IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://sectigo.com/CPS0
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://t.me/RiseProSUPPORTlLHT
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.47
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
148D000
unkown
page readonly
C80000
heap
page read and write
BAA000
heap
page read and write
BA2000
heap
page read and write
C84000
heap
page read and write
AFC000
stack
page read and write
790000
heap
page read and write
2F31000
heap
page read and write
C84000
heap
page read and write
BBF000
heap
page read and write
168F000
stack
page read and write
C84000
heap
page read and write
10E5000
unkown
page execute read
C84000
heap
page read and write
C84000
heap
page read and write
B5E000
heap
page read and write
B50000
heap
page read and write
2F31000
heap
page read and write
3150000
heap
page read and write
2F30000
heap
page read and write
BA6000
heap
page read and write
148D000
unkown
page readonly
B9F000
heap
page read and write
C84000
heap
page read and write
2F31000
heap
page read and write
C84000
heap
page read and write
2F31000
heap
page read and write
EFF000
unkown
page read and write
ED2000
unkown
page read and write
B7C000
heap
page read and write
C84000
heap
page read and write
306D000
stack
page read and write
F05000
unkown
page execute read
7DE000
stack
page read and write
71B000
stack
page read and write
C84000
heap
page read and write
2F31000
heap
page read and write
C84000
heap
page read and write
BB7000
heap
page read and write
B9B000
heap
page read and write
3080000
heap
page read and write
C84000
heap
page read and write
C90000
trusted library allocation
page read and write
BA4000
heap
page read and write
D20000
heap
page read and write
EAA000
unkown
page readonly
C84000
heap
page read and write
2F31000
heap
page read and write
10E4000
unkown
page read and write
5160000
heap
page read and write
C84000
heap
page read and write
ED7000
unkown
page execute read
C84000
heap
page read and write
C50000
heap
page read and write
C84000
heap
page read and write
C84000
heap
page read and write
2F31000
heap
page read and write
B8D000
heap
page read and write
C84000
heap
page read and write
544E000
stack
page read and write
B5A000
heap
page read and write
C84000
heap
page read and write
2F31000
heap
page read and write
780000
heap
page read and write
C84000
heap
page read and write
D50000
unkown
page readonly
C84000
heap
page read and write
10E5000
unkown
page execute read
B91000
heap
page read and write
BBF000
heap
page read and write
D51000
unkown
page execute read
C84000
heap
page read and write
C84000
heap
page read and write
D50000
unkown
page readonly
3070000
heap
page read and write
There are 65 hidden memdumps, click here to show them.