IOC Report
W53oi1JYy4.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\W53oi1JYy4.exe
"C:\Users\user\Desktop\W53oi1JYy4.exe"
malicious

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
830000
heap
page read and write
5D9000
unkown
page write copy
4210000
heap
page read and write
26A0000
heap
page read and write
2E40000
heap
page read and write
420C000
heap
page read and write
85F000
heap
page read and write
86D000
heap
page read and write
45E0000
trusted library allocation
page read and write
24A8000
direct allocation
page read and write
24A8000
direct allocation
page read and write
422C000
heap
page read and write
41E0000
heap
page read and write
2F0E000
stack
page read and write
7C0000
heap
page read and write
780000
heap
page read and write
4200000
heap
page read and write
2450000
heap
page read and write
4259000
heap
page read and write
24A8000
direct allocation
page read and write
41E1000
heap
page read and write
41FA000
heap
page read and write
2455000
heap
page read and write
881000
heap
page read and write
41F9000
heap
page read and write
2488000
direct allocation
page read and write
248B000
direct allocation
page read and write
8A5000
heap
page read and write
2E20000
heap
page read and write
24AA000
direct allocation
page read and write
891000
heap
page read and write
5DD000
unkown
page read and write
880000
heap
page read and write
52AF000
stack
page read and write
420F000
heap
page read and write
26A3000
heap
page read and write
876000
heap
page read and write
2310000
direct allocation
page execute and read and write
4228000
heap
page read and write
4203000
heap
page read and write
869000
heap
page read and write
2ECE000
stack
page read and write
400000
unkown
page readonly
2460000
direct allocation
page read and write
4220000
heap
page read and write
4261000
heap
page read and write
41F5000
heap
page read and write
4217000
heap
page read and write
870000
heap
page read and write
24A8000
direct allocation
page read and write
876000
heap
page read and write
8AD000
heap
page read and write
820000
heap
page read and write
41E1000
heap
page read and write
83E000
heap
page read and write
24A8000
direct allocation
page read and write
881000
heap
page read and write
4218000
heap
page read and write
249A000
direct allocation
page read and write
24A8000
direct allocation
page read and write
899000
heap
page read and write
5E4000
unkown
page readonly
24A8000
direct allocation
page read and write
85B000
heap
page read and write
401000
unkown
page execute read
96000
stack
page read and write
869000
heap
page read and write
24A8000
direct allocation
page read and write
248C000
direct allocation
page read and write
2459000
heap
page read and write
5D9000
unkown
page read and write
885000
heap
page read and write
41FF000
heap
page read and write
4207000
heap
page read and write
19B000
stack
page read and write
41FC000
heap
page read and write
1F0000
heap
page read and write
8B5000
heap
page read and write
51AF000
stack
page read and write
8A2000
heap
page read and write
880000
heap
page read and write
24A8000
direct allocation
page read and write
7C5000
heap
page read and write
5DF000
unkown
page write copy
4214000
heap
page read and write
83A000
heap
page read and write
23B0000
heap
page read and write
8C3000
heap
page read and write
870000
heap
page read and write
880000
heap
page read and write
420F000
heap
page read and write
There are 81 hidden memdumps, click here to show them.