IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
http://html4/loose.dtd
unknown
https://curl.se/docs/alt-svc.html#
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW173201934735a1
unknown
https://curl.se/docs/http-cookies.html
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347libgcc_s_dw2-1.dll__register_frame_info__der
unknown
https://curl.se/docs/hsts.html#
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW17
unknown
https://curl.se/docs/http-cookies.html#
unknown
https://curl.se/docs/alt-svc.html
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
http://.css
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
unknown
https://ace-snapper-privately.ngrok-free.app/test/test
unknown
http://.jpg
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
34.116.198.130
home.fvtekk5pn.top
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3D30000
direct allocation
page read and write
5E2E000
stack
page read and write
7231000
heap
page read and write
FB0000
heap
page read and write
3D30000
direct allocation
page read and write
7920000
direct allocation
page execute and read and write
626E000
stack
page read and write
7231000
heap
page read and write
7920000
direct allocation
page execute and read and write
7980000
direct allocation
page execute and read and write
7930000
direct allocation
page execute and read and write
6FEF000
stack
page read and write
7231000
heap
page read and write
79D0000
direct allocation
page execute and read and write
3D30000
direct allocation
page read and write
F44000
heap
page read and write
F60000
heap
page read and write
7231000
heap
page read and write
1A2B000
unkown
page execute and read and write
4E6E000
stack
page read and write
F44000
heap
page read and write
7231000
heap
page read and write
49EE000
stack
page read and write
3D30000
direct allocation
page read and write
7920000
direct allocation
page execute and read and write
7231000
heap
page read and write
3D30000
direct allocation
page read and write
1A44000
unkown
page execute and read and write
5BAF000
stack
page read and write
7231000
heap
page read and write
7231000
heap
page read and write
7920000
direct allocation
page execute and read and write
1E40000
heap
page read and write
3CAE000
stack
page read and write
7231000
heap
page read and write
7920000
direct allocation
page execute and read and write
7231000
heap
page read and write
7231000
heap
page read and write
FC1000
unkown
page execute and write copy
7920000
direct allocation
page execute and read and write
F44000
heap
page read and write
602F000
stack
page read and write
7231000
heap
page read and write
7920000
direct allocation
page execute and read and write
F50000
heap
page read and write
7920000
direct allocation
page execute and read and write
16CC000
unkown
page execute and read and write
7231000
heap
page read and write
52AF000
stack
page read and write
3D30000
direct allocation
page read and write
552E000
stack
page read and write
6DEE000
stack
page read and write
672E000
stack
page read and write
66EF000
stack
page read and write
3C2E000
stack
page read and write
4E2F000
stack
page read and write
59AE000
stack
page read and write
7DBB000
direct allocation
page read and write
1A44000
unkown
page execute and write copy
7990000
direct allocation
page execute and read and write
7231000
heap
page read and write
476F000
stack
page read and write
1573000
unkown
page execute and read and write
596F000
stack
page read and write
702E000
stack
page read and write
7231000
heap
page read and write
606E000
stack
page read and write
7920000
direct allocation
page execute and read and write
1A45000
unkown
page execute and write copy
4C2E000
stack
page read and write
1951000
unkown
page execute and read and write
7970000
direct allocation
page execute and read and write
184F000
unkown
page execute and read and write
576E000
stack
page read and write
79E0000
direct allocation
page execute and read and write
7231000
heap
page read and write
3D67000
heap
page read and write
722F000
stack
page read and write
FC1000
unkown
page execute and read and write
7330000
trusted library allocation
page read and write
79C0000
direct allocation
page execute and read and write
572F000
stack
page read and write
7231000
heap
page read and write
792E000
stack
page read and write
7920000
direct allocation
page execute and read and write
7920000
direct allocation
page execute and read and write
7231000
heap
page read and write
54EF000
stack
page read and write
7231000
heap
page read and write
3D2E000
stack
page read and write
7920000
direct allocation
page execute and read and write
7231000
heap
page read and write
1BEC000
unkown
page execute and read and write
6BAE000
stack
page read and write
7231000
heap
page read and write
47AE000
stack
page read and write
436F000
stack
page read and write
7231000
heap
page read and write
3D30000
direct allocation
page read and write
692F000
stack
page read and write
52EE000
stack
page read and write
7231000
heap
page read and write
264F000
stack
page read and write
F44000
heap
page read and write
7231000
heap
page read and write
62AE000
stack
page read and write
F44000
heap
page read and write
7231000
heap
page read and write
78F0000
direct allocation
page execute and read and write
7231000
heap
page read and write
244E000
stack
page read and write
3D30000
direct allocation
page read and write
7231000
heap
page read and write
7231000
heap
page read and write
7231000
heap
page read and write
EED000
stack
page read and write
7231000
heap
page read and write
7231000
heap
page read and write
3D60000
heap
page read and write
7920000
direct allocation
page execute and read and write
7920000
direct allocation
page execute and read and write
F44000
heap
page read and write
7231000
heap
page read and write
506F000
stack
page read and write
7231000
heap
page read and write
1EA1000
heap
page read and write
F44000
heap
page read and write
7230000
heap
page read and write
7231000
heap
page read and write
416F000
stack
page read and write
7231000
heap
page read and write
7231000
heap
page read and write
F44000
heap
page read and write
64AF000
stack
page read and write
220F000
stack
page read and write
78EF000
stack
page read and write
7910000
direct allocation
page execute and read and write
3F6F000
stack
page read and write
3D30000
direct allocation
page read and write
3D30000
direct allocation
page read and write
7231000
heap
page read and write
FC0000
unkown
page readonly
7920000
direct allocation
page execute and read and write
7DB9000
direct allocation
page read and write
696E000
stack
page read and write
16D1000
unkown
page execute and read and write
7231000
heap
page read and write
7231000
heap
page read and write
7670000
heap
page read and write
F44000
heap
page read and write
F44000
heap
page read and write
3CEE000
stack
page read and write
76EC000
stack
page read and write
3D50000
direct allocation
page read and write
7231000
heap
page read and write
7231000
heap
page read and write
6B6F000
stack
page read and write
7920000
direct allocation
page execute and read and write
F44000
heap
page read and write
7231000
heap
page read and write
1E4A000
heap
page read and write
7BEF000
stack
page read and write
7920000
direct allocation
page execute and read and write
6DAF000
stack
page read and write
F44000
heap
page read and write
7900000
direct allocation
page execute and read and write
7231000
heap
page read and write
3D50000
direct allocation
page read and write
456F000
stack
page read and write
7231000
heap
page read and write
3C6C000
stack
page read and write
5BEE000
stack
page read and write
64EE000
stack
page read and write
1A37000
unkown
page execute and read and write
7231000
heap
page read and write
7950000
direct allocation
page execute and read and write
7940000
direct allocation
page execute and read and write
3D30000
direct allocation
page read and write
7231000
heap
page read and write
1E4E000
heap
page read and write
1E3E000
stack
page read and write
7231000
heap
page read and write
3D30000
direct allocation
page read and write
7231000
heap
page read and write
7920000
direct allocation
page execute and read and write
79B0000
direct allocation
page execute and read and write
7231000
heap
page read and write
7231000
heap
page read and write
7960000
direct allocation
page execute and read and write
FC0000
unkown
page read and write
7231000
heap
page read and write
76B0000
direct allocation
page read and write
F40000
heap
page read and write
16CA000
unkown
page execute and read and write
7231000
heap
page read and write
50AE000
stack
page read and write
7920000
direct allocation
page execute and read and write
49AF000
stack
page read and write
F44000
heap
page read and write
F44000
heap
page read and write
7C62000
direct allocation
page read and write
4BEF000
stack
page read and write
3D30000
direct allocation
page read and write
7920000
direct allocation
page execute and read and write
7231000
heap
page read and write
7231000
heap
page read and write
5DEF000
stack
page read and write
CEC000
stack
page read and write
3D30000
direct allocation
page read and write
7231000
heap
page read and write
1958000
unkown
page execute and read and write
7231000
heap
page read and write
79A0000
direct allocation
page execute and read and write
F44000
heap
page read and write
There are 204 hidden memdumps, click here to show them.