IOC Report
YWL3cB5Fah.exe

loading gif

Files

File Path
Type
Category
Malicious
YWL3cB5Fah.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\enterogenous
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\YWL3cB5Fah.exe
"C:\Users\user\Desktop\YWL3cB5Fah.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\YWL3cB5Fah.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
3840000
direct allocation
page read and write
malicious
2F10000
heap
page read and write
2F60000
heap
page read and write
127F000
stack
page read and write
49AE000
direct allocation
page read and write
3080000
heap
page read and write
482000
unkown
page readonly
40A4000
heap
page read and write
40F4000
heap
page read and write
8AF000
stack
page read and write
4670000
direct allocation
page read and write
4939000
direct allocation
page read and write
3060000
heap
page read and write
4939000
direct allocation
page read and write
4793000
direct allocation
page read and write
3CC0000
heap
page read and write
4793000
direct allocation
page read and write
3213000
heap
page read and write
AB9000
heap
page read and write
40F4000
heap
page read and write
3B29000
direct allocation
page execute and read and write
3412000
heap
page read and write
3F10000
heap
page read and write
4810000
direct allocation
page read and write
491000
unkown
page write copy
3213000
heap
page read and write
4939000
direct allocation
page read and write
492000
unkown
page read and write
3213000
heap
page read and write
3A00000
direct allocation
page execute and read and write
49AE000
direct allocation
page read and write
4AB000
unkown
page readonly
303D000
stack
page read and write
400000
unkown
page readonly
3B3B000
heap
page read and write
3F12000
heap
page read and write
4793000
direct allocation
page read and write
8B4000
stack
page read and write
3723000
heap
page read and write
3501000
heap
page read and write
3202000
heap
page read and write
110000
heap
page read and write
36FF000
stack
page read and write
3890000
direct allocation
page read and write
3213000
heap
page read and write
3929000
heap
page read and write
19E000
stack
page read and write
482000
unkown
page readonly
403E000
heap
page read and write
2F65000
heap
page read and write
2DED000
stack
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
3FC0000
heap
page read and write
40F4000
heap
page read and write
4793000
direct allocation
page read and write
4939000
direct allocation
page read and write
3417000
heap
page read and write
31A0000
direct allocation
page read and write
3405000
heap
page read and write
3213000
heap
page read and write
30B0000
heap
page read and write
4670000
direct allocation
page read and write
31DE000
stack
page read and write
43CB000
heap
page read and write
3213000
heap
page read and write
4670000
direct allocation
page read and write
1C5000
heap
page read and write
3600000
heap
page read and write
3200000
heap
page read and write
43C1000
heap
page read and write
3F09000
heap
page read and write
493D000
direct allocation
page read and write
4172000
heap
page read and write
3B30000
direct allocation
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
399E000
heap
page read and write
49AE000
direct allocation
page read and write
1C0000
heap
page read and write
44DA000
heap
page read and write
9A000
stack
page read and write
3213000
heap
page read and write
4810000
direct allocation
page read and write
3213000
heap
page read and write
3F01000
heap
page read and write
493D000
direct allocation
page read and write
40F3000
heap
page execute and read and write
490000
unkown
page write copy
3190000
heap
page read and write
49AE000
direct allocation
page read and write
3B2D000
direct allocation
page execute and read and write
3213000
heap
page read and write
493D000
direct allocation
page read and write
4939000
direct allocation
page read and write
A8E000
heap
page read and write
3890000
direct allocation
page read and write
4810000
direct allocation
page read and write
3F40000
heap
page read and write
3405000
heap
page read and write
4150000
heap
page read and write
392D000
heap
page read and write
3FFA000
heap
page read and write
3213000
heap
page read and write
3F0D000
heap
page read and write
3213000
heap
page read and write
401000
unkown
page execute read
3DC0000
heap
page read and write
49AE000
direct allocation
page read and write
49AE000
direct allocation
page read and write
3890000
direct allocation
page read and write
3890000
direct allocation
page read and write
3AB6000
heap
page read and write
383F000
stack
page read and write
9CE000
stack
page read and write
4810000
direct allocation
page read and write
4A8000
unkown
page read and write
3400000
heap
page read and write
3800000
heap
page read and write
3213000
heap
page read and write
4793000
direct allocation
page read and write
3AAF000
stack
page read and write
3213000
heap
page read and write
493D000
direct allocation
page read and write
15E000
stack
page read and write
A8A000
heap
page read and write
3FB9000
heap
page read and write
1B0000
heap
page read and write
3B37000
heap
page read and write
3B9E000
direct allocation
page execute and read and write
4670000
direct allocation
page read and write
4810000
direct allocation
page read and write
3213000
heap
page read and write
2F20000
heap
page read and write
3CCD000
direct allocation
page execute and read and write
4793000
direct allocation
page read and write
373E000
stack
page read and write
3213000
heap
page read and write
3BC8000
heap
page read and write
3F17000
heap
page read and write
A50000
heap
page read and write
3417000
heap
page read and write
3890000
direct allocation
page read and write
36AE000
stack
page read and write
4810000
direct allocation
page read and write
3213000
heap
page read and write
4939000
direct allocation
page read and write
A80000
heap
page read and write
167F000
stack
page read and write
401000
unkown
page execute read
3E01000
heap
page read and write
4103000
heap
page read and write
3213000
heap
page read and write
A0E000
stack
page read and write
3213000
heap
page read and write
4AB000
unkown
page readonly
A10000
heap
page read and write
2F14000
heap
page read and write
3890000
direct allocation
page read and write
493D000
direct allocation
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
4670000
direct allocation
page read and write
100000
heap
page read and write
490000
unkown
page read and write
4104000
heap
page read and write
3213000
heap
page read and write
3F1A000
heap
page read and write
40F7000
heap
page read and write
400000
unkown
page readonly
3D42000
direct allocation
page execute and read and write
3CD1000
direct allocation
page execute and read and write
3213000
heap
page read and write
4051000
heap
page read and write
3FF0000
heap
page read and write
493D000
direct allocation
page read and write
4670000
direct allocation
page read and write
2E2E000
heap
page read and write
3213000
heap
page read and write
There are 171 hidden memdumps, click here to show them.