IOC Report
jZBSswQjhQ.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jZBSswQjhQ.exe
"C:\Users\user\Desktop\jZBSswQjhQ.exe"

URLs

Name
IP
Malicious
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
http://ocsp.thawte.com0
unknown

Domains

Name
IP
Malicious
198.187.3.20.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
460000
heap
page read and write
51A000
heap
page read and write
45B000
unkown
page execute and write copy
400000
unkown
page readonly
9D000
stack
page read and write
470000
heap
page read and write
45B000
unkown
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
401000
unkown
page execute read
650000
heap
page read and write
408000
unkown
page readonly
19D000
stack
page read and write
40C000
unkown
page readonly
40C000
unkown
page readonly
408000
unkown
page readonly
51E000
heap
page read and write
510000
heap
page read and write
There are 8 hidden memdumps, click here to show them.