IOC Report
stopka2017.exe

loading gif

Files

File Path
Type
Category
Malicious
stopka2017.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\{86E40C64-8653-4A9E-A0CD-DAC878E788CC}\Stopka2017.hta
HTML document, Non-ISO extended-ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\stopka2017.exe
"C:\Users\user\Desktop\stopka2017.exe"
malicious
C:\Windows\SysWOW64\mshta.exe
"C:\Windows\System32\mshta.exe" "C:\Users\user\AppData\Local\Temp\{86E40C64-8653-4A9E-A0CD-DAC878E788CC}\Stopka2017.hta"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
637C000
heap
page read and write
637E000
heap
page read and write
4E80000
heap
page read and write
4D24000
trusted library allocation
page read and write
A442000
trusted library allocation
page read and write
8959000
heap
page read and write
7EE000
stack
page read and write
6382000
heap
page read and write
2BEF000
stack
page read and write
890E000
heap
page read and write
6356000
heap
page read and write
635B000
heap
page read and write
637E000
heap
page read and write
6310000
heap
page read and write
272E000
stack
page read and write
7FA91000
trusted library allocation
page execute read
20C0000
heap
page read and write
6355000
heap
page read and write
4CD0000
trusted library allocation
page read and write
6399000
heap
page read and write
4D08000
trusted library allocation
page read and write
4D1E000
trusted library allocation
page read and write
6357000
heap
page read and write
8EF000
stack
page read and write
2DA5000
heap
page read and write
6355000
heap
page read and write
6362000
heap
page read and write
50FE000
stack
page read and write
537E000
stack
page read and write
9B000
stack
page read and write
401000
unkown
page execute read
6376000
heap
page read and write
6355000
heap
page read and write
88F1000
heap
page read and write
2DBC000
heap
page read and write
61B0000
trusted library allocation
page read and write
4BB6000
heap
page read and write
4CDA000
trusted library allocation
page read and write
88FC000
heap
page read and write
29AE000
stack
page read and write
4CCC000
trusted library allocation
page read and write
400000
unkown
page readonly
637E000
heap
page read and write
637E000
heap
page read and write
55FF000
stack
page read and write
7FA71000
trusted library allocation
page execute read
196000
stack
page read and write
887C000
heap
page read and write
4CDC000
trusted library allocation
page read and write
4FB0000
heap
page read and write
8946000
heap
page read and write
6180000
trusted library allocation
page read and write
2D4D000
heap
page read and write
4F90000
heap
page read and write
4CEA000
trusted library allocation
page read and write
2AAF000
stack
page read and write
6355000
heap
page read and write
635D000
heap
page read and write
8904000
heap
page read and write
2E6C000
stack
page read and write
2D2F000
stack
page read and write
4BB3000
heap
page read and write
2DAC000
heap
page read and write
4CE0000
trusted library allocation
page read and write
6357000
heap
page read and write
4D2C000
trusted library allocation
page read and write
8911000
heap
page read and write
615000
heap
page read and write
6364000
heap
page read and write
2130000
heap
page read and write
306A000
heap
page read and write
6355000
heap
page read and write
61A0000
trusted library allocation
page read and write
2D00000
heap
page read and write
635B000
heap
page read and write
4BB0000
heap
page read and write
4BC6000
heap
page read and write
223E000
stack
page read and write
4E50000
heap
page read and write
2DA0000
heap
page read and write
286E000
stack
page read and write
4FFB000
stack
page read and write
635B000
heap
page read and write
6355000
heap
page read and write
637E000
heap
page read and write
6362000
heap
page read and write
6371000
heap
page read and write
4B9000
heap
page read and write
2D5C000
heap
page read and write
6369000
heap
page read and write
4CE8000
trusted library allocation
page read and write
635B000
heap
page read and write
282F000
stack
page read and write
6320000
heap
page read and write
858C000
stack
page read and write
5680000
trusted library allocation
page read and write
7FA81000
trusted library allocation
page execute read
6347000
heap
page read and write
635B000
heap
page read and write
40E000
unkown
page read and write
61C0000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
4BCF000
heap
page read and write
6357000
heap
page read and write
40E000
unkown
page write copy
2DA8000
heap
page read and write
460000
heap
page read and write
4D18000
trusted library allocation
page read and write
4CCA000
trusted library allocation
page read and write
4BC0000
heap
page read and write
635F000
heap
page read and write
637E000
heap
page read and write
3060000
heap
page read and write
415000
unkown
page readonly
6367000
heap
page read and write
6357000
heap
page read and write
6369000
heap
page read and write
4CCE000
trusted library allocation
page read and write
7FAA1000
trusted library allocation
page execute read
635B000
heap
page read and write
6363000
heap
page read and write
638B000
heap
page read and write
635D000
heap
page read and write
3040000
heap
page read and write
638F000
heap
page read and write
2990000
heap
page read and write
637E000
heap
page read and write
4D1C000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
8A60000
trusted library section
page readonly
636F000
heap
page read and write
88FA000
heap
page read and write
29C0000
trusted library allocation
page read and write
637E000
heap
page read and write
4D06000
trusted library allocation
page read and write
637E000
heap
page read and write
636F000
heap
page read and write
7FAB0000
trusted library allocation
page execute read
6332000
heap
page read and write
5BE000
stack
page read and write
4CF8000
trusted library allocation
page read and write
637E000
heap
page read and write
44F000
unkown
page readonly
636E000
heap
page read and write
212E000
stack
page read and write
88EF000
heap
page read and write
4D10000
trusted library allocation
page read and write
2D77000
heap
page read and write
6384000
heap
page read and write
54BF000
stack
page read and write
4FB4000
heap
page read and write
637E000
heap
page read and write
400000
unkown
page readonly
637E000
heap
page read and write
48A000
heap
page read and write
40B000
unkown
page readonly
4CC8000
trusted library allocation
page read and write
635C000
heap
page read and write
635B000
heap
page read and write
2D9E000
heap
page read and write
636E000
heap
page read and write
2D6C000
stack
page read and write
29D0000
heap
page read and write
61C0000
trusted library allocation
page read and write
4D2A000
trusted library allocation
page read and write
40B000
unkown
page readonly
848E000
stack
page read and write
88CF000
heap
page read and write
8914000
heap
page read and write
637E000
heap
page read and write
4D00000
trusted library allocation
page read and write
636E000
heap
page read and write
480000
heap
page read and write
6355000
heap
page read and write
635B000
heap
page read and write
4E4F000
stack
page read and write
20A0000
heap
page read and write
29D5000
heap
page read and write
88F8000
heap
page read and write
635B000
heap
page read and write
88DF000
heap
page read and write
88CC000
heap
page read and write
637E000
heap
page read and write
636B000
heap
page read and write
6359000
heap
page read and write
2250000
heap
page read and write
7CA000
stack
page read and write
19D000
stack
page read and write
637E000
heap
page read and write
53BB000
stack
page read and write
411000
unkown
page readonly
4D20000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
513B000
stack
page read and write
88EC000
heap
page read and write
5FE000
stack
page read and write
2940000
heap
page read and write
2D99000
heap
page read and write
8954000
heap
page read and write
523F000
stack
page read and write
2C2E000
stack
page read and write
44F000
unkown
page readonly
4CDE000
trusted library allocation
page read and write
4D26000
trusted library allocation
page read and write
4D28000
trusted library allocation
page read and write
4BBA000
heap
page read and write
6366000
heap
page read and write
6368000
heap
page read and write
61B0000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
3066000
heap
page read and write
8C7000
stack
page read and write
2AEE000
stack
page read and write
6355000
heap
page read and write
637E000
heap
page read and write
6366000
heap
page read and write
8901000
heap
page read and write
636B000
heap
page read and write
6372000
heap
page read and write
527C000
stack
page read and write
4BC4000
heap
page read and write
6395000
heap
page read and write
4CF0000
trusted library allocation
page read and write
6355000
heap
page read and write
6180000
trusted library allocation
page read and write
6361000
heap
page read and write
4CFA000
trusted library allocation
page read and write
54FE000
stack
page read and write
470000
heap
page read and write
6371000
heap
page read and write
296F000
stack
page read and write
88DD000
heap
page read and write
636A000
heap
page read and write
6355000
heap
page read and write
6371000
heap
page read and write
610000
heap
page read and write
2D8E000
heap
page read and write
2D08000
heap
page read and write
4DFE000
stack
page read and write
411000
unkown
page readonly
637E000
heap
page read and write
4CD8000
trusted library allocation
page read and write
8870000
heap
page read and write
401000
unkown
page execute read
415000
unkown
page readonly
636E000
heap
page read and write
48E000
heap
page read and write
637E000
heap
page read and write
There are 238 hidden memdumps, click here to show them.