IOC Report
cqHMm0ykDG.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\cqHMm0ykDG.exe
"C:\Users\user\Desktop\cqHMm0ykDG.exe"
malicious

URLs

Name
IP
Malicious
https://mindhandru.buzz/pie
unknown
scentniej.buzz
prisonyfork.buzz
http://crl.micro
unknown
rebuildeso.buzz
hummskitnj.buzz
appliacnesot.buzz
screwamusresz.buzz
mindhandru.buzz
https://mindhandru.buzz/
unknown
cashfuzysao.buzz
inherineau.buzz
https://mindhandru.buzz/api
104.21.11.101
https://mindhandru.buzz/apill
unknown
https://mindhandru.buzz/d
unknown
https://mindhandru.buzz:443/api
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mindhandru.buzz
104.21.11.101

IPs

IP
Domain
Country
Malicious
104.21.11.101
mindhandru.buzz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5130000
direct allocation
page read and write
malicious
4CA1000
heap
page read and write
141F000
heap
page read and write
13C9000
heap
page read and write
13D3000
heap
page read and write
2FBF000
stack
page read and write
50E0000
trusted library allocation
page read and write
1403000
heap
page read and write
1394000
heap
page read and write
48FE000
stack
page read and write
1250000
heap
page read and write
596D000
stack
page read and write
3EBF000
stack
page read and write
1254000
heap
page read and write
3FFF000
stack
page read and write
3C3F000
stack
page read and write
1254000
heap
page read and write
1422000
heap
page read and write
1254000
heap
page read and write
136A000
heap
page read and write
4CA0000
heap
page read and write
4CA1000
heap
page read and write
EAB000
stack
page read and write
13B3000
heap
page read and write
13A2000
heap
page read and write
1254000
heap
page read and write
4C90000
direct allocation
page read and write
47BE000
stack
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
673000
unkown
page write copy
620000
unkown
page readonly
13CC000
heap
page read and write
57BE000
stack
page read and write
1428000
heap
page read and write
4CA1000
heap
page read and write
5290000
direct allocation
page execute and read and write
1403000
heap
page read and write
919000
unkown
page execute and write copy
49FF000
stack
page read and write
5A6E000
stack
page read and write
4CA1000
heap
page read and write
3DBE000
stack
page read and write
13AD000
heap
page read and write
1399000
heap
page read and write
909000
unkown
page execute and read and write
4B7E000
stack
page read and write
1403000
heap
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
149E000
stack
page read and write
1403000
heap
page read and write
52B0000
direct allocation
page execute and read and write
4B3F000
stack
page read and write
4A3E000
stack
page read and write
4C90000
direct allocation
page read and write
4C90000
direct allocation
page read and write
313E000
stack
page read and write
13AA000
heap
page read and write
13D3000
heap
page read and write
13D3000
heap
page read and write
2E7F000
stack
page read and write
38BE000
stack
page read and write
4CA1000
heap
page read and write
52E0000
direct allocation
page execute and read and write
1210000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
567F000
stack
page read and write
8DB000
unkown
page execute and read and write
582E000
stack
page read and write
477F000
stack
page read and write
453E000
stack
page read and write
427F000
stack
page read and write
43FE000
stack
page read and write
4C90000
direct allocation
page read and write
1220000
heap
page read and write
4C90000
direct allocation
page read and write
4CA2000
heap
page read and write
52B0000
direct allocation
page execute and read and write
5304000
trusted library allocation
page read and write
33BE000
stack
page read and write
675000
unkown
page execute and read and write
1254000
heap
page read and write
52B0000
direct allocation
page execute and read and write
1254000
heap
page read and write
526F000
stack
page read and write
413F000
stack
page read and write
4C90000
direct allocation
page read and write
1254000
heap
page read and write
4CA1000
heap
page read and write
1347000
heap
page read and write
34BF000
stack
page read and write
13C0000
heap
page read and write
919000
unkown
page execute and read and write
3C7E000
stack
page read and write
4C90000
direct allocation
page read and write
2FFC000
stack
page read and write
50F0000
heap
page read and write
4CA1000
heap
page read and write
621000
unkown
page execute and write copy
39BF000
stack
page read and write
13D6000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
592F000
stack
page read and write
1360000
heap
page read and write
13D6000
heap
page read and write
52B0000
direct allocation
page execute and read and write
13AF000
heap
page read and write
56BE000
stack
page read and write
3AFF000
stack
page read and write
30FF000
stack
page read and write
1254000
heap
page read and write
13B3000
heap
page read and write
3D7F000
stack
page read and write
13C0000
heap
page read and write
52B0000
direct allocation
page execute and read and write
53FD000
stack
page read and write
621000
unkown
page execute and read and write
4CA1000
heap
page read and write
463F000
stack
page read and write
2EBE000
stack
page read and write
673000
unkown
page write copy
1254000
heap
page read and write
553D000
stack
page read and write
4CA1000
heap
page read and write
ABA000
unkown
page execute and read and write
467E000
stack
page read and write
13CD000
heap
page read and write
42BE000
stack
page read and write
4CA1000
heap
page read and write
4CB0000
heap
page read and write
4C90000
direct allocation
page read and write
4C90000
direct allocation
page read and write
48BF000
stack
page read and write
1254000
heap
page read and write
4CA1000
heap
page read and write
57C0000
remote allocation
page read and write
43BF000
stack
page read and write
13B3000
heap
page read and write
52F0000
direct allocation
page execute and read and write
1254000
heap
page read and write
363E000
stack
page read and write
516B000
stack
page read and write
417E000
stack
page read and write
4C80000
heap
page read and write
5280000
direct allocation
page execute and read and write
337F000
stack
page read and write
52BD000
stack
page read and write
52C0000
direct allocation
page execute and read and write
4CA1000
heap
page read and write
13D6000
heap
page read and write
1428000
heap
page read and write
4C90000
direct allocation
page read and write
2D7E000
stack
page read and write
323F000
stack
page read and write
5130000
direct allocation
page read and write
4CA1000
heap
page read and write
3B3E000
stack
page read and write
5174000
direct allocation
page read and write
4CA1000
heap
page read and write
557E000
stack
page read and write
52A0000
direct allocation
page execute and read and write
FAC000
stack
page read and write
13C0000
heap
page read and write
159F000
stack
page read and write
35FF000
stack
page read and write
4C90000
direct allocation
page read and write
13C9000
heap
page read and write
136E000
heap
page read and write
52B0000
direct allocation
page execute and read and write
5AF0000
heap
page read and write
13C9000
heap
page read and write
1428000
heap
page read and write
52D0000
direct allocation
page execute and read and write
3EFE000
stack
page read and write
377E000
stack
page read and write
4C90000
direct allocation
page read and write
13D6000
heap
page read and write
39FE000
stack
page read and write
665000
unkown
page execute and read and write
327E000
stack
page read and write
373F000
stack
page read and write
57C0000
remote allocation
page read and write
1254000
heap
page read and write
1254000
heap
page read and write
4CA1000
heap
page read and write
1399000
heap
page read and write
1254000
heap
page read and write
13AA000
heap
page read and write
403E000
stack
page read and write
4CA1000
heap
page read and write
91A000
unkown
page execute and write copy
387F000
stack
page read and write
13A2000
heap
page read and write
13D3000
heap
page read and write
4CA1000
heap
page read and write
902000
unkown
page execute and read and write
7F4000
unkown
page execute and read and write
34FE000
stack
page read and write
620000
unkown
page read and write
543D000
stack
page read and write
5130000
direct allocation
page read and write
1254000
heap
page read and write
4C90000
direct allocation
page read and write
4C7F000
stack
page read and write
4C90000
direct allocation
page read and write
1428000
heap
page read and write
57C0000
remote allocation
page read and write
1254000
heap
page read and write
44FF000
stack
page read and write
1340000
heap
page read and write
4CA1000
heap
page read and write
4CA1000
heap
page read and write
There are 205 hidden memdumps, click here to show them.