Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
stopka2017.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\{86E40C64-8653-4A9E-A0CD-DAC878E788CC}\Stopka2017.hta
|
HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\stopka2017.exe
|
"C:\Users\user\Desktop\stopka2017.exe"
|
||
C:\Windows\SysWOW64\mshta.exe
|
"C:\Windows\System32\mshta.exe" "C:\Users\user\AppData\Local\Temp\{86E40C64-8653-4A9E-A0CD-DAC878E788CC}\Stopka2017.hta"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
637C000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
4D24000
|
trusted library allocation
|
page read and write
|
||
A442000
|
trusted library allocation
|
page read and write
|
||
8959000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
6382000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
890E000
|
heap
|
page read and write
|
||
6356000
|
heap
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
7FA91000
|
trusted library allocation
|
page execute read
|
||
20C0000
|
heap
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page read and write
|
||
6399000
|
heap
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
4D1E000
|
trusted library allocation
|
page read and write
|
||
6357000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
2DA5000
|
heap
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
6362000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6376000
|
heap
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
88F1000
|
heap
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
4BB6000
|
heap
|
page read and write
|
||
4CDA000
|
trusted library allocation
|
page read and write
|
||
88FC000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
4CCC000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
637E000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
55FF000
|
stack
|
page read and write
|
||
7FA71000
|
trusted library allocation
|
page execute read
|
||
196000
|
stack
|
page read and write
|
||
887C000
|
heap
|
page read and write
|
||
4CDC000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
8946000
|
heap
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
2D4D000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
4CEA000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
635D000
|
heap
|
page read and write
|
||
8904000
|
heap
|
page read and write
|
||
2E6C000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
4BB3000
|
heap
|
page read and write
|
||
2DAC000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
6357000
|
heap
|
page read and write
|
||
4D2C000
|
trusted library allocation
|
page read and write
|
||
8911000
|
heap
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
6364000
|
heap
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
306A000
|
heap
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
4BC6000
|
heap
|
page read and write
|
||
223E000
|
stack
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
4FFB000
|
stack
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
6362000
|
heap
|
page read and write
|
||
6371000
|
heap
|
page read and write
|
||
4B9000
|
heap
|
page read and write
|
||
2D5C000
|
heap
|
page read and write
|
||
6369000
|
heap
|
page read and write
|
||
4CE8000
|
trusted library allocation
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
6320000
|
heap
|
page read and write
|
||
858C000
|
stack
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
7FA81000
|
trusted library allocation
|
page execute read
|
||
6347000
|
heap
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
4BCF000
|
heap
|
page read and write
|
||
6357000
|
heap
|
page read and write
|
||
40E000
|
unkown
|
page write copy
|
||
2DA8000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
4D18000
|
trusted library allocation
|
page read and write
|
||
4CCA000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
635F000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
415000
|
unkown
|
page readonly
|
||
6367000
|
heap
|
page read and write
|
||
6357000
|
heap
|
page read and write
|
||
6369000
|
heap
|
page read and write
|
||
4CCE000
|
trusted library allocation
|
page read and write
|
||
7FAA1000
|
trusted library allocation
|
page execute read
|
||
635B000
|
heap
|
page read and write
|
||
6363000
|
heap
|
page read and write
|
||
638B000
|
heap
|
page read and write
|
||
635D000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
638F000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
4D1C000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
8A60000
|
trusted library section
|
page readonly
|
||
636F000
|
heap
|
page read and write
|
||
88FA000
|
heap
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
4D06000
|
trusted library allocation
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
636F000
|
heap
|
page read and write
|
||
7FAB0000
|
trusted library allocation
|
page execute read
|
||
6332000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
44F000
|
unkown
|
page readonly
|
||
636E000
|
heap
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
88EF000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
6384000
|
heap
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
4FB4000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
637E000
|
heap
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
40B000
|
unkown
|
page readonly
|
||
4CC8000
|
trusted library allocation
|
page read and write
|
||
635C000
|
heap
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
2D9E000
|
heap
|
page read and write
|
||
636E000
|
heap
|
page read and write
|
||
2D6C000
|
stack
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
4D2A000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page readonly
|
||
848E000
|
stack
|
page read and write
|
||
88CF000
|
heap
|
page read and write
|
||
8914000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
636E000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
20A0000
|
heap
|
page read and write
|
||
29D5000
|
heap
|
page read and write
|
||
88F8000
|
heap
|
page read and write
|
||
635B000
|
heap
|
page read and write
|
||
88DF000
|
heap
|
page read and write
|
||
88CC000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
636B000
|
heap
|
page read and write
|
||
6359000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
7CA000
|
stack
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
53BB000
|
stack
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
513B000
|
stack
|
page read and write
|
||
88EC000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
2D99000
|
heap
|
page read and write
|
||
8954000
|
heap
|
page read and write
|
||
523F000
|
stack
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
44F000
|
unkown
|
page readonly
|
||
4CDE000
|
trusted library allocation
|
page read and write
|
||
4D26000
|
trusted library allocation
|
page read and write
|
||
4D28000
|
trusted library allocation
|
page read and write
|
||
4BBA000
|
heap
|
page read and write
|
||
6366000
|
heap
|
page read and write
|
||
6368000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
3066000
|
heap
|
page read and write
|
||
8C7000
|
stack
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
||
6366000
|
heap
|
page read and write
|
||
8901000
|
heap
|
page read and write
|
||
636B000
|
heap
|
page read and write
|
||
6372000
|
heap
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
4BC4000
|
heap
|
page read and write
|
||
6395000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
6361000
|
heap
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
6371000
|
heap
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
88DD000
|
heap
|
page read and write
|
||
636A000
|
heap
|
page read and write
|
||
6355000
|
heap
|
page read and write
|
||
6371000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
2D08000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
637E000
|
heap
|
page read and write
|
||
4CD8000
|
trusted library allocation
|
page read and write
|
||
8870000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
415000
|
unkown
|
page readonly
|
||
636E000
|
heap
|
page read and write
|
||
48E000
|
heap
|
page read and write
|
||
637E000
|
heap
|
page read and write
|
There are 238 hidden memdumps, click here to show them.