IOC Report
DRVf7H9j4V.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DRVf7H9j4V.exe
"C:\Users\user\Desktop\DRVf7H9j4V.exe"
malicious

URLs

Name
IP
Malicious
http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kq
unknown
malicious
http://89.197.154.115:7700/K3rEzPnv_aWkoqWjwlQ_UwwHmzOpx4EBdVmPOf94Dvz96UsIrkE72JilI5LCEjfwvnZxqT-kqcT4DaURLYWyKMdkqDLkLGFtLfbxA06bzLkqpX3YMVK_WF-7csJS2nAg6pLu5gXYS3kF
89.197.154.115
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.apache.org/
unknown
http://www.zeustech.net/
unknown

IPs

IP
Domain
Country
Malicious
89.197.154.115
unknown
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
unkown
page execute read
malicious
401000
unkown
page execute read
malicious
690000
direct allocation
page execute and read and write
malicious
281E000
stack
page read and write
25DF000
stack
page read and write
580000
heap
page read and write
6E0000
heap
page read and write
2A9E000
stack
page read and write
97E000
stack
page read and write
78A000
heap
page read and write
1F0000
heap
page read and write
78D000
heap
page read and write
415000
unkown
page readonly
400000
unkown
page readonly
9C000
stack
page read and write
40C000
unkown
page readonly
26DF000
stack
page read and write
74E000
heap
page read and write
777000
heap
page read and write
40D000
unkown
page write copy
2A5E000
stack
page read and write
400000
unkown
page readonly
740000
heap
page read and write
74A000
heap
page read and write
19C000
stack
page read and write
9BE000
stack
page read and write
2B9D000
stack
page read and write
40D000
unkown
page write copy
585000
heap
page read and write
295E000
stack
page read and write
415000
unkown
page readonly
73E000
stack
page read and write
4F0000
heap
page read and write
40C000
unkown
page readonly
7AE000
heap
page read and write
291F000
stack
page read and write
9F0000
heap
page read and write
27DF000
stack
page read and write
There are 28 hidden memdumps, click here to show them.