IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
405000
unkown
page readonly
9D000
stack
page read and write
19D000
stack
page read and write
425000
unkown
page readonly
55E000
stack
page read and write
425000
unkown
page readonly
400000
unkown
page readonly
7EA000
heap
page read and write
19B000
stack
page read and write
9DF000
stack
page read and write
7E0000
heap
page read and write
400000
unkown
page readonly
B10000
heap
page read and write
7EE000
heap
page read and write
403000
unkown
page readonly
510000
heap
page read and write
403000
unkown
page readonly
59E000
stack
page read and write
620000
heap
page read and write
401000
unkown
page execute read
5E0000
heap
page read and write
430000
heap
page read and write
196000
stack
page read and write
72F000
stack
page read and write
401000
unkown
page execute read
405000
unkown
page readonly
There are 16 hidden memdumps, click here to show them.