IOC Report
pisun.exe

loading gifProcessesURLsDomainsIPsRegistryMemdumps21020102Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pisun.exe
"C:\Users\user\Desktop\pisun.exe"
malicious

URLs

Name
IP
Malicious
https://pastebin.com/raw/???
unknown

Domains

Name
IP
Malicious
such-captain.gl.at.ply.gg
147.185.221.27
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.27
such-captain.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\f9f7ecca9c9e7996304b914cc137e66d
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
1D2000
unkown
page readonly
malicious
576000
stack
page read and write
5E0000
heap
page read and write
B22000
trusted library allocation
page read and write
49F0000
heap
page read and write
B50000
heap
page read and write
63F000
heap
page read and write
B0A000
trusted library allocation
page execute and read and write
AFA000
trusted library allocation
page execute and read and write
980000
heap
page read and write
AD8000
trusted library allocation
page read and write
4BB0000
unclassified section
page read and write
4B48000
stack
page read and write
600000
heap
page read and write
3811000
trusted library allocation
page read and write
B12000
trusted library allocation
page execute and read and write
2862000
trusted library allocation
page read and write
5E5000
heap
page read and write
AD0000
trusted library allocation
page read and write
49E0000
trusted library allocation
page execute and read and write
D1E000
stack
page read and write
608000
heap
page read and write
AFC000
trusted library allocation
page execute and read and write
B27000
trusted library allocation
page execute and read and write
2811000
trusted library allocation
page read and write
28A9000
trusted library allocation
page read and write
47A000
stack
page read and write
4818000
trusted library allocation
page read and write
CD0000
heap
page read and write
5F0000
heap
page read and write
D20000
heap
page execute and read and write
60E000
heap
page read and write
CB0000
trusted library allocation
page read and write
4A8D000
stack
page read and write
2886000
trusted library allocation
page read and write
1E0000
unkown
page readonly
9A0000
heap
page read and write
1D0000
unkown
page readonly
AF2000
trusted library allocation
page execute and read and write
B07000
trusted library allocation
page execute and read and write
49D0000
trusted library allocation
page read and write
579000
stack
page read and write
AE2000
trusted library allocation
page execute and read and write
B9E000
stack
page read and write
4ACC000
stack
page read and write
B2B000
trusted library allocation
page execute and read and write
7D0000
heap
page read and write
AEA000
trusted library allocation
page execute and read and write
C9E000
stack
page read and write
49AF000
stack
page read and write
CC0000
trusted library allocation
page execute and read and write
28D4000
trusted library allocation
page read and write
B1A000
trusted library allocation
page execute and read and write
4B0C000
stack
page read and write
AF0000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
There are 46 hidden memdumps, click here to show them.