IOC Report
test2.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\test2.exe
"C:\Users\user\Desktop\test2.exe"
malicious

URLs

Name
IP
Malicious
158.247.200.45
malicious

IPs

IP
Domain
Country
Malicious
158.247.200.45
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
DB2000
unkown
page readonly
malicious
12A0000
heap
page read and write
7FFB4AD93000
trusted library allocation
page execute and read and write
1280000
heap
page read and write
1523000
trusted library allocation
page read and write
7FFB4ADBD000
trusted library allocation
page execute and read and write
1520000
trusted library allocation
page read and write
314E000
stack
page read and write
1BC75000
stack
page read and write
17B5000
heap
page read and write
1134000
stack
page read and write
136F000
heap
page read and write
1535000
heap
page read and write
2FD0000
heap
page read and write
13153000
trusted library allocation
page read and write
7FFB4ADA2000
trusted library allocation
page read and write
1180000
heap
page read and write
DB0000
unkown
page readonly
13D7000
heap
page read and write
7FFB4AE40000
trusted library allocation
page read and write
7FFB4ADAD000
trusted library allocation
page execute and read and write
17B0000
heap
page read and write
7FF41AF10000
trusted library allocation
page execute and read and write
7FFB4ADA0000
trusted library allocation
page read and write
7FFB4AEB0000
trusted library allocation
page execute and read and write
7FFB4ADEC000
trusted library allocation
page execute and read and write
13C1000
heap
page read and write
DB0000
unkown
page readonly
1BB1A000
stack
page read and write
1333000
heap
page read and write
1344000
heap
page read and write
1371000
heap
page read and write
1341000
heap
page read and write
1336000
heap
page read and write
132C000
heap
page read and write
13151000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
1B6DD000
stack
page read and write
7FFB4AD94000
trusted library allocation
page read and write
130C000
heap
page read and write
14FE000
stack
page read and write
1306000
heap
page read and write
7FFB4AD9D000
trusted library allocation
page execute and read and write
1375000
heap
page read and write
7FFB4ADB0000
trusted library allocation
page read and write
1BB70000
heap
page execute and read and write
1510000
trusted library allocation
page read and write
1300000
heap
page read and write
1530000
heap
page read and write
1260000
heap
page read and write
7FFB4AE76000
trusted library allocation
page execute and read and write
13D5000
heap
page read and write
7FFB4AF30000
trusted library allocation
page read and write
7FFB4AE4C000
trusted library allocation
page execute and read and write
1B180000
trusted library allocation
page read and write
7FFB4AE50000
trusted library allocation
page execute and read and write
17A0000
heap
page read and write
1331000
heap
page read and write
13158000
trusted library allocation
page read and write
3040000
heap
page execute and read and write
1B4D4000
heap
page read and write
12F0000
trusted library allocation
page read and write
There are 52 hidden memdumps, click here to show them.