IOC Report
6zZSlt35Hr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6zZSlt35Hr.exe
"C:\Users\user\Desktop\6zZSlt35Hr.exe"
malicious

URLs

Name
IP
Malicious
http://120.46.149.112:8888/safekey
120.46.149.112
http://120.46.149.112:8888/safekey5
unknown
http://120.46.149.112:8888/safekey#
unknown
http://120.46.149.112:8888/safekeyb
unknown
http://120.46.149.112:8888/safekey=
unknown
http://120.46.149.112:8888/safekeyy
unknown
http://120.46.149.112:8888/safekey2a
unknown
http://120.46.149.112:8888/safekey7
unknown
http://120.46.149.112:8888/safekey6
unknown

IPs

IP
Domain
Country
Malicious
120.46.149.112
unknown
China

Memdumps

Base Address
Regiontype
Protect
Malicious
613DBFE000
stack
page read and write
613DAFE000
stack
page read and write
7FF60A861000
unkown
page execute read
613DCFE000
stack
page read and write
7FF60A862000
unkown
page readonly
24E1EB10000
heap
page read and write
24E1EB95000
heap
page read and write
7FF60A862000
unkown
page readonly
24E1EA80000
heap
page read and write
24E1EAA0000
heap
page read and write
7FF60A860000
unkown
page readonly
24E1EA70000
heap
page read and write
24E1EB8C000
heap
page read and write
24E1ED85000
heap
page read and write
613D78A000
stack
page read and write
613DEFE000
stack
page read and write
613E0FF000
stack
page read and write
24E1EB68000
heap
page read and write
24E1EB6C000
heap
page read and write
613E1F8000
stack
page read and write
613E2FD000
stack
page read and write
613DFFE000
stack
page read and write
24E1EB51000
heap
page read and write
7FF60A860000
unkown
page readonly
24E1EB1C000
heap
page read and write
613DDFE000
stack
page read and write
24E1ED80000
heap
page read and write
24E1EB9D000
heap
page read and write
7FF60A863000
unkown
page execute read
7FF60A869000
unkown
page readonly
24E1EB4F000
heap
page read and write
7FF60A869000
unkown
page readonly
7FF60A861000
unkown
page execute read
There are 23 hidden memdumps, click here to show them.