IOC Report
AutoHotkey.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AutoHotkey.exe
"C:\Users\user\Desktop\AutoHotkey.exe"
malicious

URLs

Name
IP
Malicious
https://autohotkey.com
unknown
https://autohotkey.comCould
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
BF2000
heap
page read and write
C15000
heap
page read and write
92E000
stack
page read and write
5C50000
trusted library allocation
page read and write
C02000
heap
page read and write
BEB000
heap
page read and write
C1B000
heap
page read and write
AB9000
heap
page read and write
100000
heap
page read and write
14CF000
stack
page read and write
2DF4000
heap
page read and write
A70000
heap
page read and write
2DF0000
heap
page read and write
400000
unkown
page readonly
4AD000
unkown
page readonly
AD0000
heap
page read and write
1E0000
heap
page read and write
401000
unkown
page execute read
C1B000
heap
page read and write
4D4000
unkown
page write copy
4DB000
unkown
page read and write
BD0000
heap
page read and write
9D0000
heap
page read and write
4D4000
unkown
page read and write
8DF000
stack
page read and write
AB5000
heap
page read and write
4AD000
unkown
page readonly
BF5000
heap
page read and write
4D6000
unkown
page read and write
4D5000
unkown
page write copy
BF9000
heap
page read and write
8CF000
stack
page read and write
4C0000
unkown
page readonly
9F0000
heap
page read and write
9A000
stack
page read and write
4DE000
unkown
page readonly
8EE000
stack
page read and write
4C0000
unkown
page readonly
8D8000
stack
page read and write
10CE000
stack
page read and write
BD8000
heap
page read and write
AC0000
heap
page read and write
96E000
stack
page read and write
BF5000
heap
page read and write
400000
unkown
page readonly
4DE000
unkown
page readonly
AB0000
heap
page read and write
401000
unkown
page execute read
BEE000
heap
page read and write
There are 39 hidden memdumps, click here to show them.