown
page readonly
4303000
direct allocation
page read and write
1888000
heap
page read and write
333E000
trusted library allocation
page read and write
1140000
heap
page read and write
24EE000
stack
page read and write
18A6000
heap
page read and write
4380000
direct allocation
page read and write
5CA0000
trusted library allocation
page read and write
56F3000
heap
page read and write
5C80000
trusted library allocation
page read and write
11A0000
heap
page read and write
113E000
stack
page read and write
304E000
trusted library allocation
page read and write
302E000
stack
page read and write
1467000
trusted library allocation
page execute and read and write
1452000
trusted library allocation
page read and write
6360000
heap
page read and write
4380000
direct allocation
page read and write
55B0000
trusted library allocation
page read and write
11F0000
heap
page read and write
4380000
direct allocation
page read and write
108A000
unkown
page readonly
144D000
trusted library allocation
page execute and read and write
32C0000
trusted library allocation
page read and write
10F0000
heap
page read and write
1433000
trusted library allocation
page execute and read and write
1440000
trusted library allocation
page read and write
There are 202 hidden memdumps, click here to show them.