IOC Report
avx_Cracked.exe

loading gif

Files

File Path
Type
Category
Malicious
avx_Cracked.exe
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
initial sample
malicious
C:\Users\user\AppData\Local\Temp\~DF2F626955114B1B31.TMP
Composite Document File V2 Document, Cannot read section info
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\avx_Cracked.exe
"C:\Users\user\Desktop\avx_Cracked.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4100000
direct allocation
page read and write
malicious
401000
unkown
page execute and read and write
malicious
2840000
direct allocation
page read and write
3130000
direct allocation
page read and write
4100000
trusted library allocation
page read and write
423F000
stack
page read and write
D0E000
heap
page read and write
420000
unkown
page readonly
2870000
trusted library allocation
page read and write
4001000
heap
page read and write
3D50000
trusted library allocation
page read and write
422000
unkown
page execute and read and write
2840000
direct allocation
page read and write
D5E000
heap
page read and write
2840000
direct allocation
page read and write
3DD6000
heap
page read and write
41F000
unkown
page read and write
3DD0000
heap
page read and write
2840000
direct allocation
page read and write
427E000
stack
page read and write
2840000
direct allocation
page read and write
D2C000
heap
page read and write
4000000
heap
page read and write
437F000
stack
page read and write
2840000
direct allocation
page read and write
3140000
heap
page read and write
C24000
heap
page read and write
C24000
heap
page read and write
27F9000
heap
page read and write
2840000
direct allocation
page read and write
2840000
direct allocation
page read and write
30AC000
stack
page read and write
2860000
heap
page read and write
4001000
heap
page read and write
9C000
stack
page read and write
2837000
stack
page read and write
2840000
direct allocation
page read and write
2840000
direct allocation
page read and write
2840000
direct allocation
page read and write
2840000
direct allocation
page read and write
2840000
direct allocation
page read and write
2840000
direct allocation
page read and write
3150000
trusted library allocation
page read and write
41F000
unkown
page write copy
D23000
heap
page read and write
27E0000
heap
page read and write
B80000
heap
page read and write
41D000
unkown
page execute and read and write
2840000
direct allocation
page read and write
D00000
heap
page read and write
27F0000
heap
page read and write
27C0000
heap
page read and write
420000
unkown
page readonly
D44000
heap
page read and write
B90000
heap
page read and write
679000
unkown
page execute and read and write
400000
unkown
page readonly
BDE000
stack
page read and write
D0A000
heap
page read and write
41D000
unkown
page execute and write copy
C24000
heap
page read and write
C24000
heap
page read and write
27F5000
heap
page read and write
66C000
unkown
page execute and read and write
2840000
direct allocation
page read and write
400000
unkown
page readonly
2840000
direct allocation
page read and write
3130000
direct allocation
page read and write
401000
unkown
page execute and write copy
19C000
stack
page read and write
8A0000
unkown
page execute read
4001000
heap
page read and write
C20000
heap
page read and write
2840000
heap
page read and write
413E000
stack
page read and write
EFF000
stack
page read and write
8A0000
unkown
page execute read
There are 67 hidden memdumps, click here to show them.