IOC Report
52B9Zcz8vg.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\52B9Zcz8vg.exe
"C:\Users\user\Desktop\52B9Zcz8vg.exe"
malicious

URLs

Name
IP
Malicious
https://ipinfo.io/country
unknown
http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
unknown
http://foo/bar/mainwindow.baml
unknown
http://foo/MainWindow.xaml
unknown
http://defaultcontainer/MainWindow.xaml
unknown
http://xilloolli.com/api-debug.php
unknown
http://xilloolli.com/api.php
unknown
https://oklibed.com
unknown
https://github.com/reproteq/DiffPatchWpf3Copyright
unknown
https://ipinfo.io/ip
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2392D142000
unkown
page readonly
malicious
2392D570000
heap
page read and write
23947AB0000
heap
page read and write
2392EDF0000
heap
page execute and read and write
239478BA000
heap
page read and write
7FFB67877000
trusted library allocation
page read and write
2392D312000
heap
page read and write
7FFB67862000
trusted library allocation
page read and write
23947B6F000
heap
page read and write
7FFB67872000
trusted library allocation
page read and write
7FFB67980000
trusted library allocation
page execute and read and write
8760FFE000
stack
page read and write
875EFF4000
stack
page read and write
23947B76000
heap
page read and write
23947800000
heap
page read and write
2392D4E0000
heap
page read and write
23947D90000
heap
page read and write
23947B79000
heap
page read and write
7FFB67A10000
trusted library allocation
page read and write
7FFB6788D000
trusted library allocation
page execute and read and write
8761FFE000
stack
page read and write
7FFB67920000
trusted library allocation
page execute and read and write
23947933000
heap
page execute and read and write
2392EF4E000
trusted library allocation
page read and write
23947940000
heap
page read and write
2393EE61000
trusted library allocation
page read and write
2392EE61000
trusted library allocation
page read and write
7FFB67A40000
trusted library allocation
page read and write
23947D01000
heap
page read and write
23947C40000
heap
page read and write
7FFB6788B000
trusted library allocation
page execute and read and write
2392D2DC000
heap
page read and write
2392D4E5000
heap
page read and write
2392D2FB000
heap
page read and write
7FFB67910000
trusted library allocation
page read and write
23947862000
heap
page read and write
2393EE81000
trusted library allocation
page read and write
2392D440000
heap
page read and write
2392ED20000
trusted library allocation
page read and write
23947870000
heap
page read and write
87603FD000
stack
page read and write
2394788B000
heap
page read and write
2392ED40000
trusted library allocation
page read and write
7FFB6791C000
trusted library allocation
page execute and read and write
7FFB67A00000
trusted library allocation
page read and write
239479C0000
heap
page read and write
23947808000
heap
page read and write
23947E0A000
heap
page read and write
8761BF2000
stack
page read and write
23947C65000
heap
page read and write
2392D3D0000
heap
page read and write
87623FE000
stack
page read and write
2392D2D0000
heap
page read and write
7FFB67870000
trusted library allocation
page read and write
23947893000
heap
page read and write
7FF4A0530000
trusted library allocation
page execute and read and write
7FFB67863000
trusted library allocation
page execute and read and write
2392D180000
heap
page read and write
23947B4F000
heap
page read and write
23947C92000
heap
page read and write
23947DA4000
heap
page read and write
7FFB67916000
trusted library allocation
page read and write
7FFB67864000
trusted library allocation
page read and write
7FFB6787D000
trusted library allocation
page execute and read and write
23947BAF000
heap
page read and write
2392D164000
unkown
page readonly
2394DF70000
trusted library allocation
page read and write
7FFB67880000
trusted library allocation
page read and write
2392EF52000
trusted library allocation
page read and write
2392D140000
unkown
page readonly
2392D575000
heap
page read and write
2392ED50000
trusted library allocation
page read and write
2392EDE0000
trusted library allocation
page read and write
23947820000
heap
page read and write
239479C7000
heap
page read and write
2392D33D000
heap
page read and write
23947B47000
heap
page read and write
2392D310000
heap
page read and write
7FFB67A36000
trusted library allocation
page read and write
23947F0B000
heap
page read and write
7FFB6787A000
trusted library allocation
page read and write
7FFB67946000
trusted library allocation
page execute and read and write
23947866000
heap
page read and write
2394BB92000
trusted library allocation
page read and write
7FFB67A38000
trusted library allocation
page read and write
7FFB67860000
trusted library allocation
page read and write
239480B0000
heap
page execute and read and write
2392D344000
heap
page read and write
87613FE000
stack
page read and write
239479E4000
heap
page read and write
23947D1C000
heap
page read and write
239479FF000
heap
page read and write
23947DC2000
heap
page read and write
23947B55000
heap
page read and write
23947780000
heap
page read and write
23947DFF000
heap
page read and write
23947783000
heap
page read and write
7FFB67A08000
trusted library allocation
page read and write
7FFB67A30000
trusted library allocation
page read and write
875FFFE000
stack
page read and write
23947CA0000
heap
page read and write
7FFB67884000
trusted library allocation
page read and write
23947842000
heap
page read and write
7FFB678BC000
trusted library allocation
page execute and read and write
2392D33F000
heap
page read and write
23947CD5000
heap
page read and write
23947DE3000
heap
page read and write
23947CB0000
heap
page read and write
23947826000
heap
page read and write
23947CD0000
heap
page read and write
23947D30000
heap
page read and write
23947CBA000
heap
page read and write
23947887000
heap
page read and write
7FFB67A20000
trusted library allocation
page execute and read and write
23947B68000
heap
page read and write
239478E3000
heap
page read and write
23947D84000
heap
page read and write
23947A06000
heap
page read and write
7FFB6786D000
trusted library allocation
page execute and read and write
23947CAE000
heap
page read and write
23947D2B000
heap
page read and write
2392EE50000
heap
page read and write
2392D4F0000
heap
page read and write
239479B0000
heap
page read and write
23947930000
heap
page execute and read and write
2392ED53000
trusted library allocation
page read and write
87607FB000
stack
page read and write
2392D3A1000
heap
page read and write
23947C5B000
heap
page read and write
23947E0E000
heap
page read and write
23947B9D000
heap
page read and write
There are 121 hidden memdumps, click here to show them.