IOC Report
Wo0CkmOz64.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Wo0CkmOz64.exe
"C:\Users\user\Desktop\Wo0CkmOz64.exe"
malicious

URLs

Name
IP
Malicious
https://github.com/mgravell/protobuf-net
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown

IPs

IP
Domain
Country
Malicious
80.76.49.148
unknown
Bulgaria

Memdumps

Base Address
Regiontype
Protect
Malicious
12F41000
trusted library allocation
page read and write
malicious
13171000
trusted library allocation
page read and write
malicious
1BBA0000
trusted library section
page read and write
malicious
1B690000
trusted library section
page read and write
malicious
2C11000
trusted library allocation
page read and write
malicious
1B5DD000
stack
page read and write
1BB13000
heap
page read and write
1080000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
30F7000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page read and write
E0C000
heap
page read and write
12D0000
heap
page read and write
30C1000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
30CF000
trusted library allocation
page read and write
3111000
trusted library allocation
page read and write
EFB000
heap
page read and write
2E05000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
1BB19000
heap
page read and write
2DE5000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
2DA1000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
7FFD34606000
trusted library allocation
page read and write
EE0000
heap
page read and write
3173000
trusted library allocation
page read and write
B81000
stack
page read and write
3159000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
3147000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
1AF97000
heap
page read and write
303D000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
E3F000
heap
page read and write
30F3000
trusted library allocation
page read and write
1C77D000
stack
page read and write
3167000
trusted library allocation
page read and write
1BA9E000
stack
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
2E21000
trusted library allocation
page read and write
1BE7B000
stack
page read and write
2DC7000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
2DD1000
trusted library allocation
page read and write
2DDD000
trusted library allocation
page read and write
E41000
heap
page read and write
318B000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
7FFD34574000
trusted library allocation
page read and write
30D3000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
1BADC000
heap
page read and write
1C27C000
stack
page read and write
E00000
heap
page read and write
1BAC0000
heap
page read and write
2E13000
trusted library allocation
page read and write
1BACB000
heap
page read and write
1BAAA000
heap
page read and write
7FFD345AC000
trusted library allocation
page execute and read and write
2E25000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
E6B000
heap
page read and write
FD0000
heap
page read and write
30A9000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
1C37D000
stack
page read and write
303F000
trusted library allocation
page read and write
3177000
trusted library allocation
page read and write
BE0000
heap
page read and write
3127000
trusted library allocation
page read and write
1BB1F000
heap
page read and write
A54000
unkown
page readonly
30BD000
trusted library allocation
page read and write
313B000
trusted library allocation
page read and write
2E2D000
trusted library allocation
page read and write
3075000
trusted library allocation
page read and write
314F000
trusted library allocation
page read and write
1C897000
heap
page read and write
310D000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
31A9000
trusted library allocation
page read and write
1305000
heap
page read and write
319D000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
1BAA2000
heap
page read and write
7FFD3460C000
trusted library allocation
page execute and read and write
3137000
trusted library allocation
page read and write
1C07D000
stack
page read and write
311F000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
306F000
trusted library allocation
page read and write
7FFD34553000
trusted library allocation
page execute and read and write
10EF000
stack
page read and write
2DCD000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
31CD000
trusted library allocation
page read and write
1C880000
heap
page read and write
2DF9000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
1300000
heap
page read and write
2DED000
trusted library allocation
page read and write
303B000
trusted library allocation
page read and write
305D000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
1BAF7000
heap
page read and write
2DAF000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
1BD3A000
stack
page read and write
2BAE000
stack
page read and write
2DC3000
trusted library allocation
page read and write
7FFD3457B000
trusted library allocation
page execute and read and write
306B000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
313F000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
1B19D000
stack
page read and write
7FFD34554000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
1C893000
heap
page read and write
3089000
trusted library allocation
page read and write
3115000
trusted library allocation
page read and write
11EA000
stack
page read and write
2DFD000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
980000
unkown
page readonly
12C11000
trusted library allocation
page read and write
980000
unkown
page readonly
3018000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
1010000
heap
page read and write
30DF000
trusted library allocation
page read and write
315F000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
E75000
heap
page read and write
2BB0000
trusted library section
page read and write
30E3000
trusted library allocation
page read and write
3199000
trusted library allocation
page read and write
31AD000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
307D000
trusted library allocation
page read and write
2DB7000
trusted library allocation
page read and write
10A5000
heap
page read and write
12DC0000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
982000
unkown
page readonly
30D7000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
E2A000
heap
page read and write
1083000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34636000
trusted library allocation
page execute and read and write
31BF000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page read and write
31C5000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
1B789000
trusted library section
page read and write
1C88D000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
3195000
trusted library allocation
page read and write
3133000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
2DE9000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
7FFD347D0000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
1B680000
heap
page execute and read and write
E7B000
heap
page read and write
1C887000
heap
page read and write
10A0000
heap
page read and write
1BAFC000
heap
page read and write
7FFD34562000
trusted library allocation
page read and write
30DB000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
7FF43AA10000
trusted library allocation
page execute and read and write
E06000
heap
page read and write
3067000
trusted library allocation
page read and write
E6D000
heap
page read and write
1BF7A000
stack
page read and write
1336B000
trusted library allocation
page read and write
1BB28000
heap
page read and write
2E35000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page execute and read and write
3012000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
31D9000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
30A5000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
1AC40000
trusted library allocation
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
7FFD346F0000
trusted library allocation
page read and write
1C67D000
stack
page read and write
3059000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
30FB000
trusted library allocation
page read and write
31C3000
trusted library allocation
page read and write
1BB0F000
heap
page read and write
1C47D000
stack
page read and write
3055000
trusted library allocation
page read and write
312B000
trusted library allocation
page read and write
7FFD34769000
trusted library allocation
page read and write
3079000
trusted library allocation
page read and write
2C00000
heap
page execute and read and write
1BAF2000
heap
page read and write
1BB08000
heap
page read and write
30C9000
trusted library allocation
page read and write
7FFD3478A000
trusted library allocation
page read and write
1C57D000
stack
page read and write
1B89F000
stack
page read and write
2E19000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
7FFD3479E000
trusted library allocation
page read and write
316F000
trusted library allocation
page read and write
1C87D000
stack
page read and write
31BB000
trusted library allocation
page read and write
31D5000
trusted library allocation
page read and write
30E7000
trusted library allocation
page read and write
FF0000
heap
page read and write
2DAC000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
1BAFA000
heap
page read and write
1B99E000
stack
page read and write
2E01000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
314B000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
2DBD000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
1BAA0000
heap
page read and write
1C17D000
stack
page read and write
3153000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
There are 253 hidden memdumps, click here to show them.