IOC Report
1234.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1234.exe
"C:\Users\user\Desktop\1234.exe"
malicious

URLs

Name
IP
Malicious
http://www.eyuyan.com)DVarFileInfo$
unknown

Domains

Name
IP
Malicious
s-part-0035.t-0009.t-msedge.net
13.107.246.63
time.windows.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
22C0000
heap
page read and write
4B4000
unkown
page readonly
492000
unkown
page write copy
22F9000
heap
page read and write
19C000
stack
page read and write
2730000
trusted library allocation
page read and write
5AE000
heap
page read and write
306E000
stack
page read and write
49F000
unkown
page read and write
4A3000
unkown
page read and write
51E000
stack
page read and write
22F0000
heap
page read and write
540000
heap
page read and write
5A2000
heap
page read and write
2230000
heap
page read and write
302F000
stack
page read and write
496000
unkown
page write copy
400000
unkown
page readonly
56E000
heap
page read and write
22C4000
heap
page read and write
5C6000
heap
page read and write
401000
unkown
page execute read
4D0000
heap
page read and write
22F5000
heap
page read and write
5AB000
heap
page read and write
400000
unkown
page readonly
21C0000
heap
page read and write
229E000
stack
page read and write
492000
unkown
page write copy
2240000
heap
page read and write
47E000
unkown
page readonly
4B4000
unkown
page readonly
401000
unkown
page execute read
4A3000
unkown
page write copy
530000
heap
page read and write
56A000
heap
page read and write
97000
stack
page read and write
4AF000
unkown
page read and write
2234000
heap
page read and write
47E000
unkown
page readonly
82F000
stack
page read and write
5AA000
heap
page read and write
4C0000
heap
page read and write
494000
unkown
page read and write
5A6000
heap
page read and write
560000
heap
page read and write
316F000
stack
page read and write
There are 37 hidden memdumps, click here to show them.