IOC Report
bxUX6ztvg2.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\bxUX6ztvg2.exe
"C:\Users\user\Desktop\bxUX6ztvg2.exe"
malicious

URLs

Name
IP
Malicious
hicham157484.ddns.net
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
hicham157484.ddns.net
45.74.34.32
malicious

IPs

IP
Domain
Country
Malicious
45.74.34.32
hicham157484.ddns.net
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
248A0382000
unkown
page readonly
malicious
248A24CC000
trusted library allocation
page read and write
248A2466000
trusted library allocation
page read and write
248A23BF000
trusted library allocation
page read and write
248A2371000
trusted library allocation
page read and write
248A0380000
unkown
page readonly
248A236C000
trusted library allocation
page read and write
248A23D3000
trusted library allocation
page read and write
248A2417000
trusted library allocation
page read and write
248A241B000
trusted library allocation
page read and write
248A2464000
trusted library allocation
page read and write
248A2479000
trusted library allocation
page read and write
248A2435000
trusted library allocation
page read and write
248A0785000
heap
page read and write
248A24DE000
trusted library allocation
page read and write
248A0430000
heap
page read and write
248A23C2000
trusted library allocation
page read and write
248A2424000
trusted library allocation
page read and write
248A04D3000
heap
page read and write
248A2427000
trusted library allocation
page read and write
7FFAACBFC000
trusted library allocation
page execute and read and write
248A247E000
trusted library allocation
page read and write
248A0780000
heap
page read and write
248A06C3000
trusted library allocation
page read and write
248A0505000
heap
page read and write
248A23AC000
trusted library allocation
page read and write
248BAA10000
heap
page execute and read and write
248A2394000
trusted library allocation
page read and write
7FFAACC56000
trusted library allocation
page read and write
248A04D1000
heap
page read and write
A7576FE000
stack
page read and write
248BAA20000
heap
page read and write
248A236E000
trusted library allocation
page read and write
248A23C4000
trusted library allocation
page read and write
248A049C000
heap
page read and write
248A0490000
heap
page read and write
7FFAACC5C000
trusted library allocation
page execute and read and write
248A2468000
trusted library allocation
page read and write
248A23A3000
trusted library allocation
page read and write
248A2383000
trusted library allocation
page read and write
A757AFF000
stack
page read and write
248A23AE000
trusted library allocation
page read and write
248A0380000
unkown
page readonly
248A0470000
heap
page read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page execute and read and write
248B20C1000
trusted library allocation
page read and write
248A04FE000
heap
page read and write
248A2402000
trusted library allocation
page read and write
248A23CD000
trusted library allocation
page read and write
248A2090000
heap
page execute and read and write
248A23B6000
trusted library allocation
page read and write
248A06B0000
trusted library allocation
page read and write
A7578FE000
stack
page read and write
A757124000
stack
page read and write
248A2431000
trusted library allocation
page read and write
248A0970000
heap
page read and write
248A23CF000
trusted library allocation
page read and write
248A2406000
trusted library allocation
page read and write
248A2448000
trusted library allocation
page read and write
248A2444000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
248A04BB000
heap
page read and write
A7577FC000
stack
page read and write
248A244A000
trusted library allocation
page read and write
248A23E2000
trusted library allocation
page read and write
248A06C0000
trusted library allocation
page read and write
A7579FE000
stack
page read and write
248A2446000
trusted library allocation
page read and write
7FFAACBB3000
trusted library allocation
page read and write
248A2419000
trusted library allocation
page read and write
248A246A000
trusted library allocation
page read and write
7FFAACBCB000
trusted library allocation
page execute and read and write
7FFAACBA3000
trusted library allocation
page execute and read and write
248A0392000
unkown
page readonly
248A0975000
heap
page read and write
248A0450000
heap
page read and write
7FFAACBC4000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
248A247B000
trusted library allocation
page read and write
248A23D6000
trusted library allocation
page read and write
248A0420000
heap
page read and write
248A056A000
heap
page read and write
248A2381000
trusted library allocation
page read and write
7FFAACBA4000
trusted library allocation
page read and write
248A2442000
trusted library allocation
page read and write
248A23B0000
trusted library allocation
page read and write
248A2368000
trusted library allocation
page read and write
248A237B000
trusted library allocation
page read and write
248A236A000
trusted library allocation
page read and write
7FFAACBBD000
trusted library allocation
page execute and read and write
248A24C6000
trusted library allocation
page read and write
248A2422000
trusted library allocation
page read and write
248A2477000
trusted library allocation
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
7FFAACBCD000
trusted library allocation
page execute and read and write
248A2409000
trusted library allocation
page read and write
248A23B2000
trusted library allocation
page read and write
248A20C1000
trusted library allocation
page read and write
248A2475000
trusted library allocation
page read and write
248A239F000
trusted library allocation
page read and write
248A23F9000
trusted library allocation
page read and write
248A0690000
trusted library allocation
page read and write
248A238E000
trusted library allocation
page read and write
248BA448000
heap
page read and write
248A0580000
heap
page read and write
248A23B4000
trusted library allocation
page read and write
248A2433000
trusted library allocation
page read and write
248A23E6000
trusted library allocation
page read and write
248A237F000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page execute and read and write
248A04BD000
heap
page read and write
248A23F3000
trusted library allocation
page read and write
248A1F90000
heap
page read and write
7FFAACC50000
trusted library allocation
page read and write
248A2437000
trusted library allocation
page read and write
248A23A5000
trusted library allocation
page read and write
248A23E4000
trusted library allocation
page read and write
248A23D1000
trusted library allocation
page read and write
7FFAACC86000
trusted library allocation
page execute and read and write
248A2453000
trusted library allocation
page read and write
248A23E0000
trusted library allocation
page read and write
248A20B0000
heap
page read and write
248BAAC3000
heap
page read and write
248A2459000
trusted library allocation
page read and write
7FF4813C0000
trusted library allocation
page execute and read and write
248A239D000
trusted library allocation
page read and write
248A238C000
trusted library allocation
page read and write
248A245C000
trusted library allocation
page read and write
There are 119 hidden memdumps, click here to show them.