IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Edge\Edge.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Roaming\Edge\Edge.exe
"C:\Users\user\AppData\Roaming\Edge\Edge.exe" {6B387F7B-F5A9-4597-ABB2-EB1AC679F320}
malicious
C:\Users\user\AppData\Roaming\Edge\Edge.exe
"C:\Users\user\AppData\Roaming\Edge\Edge.exe" {5E0DB032-E9D6-4C1D-A145-C083BA9C5AAA}
malicious
C:\Users\user\AppData\Roaming\Edge\Edge.exe
"C:\Users\user\AppData\Roaming\Edge\Edge.exe" {5E0DB032-E9D6-4C1D-A145-C083BA9C5AAA}
malicious

Domains

Name
IP
Malicious
fishcrabs99.ddns.net
178.215.224.241
malicious

IPs

IP
Domain
Country
Malicious
178.215.224.241
fishcrabs99.ddns.net
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
{AB1F3E47-AEF1-400E-A108-233A046C3A34}
malicious
HKEY_CURRENT_USER\SOFTWARE\{68A1BBBA-1552-44A8-955F-BE6CBFD1BFA8}
{253AE243-0568-4A8A-B482-F506FA2BA02C}
HKEY_CURRENT_USER\SOFTWARE\{68A1BBBA-1552-44A8-955F-BE6CBFD1BFA8}
{5CD9FA9E-C629-40A5-B53C-5627575F9471}
HKEY_CURRENT_USER\SOFTWARE\{68A1BBBA-1552-44A8-955F-BE6CBFD1BFA8}
{F1698BDA-3E1A-43B4-A547-BEA22B623088}
HKEY_CURRENT_USER\SOFTWARE\{68A1BBBA-1552-44A8-955F-BE6CBFD1BFA8}
{5CD9FA9E-C629-40A5-B53C-5627575F9471}
HKEY_CURRENT_USER\SOFTWARE\{68A1BBBA-1552-44A8-955F-BE6CBFD1BFA8}
{F1698BDA-3E1A-43B4-A547-BEA22B623088}

Memdumps

Base Address
Regiontype
Protect
Malicious
26654540000
direct allocation
page read and write
261E6D4D000
unclassified section
page read and write
C000068000
direct allocation
page read and write
D85000
unkown
page write copy
C00007E000
direct allocation
page read and write
CD5000
unkown
page write copy
266543DD000
heap
page read and write
1B23388C000
heap
page read and write
6909FFC000
stack
page read and write
D7F000
unkown
page readonly
C0000A9000
direct allocation
page read and write
266543DD000
heap
page read and write
C000072000
direct allocation
page read and write
261DFF90000
heap
page read and write
C000086000
direct allocation
page read and write
26654550000
heap
page read and write
EFD6FEB000
stack
page read and write
266545A8000
direct allocation
page read and write
1B2339F0000
heap
page read and write
C000092000
direct allocation
page read and write
261E54D0000
direct allocation
page read and write
266543DD000
heap
page read and write
18F732A0000
heap
page read and write
AA0000
unkown
page readonly
C000104000
direct allocation
page read and write
261E6D4A000
unclassified section
page read and write
C0000D4000
direct allocation
page read and write
1B27AB50000
heap
page read and write
C00003F000
direct allocation
page read and write
C2B000
unkown
page read and write
EFD71FE000
stack
page read and write
C000120000
direct allocation
page read and write
26654370000
heap
page read and write
C000158000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
1B27A600000
heap
page read and write
C00004D000
direct allocation
page read and write
261E0190000
heap
page read and write
266543DD000
heap
page read and write
C000008000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
C000004000
direct allocation
page read and write
1B233830000
heap
page read and write
26654580000
heap
page read and write
C000006000
direct allocation
page read and write
266543DD000
heap
page read and write
AA0000
unkown
page readonly
C000028000
direct allocation
page read and write
C000038000
direct allocation
page read and write
1B23389C000
heap
page read and write
18F72FAE000
heap
page read and write
AA1000
unkown
page execute read
266543D4000
heap
page read and write
C000104000
direct allocation
page read and write
CD6000
unkown
page readonly
CF3000
unkown
page read and write
CDB000
unkown
page read and write
C000180000
direct allocation
page read and write
18F732C5000
heap
page read and write
CDB000
unkown
page read and write
C000128000
direct allocation
page read and write
18F72F28000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
6909BFF000
stack
page read and write
C000100000
direct allocation
page read and write
1B27AB5D000
heap
page read and write
26679930000
direct allocation
page read and write
C000014000
direct allocation
page read and write
261DFE88000
heap
page read and write
D7F000
unkown
page readonly
B66000
unkown
page readonly
C0000D2000
direct allocation
page read and write
C000006000
direct allocation
page read and write
2667B89B000
heap
page read and write
1B278C90000
direct allocation
page read and write
AA0000
unkown
page readonly
261E5536000
direct allocation
page read and write
261E01B0000
heap
page read and write
AB6000
unkown
page readonly
C0000A0000
direct allocation
page read and write
1B27A4F6000
unclassified section
page readonly
C00002D000
direct allocation
page read and write
261E6D16000
unclassified section
page readonly
D0D000
unkown
page read and write
C00002A000
direct allocation
page read and write
CD5000
unkown
page write copy
C43000
unkown
page read and write
EFD6FFC000
stack
page read and write
C000044000
direct allocation
page read and write
C000065000
direct allocation
page read and write
C000004000
direct allocation
page read and write
69099FF000
stack
page read and write
1B233790000
heap
page read and write
C0000BA000
direct allocation
page read and write
266543CC000
heap
page read and write
C000058000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C000056000
direct allocation
page read and write
18F78450000
direct allocation
page read and write
C000180000
direct allocation
page read and write
C0000C8000
direct allocation
page read and write
2CFDFC000
stack
page read and write
2667B20A000
unclassified section
page read and write
C00001C000
direct allocation
page read and write
C00002D000
direct allocation
page read and write
1B2337E4000
direct allocation
page read and write
2667B1D6000
unclassified section
page readonly
AF3DFE000
stack
page read and write
C0000A4000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C2D000
unkown
page write copy
C000158000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
18F783D0000
direct allocation
page read and write
C000058000
direct allocation
page read and write
AA1000
unkown
page execute read
CF3000
unkown
page read and write
1B2339F5000
heap
page read and write
D7A000
unkown
page read and write
D7A000
unkown
page read and write
266543DD000
heap
page read and write
6908DFC000
stack
page read and write
D85000
unkown
page write copy
266543CB000
heap
page read and write
D86000
unkown
page readonly
18F72F20000
direct allocation
page read and write
261E00A8000
direct allocation
page read and write
266543BC000
heap
page read and write
C000010000
direct allocation
page read and write
266543CC000
heap
page read and write
CDD000
unkown
page write copy
18F78460000
heap
page execute and read and write
C000065000
direct allocation
page read and write
266543DD000
heap
page read and write
2D07FF000
stack
page read and write
C0000CE000
direct allocation
page read and write
69095FE000
stack
page read and write
C42000
unkown
page write copy
C0000F0000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
AA1000
unkown
page execute read
C00002D000
direct allocation
page read and write
1B27A501000
unclassified section
page write copy
C0000D4000
direct allocation
page read and write
AF33FF000
stack
page read and write
1B27A52D000
unclassified section
page read and write
C00007A000
direct allocation
page read and write
2667B211000
unclassified section
page readonly
C000086000
direct allocation
page read and write
C000088000
direct allocation
page read and write
CDB000
unkown
page read and write
C00009E000
direct allocation
page read and write
C000038000
direct allocation
page read and write
18F784E0000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C000060000
direct allocation
page read and write
261E6D47000
unclassified section
page write copy
CF2000
unkown
page write copy
C00001A000
direct allocation
page read and write
1B2337EA000
direct allocation
page read and write
C000080000
direct allocation
page read and write
1B27ADA4000
heap
page read and write
1B233820000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
1B27ADB1000
heap
page read and write
18F732C0000
heap
page read and write
26654560000
heap
page read and write
D85000
unkown
page write copy
261E00A0000
direct allocation
page read and write
CDD000
unkown
page write copy
2665437C000
heap
page read and write
9F1000
unkown
page execute read
AA1000
unkown
page execute read
266543DD000
heap
page read and write
6909DFE000
stack
page read and write
B66000
unkown
page readonly
C000100000
direct allocation
page read and write
690A1FE000
stack
page read and write
C00004D000
direct allocation
page read and write
2667B207000
unclassified section
page write copy
C000044000
direct allocation
page read and write
1B278C00000
direct allocation
page read and write
D7F000
unkown
page readonly
C000004000
direct allocation
page read and write
C000028000
direct allocation
page read and write
D7F000
unkown
page readonly
2667B1A1000
unclassified section
page execute read
1B23389C000
heap
page read and write
266543DD000
heap
page read and write
2667B2F0000
heap
page read and write
C000038000
direct allocation
page read and write
18F72F2D000
direct allocation
page read and write
261E0141000
direct allocation
page read and write
2CFFFE000
stack
page read and write
26679810000
direct allocation
page read and write
1B27A4A0000
heap
page read and write
261E5450000
heap
page execute and read and write
26679980000
heap
page execute and read and write
C000000000
direct allocation
page read and write
CF2000
unkown
page write copy
C000002000
direct allocation
page read and write
D86000
unkown
page readonly
261E6D80000
heap
page read and write
266543CC000
heap
page read and write
D7F000
unkown
page readonly
18F79D31000
unclassified section
page write copy
C00008E000
direct allocation
page read and write
18F79D61000
unclassified section
page readonly
C00009E000
direct allocation
page read and write
2667B730000
heap
page read and write
CCF000
unkown
page readonly
266543CC000
heap
page read and write
1B2336B0000
heap
page read and write
C00003D000
direct allocation
page read and write
2CFDEB000
stack
page read and write
C00008A000
direct allocation
page read and write
18F79E90000
heap
page read and write
C00001E000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
EFD77FF000
stack
page read and write
C000180000
direct allocation
page read and write
26654384000
heap
page read and write
1B27A527000
unclassified section
page write copy
AA1000
unkown
page execute read
C000094000
direct allocation
page read and write
C000010000
direct allocation
page read and write
CDB000
unkown
page write copy
B66000
unkown
page readonly
C000056000
direct allocation
page read and write
266543DD000
heap
page read and write
266543BF000
heap
page read and write
266543DD000
heap
page read and write
C000098000
direct allocation
page read and write
690A7FE000
stack
page read and write
C000008000
direct allocation
page read and write
18F79D26000
unclassified section
page readonly
261E5400000
direct allocation
page read and write
2667B897000
heap
page read and write
9F0000
unkown
page readonly
C0000A9000
direct allocation
page read and write
266543DD000
heap
page read and write
266543D1000
heap
page read and write
261E00A4000
direct allocation
page read and write
261E6D21000
unclassified section
page write copy
261E6CE1000
unclassified section
page execute read
EFD7BFF000
stack
page read and write
C000006000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
C000044000
direct allocation
page read and write
1B278CF6000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
C000120000
direct allocation
page read and write
EFD75FF000
stack
page read and write
D7F000
unkown
page readonly
C0000CA000
direct allocation
page read and write
D85000
unkown
page write copy
C0000B0000
direct allocation
page read and write
1B23383C000
heap
page read and write
C000094000
direct allocation
page read and write
CF2000
unkown
page write copy
2667B643000
heap
page read and write
C0000A0000
direct allocation
page read and write
AF3BFE000
stack
page read and write
C0000BA000
direct allocation
page read and write
C000068000
direct allocation
page read and write
18F72FA0000
heap
page read and write
C0000C2000
direct allocation
page read and write
AF35FE000
stack
page read and write
261E00AA000
direct allocation
page read and write
AF37FF000
stack
page read and write
C000012000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
18F72F2A000
direct allocation
page read and write
26679910000
heap
page read and write
69091FE000
stack
page read and write
261E0120000
heap
page read and write
266545A0000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C000018000
direct allocation
page read and write
EFD79FE000
stack
page read and write
C000084000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
261E6D51000
unclassified section
page readonly
C0000D2000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
1B23389C000
heap
page read and write
AA0000
unkown
page readonly
18F72EF0000
heap
page read and write
1B27A52A000
unclassified section
page read and write
C0000C8000
direct allocation
page read and write
C000002000
direct allocation
page read and write
266798F6000
direct allocation
page read and write
1B27A531000
unclassified section
page readonly
C000016000
direct allocation
page read and write
D85000
unkown
page write copy
C000092000
direct allocation
page read and write
D86000
unkown
page readonly
C000002000
direct allocation
page read and write
261E01B5000
heap
page read and write
CCA000
unkown
page read and write
C0000CC000
direct allocation
page read and write
18F79D5D000
unclassified section
page read and write
C00004D000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C000002000
direct allocation
page read and write
B66000
unkown
page readonly
266543CC000
heap
page read and write
C00001A000
direct allocation
page read and write
C000080000
direct allocation
page read and write
C63000
unkown
page read and write
C000168000
direct allocation
page read and write
266545AA000
direct allocation
page read and write
CE6000
unkown
page read and write
C000098000
direct allocation
page read and write
D86000
unkown
page readonly
C000018000
direct allocation
page read and write
18F73270000
heap
page read and write
1B233845000
heap
page read and write
266545A4000
direct allocation
page read and write
C000016000
direct allocation
page read and write
18F79D57000
unclassified section
page write copy
266543DD000
heap
page read and write
AF39FE000
stack
page read and write
1B2337E0000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
9F1000
unkown
page execute read
1B233961000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
AA0000
unkown
page readonly
261DFE8E000
heap
page read and write
C00000E000
direct allocation
page read and write
C000080000
direct allocation
page read and write
18F72EE0000
heap
page read and write
261E6E50000
heap
page read and write
9F0000
unkown
page readonly
2D01FF000
stack
page read and write
C00002D000
direct allocation
page read and write
AF31FC000
stack
page read and write
18F79CF1000
unclassified section
page execute read
B66000
unkown
page readonly
C000080000
direct allocation
page read and write
26654555000
heap
page read and write
C0000A4000
direct allocation
page read and write
261E0100000
direct allocation
page read and write
CCF000
unkown
page readonly
261E0070000
heap
page read and write
CF3000
unkown
page read and write
1B2337E8000
direct allocation
page read and write
C000018000
direct allocation
page read and write
AB6000
unkown
page readonly
266543DD000
heap
page read and write
B66000
unkown
page readonly
C000038000
direct allocation
page read and write
CE6000
unkown
page read and write
26679890000
direct allocation
page read and write
69097FE000
stack
page read and write
C00002A000
direct allocation
page read and write
C000060000
direct allocation
page read and write
18F79D5A000
unclassified section
page read and write
2D05FF000
stack
page read and write
D13000
unkown
page read and write
D86000
unkown
page readonly
1B2337B0000
heap
page read and write
D0D000
unkown
page read and write
266543D1000
heap
page read and write
C000006000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
D86000
unkown
page readonly
2667B1E1000
unclassified section
page write copy
C00003D000
direct allocation
page read and write
18F72FA8000
heap
page read and write
1B27A4C1000
unclassified section
page execute read
C36000
unkown
page read and write
690A5FE000
stack
page read and write
2667B2A0000
heap
page read and write
2667B647000
heap
page read and write
C000012000
direct allocation
page read and write
AA0000
unkown
page readonly
EFD73FF000
stack
page read and write
C00003D000
direct allocation
page read and write
D13000
unkown
page read and write
C00007E000
direct allocation
page read and write
1B27A800000
heap
page read and write
C000088000
direct allocation
page read and write
CDB000
unkown
page write copy
266543CC000
heap
page read and write
CE6000
unkown
page read and write
C000128000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
2667B20D000
unclassified section
page read and write
2D0BFF000
stack
page read and write
261DFE80000
heap
page read and write
D85000
unkown
page write copy
CDD000
unkown
page write copy
CDB000
unkown
page write copy
AA1000
unkown
page execute read
AF31E8000
stack
page read and write
D13000
unkown
page read and write
2D09FF000
stack
page read and write
266543CC000
heap
page read and write
18F72F80000
direct allocation
page read and write
2667B2F5000
heap
page read and write
18F72F24000
direct allocation
page read and write
1B278C10000
heap
page execute and read and write
6908DE8000
stack
page read and write
2D03FE000
stack
page read and write
6908FFD000
stack
page read and write
1B23389C000
heap
page read and write
D7A000
unkown
page read and write
26654350000
heap
page read and write
18F79ED0000
heap
page read and write
266543DD000
heap
page read and write
C000014000
direct allocation
page read and write
CD6000
unkown
page readonly
266545AD000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
C000180000
direct allocation
page read and write
1B233839000
heap
page read and write
18F78546000
direct allocation
page read and write
C2B000
unkown
page write copy
C000168000
direct allocation
page read and write
C000018000
direct allocation
page read and write
266543CC000
heap
page read and write
C0000CA000
direct allocation
page read and write
There are 426 hidden memdumps, click here to show them.