IOC Report
d2ef5.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\d2ef5.exe
C:\Users\user\Desktop\d2ef5.exe
malicious

URLs

Name
IP
Malicious
https://www.reg.ru/web-sites/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_cms
unknown
https://www.reg.ru/web-sites/website-builder/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_cam
unknown
https://www.reg.ru/domain/new/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ne
unknown
https://reg.ru
unknown
https://www.reg.ru/support/ssl-sertifikaty/zakaz-ssl-sertifikata/Kak-zakazat-besplatny-SSL-sertifika
unknown
https://www.reg.ru/dedicated/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ser
unknown
https://www.reg.ru/whois/?check=&dname=siwdmfkshsgw.com&reg_source=parking_auto
unknown
https://parking.reg.ru/script/get_domain_data?domain_name=siwdmfkshsgw.com&rand=
unknown
https://www.reg.ru/hosting/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_host&
unknown

Domains

Name
IP
Malicious
siwdmfkshsgw.com
194.58.112.174
malicious
trackingg-protectioon.cdn1.mozilla.net
unknown

IPs

IP
Domain
Country
Malicious
194.58.112.174
siwdmfkshsgw.com
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
15F8000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
1019000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
15F8000
heap
page read and write
malicious
421000
unclassified section
page execute read
C7E000
stack
page read and write
10ED000
stack
page read and write
AA0000
heap
page read and write
11EE000
stack
page read and write
315F000
stack
page read and write
440000
heap
page read and write
A4E000
stack
page read and write
4CF000
heap
page read and write
15FB000
heap
page read and write
F247CFE000
stack
page read and write
4BC000
heap
page read and write
2050AD50000
heap
page read and write
401000
unkown
page execute read
9D000
stack
page read and write
2050AA30000
trusted library allocation
page read and write
46E000
heap
page read and write
F24807E000
stack
page read and write
2050AD59000
heap
page read and write
420000
unclassified section
page read and write
42A000
unclassified section
page read and write
2050BB30000
trusted library allocation
page read and write
2050AA20000
heap
page read and write
560000
heap
page read and write
402000
unkown
page readonly
404000
unkown
page read and write
2050AB60000
heap
page read and write
400000
unkown
page readonly
2050B8A0000
trusted library allocation
page read and write
19C000
stack
page read and write
2050AD10000
trusted library allocation
page read and write
2050BAC0000
heap
page readonly
4B7000
heap
page read and write
355F000
stack
page read and write
4CF000
heap
page read and write
F247E79000
stack
page read and write
1200000
heap
page read and write
4D0000
heap
page read and write
F247C7B000
stack
page read and write
F247FFE000
stack
page read and write
4AE000
heap
page read and write
2050AD55000
heap
page read and write
4BA000
heap
page read and write
402000
unkown
page readonly
2050AD00000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
2050ABC8000
heap
page read and write
F247F79000
stack
page read and write
9FC000
stack
page read and write
2050BAD0000
trusted library allocation
page read and write
404000
unkown
page write copy
3560000
heap
page read and write
CA0000
heap
page read and write
2050BAE0000
trusted library allocation
page read and write
11AE000
stack
page read and write
2050AB88000
heap
page read and write
2050ABEF000
heap
page read and write
565000
heap
page read and write
30000
heap
page read and write
49F000
heap
page read and write
2050ABD0000
heap
page read and write
1160000
heap
page read and write
1098000
heap
page read and write
A8E000
stack
page read and write
42C000
unclassified section
page readonly
F247EFF000
stack
page read and write
429000
unclassified section
page readonly
2050BAB0000
trusted library allocation
page read and write
2050ABD0000
heap
page read and write
345A000
stack
page read and write
2050AB80000
heap
page read and write
15FC000
heap
page read and write
2050AD60000
trusted library allocation
page read and write
375F000
stack
page read and write
2050AD30000
unclassified section
page read and write
400000
unkown
page readonly
8FC000
stack
page read and write
401000
unkown
page execute read
2050ACF0000
trusted library allocation
page read and write
C80000
heap
page read and write
305F000
stack
page read and write
15FB000
heap
page read and write
44A000
heap
page read and write
112D000
stack
page read and write
1F0000
trusted library allocation
page read and write
2050ABD0000
heap
page read and write
325F000
stack
page read and write
4AA000
heap
page read and write
15FC000
heap
page read and write
F247DF9000
stack
page read and write
335B000
stack
page read and write
406000
unkown
page readonly
2050AC80000
heap
page read and write
F247D7F000
stack
page read and write
406000
unkown
page readonly
There are 95 hidden memdumps, click here to show them.