IOC Report
ujsvTrVlol.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ujsvTrVlol.exe
"C:\Users\user\Desktop\ujsvTrVlol.exe"
malicious

URLs

Name
IP
Malicious
https://gcc.gnu.org/bugs/):
unknown
https://enigmaprotector.com/taggant/spv.crl0
unknown
https://enigmaprotector.com/taggant/user.crl0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1E800CF0000
heap
page read and write
270B9FF000
stack
page read and write
7FF7F5A16000
unkown
page execute and read and write
1E802AC9000
heap
page read and write
7FF7F59E0000
unkown
page readonly
270DDFE000
stack
page read and write
7FF7F63A7000
unkown
page execute and read and write
270D5FF000
stack
page read and write
1E802A60000
heap
page read and write
1E80316D000
heap
page read and write
1E802AC4000
heap
page read and write
1E803486000
heap
page read and write
1E8031C3000
heap
page read and write
1E8027B0000
trusted library allocation
page read and write
1E8029A0000
heap
page read and write
7FF7F66F3000
unkown
page execute and write copy
270ADFE000
stack
page read and write
7FFE22010000
direct allocation
page execute and read and write
270CDFE000
stack
page read and write
1E802BEF000
heap
page read and write
7FF7F5A04000
unkown
page execute and write copy
1E802A92000
heap
page read and write
1E8031BA000
heap
page read and write
7FF7F5A11000
unkown
page execute and write copy
1E800CC0000
heap
page read and write
1E800C10000
heap
page read and write
1E8031BC000
heap
page read and write
1E800D06000
heap
page read and write
1E802CA0000
heap
page read and write
7FF402950000
direct allocation
page execute and read and write
270D9FF000
stack
page read and write
1E803070000
heap
page read and write
1E802BEC000
heap
page read and write
1E802B2D000
heap
page read and write
1E800D00000
heap
page read and write
1E800B30000
heap
page read and write
7FF7F5A02000
unkown
page execute and write copy
1E802BFB000
heap
page read and write
7FF7F5A0D000
unkown
page execute and write copy
1E802990000
heap
page read and write
270BDFE000
stack
page read and write
7FF7F66F6000
unkown
page execute and read and write
7FF7F59E0000
unkown
page readonly
270E1FF000
stack
page read and write
1E803176000
heap
page read and write
1E8027B0000
trusted library allocation
page read and write
1E800C50000
heap
page read and write
270C9FF000
stack
page read and write
270D1FF000
stack
page read and write
1E8026A0000
heap
page read and write
7FF7F5A04000
unkown
page readonly
1E802BF8000
heap
page read and write
7FF7F5EF1000
unkown
page execute and read and write
7FF7F5A0D000
unkown
page readonly
1E802B15000
heap
page read and write
270B1FE000
stack
page read and write
270C5FE000
stack
page read and write
270B5FE000
stack
page read and write
270A1FE000
stack
page read and write
1E8031CE000
heap
page read and write
1E800C40000
heap
page read and write
7FF7F5DF0000
unkown
page execute and read and write
1E802BF5000
heap
page read and write
7FF7F5A15000
unkown
page readonly
1E8027E3000
heap
page read and write
270A9FE000
stack
page read and write
1E802BF4000
heap
page read and write
7FF7F5A10000
unkown
page read and write
1E8028E0000
trusted library allocation
page read and write
270E5FF000
stack
page read and write
1E802A20000
heap
page read and write
7FF7F59E1000
unkown
page execute and write copy
7FF7F5EF3000
unkown
page execute and read and write
1E800C45000
heap
page read and write
1E8027E0000
heap
page read and write
1E802B65000
heap
page read and write
1E8029B0000
heap
page read and write
2709DF7000
stack
page read and write
270A5FE000
stack
page read and write
1E803165000
heap
page read and write
1E8031D4000
heap
page read and write
7FF7F5A15000
unkown
page execute and write copy
1E802B65000
heap
page read and write
270C1FF000
stack
page read and write
7FF7F5D8A000
unkown
page execute and read and write
1E803170000
heap
page read and write
7FF7F5D9E000
unkown
page execute and read and write
1E8031DE000
heap
page read and write
7FF7F59E1000
unkown
page execute read
1E802B15000
heap
page read and write
7FF7F66F6000
unkown
page execute and write copy
7FF7F5DC8000
unkown
page execute and read and write
7FF7F5D9A000
unkown
page execute and read and write
7FF7F5A02000
unkown
page read and write
1E802920000
trusted library allocation
page read and write
There are 85 hidden memdumps, click here to show them.