IOC Report
ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
C:\Users\user\Desktop\ArchivoAdju_ntoSSAZLMAUEVNYQBKcmiizVFSGC.exe
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288

URLs

Name
IP
Malicious
http://www.indyproject.org/
unknown
http://www.lmd.de
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
16AF7000
direct allocation
page read and write
B93000
unkown
page read and write
84050F9000
stack
page read and write
15FE8000
direct allocation
page read and write
142F6000
heap
page read and write
15FCB000
direct allocation
page read and write
B8B000
unkown
page read and write
1657E000
direct allocation
page read and write
16D41000
direct allocation
page read and write
142FF000
heap
page read and write
14690000
heap
page read and write
16B37000
direct allocation
page read and write
16C30000
direct allocation
page read and write
15FAD000
direct allocation
page read and write
15F9D000
direct allocation
page read and write
16530000
direct allocation
page read and write
1F64DFE4000
heap
page read and write
165AB000
direct allocation
page read and write
BC4000
unkown
page read and write
1F64DFCD000
heap
page read and write
84051FF000
stack
page read and write
16730000
direct allocation
page read and write
1F64DED0000
trusted library allocation
page read and write
14304000
heap
page read and write
16A30000
direct allocation
page read and write
1426E000
heap
page read and write
BB8000
unkown
page read and write
142D6000
heap
page read and write
BBF000
unkown
page write copy
15FC2000
direct allocation
page read and write
165F7000
direct allocation
page read and write
1F64DFCD000
heap
page read and write
15EF0000
direct allocation
page read and write
BAF000
unkown
page read and write
1429C000
heap
page read and write
177A3000
heap
page read and write
1F64DFC5000
heap
page read and write
15F76000
direct allocation
page read and write
16B70000
direct allocation
page read and write
BB3000
unkown
page read and write
BC7000
unkown
page readonly
BA1000
unkown
page read and write
16445000
direct allocation
page read and write
1772F000
stack
page read and write
1708E000
stack
page read and write
146B0000
heap
page read and write
401000
unkown
page execute read
168F0000
direct allocation
page read and write
16870000
direct allocation
page read and write
16A73000
direct allocation
page read and write
140D0000
heap
page read and write
14700000
unkown
page execute and read and write | page no cache
142FD000
heap
page read and write
8404D6D000
stack
page read and write
16430000
direct allocation
page read and write
14300000
heap
page read and write
1F64DF50000
heap
page read and write
15F85000
direct allocation
page read and write
16D53000
direct allocation
page read and write
178C0000
direct allocation
page execute and read and write
1659B000
direct allocation
page read and write
16A70000
direct allocation
page read and write
142EE000
heap
page read and write
1740E000
stack
page read and write
1429C000
heap
page read and write
1F64DFCD000
heap
page read and write
8405079000
stack
page read and write
16BD0000
direct allocation
page read and write
146C0000
heap
page read and write
16DF0000
direct allocation
page read and write
142FA000
heap
page read and write
BC5000
unkown
page readonly
1F64E270000
trusted library allocation
page read and write
16013000
direct allocation
page read and write
13FBE000
unkown
page readonly
169B7000
direct allocation
page read and write
177A0000
heap
page read and write
16CB0000
direct allocation
page read and write
1F64DF91000
heap
page read and write
166B0000
direct allocation
page read and write
B8B000
unkown
page write copy
1F64E260000
trusted library allocation
page read and write
BA4000
unkown
page read and write
142BC000
heap
page read and write
14740000
heap
page read and write
16021000
direct allocation
page read and write
1F64E290000
heap
page read and write
1762E000
stack
page read and write
142DA000
heap
page read and write
BAD000
unkown
page read and write
30000
heap
page read and write
B9A000
unkown
page read and write
16537000
direct allocation
page read and write
142FB000
heap
page read and write
142FB000
heap
page read and write
840517F000
stack
page read and write
142F1000
heap
page read and write
16AF0000
direct allocation
page read and write
1718F000
stack
page read and write
16FFD000
stack
page read and write
1750F000
stack
page read and write
14130000
heap
page read and write
165F0000
direct allocation
page read and write
14238000
heap
page read and write
98000
stack
page read and write
1F64E250000
heap
page readonly
1429D000
heap
page read and write
13FE2000
unkown
page readonly
142F6000
heap
page read and write
1F64DF80000
heap
page read and write
16670000
direct allocation
page read and write
15F55000
direct allocation
page read and write
16570000
direct allocation
page read and write
16D70000
direct allocation
page read and write
19A000
stack
page read and write
1F64DFCC000
heap
page read and write
14089000
unkown
page readonly
1643E000
direct allocation
page read and write
142ED000
heap
page read and write
167F0000
direct allocation
page read and write
15F96000
direct allocation
page read and write
16A9D000
direct allocation
page read and write
14071000
unkown
page readonly
146A0000
direct allocation
page execute and read and write
15FBB000
direct allocation
page read and write
1F64DFE4000
heap
page read and write
14745000
heap
page read and write
B95000
unkown
page read and write
16BD8000
direct allocation
page read and write
14298000
heap
page read and write
1F64E2A0000
trusted library allocation
page read and write
15F4D000
direct allocation
page read and write
15F6F000
direct allocation
page read and write
166BE000
direct allocation
page read and write
146C3000
heap
page read and write
164B7000
direct allocation
page read and write
16A7A000
direct allocation
page read and write
1F64E1A0000
trusted library allocation
page read and write
16930000
direct allocation
page read and write
16B77000
direct allocation
page read and write
164B0000
direct allocation
page read and write
1F64EFD0000
trusted library allocation
page read and write
15F8C000
direct allocation
page read and write
1F64DF30000
heap
page read and write
8404DEE000
stack
page read and write
14230000
heap
page read and write
1F64E295000
heap
page read and write
16EFE000
stack
page read and write
167B0000
direct allocation
page read and write
1F64E299000
heap
page read and write
16677000
direct allocation
page read and write
142DC000
heap
page read and write
16977000
direct allocation
page read and write
400000
unkown
page readonly
16586000
direct allocation
page read and write
142DB000
heap
page read and write
14299000
heap
page read and write
BBB000
unkown
page read and write
142F6000
heap
page read and write
8404CEB000
stack
page read and write
166DD000
direct allocation
page read and write
16A37000
direct allocation
page read and write
16D31000
direct allocation
page read and write
1F64ED90000
trusted library allocation
page read and write
15FD2000
direct allocation
page read and write
1428E000
heap
page read and write
169B0000
direct allocation
page read and write
15EF7000
direct allocation
page read and write
8405279000
stack
page read and write
1F64DEC0000
heap
page read and write
16D5A000
direct allocation
page read and write
1F64E190000
trusted library allocation
page read and write
A23C000
unkown
page readonly
16BB0000
direct allocation
page read and write
16AA4000
direct allocation
page read and write
1F64E200000
trusted library allocation
page read and write
16A87000
direct allocation
page read and write
1F64DFCD000
heap
page read and write
B8D000
unkown
page read and write
15FB4000
direct allocation
page read and write
16D61000
direct allocation
page read and write
1F64E240000
trusted library allocation
page read and write
142F5000
heap
page read and write
16463000
direct allocation
page read and write
16D4B000
direct allocation
page read and write
14022000
unkown
page readonly
There are 176 hidden memdumps, click here to show them.