IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
10E0000
heap
page read and write
13AF000
stack
page read and write
1101000
heap
page read and write
2E20000
heap
page read and write
1001000
unkown
page execute read
100E000
unkown
page readonly
F20000
heap
page read and write
F90000
heap
page read and write
10E8000
heap
page read and write
FDE000
stack
page read and write
109E000
stack
page read and write
1000000
unkown
page readonly
1057000
unkown
page readonly
EFC000
stack
page read and write
10EE000
heap
page read and write
1001000
unkown
page execute read
BAC000
stack
page read and write
1057000
unkown
page readonly
100E000
unkown
page readonly
F10000
heap
page read and write
1000000
unkown
page readonly
14AF000
stack
page read and write
F6E000
stack
page read and write
2D4D000
stack
page read and write
There are 14 hidden memdumps, click here to show them.