IOC Report
7zG.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7zG.exe
"C:\Users\user\Desktop\7zG.exe"

Memdumps

Base Address
Regiontype
Protect
Malicious
18E7ABA0000
heap
page read and write
8F1000
unkown
page execute read
8F0000
unkown
page readonly
18E7AB73000
heap
page read and write
964000
unkown
page readonly
18E7A8E9000
heap
page read and write
990000
unkown
page readonly
18E7ABAB000
heap
page read and write
18E7A8E5000
heap
page read and write
1AA456A000
stack
page read and write
8F0000
unkown
page readonly
18E7A8E3000
heap
page read and write
18E7A840000
heap
page read and write
18E7A8FF000
heap
page read and write
18E7A8E3000
heap
page read and write
18E7A8FA000
heap
page read and write
18E7A8B0000
heap
page read and write
18E7DFE0000
trusted library allocation
page read and write
18E7A8DA000
heap
page read and write
18E7AB70000
heap
page read and write
8F1000
unkown
page execute read
18E7A870000
heap
page read and write
990000
unkown
page readonly
18E7ABA5000
heap
page read and write
1AA48FD000
stack
page read and write
18E7C350000
heap
page read and write
1AA49FE000
stack
page read and write
18E7A8DA000
heap
page read and write
18E7A850000
heap
page read and write
964000
unkown
page readonly
18E7A8B7000
heap
page read and write
18E7AAC0000
heap
page read and write
98C000
unkown
page read and write
98C000
unkown
page write copy
18E7A8D6000
heap
page read and write
There are 25 hidden memdumps, click here to show them.