IOC Report
HyperThread.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HyperThread.exe
"C:\Users\user\Desktop\HyperThread.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF69F630000
unkown
page readonly
7FF6A0ADD000
unkown
page execute read
7FF6A0F3A000
unkown
page readonly
7FF6A00DB000
unkown
page write copy
7FF6A00DD000
unkown
page execute read
2AB76980000
heap
page read and write
C4710FC000
stack
page read and write
7FF6A00DB000
unkown
page read and write
7FF6A0ADD000
unkown
page execute read
2AB769CB000
heap
page read and write
C4711FD000
stack
page read and write
7FF6A0F3A000
unkown
page readonly
2AB769C0000
heap
page read and write
7FF69F630000
unkown
page readonly
2AB76990000
heap
page read and write
7FF6A00DD000
unkown
page execute read
There are 6 hidden memdumps, click here to show them.