IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://home.twentykx20pt.top/AMeacCwtwXCqXfwTNSOI1732768477
34.118.84.150
malicious
https://curl.se/docs/hsts.html
unknown
http://html4/loose.dtd
unknown
https://curl.se/docs/alt-svc.html#
unknown
http://home.twentykx20pt.top/AMeacCwtwXCqXfwTNSOI1732768477?argument=
unknown
https://httpbin.org/ipbefore
unknown
https://curl.se/docs/http-cookies.html
unknown
http://home.twentykx20pt.top/AMeacCwtwXCqXfwTNSOI1732768477fd4
unknown
https://curl.se/docs/hsts.html#
unknown
https://curl.se/docs/http-cookies.html#
unknown
https://curl.se/docs/alt-svc.html
unknown
http://.css
unknown
http://home.twentykx20pt.top/AMeacCwtwXCqXfwTNSOI17327684775a1
unknown
http://.jpg
unknown
https://httpbin.org/ip
18.213.123.165
http://home.twentykx20pt.top/AMeacCwtwXCqXfwTNSOI1732768477http://home.twentykx20pt.top/AMeacCwtwXCq
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.twentykx20pt.top
34.118.84.150
malicious
httpbin.org
18.213.123.165

IPs

IP
Domain
Country
Malicious
34.118.84.150
home.twentykx20pt.top
United States
malicious
18.213.123.165
httpbin.org
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
71E0000
direct allocation
page execute and read and write
17A4000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
16B7000
heap
page read and write
71E0000
direct allocation
page execute and read and write
74E0000
heap
page read and write
6AE1000
heap
page read and write
16CD000
heap
page read and write
6AE1000
heap
page read and write
530000
unkown
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16CC000
heap
page read and write
16F6000
heap
page read and write
6F20000
heap
page read and write
6AE1000
heap
page read and write
5F9F000
stack
page read and write
68DE000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
16EB000
heap
page read and write
6AE1000
heap
page read and write
3E9F000
stack
page read and write
6AE1000
heap
page read and write
71F0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
15FB000
stack
page read and write
16DA000
heap
page read and write
1132000
unkown
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
3660000
direct allocation
page read and write
3A9F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1704000
heap
page read and write
6AE1000
heap
page read and write
8150000
heap
page read and write
1725000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
BDA000
unkown
page read and write
17A4000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
3680000
direct allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
621E000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
7250000
direct allocation
page execute and read and write
169C000
heap
page read and write
471E000
stack
page read and write
6AE1000
heap
page read and write
3680000
direct allocation
page read and write
E84000
unkown
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
7300000
heap
page read and write
16A4000
heap
page read and write
6AE1000
heap
page read and write
58DF000
stack
page read and write
359E000
stack
page read and write
3660000
direct allocation
page read and write
16CA000
heap
page read and write
16A3000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
645E000
stack
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
171B000
heap
page read and write
525E000
stack
page read and write
71B0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16FD000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
7530000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16CA000
heap
page read and write
6AE1000
heap
page read and write
166E000
heap
page read and write
3660000
direct allocation
page read and write
E7F000
unkown
page execute and read and write
16BF000
heap
page read and write
3660000
direct allocation
page read and write
669E000
stack
page read and write
1134000
unkown
page execute and write copy
569F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16ED000
heap
page read and write
7C4F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71D0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
7C4E000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16F7000
heap
page read and write
17A4000
heap
page read and write
591D000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1700000
heap
page read and write
8151000
heap
page read and write
409F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
4B9E000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
530000
unkown
page readonly
549E000
stack
page read and write
3660000
direct allocation
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
1704000
heap
page read and write
6AE1000
heap
page read and write
449F000
stack
page read and write
641F000
stack
page read and write
5B1F000
stack
page read and write
1640000
heap
page read and write
172E000
heap
page read and write
8160000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
545F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
491F000
stack
page read and write
6AE1000
heap
page read and write
72D0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1704000
heap
page read and write
1700000
heap
page read and write
16DB000
heap
page read and write
17A4000
heap
page read and write
351C000
stack
page read and write
1704000
heap
page read and write
6AE1000
heap
page read and write
7280000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16BD000
heap
page read and write
F63000
unkown
page execute and read and write
1724000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
1790000
heap
page read and write
16E0000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
719F000
stack
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
749F000
direct allocation
page read and write
16CB000
heap
page read and write
BB4000
unkown
page execute and read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
3C9F000
stack
page read and write
3660000
direct allocation
page read and write
16F5000
heap
page read and write
16A5000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
72F0000
direct allocation
page execute and read and write
521F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16CB000
heap
page read and write
BDC000
unkown
page execute and read and write
16CD000
heap
page read and write
7290000
direct allocation
page execute and read and write
1700000
heap
page read and write
365E000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6F20000
trusted library allocation
page read and write
6AE1000
heap
page read and write
7606000
direct allocation
page read and write
6AE1000
heap
page read and write
7301000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16F7000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
BDA000
unkown
page write copy
16F0000
heap
page read and write
6AE1000
heap
page read and write
16F7000
heap
page read and write
6F9B000
stack
page read and write
429F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
170C000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
4D9F000
stack
page read and write
7260000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1704000
heap
page read and write
16FE000
heap
page read and write
3680000
direct allocation
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1697000
heap
page read and write
531000
unkown
page execute and read and write
737F000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16D4000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
61DF000
stack
page read and write
3660000
direct allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1700000
heap
page read and write
16CA000
heap
page read and write
7301000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71B0000
trusted library allocation
page read and write
3690000
heap
page read and write
6ADF000
stack
page read and write
6AE1000
heap
page read and write
1728000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
5B5E000
stack
page read and write
6AE1000
heap
page read and write
71B0000
direct allocation
page execute and read and write
166A000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
56DE000
stack
page read and write
1704000
heap
page read and write
6AE1000
heap
page read and write
71EE000
stack
page read and write
A70000
unkown
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
754E000
heap
page read and write
6AE1000
heap
page read and write
17A0000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
16E6000
heap
page read and write
17A4000
heap
page read and write
74CE000
stack
page read and write
7322000
heap
page read and write
5D9E000
stack
page read and write
16E7000
heap
page read and write
7240000
direct allocation
page execute and read and write
16F5000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
689F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16B3000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
7547000
heap
page read and write
6AE1000
heap
page read and write
4FDF000
stack
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
11CB000
stack
page read and write
16CE000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
170C000
heap
page read and write
6AE1000
heap
page read and write
3660000
direct allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
501E000
stack
page read and write
6AE1000
heap
page read and write
1700000
heap
page read and write
6AE1000
heap
page read and write
16B8000
heap
page read and write
46DF000
stack
page read and write
6AE0000
heap
page read and write
3660000
direct allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
7488000
heap
page read and write
71E0000
direct allocation
page execute and read and write
17A4000
heap
page read and write
16B4000
heap
page read and write
71E0000
direct allocation
page execute and read and write
495E000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
3660000
direct allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6F60000
direct allocation
page read and write
7A4F000
stack
page read and write
6AE1000
heap
page read and write
665F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
7380000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
BD7000
unkown
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
74EA000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16B6000
heap
page read and write
6AE1000
heap
page read and write
D63000
unkown
page execute and read and write
4B5F000
stack
page read and write
3660000
direct allocation
page read and write
16E0000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
7200000
direct allocation
page execute and read and write
16F6000
heap
page read and write
4DDE000
stack
page read and write
6AE1000
heap
page read and write
BD5000
unkown
page execute and read and write
F72000
unkown
page execute and read and write
F5C000
unkown
page execute and read and write
6AE1000
heap
page read and write
8160000
heap
page read and write
F72000
unkown
page execute and write copy
35DE000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
16B7000
heap
page read and write
784F000
stack
page read and write
361E000
stack
page read and write
6AE1000
heap
page read and write
16E8000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
1693000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16FE000
heap
page read and write
6AE1000
heap
page read and write
16CA000
heap
page read and write
750E000
stack
page read and write
1701000
heap
page read and write
16F7000
heap
page read and write
7604000
direct allocation
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
7230000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
5D5F000
stack
page read and write
5FDE000
stack
page read and write
71E0000
direct allocation
page execute and read and write
34DE000
stack
page read and write
71C0000
direct allocation
page execute and read and write
3697000
heap
page read and write
6AE1000
heap
page read and write
16A3000
heap
page read and write
6AE1000
heap
page read and write
1722000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
7220000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1630000
heap
page read and write
6AE1000
heap
page read and write
16FD000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1660000
heap
page read and write
6AE1000
heap
page read and write
72C0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
72E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
F73000
unkown
page execute and write copy
16CA000
heap
page read and write
16D6000
heap
page read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
7301000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16F0000
heap
page read and write
6AE1000
heap
page read and write
75E3000
direct allocation
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71B0000
trusted library allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
16AE000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
531000
unkown
page execute and write copy
355E000
stack
page read and write
6AE1000
heap
page read and write
3660000
direct allocation
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
7270000
direct allocation
page execute and read and write
72A0000
direct allocation
page execute and read and write
16F5000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
71E0000
direct allocation
page execute and read and write
7210000
direct allocation
page execute and read and write
72B0000
direct allocation
page execute and read and write
71E0000
direct allocation
page execute and read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
3660000
direct allocation
page read and write
6AE1000
heap
page read and write
389F000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
44DE000
stack
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
1694000
heap
page read and write
3660000
direct allocation
page read and write
16BE000
heap
page read and write
6AE1000
heap
page read and write
16DD000
heap
page read and write
170D000
heap
page read and write
6AE1000
heap
page read and write
17A4000
heap
page read and write
6AE1000
heap
page read and write
6AE1000
heap
page read and write
There are 532 hidden memdumps, click here to show them.