IOC Report
2Dhg4Ngjrv

loading gif

Files

File Path
Type
Category
Malicious
2Dhg4Ngjrv.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2Dhg4Ngjrv.exe
"C:\Users\user\Desktop\2Dhg4Ngjrv.exe"

URLs

Name
IP
Malicious
https://neutralino.js.org
unknown
https://neutralino.js.orgbad
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
24BCA9C3000
heap
page read and write
24BC76D7000
heap
page read and write
24BC7650000
heap
page read and write
24BC76D8000
heap
page read and write
7FF61FA01000
unkown
page execute read
7FF61FC3A000
unkown
page readonly
24BC9080000
heap
page read and write
24BC76F4000
heap
page read and write
24BC908B000
heap
page read and write
7FF61FA01000
unkown
page execute read
24BC76DE000
heap
page read and write
24BC76C6000
heap
page read and write
24BC76EB000
heap
page read and write
24BC76E8000
heap
page read and write
7523DF9000
stack
page read and write
24BC9085000
heap
page read and write
24BC76CB000
heap
page read and write
24BC9090000
heap
page read and write
24BC76C7000
heap
page read and write
7FF61FC3A000
unkown
page readonly
24BC76CD000
heap
page read and write
24BC76E2000
heap
page read and write
24BC76AC000
heap
page read and write
24BC7711000
heap
page read and write
24BC7710000
heap
page read and write
24BC7620000
heap
page read and write
24BC76F9000
heap
page read and write
75240FE000
stack
page read and write
24BC76E2000
heap
page read and write
24BC7610000
heap
page read and write
7FF61FC35000
unkown
page read and write
24BC76A0000
heap
page read and write
7FF61FA00000
unkown
page readonly
75244FF000
stack
page read and write
7FF61FBD1000
unkown
page readonly
7FF61FC29000
unkown
page read and write
24BC76DE000
heap
page read and write
24BC9120000
heap
page read and write
24BC76CC000
heap
page read and write
24BC76EB000
heap
page read and write
24BCC1C0000
trusted library allocation
page read and write
75241FE000
stack
page read and write
24BCA9C0000
heap
page read and write
24BC76EB000
heap
page read and write
24BC76E2000
heap
page read and write
24BC76DE000
heap
page read and write
24BC76EB000
heap
page read and write
24BC76E2000
heap
page read and write
7FF61FA00000
unkown
page readonly
7FF61FBD1000
unkown
page readonly
7FF61FC2B000
unkown
page write copy
75242FA000
stack
page read and write
24BC76EB000
heap
page read and write
24BC76DE000
heap
page read and write
24BC76EC000
heap
page read and write
24BC76CA000
heap
page read and write
7FF61FC29000
unkown
page write copy
24BC76DF000
heap
page read and write
75243FF000
stack
page read and write
24BC9050000
heap
page read and write
There are 50 hidden memdumps, click here to show them.