IOC Report
dg7zkyyiEZ.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dg7zkyyiEZ.exe
"C:\Users\user\Desktop\dg7zkyyiEZ.exe"
malicious

URLs

Name
IP
Malicious
5.tcp.eu.ngrok.io:17742
malicious
https://pastebin.com/raw/EngADTbC=MicrosoftEdgeUpdateTaskMachine
unknown
https://pastebin.com/raw/EngADTbC
unknown

Domains

Name
IP
Malicious
5.tcp.eu.ngrok.io
3.64.4.198
malicious
198.187.3.20.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
3.64.4.198
5.tcp.eu.ngrok.io
United States
malicious
3.67.62.142
unknown
United States
malicious
3.127.181.115
unknown
United States
malicious
3.67.112.102
unknown
United States
malicious
3.67.161.133
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
ghost
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Client.exe
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2C7A000
trusted library allocation
page read and write
malicious
4F2000
unkown
page readonly
malicious
1080000
trusted library allocation
page execute and read and write
BAD000
heap
page read and write
D17000
trusted library allocation
page execute and read and write
5060000
trusted library section
page readonly
2C52000
trusted library allocation
page read and write
6A9E000
stack
page read and write
AE0000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
8210000
heap
page read and write
7F700000
trusted library allocation
page execute and read and write
F38000
heap
page read and write
B8F000
heap
page read and write
AD2000
trusted library allocation
page execute and read and write
81DE000
heap
page read and write
F30000
heap
page read and write
10A3000
heap
page execute and read and write
8360000
trusted library allocation
page execute and read and write
B10000
heap
page read and write
DB0000
heap
page read and write
8273000
heap
page read and write
D90000
trusted library allocation
page read and write
2C45000
trusted library allocation
page read and write
5110000
heap
page read and write
AFA000
trusted library allocation
page execute and read and write
B1A000
heap
page read and write
4B98000
trusted library allocation
page read and write
1064000
heap
page read and write
5250000
heap
page read and write
D12000
trusted library allocation
page read and write
103F000
stack
page read and write
8281000
heap
page read and write
9B5000
heap
page read and write
B0A000
trusted library allocation
page execute and read and write
BC9000
heap
page read and write
B4F000
heap
page read and write
81B0000
heap
page read and write
900000
heap
page read and write
6D30000
trusted library allocation
page execute and read and write
5120000
heap
page read and write
4DFA000
stack
page read and write
59A000
stack
page read and write
92DE000
stack
page read and write
C9C000
heap
page read and write
4F1B000
stack
page read and write
8269000
heap
page read and write
B1E000
heap
page read and write
B02000
trusted library allocation
page execute and read and write
BA8000
heap
page read and write
AC0000
trusted library allocation
page read and write
10A0000
heap
page execute and read and write
6940000
unclassified section
page read and write
1060000
heap
page read and write
6F20000
heap
page read and write
910000
heap
page read and write
D5E000
stack
page read and write
5135000
heap
page read and write
8F6000
stack
page read and write
8228000
heap
page read and write
8390000
heap
page read and write
AEA000
trusted library allocation
page execute and read and write
93DE000
stack
page read and write
3B91000
trusted library allocation
page read and write
505B000
stack
page read and write
8760000
heap
page read and write
D1B000
trusted library allocation
page execute and read and write
BF8000
heap
page read and write
523D000
stack
page read and write
6340000
heap
page read and write
859E000
stack
page read and write
4D2E000
stack
page read and write
4F0000
unkown
page readonly
8202000
heap
page read and write
8750000
heap
page read and write
ADA000
trusted library allocation
page execute and read and write
5240000
heap
page read and write
5130000
heap
page read and write
B94000
heap
page read and write
4E79000
stack
page read and write
C10000
heap
page read and write
699E000
stack
page read and write
CA1000
heap
page read and write
1040000
trusted library allocation
page execute and read and write
2B91000
trusted library allocation
page read and write
81E9000
heap
page read and write
828E000
heap
page read and write
9B0000
heap
page read and write
81C9000
heap
page read and write
6920000
trusted library allocation
page read and write
82EB000
stack
page read and write
8245000
heap
page read and write
AE2000
trusted library allocation
page execute and read and write
4DBA000
stack
page read and write
6930000
heap
page execute and read and write
2C3C000
trusted library allocation
page read and write
D70000
heap
page read and write
BBA000
heap
page read and write
832E000
stack
page read and write
AF7000
trusted library allocation
page execute and read and write
2C6A000
trusted library allocation
page read and write
B89000
heap
page read and write
DFC000
stack
page read and write
820B000
heap
page read and write
825F000
heap
page read and write
6542000
trusted library allocation
page read and write
8499000
stack
page read and write
E00000
heap
page read and write
4E3C000
stack
page read and write
BC1000
heap
page read and write
501D000
stack
page read and write
5274000
heap
page read and write
2C4E000
trusted library allocation
page read and write
There are 103 hidden memdumps, click here to show them.