IOC Report
j1gw88aHdL.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\j1gw88aHdL.exe
"C:\Users\user\Desktop\j1gw88aHdL.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2B84BED5000
heap
page read and write
2B84BEDC000
heap
page read and write
2B84BED8000
heap
page read and write
7FF7D4C34000
unkown
page readonly
2B84BECF000
heap
page read and write
2B84BEB8000
heap
page read and write
7FF7D4C2E000
unkown
page read and write
FB177CD000
stack
page read and write
7FF7D4BF1000
unkown
page execute read
2B84D870000
heap
page read and write
7FF7D4C2E000
unkown
page write copy
7FF7D4BF1000
unkown
page execute read
2B84BECF000
heap
page read and write
2B84BEB0000
heap
page read and write
FB173E6000
stack
page read and write
2B84D760000
heap
page read and write
2B84BED8000
heap
page read and write
2B84BE50000
heap
page read and write
FB179BF000
stack
page read and write
2B84BEE3000
heap
page read and write
FB175DE000
stack
page read and write
7FF7D4BF0000
unkown
page readonly
2B84D7D3000
heap
page read and write
7FF7D4C32000
unkown
page read and write
2B84BEE9000
heap
page read and write
2B84D86A000
heap
page read and write
2B84BE20000
heap
page read and write
2B84BED8000
heap
page read and write
2B84BEDD000
heap
page read and write
2B84D860000
heap
page read and write
7FF7D4C1B000
unkown
page readonly
2B84BD40000
heap
page read and write
7FF7D4C1B000
unkown
page readonly
2B84D7D0000
heap
page read and write
7FF7D4C34000
unkown
page readonly
7FF7D4BF0000
unkown
page readonly
2B84BECC000
heap
page read and write
2B84D865000
heap
page read and write
2B8508B0000
trusted library allocation
page read and write
There are 29 hidden memdumps, click here to show them.