IOC Report
O0I14144.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\O0I14144.exe
"C:\Users\user\Desktop\O0I14144.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
dxpam.duckdns.org
89.117.23.25
malicious

IPs

IP
Domain
Country
Malicious
89.117.23.25
dxpam.duckdns.org
Lithuania
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
17980001000
trusted library allocation
page read and write
malicious
179F5A50000
trusted library section
page read and write
malicious
1798030F000
trusted library allocation
page read and write
malicious
179F5875000
heap
page read and write
179F4005000
heap
page read and write
7FF625010000
unkown
page read and write
179F677C000
heap
page read and write
179F6698000
heap
page read and write
17980368000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F4095000
heap
page read and write
179F677C000
heap
page read and write
179F58C0000
heap
page read and write
179F6698000
heap
page read and write
179F677C000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
179F4032000
heap
page read and write
179F69B0000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5A80000
trusted library allocation
page read and write
179F5AD0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F5E70000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F6788000
heap
page read and write
179F5B00000
trusted library allocation
page read and write
179F5A90000
trusted library allocation
page read and write
252E4FC000
stack
page read and write
179F677A000
heap
page read and write
179F6698000
heap
page read and write
179F677A000
heap
page read and write
179F5A40000
heap
page execute and read and write
179F6698000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
179F5BE2000
heap
page read and write
179F3FB9000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5A70000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F59A0000
trusted library section
page read and write
179F677C000
heap
page read and write
179F6698000
heap
page read and write
179F677A000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F673C000
heap
page read and write
179F3FF1000
heap
page read and write
179F677A000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
252DFFC000
stack
page read and write
179F677A000
heap
page read and write
179F677A000
heap
page read and write
179F6698000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F6980000
trusted library allocation
page read and write
179F5980000
heap
page read and write
179F677C000
heap
page read and write
179F677A000
heap
page read and write
179F5AB7000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
179F5B83000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5B10000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F4016000
heap
page read and write
7FF848F8D000
trusted library allocation
page execute and read and write
179F673C000
heap
page read and write
179F4005000
heap
page read and write
179F5BB0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F3FBA000
heap
page read and write
179F673C000
heap
page read and write
179F3FDD000
heap
page read and write
179F6698000
heap
page read and write
179F5B40000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F4094000
heap
page read and write
252E9FA000
stack
page read and write
179F5AD0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
7FF849040000
trusted library allocation
page execute and read and write
179F677A000
heap
page read and write
179F5AD5000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F677C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F677C000
heap
page read and write
252DBDE000
stack
page read and write
179F58F4000
heap
page read and write
7FF625010000
unkown
page write copy
7FF625013000
unkown
page readonly
179F5AB0000
trusted library allocation
page read and write
179F5A20000
heap
page execute and read and write
7FF848F00000
trusted library allocation
page execute and read and write
179F5841000
heap
page read and write
179F673C000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
7FF454AC0000
trusted library allocation
page execute and read and write
179F6698000
heap
page read and write
179F5AA0000
trusted library allocation
page read and write
179F5A90000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F586D000
heap
page read and write
179F677A000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F6970000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F58B2000
heap
page read and write
179F59C0000
trusted library section
page read and write
179F4005000
heap
page read and write
179F5B20000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
7FF848E96000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F677A000
heap
page read and write
179F5A90000
trusted library allocation
page read and write
179F3F90000
direct allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F666D000
heap
page read and write
179F677A000
heap
page read and write
179F6698000
heap
page read and write
179F677C000
heap
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
179F6698000
heap
page read and write
179F666C000
heap
page read and write
252E5FE000
stack
page read and write
17980083000
trusted library allocation
page read and write
179F5B61000
trusted library allocation
page read and write
179F3FEC000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F59B0000
heap
page read and write
179F6698000
heap
page read and write
179F5A63000
trusted library allocation
page read and write
17990014000
trusted library allocation
page read and write
179F5A6A000
heap
page read and write
179F5AA0000
trusted library allocation
page read and write
179802FD000
trusted library allocation
page read and write
179F677C000
heap
page read and write
1798005F000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5B10000
trusted library allocation
page read and write
252E0FE000
stack
page read and write
179F5B00000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F673C000
heap
page read and write
179F5B10000
trusted library allocation
page read and write
179F677A000
heap
page read and write
1798030B000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F6698000
heap
page read and write
1798006F000
trusted library allocation
page read and write
179F59B5000
heap
page read and write
17980362000
trusted library allocation
page read and write
179F677A000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
179F4024000
heap
page read and write
179F677C000
heap
page read and write
179F677C000
heap
page read and write
179F677C000
heap
page read and write
179F677A000
heap
page read and write
17980067000
trusted library allocation
page read and write
179F5887000
heap
page read and write
179F3E80000
heap
page read and write
179F677C000
heap
page read and write
179F673C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F677A000
heap
page read and write
17980064000
trusted library allocation
page read and write
17980071000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5A93000
trusted library allocation
page read and write
179F4005000
heap
page read and write
179F673C000
heap
page read and write
179F5BF6000
heap
page read and write
179F5872000
heap
page read and write
179F677A000
heap
page read and write
179F5940000
direct allocation
page execute and read and write
179F5B50000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F58C1000
heap
page read and write
179F673C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F6610000
heap
page read and write
179F3F60000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F4096000
heap
page read and write
179F673C000
heap
page read and write
179F677C000
heap
page read and write
179F5A00000
trusted library allocation
page read and write
179F6647000
heap
page read and write
179F5AF3000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5960000
heap
page read and write
179F6668000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5A73000
trusted library allocation
page read and write
179F5AB0000
remote allocation
page read and write
7FF624FC0000
unkown
page readonly
179F5AB0000
trusted library allocation
page read and write
252F03C000
stack
page read and write
7FF848FB5000
trusted library allocation
page read and write
179F5AC0000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F6698000
heap
page read and write
179F677C000
heap
page read and write
179F6698000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5B10000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F402C000
heap
page read and write
179F6698000
heap
page read and write
179F677C000
heap
page read and write
179F673C000
heap
page read and write
179F5B60000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F677A000
heap
page read and write
179F6990000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5B20000
trusted library allocation
page read and write
179F58E2000
heap
page read and write
179F5B00000
trusted library allocation
page read and write
7FF848F83000
trusted library allocation
page read and write
179F5AB0000
remote allocation
page read and write
179F6669000
heap
page read and write
179F5AD0000
trusted library allocation
page read and write
179F6611000
heap
page read and write
179F5B00000
trusted library allocation
page read and write
179F5A70000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F3FCD000
heap
page read and write
179F3FB2000
heap
page read and write
179F5BE0000
trusted library allocation
page read and write
179F5AB3000
trusted library allocation
page read and write
179F5AD0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F6960000
trusted library allocation
page read and write
1798007D000
trusted library allocation
page read and write
179F5A80000
trusted library allocation
page read and write
179F5870000
heap
page read and write
179F6698000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F594F000
heap
page read and write
17980360000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F4060000
heap
page read and write
179F5840000
heap
page read and write
179F677A000
heap
page read and write
7FF624FC0000
unkown
page readonly
7FF624FEA000
unkown
page readonly
17980354000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5B30000
trusted library allocation
page read and write
179F5885000
heap
page read and write
179F677A000
heap
page read and write
179F677A000
heap
page read and write
179F673C000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5A80000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5AD0000
trusted library allocation
page read and write
7FF454AD0000
trusted library allocation
page execute and read and write
179F673C000
heap
page read and write
179F5A70000
trusted library allocation
page read and write
179F4096000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5A80000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
7FF848DE2000
trusted library allocation
page read and write
179F5AC0000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F673C000
heap
page read and write
179F5AE0000
heap
page read and write
179F5D6E000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F5B30000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F58B3000
heap
page read and write
179F3FBE000
heap
page read and write
179F677C000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F673C000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5B80000
trusted library allocation
page read and write
179F5B50000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F5AD0000
trusted library allocation
page read and write
179F5B10000
trusted library allocation
page read and write
179F5B10000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5B00000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
7FF848DF5000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F6611000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
7FF624FEA000
unkown
page readonly
179F677C000
heap
page read and write
179F673C000
heap
page read and write
179F5AF3000
trusted library allocation
page read and write
179F5AB1000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
252EB3C000
stack
page read and write
179F673C000
heap
page read and write
179F3FAB000
heap
page read and write
1798004E000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F6698000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
179F6950000
trusted library allocation
page read and write
179F5B26000
trusted library allocation
page read and write
179F5A60000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F677A000
heap
page read and write
179F673C000
heap
page read and write
17980057000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F677A000
heap
page read and write
179F677C000
heap
page read and write
179F5B75000
heap
page read and write
252E7FE000
stack
page read and write
179F673C000
heap
page read and write
7FF848F98000
trusted library allocation
page execute and read and write
179F5A90000
trusted library allocation
page read and write
252DEEB000
stack
page read and write
179F5AB5000
trusted library allocation
page read and write
1798036A000
trusted library allocation
page read and write
179F59F0000
trusted library allocation
page read and write
179F5B40000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F408A000
heap
page read and write
179F5A80000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F409A000
heap
page read and write
179F677A000
heap
page read and write
179F677A000
heap
page read and write
7FF454AE0000
trusted library allocation
page execute and read and write
179F5B90000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F5B00000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F677C000
heap
page read and write
1798034B000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F6698000
heap
page read and write
17980300000
trusted library allocation
page read and write
179F5B02000
trusted library allocation
page read and write
17980085000
trusted library allocation
page read and write
17980074000
trusted library allocation
page read and write
179F5AD0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5A80000
trusted library allocation
page read and write
17980061000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F673C000
heap
page read and write
252EA3E000
stack
page read and write
179F5AF0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5AB3000
trusted library allocation
page read and write
179F5A90000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F677C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F677A000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
1798033D000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F4005000
heap
page read and write
179F6698000
heap
page read and write
179F5BC0000
trusted library allocation
page read and write
179F5B10000
trusted library allocation
page read and write
179F5A10000
trusted library allocation
page read and write
7FF848F96000
trusted library allocation
page execute and read and write
179F677C000
heap
page read and write
179F5B70000
heap
page read and write
179F677A000
heap
page read and write
179F5B10000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F677C000
heap
page read and write
17980055000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F677C000
heap
page read and write
179F5B00000
trusted library allocation
page read and write
179F5AD0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F5A73000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F677C000
heap
page read and write
179F5AB0000
remote allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5A80000
trusted library allocation
page read and write
7FF848F94000
trusted library allocation
page execute and read and write
179F5AB0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F677A000
heap
page read and write
179F6668000
heap
page read and write
179F673C000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5B40000
trusted library allocation
page read and write
179F5879000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
252E2FD000
stack
page read and write
179F677C000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F5AB3000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5A90000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5AA0000
trusted library allocation
page read and write
179F5B10000
trusted library allocation
page read and write
179F5B80000
trusted library allocation
page read and write
179F3FCE000
heap
page read and write
179F6698000
heap
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
179F5AF0000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F5AB8000
trusted library allocation
page read and write
179F61C4000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F673C000
heap
page read and write
179F673C000
heap
page read and write
17980336000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
252E6FC000
stack
page read and write
179F673C000
heap
page read and write
179F5B50000
trusted library allocation
page read and write
179F5B30000
trusted library allocation
page read and write
17980329000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
7FF625013000
unkown
page readonly
179F677A000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F3FFD000
heap
page read and write
7FF624FC1000
unkown
page execute read
179F677C000
heap
page read and write
179F5AD0000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
252E3FE000
stack
page read and write
179F4094000
heap
page read and write
179F69A0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5BD0000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F677A000
heap
page read and write
179F5AD0000
trusted library allocation
page read and write
179F58E3000
heap
page read and write
179F677C000
heap
page read and write
252E8FE000
stack
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F677C000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5AB0000
trusted library allocation
page read and write
1798034F000
trusted library allocation
page read and write
179F677C000
heap
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
179F3FA0000
heap
page read and write
179F6698000
heap
page read and write
179F404A000
heap
page read and write
1798007F000
trusted library allocation
page read and write
17990009000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F58E4000
heap
page read and write
179F677C000
heap
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
179F5BA0000
trusted library allocation
page read and write
179F4092000
heap
page read and write
7FF848DE4000
trusted library allocation
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5A70000
trusted library allocation
page read and write
179F5B00000
trusted library allocation
page read and write
252DB9E000
stack
page read and write
179F5B10000
trusted library allocation
page read and write
179F59D0000
trusted library allocation
page read and write
179F5AB1000
trusted library allocation
page read and write
179F5A90000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5AB5000
trusted library allocation
page read and write
179F673C000
heap
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5A70000
trusted library allocation
page read and write
7FF624FC1000
unkown
page execute read
179F677A000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F677C000
heap
page read and write
179F673C000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
17990001000
trusted library allocation
page read and write
252E1F3000
stack
page read and write
179F5B20000
trusted library allocation
page read and write
179F5AC0000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F5B20000
trusted library allocation
page read and write
179F5AF0000
trusted library allocation
page read and write
179F6698000
heap
page read and write
179F5AB0000
trusted library allocation
page read and write
179F5AB3000
trusted library allocation
page read and write
179F5A83000
trusted library allocation
page read and write
There are 540 hidden memdumps, click here to show them.