IOC Report
P2jWhX7B3B.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\P2jWhX7B3B.exe
"C:\Users\user\Desktop\P2jWhX7B3B.exe"
malicious

URLs

Name
IP
Malicious
https://gcc.gnu.org/bugs/):
unknown
https://enigmaprotector.com/taggant/spv.crl0
unknown
https://enigmaprotector.com/taggant/user.crl0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
56F2BFE000
stack
page read and write
7FF788885000
unkown
page execute and write copy
21CBA301000
heap
page read and write
56F23FE000
stack
page read and write
21CB8520000
heap
page read and write
56F1BFF000
stack
page read and write
21CBA5B0000
heap
page read and write
21CBA38D000
heap
page read and write
21CB8500000
heap
page read and write
21CBAA5C000
heap
page read and write
56F3BFE000
stack
page read and write
56F2FFF000
stack
page read and write
21CBA050000
heap
page read and write
56F03FE000
stack
page read and write
21CBAAC2000
heap
page read and write
21CBA344000
heap
page read and write
56F27FF000
stack
page read and write
21CBA090000
heap
page read and write
7FF787B94000
unkown
page readonly
21CBA150000
heap
page read and write
56F0BFE000
stack
page read and write
21CB8526000
heap
page read and write
7FF787BA0000
unkown
page read and write
21CBA053000
heap
page read and write
21CBA355000
heap
page read and write
21CBAA6C000
heap
page read and write
21CBA0D0000
trusted library allocation
page read and write
21CBA0D0000
trusted library allocation
page read and write
7FF787BA1000
unkown
page execute and write copy
21CBAAC7000
heap
page read and write
21CBA550000
trusted library allocation
page read and write
7FF787BA5000
unkown
page execute and write copy
7FF787B94000
unkown
page execute and write copy
21CBA415000
heap
page read and write
21CBAD96000
heap
page read and write
21CB9FC0000
heap
page read and write
21CBA418000
heap
page read and write
56EFFFE000
stack
page read and write
7FF787F1A000
unkown
page execute and read and write
56F1FFE000
stack
page read and write
7FF787B92000
unkown
page read and write
56F17FF000
stack
page read and write
7FF787F2A000
unkown
page execute and read and write
56F3FFF000
stack
page read and write
21CBAA57000
heap
page read and write
56F37FF000
stack
page read and write
56F0FFE000
stack
page read and write
21CBAA57000
heap
page read and write
56EFBFE000
stack
page read and write
21CB84D0000
heap
page read and write
7FF787B71000
unkown
page execute and write copy
56F13FE000
stack
page read and write
21CBA160000
heap
page read and write
21CBA415000
heap
page read and write
7FF788083000
unkown
page execute and read and write
7FF787F2E000
unkown
page execute and read and write
56EF7F7000
stack
page read and write
7FF787B70000
unkown
page readonly
21CBA070000
heap
page read and write
7FF788536000
unkown
page execute and read and write
7FF787F58000
unkown
page execute and read and write
7FFE22010000
direct allocation
page execute and read and write
21CBAAB9000
heap
page read and write
21CBA420000
heap
page read and write
21CBA0D0000
trusted library allocation
page read and write
7FF788882000
unkown
page execute and write copy
21CBAA51000
heap
page read and write
7FF787B9D000
unkown
page readonly
21CBA344000
heap
page read and write
7FF787BA6000
unkown
page execute and read and write
7FF787BA5000
unkown
page readonly
21CBAA4F000
heap
page read and write
21CBA2D2000
heap
page read and write
21CBAAB5000
heap
page read and write
21CBAA5C000
heap
page read and write
21CBA260000
heap
page read and write
7FF787B9D000
unkown
page execute and write copy
21CBA2A0000
heap
page read and write
7FF787B92000
unkown
page execute and write copy
21CBA41B000
heap
page read and write
21CB84C0000
heap
page read and write
7FF787B70000
unkown
page readonly
21CBA980000
heap
page read and write
21CBA423000
heap
page read and write
21CBA155000
heap
page read and write
21CB9FB0000
heap
page read and write
7FF787B71000
unkown
page execute read
7FF787F80000
unkown
page execute and read and write
21CBAA63000
heap
page read and write
56F33FE000
stack
page read and write
21CBA2FC000
heap
page read and write
21CBA417000
heap
page read and write
21CBA38D000
heap
page read and write
21CBAA60000
heap
page read and write
56F07FF000
stack
page read and write
21CBA41C000
heap
page read and write
7FF40F620000
direct allocation
page execute and read and write
21CBAAB8000
heap
page read and write
21CBAAD0000
heap
page read and write
7FF788885000
unkown
page execute and read and write
There are 90 hidden memdumps, click here to show them.