IOC Report
J0YZ3B2MaR

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\J0YZ3B2MaR.exe
"C:\Users\user\Desktop\J0YZ3B2MaR.exe"

Memdumps

Base Address
Regiontype
Protect
Malicious
5C0000
heap
page read and write
1F0000
heap
page read and write
2260000
heap
page read and write
9C000
stack
page read and write
40B000
unkown
page write copy
5C4000
heap
page read and write
4F0000
heap
page read and write
5C4000
heap
page read and write
409000
unkown
page read and write
19D000
stack
page read and write
401000
unkown
page execute read
793000
heap
page read and write
770000
heap
page read and write
6CF000
stack
page read and write
2271000
heap
page read and write
400000
unkown
page readonly
409000
unkown
page write copy
2110000
direct allocation
page read and write
2270000
heap
page read and write
77E000
heap
page read and write
57E000
stack
page read and write
77A000
heap
page read and write
2271000
heap
page read and write
53E000
stack
page read and write
2278000
heap
page read and write
40E000
unkown
page readonly
96F000
stack
page read and write
There are 17 hidden memdumps, click here to show them.