IOC Report
RUMMY.EXE

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RUMMY.EXE
"C:\Users\user\Desktop\RUMMY.EXE"
malicious

URLs

Name
IP
Malicious
http://unni.web.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
404000
unkown
page readonly
47D4000
heap
page read and write
404000
unkown
page readonly
7DB000
heap
page read and write
7BF000
heap
page read and write
22BE000
stack
page read and write
79A000
heap
page read and write
600000
heap
page read and write
7B6000
heap
page read and write
22D0000
heap
page read and write
47D0000
heap
page read and write
407000
unkown
page readonly
7C5000
heap
page read and write
7BF000
heap
page read and write
790000
heap
page read and write
253E000
stack
page read and write
7C6000
heap
page read and write
24FF000
stack
page read and write
2260000
heap
page read and write
400000
unkown
page readonly
C20000
heap
page read and write
19C000
stack
page read and write
400000
unkown
page readonly
406000
unkown
page write copy
70F000
stack
page read and write
54E000
stack
page read and write
96000
stack
page read and write
C2C000
heap
page read and write
7D7000
heap
page read and write
2270000
heap
page read and write
2304000
heap
page read and write
406000
unkown
page read and write
79E000
heap
page read and write
7E3000
heap
page read and write
263F000
stack
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
1F0000
heap
page read and write
407000
unkown
page readonly
500000
heap
page read and write
2300000
heap
page read and write
3EA0000
trusted library allocation
page read and write
C28000
heap
page read and write
7C5000
heap
page read and write
There are 34 hidden memdumps, click here to show them.