IOC Report
tZz1Ogtr2C.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\tZz1Ogtr2C.exe
"C:\Users\user\Desktop\tZz1Ogtr2C.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B30000
direct allocation
page read and write
malicious
D11000
unkown
page execute and read and write
malicious
C0F000
heap
page read and write
9A0000
direct allocation
page read and write
C04000
heap
page read and write
93C000
stack
page read and write
11F9000
direct allocation
page execute and read and write
D61000
heap
page read and write
C0F000
heap
page read and write
C0F000
heap
page read and write
B80000
direct allocation
page read and write
C06000
heap
page read and write
A54000
heap
page read and write
C0F000
heap
page read and write
BFA000
heap
page read and write
990000
heap
page read and write
10D0000
direct allocation
page execute and read and write
9DE000
stack
page read and write
980000
heap
page read and write
F1B000
heap
page read and write
F5F000
stack
page read and write
126E000
direct allocation
page execute and read and write
BFE000
heap
page read and write
C15000
heap
page read and write
C0F000
heap
page read and write
1550000
heap
page read and write
D10000
unkown
page readonly
B80000
direct allocation
page read and write
B80000
direct allocation
page read and write
B80000
direct allocation
page read and write
C15000
heap
page read and write
C0A000
heap
page read and write
D66000
heap
page read and write
A54000
heap
page read and write
B80000
direct allocation
page read and write
D60000
heap
page read and write
D11000
unkown
page execute read
C04000
heap
page read and write
C0B000
heap
page read and write
D61000
heap
page read and write
105F000
stack
page read and write
13A1000
direct allocation
page execute and read and write
C0A000
heap
page read and write
A50000
heap
page read and write
1044000
heap
page read and write
11FD000
direct allocation
page execute and read and write
BF0000
heap
page read and write
D10000
unkown
page readonly
1048000
heap
page read and write
139D000
direct allocation
page execute and read and write
A1E000
stack
page read and write
B80000
direct allocation
page read and write
E89000
heap
page read and write
10B9000
heap
page read and write
83D000
stack
page read and write
C0F000
heap
page read and write
1412000
direct allocation
page execute and read and write
There are 47 hidden memdumps, click here to show them.