IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
fragnantbui.shop
malicious
gutterydhowi.shop
malicious
offensivedzvju.shop
malicious
drawzhotdog.shop
malicious
ghostreedmnu.shop
malicious
reinforcenh.shop
malicious
stogeneratmns.shop
malicious
vozmeatillu.shop
malicious
https://ghostreedmnu.shop/api
188.114.96.3
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://ghostreedmnu.shop/
unknown
https://api.midtrans.comGetUserDefaultLocaleNameinvalid
unknown
https://api.sandbox.midtrans.comcrypto/aes:
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ghostreedmnu.shop
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
ghostreedmnu.shop
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
72B000
remote allocation
page readonly
malicious
143F000
direct allocation
page read and write
1490000
direct allocation
page read and write
C4B000
unkown
page readonly
475D000
stack
page read and write
C01000
unkown
page read and write
140C000
direct allocation
page read and write
833000
heap
page read and write
14CE000
direct allocation
page read and write
18A0000
direct allocation
page read and write
9DD000
stack
page read and write
21880000
direct allocation
page read and write
2163D000
stack
page read and write
4BDE000
stack
page read and write
14A4000
direct allocation
page read and write
790000
heap
page read and write
1900000
direct allocation
page read and write
C1E000
unkown
page read and write
1488000
direct allocation
page read and write
7F2000
heap
page read and write
14BA000
direct allocation
page read and write
650000
unkown
page readonly
17CE000
direct allocation
page read and write
1412000
direct allocation
page read and write
14C6000
direct allocation
page read and write
4B9F000
stack
page read and write
ED0000
remote allocation
page read and write
2177D000
stack
page read and write
1448000
direct allocation
page read and write
73D000
remote allocation
page readonly
ADF000
stack
page read and write
7D8000
heap
page read and write
BED000
unkown
page read and write
6E1000
remote allocation
page execute read
829000
heap
page read and write
440000
heap
page read and write
14AE000
direct allocation
page read and write
C28000
unkown
page readonly
14CA000
direct allocation
page read and write
1482000
direct allocation
page read and write
149A000
direct allocation
page read and write
18B0000
direct allocation
page read and write
1446000
direct allocation
page read and write
651000
unkown
page execute read
14BC000
direct allocation
page read and write
218C2000
direct allocation
page read and write
148E000
direct allocation
page read and write
D1D000
stack
page read and write
7F6000
heap
page read and write
C28000
unkown
page readonly
1882000
direct allocation
page read and write
4D1E000
stack
page read and write
14B0000
direct allocation
page read and write
1498000
direct allocation
page read and write
814000
heap
page read and write
E7D000
stack
page read and write
1668000
direct allocation
page read and write
140A000
direct allocation
page read and write
651000
unkown
page execute read
1502000
direct allocation
page read and write
4D60000
heap
page read and write
142C000
direct allocation
page read and write
167A000
direct allocation
page read and write
1402000
direct allocation
page read and write
1DD000
stack
page read and write
14A0000
direct allocation
page read and write
14C2000
direct allocation
page read and write
18F0000
direct allocation
page read and write
1546000
direct allocation
page read and write
1456000
direct allocation
page read and write
7FC000
heap
page read and write
148C000
direct allocation
page read and write
5C0000
direct allocation
page read and write
1890000
direct allocation
page read and write
1666000
direct allocation
page read and write
620000
heap
page read and write
215FF000
stack
page read and write
18C0000
direct allocation
page read and write
1434000
direct allocation
page read and write
BBD000
unkown
page read and write
14D8000
direct allocation
page read and write
166A000
direct allocation
page read and write
BBD000
unkown
page write copy
14B2000
direct allocation
page read and write
C9E000
stack
page read and write
538000
direct allocation
page read and write
1416000
direct allocation
page read and write
2187F000
stack
page read and write
61E000
stack
page read and write
1438000
direct allocation
page read and write
ED0000
remote allocation
page read and write
197F000
direct allocation
page read and write
13CD000
stack
page read and write
775000
heap
page read and write
1458000
direct allocation
page read and write
145A000
direct allocation
page read and write
D5C000
heap
page read and write
F40000
heap
page read and write
14BE000
direct allocation
page read and write
6E0000
remote allocation
page execute and read and write
7EB000
heap
page read and write
14D4000
direct allocation
page read and write
863000
heap
page read and write
D50000
heap
page read and write
6AB000
stack
page read and write
214FE000
stack
page read and write
150C000
direct allocation
page read and write
7D0000
heap
page read and write
1464000
direct allocation
page read and write
14A8000
direct allocation
page read and write
72E000
remote allocation
page execute and read and write
829000
heap
page read and write
833000
heap
page read and write
5B5000
heap
page read and write
CDD000
stack
page read and write
C1E000
stack
page read and write
1492000
direct allocation
page read and write
E50000
direct allocation
page read and write
143A000
direct allocation
page read and write
141C000
direct allocation
page read and write
14AA000
direct allocation
page read and write
C4B000
unkown
page readonly
118E000
stack
page read and write
810000
heap
page read and write
18E0000
direct allocation
page read and write
7A0000
heap
page read and write
14E9000
direct allocation
page read and write
E20000
heap
page read and write
128F000
stack
page read and write
F3E000
stack
page read and write
14D0000
direct allocation
page read and write
17E0000
direct allocation
page read and write
630000
heap
page read and write
17DE000
direct allocation
page read and write
1404000
direct allocation
page read and write
167C000
direct allocation
page read and write
1418000
direct allocation
page read and write
C27000
unkown
page write copy
14D2000
direct allocation
page read and write
1486000
direct allocation
page read and write
1406000
direct allocation
page read and write
1494000
direct allocation
page read and write
ED0000
remote allocation
page read and write
66B000
stack
page read and write
EBD000
stack
page read and write
770000
heap
page read and write
810000
heap
page read and write
14DC000
direct allocation
page read and write
145C000
direct allocation
page read and write
D20000
direct allocation
page read and write
1662000
direct allocation
page read and write
1400000
direct allocation
page read and write
14C0000
direct allocation
page read and write
138F000
stack
page read and write
4CDE000
stack
page read and write
5D0000
direct allocation
page read and write
141E000
direct allocation
page read and write
14A2000
direct allocation
page read and write
218C0000
direct allocation
page read and write
7FC000
heap
page read and write
1500000
direct allocation
page read and write
197F000
direct allocation
page read and write
14B8000
direct allocation
page read and write
BC3000
unkown
page read and write
812000
heap
page read and write
1460000
direct allocation
page read and write
1474000
direct allocation
page read and write
147A000
direct allocation
page read and write
1420000
direct allocation
page read and write
530000
direct allocation
page read and write
148A000
direct allocation
page read and write
86A000
heap
page read and write
18D0000
direct allocation
page read and write
149E000
direct allocation
page read and write
5B0000
heap
page read and write
1410000
direct allocation
page read and write
1414000
direct allocation
page read and write
14D6000
direct allocation
page read and write
140E000
direct allocation
page read and write
DC000
stack
page read and write
C27000
unkown
page write copy
4D5F000
stack
page read and write
650000
unkown
page readonly
150A000
direct allocation
page read and write
1680000
direct allocation
page read and write
8EA000
unkown
page readonly
BC4000
unkown
page write copy
144A000
direct allocation
page read and write
8EA000
unkown
page readonly
465D000
stack
page read and write
7F8000
heap
page read and write
14EC000
direct allocation
page read and write
BC2000
unkown
page write copy
B1E000
stack
page read and write
2173E000
stack
page read and write
There are 185 hidden memdumps, click here to show them.