IOC Report
CakeView.exe

loading gifProcessesURLsMemdumps20102Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\CakeView.exe
"C:\Users\user\Desktop\CakeView.exe"

URLs

Name
IP
Malicious
https://wiki.prowrestlingmods.io/https://discord.gg/ctUmSTueV3materialeditor.exePlease
unknown
https://prowrestlingmods.io
unknown
https://wiki.prowrestlingmods.io/
unknown
https://www.patreon.com/PWModsSysCore::Assets::VCTexture
unknown
https://discord.gg/ctUmSTueV3
unknown
https://www.patreon.com/PWMods
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2B522109000
heap
page read and write
7FF73CFF0000
unkown
page readonly
2B52210B000
heap
page read and write
7FF73D0D0000
unkown
page readonly
F3D97BC000
stack
page read and write
7FF73CFF1000
unkown
page execute read
7FF73D203000
unkown
page write copy
7FF73D0CC000
unkown
page readonly
2B521F90000
heap
page read and write
7FF73D20A000
unkown
page write copy
7FF73CFF0000
unkown
page readonly
7FF73D243000
unkown
page readonly
7FF73D203000
unkown
page write copy
7FF73CFF1000
unkown
page execute read
F3D9AFE000
stack
page read and write
7FF73D243000
unkown
page readonly
F3D9BFE000
stack
page read and write
7FF73D0CC000
unkown
page read and write
2B522070000
heap
page read and write
7FF73D209000
unkown
page read and write
F3D9CFE000
stack
page read and write
2B522100000
heap
page read and write
There are 12 hidden memdumps, click here to show them.