IOC Report
FATURA VE BELGELER.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FATURA VE BELGELER.exe
"C:\Users\user\Desktop\FATURA VE BELGELER.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
2779BAFD000
trusted library allocation
page read and write
malicious
277ABAE1000
trusted library allocation
page read and write
27799E20000
unkown
page readonly
277B3B10000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
DDEC4FE000
stack
page read and write
2779A110000
heap
page read and write
277B4760000
trusted library section
page read and write
7FFAACD50000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
DDEC7FB000
stack
page read and write
7FFB1E3C2000
unkown
page readonly
7FFAACC56000
trusted library allocation
page read and write
DDEC6FE000
stack
page read and write
7FFAACCC0000
trusted library allocation
page execute and read and write
2779A1B3000
trusted library allocation
page read and write
277B4770000
heap
page read and write
7FFAACD56000
trusted library allocation
page read and write
7FFAACBA4000
trusted library allocation
page read and write
277B43B0000
heap
page execute and read and write
2779A130000
heap
page read and write
7FFAACD70000
trusted library allocation
page read and write
27799F31000
heap
page read and write
7FFAACBCB000
trusted library allocation
page execute and read and write
7FFB1E3C0000
unkown
page read and write
2779A0E0000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
27799E22000
unkown
page readonly
27799F64000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACD5C000
trusted library allocation
page read and write
27799F13000
heap
page read and write
7FFAACC50000
trusted library allocation
page read and write
7FFAACC86000
trusted library allocation
page execute and read and write
7FFAACD46000
trusted library allocation
page read and write
7FFAACC5C000
trusted library allocation
page execute and read and write
277ABAF1000
trusted library allocation
page read and write
277B43C0000
trusted library section
page read and write
277ABAE8000
trusted library allocation
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page execute and read and write
7FF430B50000
trusted library allocation
page execute and read and write
277B440C000
trusted library section
page read and write
7FFB1E3C5000
unkown
page readonly
DDEC183000
stack
page read and write
7FFAACBB8000
trusted library allocation
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
2779A180000
trusted library allocation
page read and write
7FFB1E3A1000
unkown
page execute read
2779A1A0000
trusted library allocation
page read and write
7FFAACD92000
trusted library allocation
page read and write
2779A0F0000
heap
page read and write
2779BA10000
trusted library section
page read and write
2779A0E5000
heap
page read and write
27799FD4000
heap
page read and write
7FFB1E3A0000
unkown
page readonly
27799E2C000
unkown
page readonly
7FFAACBA2000
trusted library allocation
page read and write
7FFAACBC4000
trusted library allocation
page read and write
27799EF0000
heap
page read and write
27799F1D000
heap
page read and write
27799F5C000
heap
page read and write
27799F33000
heap
page read and write
7FFAACBCD000
trusted library allocation
page execute and read and write
277ABE91000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
277B43CD000
trusted library section
page read and write
27799F1B000
heap
page read and write
7FFAACBA3000
trusted library allocation
page execute and read and write
27799EFC000
heap
page read and write
27799E30000
unkown
page readonly
277B3E6C000
heap
page read and write
2779A260000
heap
page read and write
2779A000000
heap
page read and write
2779BAE1000
trusted library allocation
page read and write
2779A1B0000
trusted library allocation
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
2779A230000
heap
page execute and read and write
277AD673000
trusted library allocation
page read and write
7FFAACBB2000
trusted library allocation
page read and write
2779A265000
heap
page read and write
7FFAACBFC000
trusted library allocation
page execute and read and write
7FFAACBA0000
trusted library allocation
page read and write
27799FE3000
heap
page read and write
277AC03A000
trusted library allocation
page read and write
277AD0CB000
trusted library allocation
page read and write
277ABAFE000
trusted library allocation
page read and write
2779BAD0000
heap
page read and write
27799F5E000
heap
page read and write
7FFAACDA0000
trusted library allocation
page execute and read and write
277ABAED000
trusted library allocation
page read and write
There are 81 hidden memdumps, click here to show them.