IOC Report
123123.exe.bin.exe

loading gifProcessesURLsDomainsIPsRegistryMemdumps21020102Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\123123.exe.bin.exe
"C:\Users\user\Desktop\123123.exe.bin.exe"
malicious

URLs

Name
IP
Malicious
http://go.microsoft.
unknown
http://go.microsoft.LinkId=42127
unknown
https://pastebin.com/raw/???
unknown

Domains

Name
IP
Malicious
size-ingredients.gl.at.ply.gg
147.185.221.27
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.27
size-ingredients.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\11390ffcc5e77b5abb8fc1519f8a1de5
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
5F2000
unkown
page readonly
malicious
3C01000
trusted library allocation
page read and write
796000
stack
page read and write
4F10000
trusted library allocation
page read and write
B6E000
stack
page read and write
D02000
trusted library allocation
page execute and read and write
DB0000
heap
page read and write
A74000
heap
page read and write
69A000
stack
page read and write
CEC000
trusted library allocation
page execute and read and write
4F69000
stack
page read and write
AA9000
heap
page read and write
EBE000
stack
page read and write
A3E000
heap
page read and write
28BE000
stack
page read and write
4E7D000
stack
page read and write
4DD0000
trusted library allocation
page read and write
4C08000
trusted library allocation
page read and write
2C52000
trusted library allocation
page read and write
D6E000
stack
page read and write
4DB0000
trusted library allocation
page read and write
4F00000
trusted library allocation
page execute and read and write
BE7000
trusted library allocation
page read and write
D80000
heap
page read and write
4F20000
heap
page read and write
BF0000
heap
page read and write
30AE000
trusted library allocation
page read and write
D1B000
trusted library allocation
page execute and read and write
600000
unkown
page readonly
D17000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
4EFC000
stack
page read and write
2C01000
trusted library allocation
page read and write
D20000
heap
page read and write
4FD0000
unclassified section
page read and write
BE0000
trusted library allocation
page read and write
D12000
trusted library allocation
page read and write
CE2000
trusted library allocation
page execute and read and write
CD2000
trusted library allocation
page execute and read and write
5F0000
unkown
page readonly
DA0000
heap
page read and write
4DC0000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
4EBC000
stack
page read and write
4D9F000
stack
page read and write
A30000
heap
page read and write
D0A000
trusted library allocation
page execute and read and write
CEA000
trusted library allocation
page execute and read and write
A3A000
heap
page read and write
AC0000
heap
page read and write
BF5000
heap
page read and write
CE0000
trusted library allocation
page read and write
CFA000
trusted library allocation
page execute and read and write
AA4000
heap
page read and write
CF7000
trusted library allocation
page execute and read and write
11A0000
heap
page execute and read and write
118E000
stack
page read and write
CDA000
trusted library allocation
page execute and read and write
There are 48 hidden memdumps, click here to show them.