IOC Report
9Aa8t2BpXw

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9Aa8t2BpXw.exe
"C:\Users\user\Desktop\9Aa8t2BpXw.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
405000
unkown
page execute and write copy
6A1000
heap
page read and write
242E000
stack
page read and write
403000
unkown
page read and write
7AE000
stack
page read and write
9EE000
stack
page read and write
405000
unkown
page execute and write copy
4E0000
heap
page read and write
63E000
stack
page read and write
400000
unkown
page readonly
8AF000
stack
page read and write
6A5000
heap
page read and write
69B000
heap
page read and write
6B7000
heap
page read and write
68B000
heap
page read and write
252F000
stack
page read and write
3FA0000
trusted library allocation
page read and write
696000
heap
page read and write
6B4000
heap
page read and write
6A1000
heap
page read and write
53E000
stack
page read and write
3B50000
heap
page read and write
22EE000
stack
page read and write
4F0000
heap
page read and write
697000
heap
page read and write
68F000
heap
page read and write
8EE000
stack
page read and write
3B60000
heap
page read and write
693000
heap
page read and write
3B65000
heap
page read and write
401000
unkown
page execute and write copy
670000
heap
page read and write
23EF000
stack
page read and write
400000
unkown
page readonly
67E000
heap
page read and write
99000
stack
page read and write
AB0000
heap
page read and write
6A8000
heap
page read and write
693000
heap
page read and write
6A2000
heap
page read and write
401000
unkown
page execute and write copy
67A000
heap
page read and write
AA0000
heap
page read and write
B0A000
heap
page read and write
3B54000
heap
page read and write
19C000
stack
page read and write
403000
unkown
page write copy
B00000
heap
page read and write
69B000
heap
page read and write
1F0000
heap
page read and write
There are 40 hidden memdumps, click here to show them.