IOC Report
uPt3XcHAIA.exe

loading gifProcessesURLsIPsMemdumps21010Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\uPt3XcHAIA.exe
"C:\Users\user\Desktop\uPt3XcHAIA.exe"
malicious

URLs

Name
IP
Malicious
176.113.115.225
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
176.113.115.225
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2B61000
trusted library allocation
page read and write
malicious
922000
unkown
page readonly
malicious
7FFD3415D000
trusted library allocation
page execute and read and write
2F09000
trusted library allocation
page read and write
1BA80000
heap
page read and write
1AEE0000
heap
page read and write
7FFD34160000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1B573000
heap
page read and write
2ADE000
stack
page read and write
1BA57000
heap
page read and write
D81000
heap
page read and write
7FFD3417D000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
12B6E000
trusted library allocation
page read and write
920000
unkown
page readonly
2B50000
heap
page read and write
1BA20000
heap
page read and write
1C1CA000
stack
page read and write
7FFD34270000
trusted library allocation
page execute and read and write
DFF000
heap
page read and write
7FFD3420C000
trusted library allocation
page execute and read and write
1063000
trusted library allocation
page read and write
1B81E000
stack
page read and write
1B570000
heap
page read and write
1B710000
heap
page execute and read and write
E03000
heap
page read and write
CF4000
stack
page read and write
12B68000
trusted library allocation
page read and write
7FFD34170000
trusted library allocation
page read and write
1BA65000
heap
page read and write
11F0000
heap
page read and write
2BA8000
trusted library allocation
page read and write
100C000
stack
page read and write
1BA6B000
heap
page read and write
10D5000
heap
page read and write
2BF8000
trusted library allocation
page read and write
1BA26000
heap
page read and write
1BA1D000
stack
page read and write
D40000
heap
page read and write
1B674000
stack
page read and write
D20000
heap
page read and write
D00000
heap
page read and write
1BECC000
stack
page read and write
1C0CC000
stack
page read and write
1C2CC000
stack
page read and write
7FFD34153000
trusted library allocation
page execute and read and write
1AB90000
trusted library allocation
page read and write
1235000
heap
page read and write
12B61000
trusted library allocation
page read and write
DC7000
heap
page read and write
7FFD34210000
trusted library allocation
page execute and read and write
1BFCF000
stack
page read and write
D83000
heap
page read and write
1230000
heap
page read and write
920000
unkown
page readonly
7FFD3416D000
trusted library allocation
page execute and read and write
1BA31000
heap
page read and write
1B52A000
stack
page read and write
2B3F000
stack
page read and write
1BBD0000
heap
page read and write
7FFD34301000
trusted library allocation
page read and write
10D0000
heap
page read and write
11DF000
stack
page read and write
7FFD34236000
trusted library allocation
page execute and read and write
7FF49E990000
trusted library allocation
page execute and read and write
D46000
heap
page read and write
7FFD34174000
trusted library allocation
page read and write
2AE0000
heap
page execute and read and write
7FFD341AC000
trusted library allocation
page execute and read and write
7FFD34200000
trusted library allocation
page read and write
1B56E000
stack
page read and write
D4C000
heap
page read and write
7FFD34150000
trusted library allocation
page read and write
7FFD34154000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
7FFD34206000
trusted library allocation
page read and write
1BA2D000
heap
page read and write
DAD000
heap
page read and write
1B91D000
stack
page read and write
1030000
trusted library allocation
page read and write
7FFD342F2000
trusted library allocation
page read and write
D6A000
heap
page read and write
9D0000
heap
page read and write
1B0ED000
stack
page read and write
7FFD34163000
trusted library allocation
page read and write
There are 77 hidden memdumps, click here to show them.