IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
87.120.113.179
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
87.120.113.179
unknown
Bulgaria
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B22000
unkown
page readonly
malicious
2FE1000
trusted library allocation
page read and write
malicious
1046000
heap
page read and write
12FF1000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
2E67000
heap
page read and write
10AD000
heap
page read and write
1140000
trusted library allocation
page read and write
1BD74000
stack
page read and write
1B45D000
stack
page read and write
2E50000
heap
page read and write
1150000
trusted library allocation
page read and write
1C0F5000
heap
page read and write
1C112000
heap
page read and write
1C098000
heap
page read and write
1BF7E000
stack
page read and write
2E2E000
stack
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
7FF848F00000
trusted library allocation
page execute and read and write
132C000
stack
page read and write
B20000
unkown
page readonly
7FF848D4D000
trusted library allocation
page execute and read and write
1BB74000
stack
page read and write
1C119000
heap
page read and write
1C96C000
stack
page read and write
1020000
trusted library allocation
page read and write
1B840000
heap
page read and write
1153000
trusted library allocation
page read and write
7FF848D33000
trusted library allocation
page execute and read and write
1C115000
heap
page read and write
1118000
heap
page read and write
11A0000
heap
page read and write
1C36D000
stack
page read and write
1C07D000
stack
page read and write
7FF848EF0000
trusted library allocation
page execute and read and write
7FF848DEC000
trusted library allocation
page execute and read and write
1225000
heap
page read and write
BE0000
heap
page read and write
1B995000
stack
page read and write
1B893000
heap
page read and write
1C080000
heap
page read and write
142F000
stack
page read and write
1B010000
trusted library allocation
page read and write
1100000
heap
page read and write
7FF848D34000
trusted library allocation
page read and write
104C000
heap
page read and write
7FF848E16000
trusted library allocation
page execute and read and write
B20000
unkown
page readonly
7FF848DE0000
trusted library allocation
page read and write
1C56F000
stack
page read and write
1B890000
heap
page read and write
BB0000
heap
page read and write
7FF848DE6000
trusted library allocation
page read and write
1585000
heap
page read and write
1C86C000
stack
page read and write
2FD0000
heap
page execute and read and write
1C11E000
heap
page read and write
1220000
heap
page read and write
7FF848D5B000
trusted library allocation
page execute and read and write
1104000
heap
page read and write
1C0D4000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
12FE1000
trusted library allocation
page read and write
1084000
heap
page read and write
1BA70000
heap
page execute and read and write
7FF848E50000
trusted library allocation
page execute and read and write
FD0000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
BC0000
heap
page read and write
1580000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
1C121000
heap
page read and write
7FF848D3D000
trusted library allocation
page execute and read and write
7FF848ED0000
trusted library allocation
page read and write
1B7DE000
stack
page read and write
EF1000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
1BC7A000
stack
page read and write
7FF488050000
trusted library allocation
page execute and read and write
7FF848D5D000
trusted library allocation
page execute and read and write
1BE7E000
stack
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
2FAE000
stack
page read and write
7FF848D42000
trusted library allocation
page read and write
1C134000
heap
page read and write
1081000
heap
page read and write
1C12B000
heap
page read and write
152B000
stack
page read and write
106C000
heap
page read and write
1040000
heap
page read and write
1C76A000
stack
page read and write
There are 81 hidden memdumps, click here to show them.