IOC Report
Project1.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Project1.exe
"C:\Users\user\Desktop\Project1.exe"
malicious
C:\Users\user\Desktop\Project1.exe
"C:\Users\user\Desktop\Project1.exe"
malicious
C:\Users\user\Desktop\Project1.exe
"C:\Users\user\Desktop\Project1.exe"
malicious
C:\Users\user\Desktop\Project1.exe
"C:\Users\user\Desktop\Project1.exe"
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Memdumps

Base Address
Regiontype
Protect
Malicious
5DE000
heap
page read and write
5B8000
heap
page read and write
7FB000
heap
page read and write
7D3000
heap
page read and write
19B000
stack
page read and write
7DD000
heap
page read and write
7F5000
heap
page read and write
7F3000
heap
page read and write
2CBE000
stack
page read and write
AE0000
heap
page read and write
BD5000
heap
page read and write
5DF000
heap
page read and write
5EE000
stack
page read and write
5DE000
heap
page read and write
64E000
heap
page read and write
97E000
stack
page read and write
95E000
stack
page read and write
2320000
direct allocation
page read and write
2330000
direct allocation
page read and write
66C000
heap
page read and write
23AE000
stack
page read and write
28DE000
stack
page read and write
600000
heap
page read and write
55E000
stack
page read and write
68A000
heap
page read and write
7F4000
heap
page read and write
2A1E000
stack
page read and write
A93000
heap
page read and write
29DF000
stack
page read and write
500000
heap
page read and write
68C000
heap
page read and write
85F000
stack
page read and write
1C172110000
heap
page read and write
B10000
trusted library allocation
page read and write
93F000
stack
page read and write
2C5F000
stack
page read and write
7B0000
heap
page read and write
2D2F000
stack
page read and write
23E3000
heap
page read and write
23D8000
direct allocation
page read and write
A5F000
stack
page read and write
691000
heap
page read and write
2B5E000
stack
page read and write
5C3000
heap
page read and write
51E000
stack
page read and write
1C1720A0000
heap
page read and write
23E0000
heap
page read and write
AC3000
direct allocation
page read and write
2B2F000
stack
page read and write
5B9000
heap
page read and write
401000
unkown
page execute read
2C2F000
stack
page read and write
598000
heap
page read and write
2D9F000
stack
page read and write
5D7000
heap
page read and write
74E000
stack
page read and write
26CE000
stack
page read and write
40D0000
trusted library allocation
page read and write
5B0000
heap
page read and write
7D7000
heap
page read and write
5E1000
heap
page read and write
2334000
direct allocation
page read and write
BD0000
heap
page read and write
68F000
heap
page read and write
97000
stack
page read and write
7FB000
heap
page read and write
233C000
direct allocation
page read and write
2B3F000
stack
page read and write
23DC000
direct allocation
page read and write
590000
heap
page read and write
1C172119000
heap
page read and write
790000
heap
page read and write
AB0000
direct allocation
page read and write
670000
heap
page read and write
23D0000
direct allocation
page read and write
23E3000
direct allocation
page read and write
61E000
stack
page read and write
478000
unkown
page read and write
478000
unkown
page write copy
23E0000
direct allocation
page read and write
2A3F000
stack
page read and write
67E000
heap
page read and write
B79000
heap
page read and write
2430000
heap
page read and write
677000
heap
page read and write
23C0000
heap
page read and write
4190000
trusted library allocation
page read and write
26E0000
heap
page read and write
7CE000
heap
page read and write
5CA000
heap
page read and write
B80000
heap
page read and write
AB8000
direct allocation
page read and write
5BE000
heap
page read and write
B30000
heap
page read and write
67A000
heap
page read and write
5CF000
heap
page read and write
7D2000
heap
page read and write
7DD000
heap
page read and write
4EE000
stack
page read and write
67D000
heap
page read and write
66C000
heap
page read and write
19A000
stack
page read and write
264E000
stack
page read and write
97000
stack
page read and write
681000
heap
page read and write
B40000
heap
page read and write
485000
unkown
page readonly
97000
stack
page read and write
4DE000
stack
page read and write
690000
heap
page read and write
679000
heap
page read and write
660000
heap
page read and write
478000
unkown
page read and write
5E1000
heap
page read and write
698000
heap
page read and write
674000
heap
page read and write
ABC000
direct allocation
page read and write
478000
unkown
page read and write
5F0000
heap
page read and write
5AE000
stack
page read and write
2B1F000
stack
page read and write
5D4000
heap
page read and write
5D5000
heap
page read and write
5E2000
heap
page read and write
2B1F000
stack
page read and write
AB0000
direct allocation
page execute and read and write
47D000
unkown
page read and write
AB0000
heap
page read and write
1F0000
heap
page read and write
5FC000
heap
page read and write
5C7000
heap
page read and write
AA0000
heap
page read and write
7D9000
heap
page read and write
B33AD0C000
stack
page read and write
400000
unkown
page readonly
AB8000
direct allocation
page read and write
2DBF000
stack
page read and write
29DF000
stack
page read and write
1C172070000
heap
page read and write
B7E000
stack
page read and write
23E3000
direct allocation
page read and write
5D6000
heap
page read and write
5FC000
heap
page read and write
5B1000
heap
page read and write
5F3000
heap
page read and write
2C9E000
stack
page read and write
AB4000
direct allocation
page read and write
5D3000
heap
page read and write
675000
heap
page read and write
1F0000
heap
page read and write
5DE000
heap
page read and write
9AE000
stack
page read and write
23DE000
direct allocation
page read and write
67B000
heap
page read and write
5BA000
heap
page read and write
7F2000
heap
page read and write
B33AD8E000
stack
page read and write
685000
heap
page read and write
5C3000
heap
page read and write
23D8000
direct allocation
page read and write
7D6000
heap
page read and write
51E000
stack
page read and write
7CE000
heap
page read and write
A7F000
stack
page read and write
B45000
heap
page read and write
7A0000
direct allocation
page execute and read and write
7F2000
heap
page read and write
7EB000
heap
page read and write
AB3000
heap
page read and write
B33B0FE000
stack
page read and write
23C0000
trusted library allocation
page read and write
505000
heap
page read and write
674000
heap
page read and write
5D8000
heap
page read and write
7C9000
heap
page read and write
293E000
stack
page read and write
23D4000
direct allocation
page read and write
7E1000
heap
page read and write
485000
unkown
page readonly
2A1E000
stack
page read and write
5B9000
heap
page read and write
5DD000
heap
page read and write
1C172080000
heap
page read and write
2340000
direct allocation
page read and write
4130000
trusted library allocation
page read and write
7DD000
heap
page read and write
4A0000
heap
page read and write
97000
stack
page read and write
68F000
heap
page read and write
2C7F000
stack
page read and write
2338000
direct allocation
page read and write
B33B07E000
stack
page read and write
47D000
unkown
page read and write
1C172490000
heap
page read and write
7E0000
heap
page read and write
7E9000
heap
page read and write
1F0000
heap
page read and write
550000
heap
page read and write
5B1000
heap
page read and write
BD9000
heap
page read and write
2B7E000
stack
page read and write
1C173AE0000
heap
page read and write
26E3000
heap
page read and write
64A000
heap
page read and write
5B6000
heap
page read and write
5D5000
heap
page read and write
B75000
heap
page read and write
83E000
stack
page read and write
7D7000
heap
page read and write
B85000
heap
page read and write
67A000
heap
page read and write
70E000
stack
page read and write
B70000
heap
page read and write
5DE000
heap
page read and write
A90000
heap
page read and write
BB0000
heap
page read and write
AA0000
direct allocation
page execute and read and write
AAF000
stack
page read and write
5C0000
heap
page read and write
19B000
stack
page read and write
640000
heap
page read and write
7DB000
heap
page read and write
478000
unkown
page read and write
7E0000
heap
page read and write
5B6000
heap
page read and write
7FB000
heap
page read and write
2510000
heap
page read and write
5BA000
heap
page read and write
87F000
stack
page read and write
97E000
stack
page read and write
A7E000
stack
page read and write
1F0000
heap
page read and write
47D000
unkown
page read and write
5F4000
heap
page read and write
5DE000
heap
page read and write
7D6000
heap
page read and write
A90000
heap
page read and write
4DE000
stack
page read and write
4110000
trusted library allocation
page read and write
485000
unkown
page readonly
5B5000
heap
page read and write
268E000
stack
page read and write
7DE000
heap
page read and write
B10000
trusted library allocation
page read and write
7E0000
heap
page read and write
560000
heap
page read and write
B89000
heap
page read and write
668000
heap
page read and write
5AC000
heap
page read and write
570000
heap
page read and write
5FC000
heap
page read and write
2440000
direct allocation
page execute and read and write
B49000
heap
page read and write
67A000
heap
page read and write
67D000
heap
page read and write
7E4000
heap
page read and write
2600000
trusted library allocation
page read and write
5D8000
heap
page read and write
67D000
heap
page read and write
520000
heap
page read and write
7B7000
heap
page read and write
1C172495000
heap
page read and write
19B000
stack
page read and write
59E000
stack
page read and write
There are 254 hidden memdumps, click here to show them.