IOC Report
8xfH5IUIWU.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8xfH5IUIWU.exe
"C:\Users\user\Desktop\8xfH5IUIWU.exe"
malicious

URLs

Name
IP
Malicious
https://gcc.gnu.org/bugs/):
unknown
https://enigmaprotector.com/taggant/spv.crl0
unknown
https://enigmaprotector.com/taggant/user.crl0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
E5349FE000
stack
page read and write
7FF7A7474000
unkown
page readonly
1F37AA6C000
heap
page read and write
7FF7A746C000
unkown
page readonly
1F37A8C0000
heap
page read and write
1F37A860000
trusted library allocation
page read and write
7FF7A7440000
unkown
page readonly
7FF7A7474000
unkown
page execute and write copy
7FF7A7954000
unkown
page execute and read and write
E531DFF000
stack
page read and write
E5319FE000
stack
page read and write
7FF7A7464000
unkown
page execute and write copy
1F37AE80000
heap
page read and write
7FF7A7475000
unkown
page execute and read and write
1F37A68B000
heap
page read and write
E5355FE000
stack
page read and write
7FF7A746C000
unkown
page execute and write copy
1F378A60000
heap
page read and write
1F37B2B6000
heap
page read and write
1F37A580000
heap
page read and write
7FF7A7D2C000
unkown
page execute and read and write
7FF483210000
direct allocation
page execute and read and write
7FF7A7828000
unkown
page execute and read and write
E5341FF000
stack
page read and write
E5335FF000
stack
page read and write
1F37A7C0000
heap
page read and write
7FF7A7441000
unkown
page execute read
1F37A630000
heap
page read and write
7FF8C7240000
direct allocation
page execute and read and write
1F37B2A0000
trusted library allocation
page read and write
1F378AC5000
heap
page read and write
1F378AC0000
heap
page read and write
1F378B0C000
heap
page read and write
7FF7A746F000
unkown
page read and write
7FF7A7470000
unkown
page execute and write copy
1F378B00000
heap
page read and write
7FF7A7441000
unkown
page execute and write copy
1F37A8D0000
heap
page read and write
E5359FE000
stack
page read and write
7FF7A7462000
unkown
page read and write
1F37A699000
heap
page read and write
1F37A6C3000
heap
page read and write
1F37A9A2000
heap
page read and write
E5361FF000
stack
page read and write
7FF7A7462000
unkown
page execute and write copy
7FF7A7464000
unkown
page readonly
1F37A5A0000
heap
page read and write
7FF7A7FF3000
unkown
page execute and write copy
1F37AEEB000
heap
page read and write
E5329FF000
stack
page read and write
1F378A90000
heap
page read and write
1F37A860000
trusted library allocation
page read and write
E5339FE000
stack
page read and write
7FF7A7FF3000
unkown
page execute and read and write
7FF7A7FF0000
unkown
page execute and write copy
1F37A860000
trusted library allocation
page read and write
E5315F8000
stack
page read and write
E535DFF000
stack
page read and write
1F37AF23000
heap
page read and write
E532DFF000
stack
page read and write
1F37A9E4000
heap
page read and write
E5351FE000
stack
page read and write
1F378B06000
heap
page read and write
1F37AF0E000
heap
page read and write
E5365FE000
stack
page read and write
E5321FF000
stack
page read and write
1F37A5B0000
heap
page read and write
7FF7A77EA000
unkown
page execute and read and write
7FF7A7440000
unkown
page readonly
E5345FF000
stack
page read and write
E533DFF000
stack
page read and write
7FF7A7851000
unkown
page execute and read and write
7FF7A77FE000
unkown
page execute and read and write
7FF7A77FA000
unkown
page execute and read and write
1F37A6C0000
heap
page read and write
1F37A860000
trusted library allocation
page read and write
E5325FE000
stack
page read and write
E5331FF000
stack
page read and write
1F37A8B0000
heap
page read and write
1F37A940000
heap
page read and write
E534DFE000
stack
page read and write
1F378A50000
heap
page read and write
There are 72 hidden memdumps, click here to show them.