IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
http://www.enigmaprotector.com/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
unkown
page execute and write copy
malicious
401000
unkown
page execute and write copy
malicious
41F000
unkown
page execute and write copy
41F000
unkown
page execute and write copy
87E000
heap
page read and write
D7F000
stack
page read and write
870000
heap
page read and write
9D000
stack
page read and write
400000
unkown
page readonly
790000
heap
page read and write
780000
heap
page read and write
6D9000
unkown
page read and write
19D000
stack
page read and write
400000
unkown
page readonly
6D9000
unkown
page execute and write copy
830000
heap
page read and write
87A000
heap
page read and write
C7E000
stack
page read and write
There are 8 hidden memdumps, click here to show them.