IOC Report
G53ADrk4YR.exe

loading gif

Files

File Path
Type
Category
Malicious
G53ADrk4YR.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\G53ADrk4YR.exe
"C:\Users\user\Desktop\G53ADrk4YR.exe"
malicious

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
82.9.14.4
unknown
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2E51000
trusted library allocation
page read and write
malicious
AE2000
unkown
page readonly
malicious
11C0000
heap
page read and write
10F2000
trusted library allocation
page read and write
2E0C000
stack
page read and write
604D000
stack
page read and write
6B3D000
stack
page read and write
5E3E000
stack
page read and write
5DD5000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
1108000
heap
page read and write
BF0000
heap
page read and write
620C000
stack
page read and write
6F90000
heap
page read and write
EF8000
stack
page read and write
1137000
heap
page read and write
2E20000
heap
page read and write
2E40000
heap
page read and write
F40000
heap
page read and write
638E000
stack
page read and write
5DC6000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
5BA0000
heap
page read and write
6D3E000
stack
page read and write
568E000
stack
page read and write
AE0000
unkown
page readonly
10C0000
trusted library allocation
page read and write
63CC000
stack
page read and write
105E000
stack
page read and write
634E000
stack
page read and write
10E6000
trusted library allocation
page execute and read and write
1410000
trusted library allocation
page read and write
11E2000
heap
page read and write
5DB4000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5388000
heap
page read and write
3308000
trusted library allocation
page read and write
10C3000
trusted library allocation
page execute and read and write
2DAF000
stack
page read and write
2E10000
trusted library allocation
page read and write
3E59000
trusted library allocation
page read and write
112A000
heap
page read and write
10CD000
trusted library allocation
page execute and read and write
53A0000
trusted library allocation
page read and write
11D1000
heap
page read and write
5DEB000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
145E000
stack
page read and write
5DA4000
trusted library allocation
page read and write
B8C000
stack
page read and write
11BC000
heap
page read and write
539E000
heap
page read and write
52A0000
heap
page read and write
3181000
trusted library allocation
page read and write
4F4E000
stack
page read and write
1135000
heap
page read and write
608E000
stack
page read and write
11A2000
heap
page read and write
13FF000
stack
page read and write
11CF000
heap
page read and write
53B0000
heap
page execute and read and write
10EA000
trusted library allocation
page execute and read and write
11ED000
heap
page read and write
644C000
stack
page read and write
640C000
stack
page read and write
578E000
stack
page read and write
111E000
heap
page read and write
F45000
heap
page read and write
10F0000
trusted library allocation
page read and write
550C000
stack
page read and write
11F9000
heap
page read and write
3E51000
trusted library allocation
page read and write
F3E000
stack
page read and write
10FB000
trusted library allocation
page execute and read and write
5FDE000
stack
page read and write
539B000
heap
page read and write
1100000
heap
page read and write
564E000
stack
page read and write
630D000
stack
page read and write
1507000
heap
page read and write
1500000
heap
page read and write
1060000
heap
page read and write
1468000
trusted library allocation
page read and write
10E2000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page execute and read and write
6C3E000
stack
page read and write
3E57000
trusted library allocation
page read and write
10F7000
trusted library allocation
page execute and read and write
12FE000
stack
page read and write
10D0000
trusted library allocation
page read and write
2DC0000
heap
page execute and read and write
6F80000
heap
page read and write
7FAD0000
trusted library allocation
page execute and read and write
554E000
stack
page read and write
1070000
heap
page read and write
10C4000
trusted library allocation
page read and write
540E000
stack
page read and write
57CE000
stack
page read and write
10B0000
trusted library allocation
page read and write
5316000
heap
page read and write
58CE000
stack
page read and write
5DC9000
trusted library allocation
page read and write
1067000
heap
page read and write
11CD000
heap
page read and write
5390000
heap
page read and write
317F000
trusted library allocation
page read and write
There are 99 hidden memdumps, click here to show them.