IOC Report
MysticThumbs4.2.0 Patch.exe

loading gif

Files

File Path
Type
Category
Malicious
MysticThumbs4.2.0 Patch.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\E_N60005\eAPI.fne
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\E_N60005\krnln.fnr
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\E_N60005\dp1.fne
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe
"C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe"
malicious

URLs

Name
IP
Malicious
http://www.eyuyan.com
unknown
http://dywt.com.cn/RSATool2v14.rar
unknown
http://www.baidu.com
unknown
http://www.baidu.comtest
unknown
http://www.eyuyan.comDVarFileInfo$
unknown
http://www.52pojie.cn/
unknown
http://www.eyuyan.comservice
unknown
http://dywt.com.cn
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
41D000
unkown
page write copy
9A0000
heap
page read and write
2C4F000
stack
page read and write
268F000
stack
page read and write
4191000
heap
page read and write
9C4000
heap
page read and write
404F000
stack
page read and write
9B0000
direct allocation
page read and write
19C000
stack
page read and write
9C4000
heap
page read and write
304E000
stack
page read and write
4B06000
heap
page read and write
7FE000
unkown
page execute and read and write
9C4000
heap
page read and write
93E000
stack
page read and write
BE6000
heap
page read and write
9C4000
heap
page read and write
1012A000
unkown
page readonly
9B0000
direct allocation
page read and write
9C4000
heap
page read and write
2B4E000
stack
page read and write
9B0000
direct allocation
page read and write
2ECF000
stack
page read and write
255E000
stack
page read and write
10117000
unkown
page read and write
41B000
unkown
page read and write
9B0000
direct allocation
page read and write
2C8E000
stack
page read and write
8E0000
heap
page read and write
684000
unkown
page execute and read and write
418F000
stack
page read and write
9C4000
heap
page read and write
100E7000
unkown
page readonly
4750000
direct allocation
page execute and read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
354E000
stack
page read and write
ACF000
stack
page read and write
28CE000
stack
page read and write
4D60000
direct allocation
page read and write
2580000
heap
page read and write
2B0F000
stack
page read and write
4191000
heap
page read and write
3B4F000
stack
page read and write
4AE6000
heap
page read and write
9C4000
heap
page read and write
1010D000
unkown
page write copy
9C4000
heap
page read and write
BD2000
heap
page read and write
9C4000
heap
page read and write
BDC000
heap
page read and write
B9D000
heap
page read and write
4770000
direct allocation
page execute and read and write
AE0000
direct allocation
page read and write
350F000
stack
page read and write
340E000
stack
page read and write
400000
unkown
page readonly
AF7000
heap
page read and write
368E000
stack
page read and write
33CF000
stack
page read and write
9B0000
direct allocation
page read and write
10000000
unkown
page readonly
408E000
stack
page read and write
9B0000
direct allocation
page read and write
3DCF000
stack
page read and write
BEC000
heap
page read and write
9C4000
heap
page read and write
684000
unkown
page execute and write copy
BE2000
heap
page read and write
9B0000
direct allocation
page read and write
9C4000
heap
page read and write
29CF000
stack
page read and write
AE0000
direct allocation
page read and write
2A0E000
stack
page read and write
9B0000
direct allocation
page read and write
3E0E000
stack
page read and write
B7E000
stack
page read and write
3C8F000
stack
page read and write
47B0000
direct allocation
page read and write
AE0000
direct allocation
page read and write
3B8E000
stack
page read and write
4780000
direct allocation
page execute and read and write
10106000
unkown
page write copy
38CF000
stack
page read and write
328F000
stack
page read and write
99E000
stack
page read and write
3F0F000
stack
page read and write
3A0F000
stack
page read and write
4E84000
heap
page read and write
37CE000
stack
page read and write
3CCE000
stack
page read and write
4191000
heap
page read and write
3F4E000
stack
page read and write
B3C000
stack
page read and write
401000
unkown
page execute and write copy
4190000
heap
page read and write
364F000
stack
page read and write
B8B000
heap
page read and write
BCE000
heap
page read and write
10001000
unkown
page execute read
4770000
direct allocation
page execute and read and write
41E000
unkown
page execute and read and write
4760000
direct allocation
page execute and read and write
48C7000
heap
page read and write
300F000
stack
page read and write
9C4000
heap
page read and write
9B0000
direct allocation
page read and write
4290000
trusted library allocation
page read and write
3A4E000
stack
page read and write
48C0000
heap
page read and write
378F000
stack
page read and write
9C4000
heap
page read and write
10125000
unkown
page read and write
9B0000
direct allocation
page read and write
474F000
stack
page read and write
4E80000
heap
page read and write
2D8F000
stack
page read and write
685000
unkown
page execute and write copy
97000
stack
page read and write
2DCE000
stack
page read and write
9C4000
heap
page read and write
318E000
stack
page read and write
9C4000
heap
page read and write
1010B000
unkown
page read and write
9C4000
heap
page read and write
4B60000
heap
page read and write
2570000
direct allocation
page execute and read and write
9B0000
direct allocation
page read and write
9C4000
heap
page read and write
2F0E000
stack
page read and write
48C4000
heap
page read and write
400000
unkown
page readonly
251F000
stack
page read and write
9C4000
heap
page read and write
47A0000
direct allocation
page execute and read and write
401000
unkown
page execute and read and write
2584000
heap
page read and write
4790000
direct allocation
page execute and read and write
9C0000
heap
page read and write
58D000
unkown
page execute and read and write
B80000
heap
page read and write
390E000
stack
page read and write
4B01000
heap
page read and write
9C4000
heap
page read and write
9B0000
direct allocation
page read and write
9B0000
direct allocation
page read and write
9C4000
heap
page read and write
32CE000
stack
page read and write
4760000
heap
page read and write
9C4000
heap
page read and write
49AB000
heap
page read and write
AF0000
heap
page read and write
48D6000
heap
page read and write
BDD000
heap
page read and write
9C4000
heap
page read and write
9C4000
heap
page read and write
9B0000
direct allocation
page read and write
288F000
stack
page read and write
464C000
stack
page read and write
314F000
stack
page read and write
278F000
stack
page read and write
800000
heap
page read and write
41B000
unkown
page write copy
2560000
direct allocation
page read and write
There are 154 hidden memdumps, click here to show them.