IOC Report
PROFOMA INVOICE-2024-0419 .exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exe
"C:\Users\user\Desktop\PROFOMA INVOICE-2024-0419 .exe"
malicious

URLs

Name
IP
Malicious
https://github.com/mgravell/protobuf-net
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown

Domains

Name
IP
Malicious
pukrilug.duckdns.org
150.114.84.125
malicious

IPs

IP
Domain
Country
Malicious
150.114.84.125
pukrilug.duckdns.org
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1B440000
trusted library section
page read and write
malicious
12B71000
trusted library allocation
page read and write
malicious
2B71000
trusted library allocation
page read and write
malicious
1B330000
trusted library section
page read and write
malicious
13248000
trusted library allocation
page read and write
malicious
2B60000
heap
page execute and read and write
7FF84906A000
trusted library allocation
page read and write
AF8000
heap
page read and write
2F2F000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
1B7F9000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
1B9A0000
heap
page read and write
2F44000
trusted library allocation
page read and write
AA5000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
2F66000
trusted library allocation
page read and write
1B7DF000
stack
page read and write
AAD000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF4122A0000
trusted library allocation
page execute and read and write
5E0000
unkown
page readonly
7FF848EB6000
trusted library allocation
page read and write
1B6DF000
stack
page read and write
AF0000
heap
page read and write
2F6A000
trusted library allocation
page read and write
AC1000
heap
page read and write
D50000
heap
page read and write
1B7E0000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
D85000
heap
page read and write
7FF84902E000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
6B4000
unkown
page readonly
28A3000
trusted library allocation
page read and write
7FF84900D000
trusted library allocation
page read and write
7FF848FE4000
trusted library allocation
page read and write
13504000
trusted library allocation
page read and write
DE0000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page execute and read and write
2F31000
trusted library allocation
page read and write
A8C000
heap
page read and write
2F75000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
5E2000
unkown
page readonly
7FF848E20000
trusted library allocation
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
2F40000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
289E000
stack
page read and write
DE5000
heap
page read and write
D90000
heap
page read and write
2F64000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1B7FB000
heap
page read and write
A50000
heap
page read and write
1AFEC000
stack
page read and write
A80000
heap
page read and write
2F53000
trusted library allocation
page read and write
7E1000
stack
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
2F84000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
7FF848E2D000
trusted library allocation
page execute and read and write
1B80D000
heap
page read and write
2F35000
trusted library allocation
page read and write
1B5DE000
stack
page read and write
B6D000
heap
page read and write
2F77000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
DC0000
trusted library allocation
page read and write
28C0000
trusted library section
page read and write
7FF849040000
trusted library allocation
page read and write
A40000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
D4E000
stack
page read and write
28A0000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
13550000
trusted library allocation
page read and write
B6B000
heap
page read and write
2F33000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
5E0000
unkown
page readonly
7FF848FE0000
trusted library allocation
page read and write
2910000
heap
page execute and read and write
B7E000
heap
page read and write
2F7C000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
2F5B000
trusted library allocation
page read and write
D80000
heap
page read and write
AEE000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
AAF000
heap
page read and write
2F6C000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
AC4000
heap
page read and write
2960000
heap
page read and write
There are 101 hidden memdumps, click here to show them.