IOCReport

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\eUTopTYPuc.exe
'C:\Users\user\Desktop\eUTopTYPuc.exe'
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9D000
unkown
page read and write
clean
21A0000
heap private
page read and write
clean
89F000
stack
page read and write
clean
400000
unkown image
page readonly
clean
401000
unkown image
page execute read
clean
422000
unkown image
page read and write
clean
430000
unkown
page readonly
clean
19C000
stack
page read and write
clean
58E000
unkown
page read and write
clean
8DE000
unkown
page read and write
clean
54E000
unkown
page read and write
clean
32D000
unkown
page read and write
clean
422000
unkown image
page write copy
clean
331000
unkown
page read and write
clean
400000
unkown image
page readonly
clean
400000
unkown image
page readonly
clean
5AA000
heap default
page read and write
clean
5A0000
heap default
page read and write
clean
401000
unkown image
page execute read
clean
425000
unkown image
page readonly
clean
79F000
stack
page read and write
clean
22C0000
heap private
page read and write
clean
9DF000
stack
page read and write
clean
590000
unkown
page readonly
clean
1F0000
unkown
page read and write
clean
9E0000
unkown
page readonly
clean
425000
unkown image
page readonly
clean
500000
heap default
page read and write
clean
There are 18 hidden memdumps, click here to show them.