IOC Report

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Fra FAC-ES101-2107-03806.doc.exe
'C:\Users\user\Desktop\Fra FAC-ES101-2107-03806.doc.exe'
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2120000
unkown
page execute and read and write
malicious
1DA30059000
unkown
page read and write
clean
11F13050000
unkown
page read and write
clean
7FF5A4FF6000
unkown image
page readonly
clean
7FF5E4558000
unkown image
page readonly
clean
7FF5C60BC000
unkown image
page readonly
clean
7FF5D0726000
unkown image
page readonly
clean
23A93A00000
unkown image
page readonly
clean
1EB0A875000
unkown
page read and write
clean
7FF59B830000
unkown image
page readonly
clean
1ED38980000
unkown image
page readonly
clean
23A93B30000
unkown image
page readonly
clean
11F0D770000
unkown image
page readonly
clean
23207B000
stack
page read and write
clean
7FF552F8C000
unkown image
page readonly
clean
1E94A058000
unkown
page read and write
clean
1DA30E03000
unkown
page read and write
clean
1DA30113000
unkown
page read and write
clean
7FF5C5DA9000
unkown image
page readonly
clean
1DA309D3000
unkown
page read and write
clean
11F12E00000
unkown
page read and write
clean
7FF5C614F000
unkown image
page readonly
clean
1DA3099A000
unkown
page read and write
clean
7DF5D1C00000
unkown image
page readonly
clean
7FF58284B000
unkown image
page readonly
clean
1EB0A640000
unkown image
page readonly
clean
A7A0C7C000
stack
page read and write
clean
281A1013000
unkown
page read and write
clean
7FF5E4636000
unkown image
page readonly
clean
23A94402000
unkown
page read and write
clean
1DE3A629000
unkown
page read and write
clean
7FF5AE653000
unkown image
page readonly
clean
11F0D670000
unkown image
page readonly
clean
7DF59CD62000
unkown image
page readonly
clean
11F0D630000
heap private
page read and write
clean
1DA30954000
unkown
page read and write
clean
7FF5ADDF6000
unkown image
page readonly
clean
7FF517E03000
unkown image
page readonly
clean
7FF5D0651000
unkown image
page readonly
clean
11F12D20000
unkown
page read and write
clean
1DA3099A000
unkown
page read and write
clean
7DF45D6F0000
unkown image
page readonly
clean
1ED38470000
unkown
page read and write
clean
7DF4E3960000
unkown image
page readonly
clean
7DF55F822000
unkown image
page readonly
clean
1DA30984000
unkown
page read and write
clean
7FF517D24000
unkown image
page readonly
clean
11F12BD0000
unkown
page read and write
clean
2A0A3980000
unkown image
page readonly
clean
7FF5AE646000
unkown image
page readonly
clean
20C89B02000
unkown
page read and write
clean
7FF5A4D5D000
unkown image
page readonly
clean
1EB0A760000
unkown
page read and write
clean
20C89A3A000
unkown
page read and write
clean
9BE6477000
stack
page read and write
clean
1ED3844F000
unkown
page read and write
clean
7FF55E3D3000
unkown image
page readonly
clean
11F0D872000
unkown
page read and write
clean
7FF5AE5C9000
unkown image
page readonly
clean
7FF553229000
unkown image
page readonly
clean
8A0000
unkown image
page readonly
clean
19EB9FF0000
unkown image
page readonly
clean
7FF59B906000
unkown image
page readonly
clean
7FF582865000
unkown image
page readonly
clean
7FF553271000
unkown image
page readonly
clean
1DA300BF000
unkown
page read and write
clean
7DF417120000
unkown image
page readonly
clean
1DA30985000
unkown
page read and write
clean
1E949FB0000
unkown image
page readonly
clean
7FF5E3008000
unkown image
page readonly
clean
7FF5C6158000
unkown image
page readonly
clean
7FF517D18000
unkown image
page readonly
clean
B67F4FD000
stack
page read and write
clean
11F12DE0000
unkown
page read and write
clean
7DF5D1BF0000
unkown image
page readonly
clean
1DA30720000
unkown
page read and write
clean
23A94532000
unkown
page read and write
clean
11F12EF2000
unkown
page read and write
clean