IOC Report
011K3SJvSf.exe

loading gifProcessesURLsIPsMemdumps21010Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\011K3SJvSf.exe
"C:\Users\user\Desktop\011K3SJvSf.exe"
malicious

URLs

Name
IP
Malicious
176.113.115.225
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
176.113.115.225
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
702000
unkown
page readonly
malicious
29B1000
trusted library allocation
page read and write
malicious
1B4D0000
heap
page execute and read and write
1B7DD000
stack
page read and write
C37000
heap
page read and write
7FFAAC0A3000
trusted library allocation
page read and write
1090000
heap
page execute and read and write
7B0000
heap
page read and write
1B5DE000
stack
page read and write
7FFAAC0B4000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
7FFB1E4D2000
unkown
page readonly
1B37A000
stack
page read and write
7FFAAC176000
trusted library allocation
page execute and read and write
129BE000
trusted library allocation
page read and write
7FFAAC150000
trusted library allocation
page execute and read and write
1AF3C000
stack
page read and write
7FFAAC1B0000
trusted library allocation
page execute and read and write
1B4A4000
stack
page read and write
7A0000
heap
page read and write
B9E000
heap
page read and write
7FFAAC140000
trusted library allocation
page read and write
1B825000
heap
page read and write
1BEFC000
stack
page read and write
7FFAAC0A0000
trusted library allocation
page read and write
7FFB1E4B1000
unkown
page execute read
B6C000
heap
page read and write
129B1000
trusted library allocation
page read and write
29AE000
stack
page read and write
1B3A0000
heap
page read and write
7FFAAC14C000
trusted library allocation
page execute and read and write
C21000
heap
page read and write
129B8000
trusted library allocation
page read and write
1BCFD000
stack
page read and write
1105000
heap
page read and write
7FFB1E4D0000
unkown
page read and write
7FFAAC09D000
trusted library allocation
page execute and read and write
1B7E0000
heap
page read and write
7FFAAC090000
trusted library allocation
page read and write
B00000
heap
page read and write
7FFAAC0AD000
trusted library allocation
page execute and read and write
1AD34000
heap
page read and write
EC0000
heap
page read and write
E30000
trusted library allocation
page read and write
BCC000
heap
page read and write
7FFAAC241000
trusted library allocation
page read and write
C39000
heap
page read and write
7FFB1E4C6000
unkown
page readonly
7FFAAC0BD000
trusted library allocation
page execute and read and write
7FFAAC146000
trusted library allocation
page read and write
7FFAAC232000
trusted library allocation
page read and write
1B3A3000
heap
page read and write
1B9F0000
heap
page read and write
1BBFF000
stack
page read and write
10DE000
stack
page read and write
1B821000
heap
page read and write
1BDFA000
stack
page read and write
7FFB1E4B0000
unkown
page readonly
1A9E0000
trusted library allocation
page read and write
1B6DC000
stack
page read and write
F05000
heap
page read and write
7FFAAC093000
trusted library allocation
page execute and read and write
7FFAAC0B0000
trusted library allocation
page read and write
1B819000
heap
page read and write
AF4000
stack
page read and write
7FFB1E4D5000
unkown
page readonly
E43000
trusted library allocation
page read and write
100D000
stack
page read and write
B60000
heap
page read and write
C25000
heap
page read and write
7FF4DA9B0000
trusted library allocation
page execute and read and write
700000
unkown
page readonly
106F000
stack
page read and write
E2C000
stack
page read and write
1100000
heap
page read and write
BA0000
heap
page read and write
E40000
trusted library allocation
page read and write
1B803000
heap
page read and write
1B82E000
heap
page read and write
F00000
heap
page read and write
B8F000
heap
page read and write
1C1FC000
stack
page read and write
700000
unkown
page readonly
BD2000
heap
page read and write
BA2000
heap
page read and write
7FFAAC0EC000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
1B7EE000
heap
page read and write
ED0000
heap
page read and write
7FFAAC094000
trusted library allocation
page read and write
1B80E000
heap
page read and write
There are 81 hidden memdumps, click here to show them.