IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
68.178.207.33
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
68.178.207.33
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E82000
unkown
page readonly
malicious
3181000
trusted library allocation
page read and write
malicious
14B3000
trusted library allocation
page read and write
1C74A000
stack
page read and write
1220000
heap
page read and write
13C8000
heap
page read and write
14F0000
heap
page execute and read and write
12D0000
heap
page read and write
12B0000
trusted library allocation
page read and write
1BF0F000
stack
page read and write
7FFD33CD0000
trusted library allocation
page read and write
1311000
heap
page read and write
12DC000
heap
page read and write
1C64C000
stack
page read and write
7FFD33BEC000
trusted library allocation
page execute and read and write
1C340000
heap
page read and write
1318E000
trusted library allocation
page read and write
1C14F000
heap
page read and write
7FFD33C50000
trusted library allocation
page execute and read and write
18D0000
heap
page read and write
317E000
stack
page read and write
7FFD33CE1000
trusted library allocation
page read and write
1392000
heap
page read and write
12D6000
heap
page read and write
13188000
trusted library allocation
page read and write
166E000
stack
page read and write
7FFD33B50000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
7FFD33B30000
trusted library allocation
page read and write
1C44C000
stack
page read and write
7FFD33B4D000
trusted library allocation
page execute and read and write
E80000
unkown
page readonly
130F000
heap
page read and write
18D5000
heap
page read and write
1BE00000
heap
page execute and read and write
7FFD33BF0000
trusted library allocation
page execute and read and write
7FFD33B33000
trusted library allocation
page execute and read and write
1240000
heap
page read and write
133D000
heap
page read and write
1313000
heap
page read and write
1560000
heap
page read and write
7FFD33B8C000
trusted library allocation
page execute and read and write
1210000
heap
page read and write
14C0000
heap
page read and write
1B505000
heap
page read and write
1343000
heap
page read and write
7FFD33B5D000
trusted library allocation
page execute and read and write
1565000
heap
page read and write
1C16A000
heap
page read and write
1C00E000
stack
page read and write
FC4000
stack
page read and write
7FFD33B54000
trusted library allocation
page read and write
1300000
heap
page read and write
12F3000
heap
page read and write
1B1B0000
trusted library allocation
page read and write
1BC00000
heap
page read and write
1BBCE000
stack
page read and write
186B000
stack
page read and write
1B70D000
stack
page read and write
7FFD33C16000
trusted library allocation
page execute and read and write
13181000
trusted library allocation
page read and write
1C15A000
heap
page read and write
7FFD33BE0000
trusted library allocation
page read and write
1C10E000
stack
page read and write
1870000
heap
page read and write
7FF45A5E0000
trusted library allocation
page execute and read and write
7FFD33B3D000
trusted library allocation
page execute and read and write
1BC03000
heap
page read and write
1260000
heap
page read and write
12FC000
heap
page read and write
1C110000
heap
page read and write
14A0000
trusted library allocation
page read and write
7FFD33B34000
trusted library allocation
page read and write
1BB8E000
stack
page read and write
1BD04000
stack
page read and write
1BB4A000
stack
page read and write
1C94C000
stack
page read and write
E80000
unkown
page readonly
7FFD33BE6000
trusted library allocation
page read and write
1C124000
heap
page read and write
7FFD33B42000
trusted library allocation
page read and write
7FFD33B40000
trusted library allocation
page read and write
176D000
stack
page read and write
There are 73 hidden memdumps, click here to show them.