IOC Report
re.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\re.exe
"C:\Users\user\Desktop\re.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

IPs

IP
Domain
Country
Malicious
87.120.113.125
unknown
Bulgaria
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
204C92AA000
heap
page read and write
204C93B0000
heap
page read and write
7FF633A61000
unkown
page execute read
7FF633A61000
unkown
page execute read
7FF633A64000
unkown
page readonly
7FF633A63000
unkown
page write copy
7FF633A6B000
unkown
page readonly
7FF633A6B000
unkown
page readonly
7FF633A60000
unkown
page readonly
7FF633A60000
unkown
page readonly
7FF633A63000
unkown
page write copy
5CDADFD000
stack
page read and write
204C9490000
heap
page read and write
7FF633A64000
unkown
page readonly
7FF633A68000
unkown
page write copy
7FF633A68000
unkown
page read and write
204C92A0000
heap
page read and write
There are 7 hidden memdumps, click here to show them.