IOC Report
ABT-57809267-57236090890_____________________________________.exe

loading gif

Files

File Path
Type
Category
Malicious
ABT-57809267-57236090890_____________________________________.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\aut8218.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut8276.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\caulds
data
dropped
C:\Users\user\AppData\Local\Temp\drawlingly
ASCII text, with very long lines (28720), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ABT-57809267-57236090890_____________________________________.exe
"C:\Users\user\Desktop\ABT-57809267-57236090890_____________________________________.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\ABT-57809267-57236090890_____________________________________.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3A90000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3C90000
direct allocation
page read and write
2A20000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
1291000
heap
page read and write
28AE000
stack
page read and write
3C13000
direct allocation
page read and write
3A69000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
1291000
heap
page read and write
F10000
heap
page read and write
3D89000
direct allocation
page read and write
1291000
heap
page read and write
F82000
trusted library allocation
page read and write
3C13000
direct allocation
page read and write
F40000
trusted library allocation
page read and write
123A000
heap
page read and write
126A000
heap
page read and write
5657000
trusted library allocation
page read and write
523E000
stack
page read and write
D10000
heap
page read and write
127A000
heap
page read and write
1326000
heap
page read and write
DE1000
heap
page read and write
2B23000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
F6D000
trusted library allocation
page execute and read and write
2900000
heap
page execute and read and write
127C000
heap
page read and write
4F20000
trusted library allocation
page read and write
76F000
unkown
page readonly
3DBD000
direct allocation
page read and write
1232000
heap
page read and write
3BE3000
direct allocation
page read and write
5680000
trusted library allocation
page execute and read and write
3E2E000
direct allocation
page read and write
5C40000
heap
page read and write
1223000
heap
page read and write
7B8000
unkown
page readonly
FFC000
stack
page read and write
6E0000
unkown
page readonly
4F2E000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
3AF0000
direct allocation
page read and write
12B1000
heap
page read and write
124C000
heap
page read and write
1EB0000
heap
page read and write
2AB6000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
134C000
heap
page read and write
3E2E000
direct allocation
page read and write
5E40000
trusted library allocation
page read and write
D18000
heap
page read and write
F50000
trusted library allocation
page read and write
4FCC000
stack
page read and write
1291000
heap
page read and write
D3A000
heap
page read and write
2B37000
trusted library allocation
page read and write
3DBD000
direct allocation
page read and write
7AA000
unkown
page readonly
4F2B000
trusted library allocation
page read and write
2B3C000
trusted library allocation
page read and write
117E000
stack
page read and write
103E000
stack
page read and write
1232000
heap
page read and write
6E1000
unkown
page execute read
5677000
trusted library allocation
page read and write
5C44000
heap
page read and write
2B27000
trusted library allocation
page read and write
3AC0000
direct allocation
page read and write
3AC0000
direct allocation
page read and write
4F32000
trusted library allocation
page read and write
513E000
stack
page read and write
3C90000
direct allocation
page read and write
5E80000
heap
page read and write
5D40000
heap
page read and write
50D3000
heap
page read and write
1040000
heap
page read and write
13BF000
heap
page read and write
3C90000
direct allocation
page read and write
3DFE000
direct allocation
page read and write
13C0000
heap
page read and write
2AB0000
trusted library allocation
page read and write
4A48000
trusted library allocation
page read and write
3D8D000
direct allocation
page read and write
123D000
heap
page read and write
795000
unkown
page readonly
2A10000
trusted library allocation
page read and write
B70000
heap
page read and write
400000
system
page execute and read and write
3AC0000
direct allocation
page read and write
79F000
unkown
page read and write
F87000
trusted library allocation
page execute and read and write
79F000
unkown
page write copy
127C000
heap
page read and write
3C13000
direct allocation
page read and write
C75000
heap
page read and write
1060000
heap
page read and write
D9B000
heap
page read and write
1291000
heap
page read and write
1200000
heap
page read and write
4F60000
trusted library allocation
page read and write
795000
unkown
page readonly
11D0000
heap
page read and write
F72000
trusted library allocation
page read and write
1291000
heap
page read and write
4BDD000
stack
page read and write
3D89000
direct allocation
page read and write
6130000
heap
page read and write
2A30000
heap
page read and write
1261000
heap
page read and write
7AA000
unkown
page readonly
9F0000
heap
page read and write
28F0000
trusted library allocation
page execute and read and write
4F4D000
trusted library allocation
page read and write
123D000
heap
page read and write
4F52000
trusted library allocation
page read and write
D45000
heap
page read and write
3BE3000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
5C77000
heap
page read and write
5650000
trusted library allocation
page read and write
126B000
heap
page read and write
D47000
heap
page read and write
FCE000
stack
page read and write
3E2E000
direct allocation
page read and write
5670000
trusted library allocation
page read and write
7B8000
unkown
page readonly
A3A000
stack
page read and write
B38000
stack
page read and write
C70000
heap
page read and write
1291000
heap
page read and write
1232000
heap
page read and write
3D8D000
direct allocation
page read and write
127A000
heap
page read and write
7F4C0000
trusted library allocation
page execute and read and write
1208000
heap
page read and write
527E000
stack
page read and write
4F3E000
trusted library allocation
page read and write
5C60000
heap
page read and write
5E50000
trusted library allocation
page execute and read and write
F5D000
trusted library allocation
page execute and read and write
5EE0000
trusted library allocation
page read and write
1291000
heap
page read and write
2AA9000
trusted library allocation
page read and write
123D000
heap
page read and write
13A1000
heap
page read and write
F76000
trusted library allocation
page execute and read and write
52BE000
stack
page read and write
6E1000
unkown
page execute read
50CC000
stack
page read and write
3A41000
trusted library allocation
page read and write
50D0000
heap
page read and write
1233000
heap
page read and write
3DBD000
direct allocation
page read and write
7A8000
unkown
page readonly
F90000
heap
page read and write
3DFE000
direct allocation
page read and write
13B0000
heap
page read and write
28EC000
stack
page read and write
3DB9000
direct allocation
page read and write
3D89000
direct allocation
page read and write
11D4000
heap
page read and write
7A8000
unkown
page readonly
52D0000
heap
page execute and read and write
3D8D000
direct allocation
page read and write
1E80000
direct allocation
page execute and read and write
3DB9000
direct allocation
page read and write
3DFE000
direct allocation
page read and write
53DF000
stack
page read and write
6E0000
unkown
page readonly
F7A000
trusted library allocation
page execute and read and write
4F26000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
3AAC000
trusted library allocation
page read and write
1291000
heap
page read and write
13C0000
heap
page read and write
11E0000
heap
page read and write
F8B000
trusted library allocation
page execute and read and write
3C60000
direct allocation
page read and write
5660000
trusted library allocation
page read and write
DE6000
heap
page read and write
3AF0000
direct allocation
page read and write
76F000
unkown
page readonly
F54000
trusted library allocation
page read and write
42C000
system
page execute and read and write
13C0000
heap
page read and write
127B000
heap
page read and write
13A1000
heap
page read and write
989000
stack
page read and write
FBF000
stack
page read and write
1291000
heap
page read and write
1292000
heap
page read and write
2A0F000
stack
page read and write
3C60000
direct allocation
page read and write
FDB000
stack
page read and write
3C60000
direct allocation
page read and write
1230000
heap
page read and write
19FD000
stack
page read and write
3DB9000
direct allocation
page read and write
7A3000
unkown
page write copy
1DFE000
stack
page read and write
C50000
heap
page read and write
5620000
trusted library allocation
page read and write
F53000
trusted library allocation
page execute and read and write
54DF000
stack
page read and write
3BE3000
direct allocation
page read and write
1369000
heap
page read and write
There are 201 hidden memdumps, click here to show them.