IOC Report
CxDfBJ42lP.exe

loading gifProcessesURLsIPsMemdumps1010Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CxDfBJ42lP.exe
"C:\Users\user\Desktop\CxDfBJ42lP.exe"
malicious

URLs

Name
IP
Malicious
https://pastebin.com/raw/yraPuhAK
unknown

IPs

IP
Domain
Country
Malicious
172.86.115.43
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
542000
unkown
page readonly
malicious
28E0000
heap
page execute and read and write
AB5000
heap
page read and write
B8E000
heap
page read and write
55AE000
stack
page read and write
4E11000
trusted library allocation
page read and write
500F000
stack
page read and write
B1E000
heap
page read and write
291A000
trusted library allocation
page read and write
4E25000
trusted library allocation
page read and write
291C000
trusted library allocation
page read and write
DDE000
stack
page read and write
26CB000
trusted library allocation
page execute and read and write
291E000
trusted library allocation
page read and write
602F000
stack
page read and write
2920000
trusted library allocation
page read and write
2954000
trusted library allocation
page read and write
610000
unkown
page readonly
556C000
stack
page read and write
27A0000
trusted library allocation
page read and write
4E18000
trusted library allocation
page read and write
28D0000
trusted library allocation
page read and write
1097000
trusted library allocation
page execute and read and write
27B0000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
B44000
heap
page read and write
524E000
stack
page read and write
26C0000
trusted library allocation
page read and write
4DF6000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
4DF4000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
E5E000
stack
page read and write
4E3C000
trusted library allocation
page read and write
109A000
trusted library allocation
page execute and read and write
48F8000
trusted library allocation
page read and write
B10000
heap
page read and write
28CE000
stack
page read and write
E9E000
stack
page read and write
540000
unkown
page readonly
4E16000
trusted library allocation
page read and write
B53000
heap
page read and write
26E0000
trusted library allocation
page read and write
AFE000
stack
page read and write
2940000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
51CE000
stack
page read and write
1073000
trusted library allocation
page execute and read and write
4E0E000
trusted library allocation
page read and write
4E46000
trusted library allocation
page read and write
A20000
heap
page read and write
E1E000
stack
page read and write
520E000
stack
page read and write
2790000
trusted library allocation
page execute and read and write
27AC000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
276E000
stack
page read and write
EDE000
stack
page read and write
4DFC000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
5F2E000
stack
page read and write
4E44000
trusted library allocation
page read and write
6AB000
stack
page read and write
272E000
stack
page read and write
B55000
heap
page read and write
50C0000
heap
page execute and read and write
B00000
trusted library allocation
page read and write
294B000
trusted library allocation
page read and write
A70000
trusted library allocation
page execute and read and write
4A8E000
stack
page read and write
4E60000
trusted library allocation
page read and write
2943000
trusted library allocation
page read and write
2770000
heap
page read and write
107D000
trusted library allocation
page execute and read and write
A10000
heap
page read and write
4FCD000
stack
page read and write
4DDA000
trusted library allocation
page read and write
10A0000
heap
page read and write
4E90000
heap
page read and write
A30000
heap
page read and write
5040000
trusted library allocation
page execute and read and write
38F1000
trusted library allocation
page read and write
27C0000
heap
page read and write
5E2F000
stack
page read and write
B1A000
heap
page read and write
7A8000
stack
page read and write
528E000
stack
page read and write
26C7000
trusted library allocation
page execute and read and write
38F8000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
5D2E000
stack
page read and write
28F1000
trusted library allocation
page read and write
1083000
trusted library allocation
page read and write
4E4A000
trusted library allocation
page read and write
AB0000
heap
page read and write
There are 86 hidden memdumps, click here to show them.