IOC Report
Hesap-hareketleriniz10-10-2024.exe

loading gif

Files

File Path
Type
Category
Malicious
Hesap-hareketleriniz10-10-2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\iodization
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Hesap-hareketleriniz10-10-2024.exe
"C:\Users\user\Desktop\Hesap-hareketleriniz10-10-2024.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\Hesap-hareketleriniz10-10-2024.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3700000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
482000
unkown
page readonly
4AB000
unkown
page readonly
3213000
heap
page read and write
40CA000
heap
page read and write
4760000
direct allocation
page read and write
3FB9000
heap
page read and write
15FE000
stack
page read and write
4A9E000
direct allocation
page read and write
2E30000
direct allocation
page read and write
4A29000
direct allocation
page read and write
3090000
heap
page read and write
119E000
stack
page read and write
3FB1000
heap
page read and write
3213000
heap
page read and write
19E000
stack
page read and write
9A000
stack
page read and write
4A29000
direct allocation
page read and write
4A2D000
direct allocation
page read and write
4151000
heap
page read and write
3213000
heap
page read and write
4760000
direct allocation
page read and write
3790000
direct allocation
page read and write
4883000
direct allocation
page read and write
3A5F000
stack
page read and write
2E90000
heap
page read and write
4A29000
direct allocation
page read and write
15A0000
heap
page read and write
4141000
heap
page read and write
8B4000
stack
page read and write
3213000
heap
page read and write
9AA000
heap
page read and write
3213000
heap
page read and write
4141000
heap
page read and write
4760000
direct allocation
page read and write
3B29000
direct allocation
page execute and read and write
3213000
heap
page read and write
3FB7000
heap
page read and write
3070000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
9AE000
heap
page read and write
4187000
heap
page read and write
40EC000
heap
page read and write
31EE000
stack
page read and write
4900000
direct allocation
page read and write
4A2D000
direct allocation
page read and write
4141000
heap
page read and write
401000
unkown
page execute read
2E20000
heap
page read and write
4A29000
direct allocation
page read and write
4A2D000
direct allocation
page read and write
4760000
direct allocation
page read and write
3213000
heap
page read and write
303C000
stack
page read and write
3501000
heap
page read and write
3200000
heap
page read and write
3790000
direct allocation
page read and write
3A70000
heap
page read and write
4A9E000
direct allocation
page read and write
400000
unkown
page readonly
3400000
heap
page read and write
4141000
heap
page read and write
4A2D000
direct allocation
page read and write
3E4F000
stack
page read and write
110000
heap
page read and write
3790000
direct allocation
page read and write
4187000
heap
page read and write
4187000
heap
page read and write
400000
unkown
page readonly
36FF000
stack
page read and write
365E000
stack
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
89F000
stack
page read and write
4900000
direct allocation
page read and write
4900000
direct allocation
page read and write
3929000
heap
page read and write
3213000
heap
page read and write
4141000
heap
page read and write
3FBD000
heap
page read and write
3790000
direct allocation
page read and write
3CD1000
direct allocation
page execute and read and write
4A29000
direct allocation
page read and write
2E0E000
stack
page read and write
4187000
heap
page read and write
4141000
heap
page read and write
44C7000
heap
page read and write
3213000
heap
page read and write
3A00000
direct allocation
page execute and read and write
4187000
heap
page read and write
4A7000
unkown
page read and write
4187000
heap
page read and write
3405000
heap
page read and write
3417000
heap
page read and write
4187000
heap
page read and write
3412000
heap
page read and write
40BC000
heap
page read and write
40BE000
heap
page read and write
2DFD000
stack
page read and write
4A9E000
direct allocation
page read and write
4900000
direct allocation
page read and write
3D42000
direct allocation
page execute and read and write
3213000
heap
page read and write
40EC000
heap
page read and write
3213000
heap
page read and write
3213000
heap
page read and write
4187000
heap
page read and write
100000
heap
page read and write
4141000
heap
page read and write
4883000
direct allocation
page read and write
4141000
heap
page read and write
1C0000
heap
page read and write
8AF000
stack
page read and write
3213000
heap
page read and write
408B000
heap
page read and write
4A29000
direct allocation
page read and write
3800000
heap
page read and write
3790000
direct allocation
page read and write
4A9E000
direct allocation
page read and write
4760000
direct allocation
page read and write
4900000
direct allocation
page read and write
3D12000
heap
page read and write
4141000
heap
page read and write
4187000
heap
page read and write
3213000
heap
page read and write
2E94000
heap
page read and write
1A0000
heap
page read and write
4883000
direct allocation
page read and write
3213000
heap
page read and write
4883000
direct allocation
page read and write
3B2D000
direct allocation
page execute and read and write
30C0000
heap
page read and write
40BC000
heap
page read and write
31A0000
heap
page read and write
3DC0000
heap
page read and write
15E000
stack
page read and write
3FB4000
heap
page read and write
401000
unkown
page execute read
3213000
heap
page read and write
4900000
direct allocation
page read and write
3B64000
heap
page read and write
4883000
direct allocation
page read and write
3417000
heap
page read and write
3213000
heap
page read and write
3A61000
heap
page read and write
399E000
heap
page read and write
4187000
heap
page read and write
4141000
heap
page read and write
490000
unkown
page read and write
3202000
heap
page read and write
4187000
heap
page read and write
3600000
heap
page read and write
378E000
stack
page read and write
4A9E000
direct allocation
page read and write
3213000
heap
page read and write
40C0000
heap
page read and write
40F0000
heap
page read and write
3213000
heap
page read and write
40EC000
heap
page read and write
4140000
heap
page read and write
159F000
stack
page read and write
3FA0000
heap
page read and write
4A2D000
direct allocation
page read and write
4883000
direct allocation
page read and write
45D2000
heap
page read and write
3CD0000
heap
page read and write
3213000
heap
page read and write
4141000
heap
page read and write
3213000
heap
page read and write
9A0000
heap
page read and write
392D000
heap
page read and write
2F10000
heap
page read and write
4A2D000
direct allocation
page read and write
3EC0000
heap
page read and write
3213000
heap
page read and write
3801000
heap
page read and write
3790000
direct allocation
page read and write
40EB000
heap
page execute and read and write
4141000
heap
page read and write
4141000
heap
page read and write
490000
unkown
page write copy
4A9E000
direct allocation
page read and write
3213000
heap
page read and write
3CCD000
direct allocation
page execute and read and write
31B0000
direct allocation
page read and write
3723000
heap
page read and write
4062000
heap
page read and write
4760000
direct allocation
page read and write
1A5000
heap
page read and write
3A80000
heap
page read and write
3213000
heap
page read and write
3405000
heap
page read and write
3B9E000
direct allocation
page execute and read and write
482000
unkown
page readonly
1620000
heap
page read and write
4AB000
unkown
page readonly
9DB000
heap
page read and write
2F15000
heap
page read and write
4151000
heap
page read and write
There are 191 hidden memdumps, click here to show them.