IOC Report
Microsoft.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Microsoft.exe
"C:\Users\user\Desktop\Microsoft.exe"
malicious

Domains

Name
IP
Malicious
rlw.gov.ru
194.226.91.17
cittrans.gov.ru
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
710000
heap
page read and write
407000
unkown
page read and write
400000
unkown
page readonly
404000
unkown
page readonly
401000
unkown
page execute read
749000
heap
page read and write
746000
heap
page read and write
740000
heap
page read and write
A3F000
stack
page read and write
400000
unkown
page readonly
404000
unkown
page readonly
401000
unkown
page execute read
753000
heap
page read and write
80000
heap
page read and write
61C000
stack
page read and write
C3E000
stack
page read and write
160000
heap
page read and write
190000
heap
page read and write
407000
unkown
page write copy
408000
unkown
page write copy
74C000
heap
page read and write
There are 11 hidden memdumps, click here to show them.