IOC Report
68#U2591.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\68#U2591.exe
"C:\Users\user\Desktop\68#U2591.exe"

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Browse For Folder Width
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Browse For Folder Height

Memdumps

Base Address
Regiontype
Protect
Malicious
1D009E55000
heap
page read and write
1D005E88000
heap
page read and write
1D005F0B000
heap
page read and write
1D008088000
heap
page read and write
1D80E47C000
heap
page read and write
1D0060B0000
trusted library section
page read and write
1D80A3E0000
heap
page read and write
1D80E47B000
heap
page read and write
1D005EEF000
heap
page read and write
7DF4F3DB1000
trusted library allocation
page execute read
1D009E56000
heap
page read and write
7FF7FEC4A000
unkown
page readonly
1D005DF0000
heap
page read and write
1D80E503000
heap
page read and write
1D009E7E000
heap
page read and write
1D0095F0000
trusted library allocation
page read and write
1D005E70000
heap
page read and write
1D009E50000
heap
page read and write
1D009E55000
heap
page read and write
1D009E5E000
heap
page read and write
1D009E09000
heap
page read and write
1D80A2B0000
trusted library allocation
page read and write
1D005ECF000
heap
page read and write
1D0060BA000
trusted library section
page read and write
1D005EF9000
heap
page read and write
64D1D4D000
stack
page read and write
1D008162000
heap
page read and write
1D0061B5000
heap
page read and write
1D80E3C2000
heap
page read and write
1D009E7E000
heap
page read and write
64D0DEF000
stack
page read and write
7FF7FEBE0000
unkown
page readonly
1D0080F1000
heap
page read and write
1D005F5B000
heap
page read and write
1D80E4E8000
heap
page read and write
1D005F1F000
heap
page read and write
1D005F64000
heap
page read and write
1D009E4E000
heap
page read and write
1D005F05000
heap
page read and write
1D80A2C0000
trusted library allocation
page read and write
1D80A234000
trusted library allocation
page read and write
1D80A21C000
trusted library allocation
page read and write
64D12FD000
stack
page read and write
64D204A000
stack
page read and write
1D80A25E000
trusted library allocation
page read and write
1D0060C4000
trusted library section
page read and write
1D80A224000
trusted library allocation
page read and write
1D80E44C000
heap
page read and write
1D80E46E000
heap
page read and write
1D0080BC000
heap
page read and write
1D80E460000
heap
page read and write
1D80E41F000
heap
page read and write
1D80E512000
heap
page read and write
64D1A4E000
stack
page read and write
1D005F6E000
heap
page read and write
1D005F64000
heap
page read and write
1D009E5E000
heap
page read and write
1D005F15000
heap
page read and write
1D009E56000
heap
page read and write
1D80A3C0000
trusted library allocation
page read and write
1D80A22C000
trusted library allocation
page read and write
1D009E52000
heap
page read and write
1D005F6C000
heap
page read and write
1D009E5E000
heap
page read and write
1D0080E4000
heap
page read and write
1D005F15000
heap
page read and write
1D80A3D0000
trusted library allocation
page read and write
1D80E512000
heap
page read and write
1D80E42D000
heap
page read and write
1D009E56000
heap
page read and write
1D005F6C000
heap
page read and write
1D007E90000
trusted library allocation
page read and write
1D005EA5000
heap
page read and write
1D009E56000
heap
page read and write
1D009E56000
heap
page read and write
1D0060C0000
trusted library section
page read and write
1D005F6E000
heap
page read and write
1D80E441000
heap
page read and write
1D009E5E000
heap
page read and write
1D00A1FD000
heap
page read and write
1D80E46F000
heap
page read and write
1D009E8F000
heap
page read and write
1D80E47A000
heap
page read and write
1D80E44C000
heap
page read and write
1D009E4F000
heap
page read and write
1D80E43E000
heap
page read and write
1D009E5E000
heap
page read and write
1D80E45E000
heap
page read and write
1D005EC1000
heap
page read and write
1D005EB9000
heap
page read and write
1D005F6E000
heap
page read and write
1D009E56000
heap
page read and write
1D009E6F000
heap
page read and write
1D80E4F1000
heap
page read and write
1D005ECB000
heap
page read and write
1D80A3D3000
trusted library allocation
page read and write
1D80A250000
trusted library allocation
page read and write
1D80E4E0000
heap
page read and write
1D009E56000
heap
page read and write
1D005EEF000
heap
page read and write
1D005F1F000
heap
page read and write
7FF7FEC4A000
unkown
page readonly
1D80E467000
heap
page read and write
1D80E502000
heap
page read and write
1D80E512000
heap
page read and write
1D009E4F000
heap
page read and write
1D009E4E000
heap
page read and write
1D80E5B0000
trusted library allocation
page read and write
1D009E4E000
heap
page read and write
7FF7FEC3B000
unkown
page write copy
1D80A288000
trusted library allocation
page read and write
1D80E3B0000
heap
page read and write
1D80E512000
heap
page read and write
1D0060CA000
trusted library section
page read and write
1D80A2BC000
trusted library allocation
page read and write
1D80E480000
heap
page read and write
1D80A2B4000
trusted library allocation
page read and write
1D80E467000
heap
page read and write
1D009E4E000
heap
page read and write
1D80A29C000
trusted library allocation
page read and write
1D005F57000
heap
page read and write
1D006180000
trusted library allocation
page read and write
1D0060A4000
trusted library section
page read and write
1D80E46F000
heap
page read and write
1D006070000
heap
page read and write
1D009E40000
heap
page read and write
1D80E47B000
heap
page read and write
1D80E4E1000
heap
page read and write
1D80E46E000
heap
page read and write
1D009E4E000
heap
page read and write
1D0061BE000
heap
page read and write
1D005E10000
heap
page read and write
1D80E503000
heap
page read and write
7FF7FEC4F000
unkown
page readonly
1D005F6C000
heap
page read and write
1D0080AD000
heap
page read and write
1D009E56000
heap
page read and write
1D005F57000
heap
page read and write
1D80E47B000
heap
page read and write
7FF7FEC40000
unkown
page read and write
1D009E50000
heap
page read and write
1D005F57000
heap
page read and write
1D005DD0000
heap
page read and write
1D005EBA000
heap
page read and write
1D80E44C000
heap
page read and write
1D80E4E2000
heap
page read and write
1D005F4B000
heap
page read and write
7FF7FEBE0000
unkown
page readonly
1D009E5E000
heap
page read and write
1D009E97000
heap
page read and write
1D80E502000
heap
page read and write
1D80E44C000
heap
page read and write
1D009DF0000
heap
page read and write
7FF7FEC3B000
unkown
page read and write
1D009E52000
heap
page read and write
1D009E4E000
heap
page read and write
1D009E43000
heap
page read and write
1D80E47E000
heap
page read and write
1D80E522000
heap
page read and write
1D00A1F4000
heap
page read and write
64D184E000
stack
page read and write
1D009E4D000
heap
page read and write
64D194B000
stack
page read and write
1D00808A000
heap
page read and write
1D80E46E000
heap
page read and write
1D80E502000
heap
page read and write
1D009E56000
heap
page read and write
1D005F48000
heap
page read and write
1D009E55000
heap
page read and write
1D009E94000
heap
page read and write
1D80E43C000
heap
page read and write
1D80E467000
heap
page read and write
1D009E4E000
heap
page read and write
1D80E44C000
heap
page read and write
1D006081000
trusted library allocation
page read and write
1D005EF9000
heap
page read and write
1D80A278000
trusted library allocation
page read and write
1D005F48000
heap
page read and write
1D00A0B9000
heap
page read and write
1D80A2C8000
trusted library allocation
page read and write
1D009E55000
heap
page read and write
1D80A268000
trusted library allocation
page read and write
1D80A280000
trusted library allocation
page read and write
64D1F4A000
stack
page read and write
1D80A24C000
trusted library allocation
page read and write
1D009E5E000
heap
page read and write
1D005EC8000
heap
page read and write
1D005EB9000
heap
page read and write
7DF4F3DC1000
trusted library allocation
page execute read
1D80A240000
trusted library allocation
page read and write
1D80A2C4000
trusted library allocation
page read and write
7DF4F3DB0000
trusted library allocation
page readonly
1D00A0A4000
heap
page read and write
1D005F4B000
heap
page read and write
1D009E4E000
heap
page read and write
1D80A2A4000
trusted library allocation
page read and write
1D80E4E6000
heap
page read and write
1D80A23C000
trusted library allocation
page read and write
1D80E4F0000
heap
page read and write
1D008084000
heap
page read and write
1D0080EA000
heap
page read and write
1D80E46E000
heap
page read and write
1D80E44C000
heap
page read and write
1D80E480000
heap
page read and write
1D80E502000
heap
page read and write
1D80E4F0000
heap
page read and write
1D009E5E000
heap
page read and write
1D005F0B000
heap
page read and write
1D80A218000
trusted library allocation
page read and write
1D009E5E000
heap
page read and write
1D80DC12000
trusted library allocation
page read and write
1D00609A000
trusted library allocation
page read and write
1D009E4D000
heap
page read and write
1D80A298000
trusted library allocation
page read and write
1D008070000
heap
page read and write
1D00808C000
heap
page read and write
1D005F64000
heap
page read and write
1D80A20C000
trusted library allocation
page read and write
1D80E4F0000
heap
page read and write
1D009E4E000
heap
page read and write
1D80E480000
heap
page read and write
1D005EEF000
heap
page read and write
1D80E464000
heap
page read and write
1D80A248000
trusted library allocation
page read and write
1D80E4F0000
heap
page read and write
1D009E4D000
heap
page read and write
1D009E89000
heap
page read and write
1D005EB6000
heap
page read and write
1D005F15000
heap
page read and write
1D006170000
heap
page read and write
1D005EF9000
heap
page read and write
1D0060AA000
trusted library section
page read and write
64D16F9000
stack
page read and write
1D009E77000
heap
page read and write
1D005F05000
heap
page read and write
64D15F9000
stack
page read and write
1D009E97000
heap
page read and write
1D005F5B000
heap
page read and write
1D80A254000
trusted library allocation
page read and write
1D00A0A0000
heap
page read and write
1D80E44C000
heap
page read and write
7FF7FEC4E000
unkown
page readonly
1D80E502000
heap
page read and write
1D009E63000
heap
page read and write
1D009E5E000
heap
page read and write
1D005F4B000
heap
page read and write
1D80E47B000
heap
page read and write
1D0060A0000
trusted library section
page read and write
1D80E480000
heap
page read and write
1D009E3C000
heap
page read and write
1D009E5E000
heap
page read and write
1D80A208000
trusted library allocation
page read and write
1D005EC0000
heap
page read and write
1D009E81000
heap
page read and write
1D005EE7000
heap
page read and write
1D80A220000
trusted library allocation
page read and write
1D80A259000
trusted library allocation
page read and write
1D005ECF000
heap
page read and write
1D80E800000
heap
page read and write
1D80E522000
heap
page read and write
1D005F5B000
heap
page read and write
1D80A2A8000
trusted library allocation
page read and write
1D80A28C000
trusted library allocation
page read and write
1D009E29000
heap
page read and write
1D009E78000
heap
page read and write
1D80E44C000
heap
page read and write
1D009E50000
heap
page read and write
1D009E4E000
heap
page read and write
1D80A2D8000
trusted library allocation
page read and write
1D80E467000
heap
page read and write
1D009E56000
heap
page read and write
1D0080C5000
heap
page read and write
1D80E4F0000
heap
page read and write
1D0061B0000
heap
page read and write
1D80A3C0000
trusted library allocation
page read and write
1D0060B4000
trusted library section
page read and write
1D00A0BF000
heap
page read and write
7FF7FEC28000
unkown
page readonly
1D00807D000
heap
page read and write
1D009E7E000
heap
page read and write
1D80E44C000
heap
page read and write
1D80E48F000
heap
page read and write
1D006174000
heap
page read and write
1D80E3B3000
heap
page read and write
64D214E000
stack
page read and write
1D005F48000
heap
page read and write
1D80E4EB000
heap
page read and write
1D009E4E000
heap
page read and write
1D009E56000
heap
page read and write
1D80E503000
heap
page read and write
1D009E5E000
heap
page read and write
1D00A1F0000
heap
page read and write
1D009E5E000
heap
page read and write
1D80E47B000
heap
page read and write
1D80E46B000
heap
page read and write
1D009E56000
heap
page read and write
1D80E464000
heap
page read and write
1D80E480000
heap
page read and write
1D0095F4000
heap
page read and write
1D80A238000
trusted library allocation
page read and write
64D1B4E000
stack
page read and write
1D009E50000
heap
page read and write
1D0060D0000
heap
page read and write
1D00A0C2000
heap
page read and write
1D80E3F8000
heap
page read and write
1D80E466000
heap
page read and write
1D005F05000
heap
page read and write
1D80E4E3000
heap
page read and write
1D005EC8000
heap
page read and write
1D009E5E000
heap
page read and write
1D80A270000
trusted library allocation
page read and write
1D80E480000
heap
page read and write
1D80E46E000
heap
page read and write
7FF7FEC28000
unkown
page readonly
1D009E4F000
heap
page read and write
1D80E46B000
heap
page read and write
1D005F1F000
heap
page read and write
1D80A230000
trusted library allocation
page read and write
1D005DE0000
heap
page readonly
1D80E502000
heap
page read and write
7FF7FEBE1000
unkown
page execute read
1D005F0B000
heap
page read and write
64D1E4A000
stack
page read and write
1D80E400000
heap
page read and write
1D80E46E000
heap
page read and write
1D005EDE000
heap
page read and write
64D174F000
stack
page read and write
1D80E522000
heap
page read and write
1D009E50000
heap
page read and write
1D005E78000
heap
page read and write
1D009E8A000
heap
page read and write
64D1C4E000
stack
page read and write
1D009E5E000
heap
page read and write
1D009E56000
heap
page read and write
1D009E9C000
heap
page read and write
1D80E444000
heap
page read and write
1D80E409000
heap
page read and write
7FF7FEC4E000
unkown
page write copy
1D80E512000
heap
page read and write
1D005ED6000
heap
page read and write
1D80E4E4000
heap
page read and write
1D80E4F2000
heap
page read and write
1D80E49C000
heap
page read and write
1D009E4E000
heap
page read and write
1D0095F1000
heap
page read and write
7FF7FEBE1000
unkown
page execute read
1D009E4D000
heap
page read and write
1D009E6E000
heap
page read and write
1D80E46B000
heap
page read and write
1D008079000
heap
page read and write
1D80A210000
trusted library allocation
page read and write
1D80E4E1000
heap
page read and write
1D80E480000
heap
page read and write
There are 343 hidden memdumps, click here to show them.