Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ABT-57809267-57236090890_____________________________________.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut8218.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut8276.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\caulds
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\drawlingly
|
ASCII text, with very long lines (28720), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ABT-57809267-57236090890_____________________________________.exe
|
"C:\Users\user\Desktop\ABT-57809267-57236090890_____________________________________.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\ABT-57809267-57236090890_____________________________________.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3A90000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
3C90000
|
direct allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
3C13000
|
direct allocation
|
page read and write
|
||
3A69000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
3D89000
|
direct allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
F82000
|
trusted library allocation
|
page read and write
|
||
3C13000
|
direct allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
123A000
|
heap
|
page read and write
|
||
126A000
|
heap
|
page read and write
|
||
5657000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
DE1000
|
heap
|
page read and write
|
||
2B23000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
2900000
|
heap
|
page execute and read and write
|
||
127C000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
76F000
|
unkown
|
page readonly
|
||
3DBD000
|
direct allocation
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
3BE3000
|
direct allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page execute and read and write
|
||
3E2E000
|
direct allocation
|
page read and write
|
||
5C40000
|
heap
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
7B8000
|
unkown
|
page readonly
|
||
FFC000
|
stack
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
4F46000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
direct allocation
|
page read and write
|
||
12B1000
|
heap
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
2AB6000
|
trusted library allocation
|
page read and write
|
||
2A41000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
3E2E000
|
direct allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
2B37000
|
trusted library allocation
|
page read and write
|
||
3DBD000
|
direct allocation
|
page read and write
|
||
7AA000
|
unkown
|
page readonly
|
||
4F2B000
|
trusted library allocation
|
page read and write
|
||
2B3C000
|
trusted library allocation
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
6E1000
|
unkown
|
page execute read
|
||
5677000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
heap
|
page read and write
|
||
2B27000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
3C90000
|
direct allocation
|
page read and write
|
||
5E80000
|
heap
|
page read and write
|
||
5D40000
|
heap
|
page read and write
|
||
50D3000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
13BF000
|
heap
|
page read and write
|
||
3C90000
|
direct allocation
|
page read and write
|
||
3DFE000
|
direct allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
4A48000
|
trusted library allocation
|
page read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
123D000
|
heap
|
page read and write
|
||
795000
|
unkown
|
page readonly
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
79F000
|
unkown
|
page read and write
|
||
F87000
|
trusted library allocation
|
page execute and read and write
|
||
79F000
|
unkown
|
page write copy
|
||
127C000
|
heap
|
page read and write
|
||
3C13000
|
direct allocation
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
D9B000
|
heap
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
795000
|
unkown
|
page readonly
|
||
11D0000
|
heap
|
page read and write
|
||
F72000
|
trusted library allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
3D89000
|
direct allocation
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
1261000
|
heap
|
page read and write
|
||
7AA000
|
unkown
|
page readonly
|
||
9F0000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page execute and read and write
|
||
4F4D000
|
trusted library allocation
|
page read and write
|
||
123D000
|
heap
|
page read and write
|
||
4F52000
|
trusted library allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
3BE3000
|
direct allocation
|
page read and write
|
||
3AF0000
|
direct allocation
|
page read and write
|
||
5C77000
|
heap
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
3E2E000
|
direct allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
7B8000
|
unkown
|
page readonly
|
||
A3A000
|
stack
|
page read and write
|
||
B38000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
7F4C0000
|
trusted library allocation
|
page execute and read and write
|
||
1208000
|
heap
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
4F3E000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page execute and read and write
|
||
F5D000
|
trusted library allocation
|
page execute and read and write
|
||
5EE0000
|
trusted library allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
2AA9000
|
trusted library allocation
|
page read and write
|
||
123D000
|
heap
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
F76000
|
trusted library allocation
|
page execute and read and write
|
||
52BE000
|
stack
|
page read and write
|
||
6E1000
|
unkown
|
page execute read
|
||
50CC000
|
stack
|
page read and write
|
||
3A41000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
1233000
|
heap
|
page read and write
|
||
3DBD000
|
direct allocation
|
page read and write
|
||
7A8000
|
unkown
|
page readonly
|
||
F90000
|
heap
|
page read and write
|
||
3DFE000
|
direct allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
28EC000
|
stack
|
page read and write
|
||
3DB9000
|
direct allocation
|
page read and write
|
||
3D89000
|
direct allocation
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
7A8000
|
unkown
|
page readonly
|
||
52D0000
|
heap
|
page execute and read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
1E80000
|
direct allocation
|
page execute and read and write
|
||
3DB9000
|
direct allocation
|
page read and write
|
||
3DFE000
|
direct allocation
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
F7A000
|
trusted library allocation
|
page execute and read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
trusted library allocation
|
page read and write
|
||
3AAC000
|
trusted library allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
F8B000
|
trusted library allocation
|
page execute and read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
3AF0000
|
direct allocation
|
page read and write
|
||
76F000
|
unkown
|
page readonly
|
||
F54000
|
trusted library allocation
|
page read and write
|
||
42C000
|
system
|
page execute and read and write
|
||
13C0000
|
heap
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
989000
|
stack
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
3C60000
|
direct allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
19FD000
|
stack
|
page read and write
|
||
3DB9000
|
direct allocation
|
page read and write
|
||
7A3000
|
unkown
|
page write copy
|
||
1DFE000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
F53000
|
trusted library allocation
|
page execute and read and write
|
||
54DF000
|
stack
|
page read and write
|
||
3BE3000
|
direct allocation
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
There are 201 hidden memdumps, click here to show them.