IOC Report
4.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\4.exe
"C:\Users\user\Desktop\4.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://cactusbloguuodvqjmnzlwetjlpj6aggc6iocwhuupb47laukux7ckid.onion/In
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF656D19000
unkown
page execute and read and write
malicious
7E745FE000
stack
page read and write
200ACEE0000
heap
page read and write
200ACD00000
heap
page read and write
7FF656E7A000
unkown
page execute and read and write
200ACDE0000
heap
page read and write
7FF656FAA000
unkown
page write copy
7E747FF000
stack
page read and write
7FF656911000
unkown
page execute and read and write
200ACE00000
heap
page read and write
7FF656D9F000
unkown
page execute and write copy
7FF656FAA000
unkown
page read and write
7FF656E8A000
unkown
page execute and read and write
7FF656910000
unkown
page readonly
7FF656910000
unkown
page readonly
7E743FC000
stack
page read and write
200AD150000
heap
page read and write
200ACFF6000
heap
page read and write
200ACEE8000
heap
page read and write
200AD155000
heap
page read and write
There are 10 hidden memdumps, click here to show them.