IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
961000
unkown
page execute read
A27000
unkown
page readonly
30F0000
heap
page read and write
A14000
unkown
page readonly
A40000
heap
page read and write
110000
heap
page read and write
A63000
heap
page read and write
180000
heap
page read and write
AA000
stack
page read and write
A14000
unkown
page readonly
17B0000
heap
page read and write
9EF000
unkown
page readonly
A1E000
unkown
page read and write
A22000
unkown
page write copy
7FD000
stack
page read and write
7BF000
stack
page read and write
A27000
unkown
page readonly
961000
unkown
page execute read
1740000
heap
page read and write
30F4000
heap
page read and write
160000
heap
page read and write
960000
unkown
page readonly
A6C000
heap
page read and write
A48000
heap
page read and write
960000
unkown
page readonly
9EF000
unkown
page readonly
7DB000
stack
page read and write
7CF000
stack
page read and write
A1E000
unkown
page write copy
There are 19 hidden memdumps, click here to show them.