IOC Report
VBqmdl6ttr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VBqmdl6ttr.exe
"C:\Users\user\Desktop\VBqmdl6ttr.exe"
malicious

URLs

Name
IP
Malicious
20.25.126.96
malicious
https://20.25.126.96:443/cm
unknown
https://20.25.126.96/m
unknown
https://20.25.126.96/cmf
unknown
http://127.0.0.1:%u/
unknown
https://20.25.126.96/
unknown
https://20.25.126.96/cm
unknown
https://20.25.126.96/6
unknown
https://20.25.126.96/cmr
unknown
https://20.25.126.96/4
unknown
https://20.25.126.96/cmD
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.25.126.96
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1D7C96A0000
direct allocation
page execute and read and write
malicious
1D7C93F0000
unclassified section
page execute read
malicious
1D7C9475000
heap
page read and write
1D7C9497000
heap
page read and write
1D7C94CB000
heap
page read and write
1D7C94C2000
heap
page read and write
1D7C94BC000
heap
page read and write
7FF7F7336000
unkown
page readonly
1D7C94B9000
heap
page read and write
7FF7F72D4000
unkown
page write copy
1D7C94CB000
heap
page read and write
1D7C94CB000
heap
page read and write
7FF7F7336000
unkown
page readonly
1D7C94B9000
heap
page read and write
1D7C94C5000
heap
page read and write
1D7C9493000
heap
page read and write
1D7C94B3000
heap
page read and write
1D7C94A4000
heap
page read and write
1D7C96E8000
direct allocation
page execute and read and write
1D7C94B9000
heap
page read and write
1D7C93D0000
heap
page read and write
1D7C9680000
remote allocation
page read and write
1D7C94A4000
heap
page read and write
1D7C94A4000
heap
page read and write
1D7C9491000
heap
page read and write
7FF7F732D000
unkown
page readonly
1D7C9481000
heap
page read and write
1D7C947C000
heap
page read and write
1D7C9491000
heap
page read and write
7FF7F7333000
unkown
page write copy
3409FF000
stack
page read and write
1D7C9640000
heap
page read and write
1D7C94C5000
heap
page read and write
1D7C94C2000
heap
page read and write
1D7C94C2000
heap
page read and write
3407FD000
stack
page read and write
1D7C947C000
heap
page read and write
1D7C9491000
heap
page read and write
1D7C9477000
heap
page read and write
1D7C94A4000
heap
page read and write
1D7C9680000
remote allocation
page read and write
1D7C96F1000
direct allocation
page execute and read and write
7FF7F72D1000
unkown
page execute read
1D7C9446000
heap
page read and write
1D7C9493000
heap
page read and write
1D7C94CB000
heap
page read and write
1D7C94BC000
heap
page read and write
1D7C9497000
heap
page read and write
1D7C94BF000
heap
page read and write
7FF7F72D0000
unkown
page readonly
1D7C9479000
heap
page read and write
1D7C9491000
heap
page read and write
1D7C94B3000
heap
page read and write
1D7C9491000
heap
page read and write
1D7C94B3000
heap
page read and write
1D7C96EE000
direct allocation
page execute and read and write
1D7C9479000
heap
page read and write
1D7C94CB000
heap
page read and write
7FF7F7330000
unkown
page read and write
1D7C94C5000
heap
page read and write
1D7C94C0000
heap
page read and write
1D7C9493000
heap
page read and write
1D7C94B9000
heap
page read and write
1D7C9481000
heap
page read and write
1D7C9482000
heap
page read and write
1D7C9695000
heap
page read and write
1D7C92F0000
heap
page read and write
1D7C94C6000
heap
page read and write
1D7C94C2000
heap
page read and write
1D7C9497000
heap
page read and write
1D7C94C3000
heap
page read and write
1D7C94BB000
heap
page read and write
1D7C9471000
heap
page read and write
1D7C94CB000
heap
page read and write
1D7C94B3000
heap
page read and write
7FF7F7333000
unkown
page read and write
1D7C94C5000
heap
page read and write
1D7C9491000
heap
page read and write
1D7C9540000
heap
page read and write
1D7C96EB000
direct allocation
page execute and read and write
1D7C9481000
heap
page read and write
1D7C94A4000
heap
page read and write
1D7C9680000
remote allocation
page read and write
7FF7F72D0000
unkown
page readonly
1D7C94BC000
heap
page read and write
1D7C94C5000
heap
page read and write
3413FE000
stack
page read and write
1D7C947C000
heap
page read and write
1D7C94B9000
heap
page read and write
1D7C9493000
heap
page read and write
1D7C94C2000
heap
page read and write
1D7C94A4000
heap
page read and write
1D7C94BC000
heap
page read and write
1D7C94B3000
heap
page read and write
1D7C94CB000
heap
page read and write
1D7C94CB000
heap
page read and write
1D7C9487000
heap
page read and write
1D7C9690000
heap
page read and write
7FF7F72D4000
unkown
page write copy
3415FE000
stack
page read and write
1D7C9457000
heap
page read and write
1D7C94CB000
heap
page read and write
340FFC000
stack
page read and write
1D7C94CB000
heap
page read and write
1D7C9491000
heap
page read and write
1D7C94A4000
heap
page read and write
1D7C9481000
heap
page read and write
7FF7F72D1000
unkown
page execute read
1D7C94B3000
heap
page read and write
1D7C9487000
heap
page read and write
1D7C94B9000
heap
page read and write
1D7C94C5000
heap
page read and write
340BFC000
stack
page read and write
1D7C9440000
heap
page read and write
7FF7F732D000
unkown
page readonly
1D7C944C000
heap
page read and write
3411FD000
stack
page read and write
1D7C947C000
heap
page read and write
1D7C9481000
heap
page read and write
3417FD000
stack
page read and write
There are 110 hidden memdumps, click here to show them.