IOC Report
uvm3TJY1xJ.exe

loading gif

Files

File Path
Type
Category
Malicious
uvm3TJY1xJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\myriopodous
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uvm3TJY1xJ.exe
"C:\Users\user\Desktop\uvm3TJY1xJ.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\uvm3TJY1xJ.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3A90000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
3413000
heap
page read and write
9FA000
heap
page read and write
3E2D000
direct allocation
page execute and read and write
474D000
direct allocation
page read and write
3413000
heap
page read and write
3617000
heap
page read and write
46FD000
direct allocation
page read and write
3413000
heap
page read and write
3413000
heap
page read and write
9EE000
stack
page read and write
3DE0000
heap
page read and write
3AF0000
direct allocation
page read and write
476E000
direct allocation
page read and write
46F9000
direct allocation
page read and write
3617000
heap
page read and write
3AE0000
direct allocation
page read and write
45D0000
direct allocation
page read and write
1700000
heap
page read and write
3C2D000
heap
page read and write
2FB0000
direct allocation
page execute and read and write
482000
unkown
page readonly
3413000
heap
page read and write
3F46000
heap
page read and write
3B3E000
heap
page read and write
407F000
heap
page read and write
3413000
heap
page read and write
4430000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
8B4000
stack
page read and write
3413000
heap
page read and write
3413000
heap
page read and write
3F79000
heap
page read and write
4749000
direct allocation
page read and write
3402000
heap
page read and write
401000
unkown
page execute read
3701000
heap
page read and write
3EC4000
heap
page read and write
404A000
heap
page read and write
89F000
stack
page read and write
2FA0000
heap
page read and write
93E000
stack
page read and write
9A000
stack
page read and write
3413000
heap
page read and write
372E000
stack
page read and write
4201000
heap
page read and write
115000
heap
page read and write
4480000
direct allocation
page read and write
9F0000
heap
page read and write
2FE4000
heap
page read and write
384E000
stack
page read and write
400000
unkown
page readonly
3E9E000
direct allocation
page execute and read and write
3FD1000
direct allocation
page execute and read and write
46FD000
direct allocation
page read and write
3413000
heap
page read and write
325D000
stack
page read and write
43E0000
direct allocation
page read and write
4749000
direct allocation
page read and write
3413000
heap
page read and write
32F0000
heap
page read and write
3413000
heap
page read and write
3E29000
direct allocation
page execute and read and write
3413000
heap
page read and write
4430000
direct allocation
page read and write
3FCD000
direct allocation
page execute and read and write
4430000
direct allocation
page read and write
45D0000
direct allocation
page read and write
3413000
heap
page read and write
9FE000
heap
page read and write
46F9000
direct allocation
page read and write
3EA1000
heap
page read and write
329D000
stack
page read and write
3A23000
heap
page read and write
46F9000
direct allocation
page read and write
398E000
stack
page read and write
3800000
heap
page read and write
400000
unkown
page readonly
3EAB000
heap
page read and write
3900000
heap
page read and write
474D000
direct allocation
page read and write
985000
heap
page read and write
43ED000
heap
page read and write
4AB000
unkown
page readonly
3605000
heap
page read and write
3413000
heap
page read and write
950000
heap
page read and write
40C8000
heap
page read and write
3413000
heap
page read and write
40B7000
heap
page read and write
4042000
direct allocation
page execute and read and write
110000
heap
page read and write
3413000
heap
page read and write
3413000
heap
page read and write
A2A000
heap
page read and write
4620000
direct allocation
page read and write
3413000
heap
page read and write
3C29000
heap
page read and write
4AB000
unkown
page readonly
3413000
heap
page read and write
4553000
direct allocation
page read and write
3F8E000
heap
page read and write
11EE000
stack
page read and write
407F000
heap
page read and write
3CE0000
heap
page read and write
401000
unkown
page execute read
4553000
direct allocation
page read and write
1F0000
heap
page read and write
3413000
heap
page read and write
3413000
heap
page read and write
3600000
heap
page read and write
100000
heap
page read and write
4553000
direct allocation
page read and write
4749000
direct allocation
page read and write
3413000
heap
page read and write
4A7000
unkown
page read and write
45A3000
direct allocation
page read and write
3413000
heap
page read and write
40CE000
heap
page read and write
4480000
direct allocation
page read and write
46FD000
direct allocation
page read and write
490000
unkown
page write copy
3605000
heap
page read and write
45D0000
direct allocation
page read and write
4480000
direct allocation
page read and write
4620000
direct allocation
page read and write
3EAF000
heap
page read and write
3AF0000
direct allocation
page read and write
47BE000
direct allocation
page read and write
3C9E000
heap
page read and write
4620000
direct allocation
page read and write
476E000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
3320000
heap
page read and write
3B00000
heap
page read and write
2EB9000
heap
page read and write
15EF000
stack
page read and write
406C000
heap
page read and write
47BE000
direct allocation
page read and write
3B3E000
heap
page read and write
394E000
stack
page read and write
3D00000
direct allocation
page execute and read and write
3FE0000
heap
page read and write
474D000
direct allocation
page read and write
3413000
heap
page read and write
3B2F000
stack
page read and write
8AF000
stack
page read and write
3F51000
heap
page read and write
47BE000
direct allocation
page read and write
3AF0000
direct allocation
page read and write
162E000
stack
page read and write
3413000
heap
page read and write
3413000
heap
page read and write
3810000
direct allocation
page read and write
3FFB000
heap
page read and write
3612000
heap
page read and write
3413000
heap
page read and write
3B36000
heap
page read and write
A22000
heap
page read and write
8FE000
stack
page read and write
32D0000
heap
page read and write
482000
unkown
page readonly
3A8F000
stack
page read and write
3400000
heap
page read and write
476E000
direct allocation
page read and write
403E000
heap
page read and write
490000
unkown
page read and write
980000
heap
page read and write
3FBE000
heap
page read and write
990000
heap
page read and write
45A3000
direct allocation
page read and write
45A3000
direct allocation
page read and write
2FE0000
heap
page read and write
There are 164 hidden memdumps, click here to show them.