IOC Report
cake.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\cake.exe
"C:\Users\user\Desktop\cake.exe"
malicious

URLs

Name
IP
Malicious
vecotr.viewdns.net
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
vecotr.viewdns.net
163.5.112.71
malicious

IPs

IP
Domain
Country
Malicious
163.5.112.71
vecotr.viewdns.net
France
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
72000
unkown
page readonly
malicious
8B0000
heap
page read and write
1ABB3000
heap
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
1AFBE000
stack
page read and write
1AB7E000
stack
page read and write
1B0BF000
stack
page read and write
1ABB0000
heap
page read and write
220E000
stack
page read and write
1A599000
heap
page read and write
400000
heap
page read and write
1B86C000
stack
page read and write
1ADB4000
stack
page read and write
406000
heap
page read and write
7FF848E10000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
1B96C000
stack
page read and write
500000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
920000
heap
page execute and read and write
40C000
heap
page read and write
7FF848D62000
trusted library allocation
page read and write
600000
heap
page read and write
8C3000
trusted library allocation
page read and write
431000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF487CD0000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
1B270000
heap
page read and write
70000
unkown
page readonly
1ACBA000
stack
page read and write
1B4000
stack
page read and write
1AAE0000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
444000
heap
page read and write
1B56C000
stack
page read and write
7FF848D53000
trusted library allocation
page execute and read and write
4CC000
heap
page read and write
1B0F3000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
46E000
heap
page read and write
965000
heap
page read and write
12218000
trusted library allocation
page read and write
1AEBF000
stack
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
7FF848DAC000
trusted library allocation
page execute and read and write
670000
trusted library allocation
page read and write
695000
heap
page read and write
8A0000
trusted library allocation
page read and write
7FF848D74000
trusted library allocation
page read and write
1B0C0000
heap
page read and write
434000
heap
page read and write
620000
heap
page read and write
1B76A000
stack
page read and write
2255000
trusted library allocation
page read and write
12211000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
1B1FE000
stack
page read and write
70000
unkown
page readonly
7FF848EF0000
trusted library allocation
page read and write
1A79C000
stack
page read and write
4F0000
heap
page read and write
442000
heap
page read and write
42C000
heap
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
1A240000
trusted library allocation
page read and write
1AB30000
heap
page execute and read and write
960000
heap
page read and write
690000
heap
page read and write
2211000
trusted library allocation
page read and write
7FF848E06000
trusted library allocation
page read and write
79F000
stack
page read and write
89E000
stack
page read and write
There are 66 hidden memdumps, click here to show them.