IOC Report
filedata

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\filedata.exe
"C:\Users\user\Desktop\filedata.exe"
malicious

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.archivesystems.com/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
640000
unkown
page readonly
642000
unkown
page readonly
516B000
stack
page read and write
D37000
trusted library allocation
page execute and read and write
D04000
trusted library allocation
page read and write
5450000
heap
page read and write
9970000
trusted library allocation
page read and write
7E8000
stack
page read and write
D10000
trusted library allocation
page read and write
D0D000
trusted library allocation
page execute and read and write
5455000
heap
page read and write
5430000
trusted library allocation
page read and write
1071000
trusted library allocation
page read and write
BCB000
heap
page read and write
AF0000
heap
page read and write
4FDF000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
3961000
trusted library allocation
page read and write
4AFE000
stack
page read and write
5000000
trusted library section
page readonly
6BFE000
heap
page read and write
AE0000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page execute and read and write
5190000
heap
page execute and read and write
D50000
trusted library allocation
page read and write
992E000
stack
page read and write
10B0000
heap
page read and write
D32000
trusted library allocation
page read and write
6BF0000
heap
page read and write
9050000
heap
page execute and read and write
5170000
trusted library allocation
page read and write
5420000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
5310000
heap
page read and write
5010000
heap
page read and write
6F6F000
stack
page read and write
B32000
heap
page read and write
AF8000
heap
page read and write
29F4000
trusted library allocation
page read and write
9980000
trusted library allocation
page execute and read and write
1050000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
B94000
heap
page read and write
1040000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
107D000
trusted library allocation
page read and write
6E6E000
stack
page read and write
4E40000
trusted library allocation
page read and write
A40000
heap
page read and write
101A000
heap
page read and write
105B000
trusted library allocation
page read and write
4EB0000
heap
page read and write
5020000
heap
page read and write
5AF0000
heap
page read and write
D9E000
stack
page read and write
D26000
trusted library allocation
page execute and read and write
A80000
heap
page read and write
5193000
heap
page execute and read and write
6FAE000
stack
page read and write
2A03000
trusted library allocation
page read and write
1010000
heap
page read and write
AFE000
heap
page read and write
9940000
trusted library allocation
page read and write
A50000
heap
page read and write
70B0000
heap
page read and write
5B0C000
heap
page read and write
9BDE000
stack
page read and write
10B7000
heap
page read and write
5B00000
heap
page read and write
4EE0000
heap
page read and write
D13000
trusted library allocation
page read and write
9A9E000
stack
page read and write
4E70000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
D03000
trusted library allocation
page execute and read and write
4EE3000
heap
page read and write
B25000
heap
page read and write
A85000
heap
page read and write
FEE000
stack
page read and write
4E50000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
7F1B0000
trusted library allocation
page execute and read and write
7212000
trusted library allocation
page read and write
5B20000
heap
page read and write
1076000
trusted library allocation
page read and write
D2A000
trusted library allocation
page execute and read and write
4FC0000
trusted library allocation
page read and write
1020000
trusted library allocation
page execute and read and write
10A0000
heap
page execute and read and write
4EC4000
trusted library allocation
page read and write
9ADE000
stack
page read and write
295E000
stack
page read and write
2961000
trusted library allocation
page read and write
B91000
heap
page read and write
106E000
trusted library allocation
page read and write
541E000
stack
page read and write
650000
unkown
page readonly
4FD0000
trusted library allocation
page read and write
90F0000
trusted library allocation
page read and write
9950000
trusted library allocation
page execute and read and write
B8D000
heap
page read and write
D1D000
trusted library allocation
page execute and read and write
71E0000
trusted library allocation
page execute and read and write
D20000
trusted library allocation
page read and write
70AE000
stack
page read and write
9060000
trusted library allocation
page read and write
D22000
trusted library allocation
page read and write
D3B000
trusted library allocation
page execute and read and write
70C0000
heap
page read and write
DA0000
heap
page read and write
6E8000
stack
page read and write
There are 102 hidden memdumps, click here to show them.