IOC Report
DocumentoSENAMHI20222103.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DocumentoSENAMHI20222103.exe
"C:\Users\user\Desktop\DocumentoSENAMHI20222103.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
68760000
trusted library allocation
page read and write
AFE000
heap
page read and write
68784000
trusted library allocation
page read and write
A91000
heap
page read and write
3F0000
trusted library allocation
page read and write
687C4000
trusted library allocation
page read and write
A24000
heap
page read and write
252A000
heap
page read and write
A8F000
heap
page read and write
6A434000
trusted library allocation
page read and write
AB3000
heap
page read and write
293000
unkown
page readonly
A3F000
heap
page read and write
6A434000
trusted library allocation
page read and write
A5E000
heap
page read and write
A71000
heap
page read and write
1FE2F435000
heap
page read and write
A91000
heap
page read and write
298B9AD0000
unkown
page readonly
A5F000
heap
page read and write
AFE000
heap
page read and write
AAE000
heap
page read and write
687E0000
trusted library allocation
page read and write
298B9800000
unkown
page read and write
68734000
trusted library allocation
page read and write
A90000
heap
page read and write
A3E000
heap
page read and write
1FE2F2B0000
heap
page read and write
687D8000
trusted library allocation
page read and write
292000
unkown
page read and write
B7226FA000
unkown
page read and write
F0000
heap
page read and write
A8D000
heap
page read and write
ABD000
heap
page read and write
A56000
heap
page read and write
A26000
heap
page read and write
161000
unkown
page readonly
A95000
heap
page read and write
AB5000
heap
page read and write
A4D000
heap
page read and write
68700000
trusted library allocation
page read and write
AA4000
heap
page read and write
298B97E0000
unkown
page readonly
AB9000
heap
page read and write
AC1000
heap
page read and write
6873C000
trusted library allocation
page read and write
A5F000
heap
page read and write
6FE9D000
trusted library allocation
page read and write
316E000
stack
page read and write
AFB000
heap
page read and write
150000
unkown
page readonly
6FE36000
trusted library allocation
page read and write
298B9720000
heap
page read and write
68784000
trusted library allocation
page read and write
810000
heap
page read and write
AC1000
heap
page read and write
252B000
heap
page read and write
E383B7F000
stack
page read and write
AB9000
heap
page read and write
AB9000
heap
page read and write
6A389000
trusted library allocation
page read and write
6A310000
trusted library allocation
page read and write
298B9813000
unkown
page read and write
68759000
trusted library allocation
page read and write
A84000
heap
page read and write
68708000
trusted library allocation
page read and write
68731000
trusted library allocation
page read and write
A4C000
heap
page read and write
6A369000
trusted library allocation
page read and write
6A432000
trusted library allocation
page read and write
AA6000
heap
page read and write
2530000
direct allocation
page execute and read and write
A39000
heap
page read and write
6FE1D000
trusted library allocation
page read and write
6A434000
trusted library allocation
page read and write
6A345000
trusted library allocation
page read and write
A93000
heap
page read and write
298B9E60000
unkown
page readonly
ABB000
heap
page read and write
AAF000
heap
page read and write
A95000
heap
page read and write
6A264000
trusted library allocation
page read and write
A41000
heap
page read and write
6A2A8000
trusted library allocation
page read and write
A32000
heap
page read and write
A6D000
heap
page read and write
3DC000
stack
page read and write
2529000
heap
page read and write
6FE97000
trusted library allocation
page read and write
1FE2FC02000
heap
page read and write
AB6000
heap
page read and write
AF6000
heap
page read and write
6A42E000
trusted library allocation
page read and write
A56000
heap
page read and write
6A36D000
trusted library allocation
page read and write
A24000
heap
page read and write
A85000
heap
page read and write
6A3F8000
trusted library allocation
page read and write
A32000
heap
page read and write
1FE2FBE0000
heap
page readonly
6A2CC000
trusted library allocation
page read and write
6A3F0000
trusted library allocation
page read and write
6A2FC000
trusted library allocation
page read and write
A00000
heap
page read and write
A8F000
heap
page read and write
AA6000
heap
page read and write
3671000
trusted library allocation
page read and write
A7A000
heap
page read and write
A95000
heap
page read and write
6A3D1000
trusted library allocation
page read and write
AC1000
heap
page read and write
A33000
heap
page read and write
A35000
heap
page read and write
6A2C4000
trusted library allocation
page read and write
68799000
trusted library allocation
page read and write
ABD000
heap
page read and write
68784000
trusted library allocation
page read and write
68739000
trusted library allocation
page read and write
E383A7B000
stack
page read and write
AA3000
heap
page read and write
A6D000
heap
page read and write
A2A000
heap
page read and write
6FE79000
trusted library allocation
page read and write
AC1000
heap
page read and write
A26000
heap
page read and write
687C9000
trusted library allocation
page read and write
6A2CC000
trusted library allocation
page read and write
A41000
heap
page read and write
6A2CC000
trusted library allocation
page read and write
6FE35000
trusted library allocation
page read and write
6A30C000
trusted library allocation
page read and write
AB6000
heap
page read and write
A82000
heap
page read and write
A3F000
heap
page read and write
31EE000
stack
page read and write
6A384000
trusted library allocation
page read and write
326E000
stack
page read and write
A32000
heap
page read and write
ABF000
heap
page read and write
6FDC0000
trusted library allocation
page read and write
A7A000
heap
page read and write
A95000
heap
page read and write
B72257F000
unkown
page read and write
68719000
trusted library allocation
page read and write
A95000
heap
page read and write
3670000
trusted library allocation
page read and write
6FEA1000
trusted library allocation
page read and write
1FE2FC15000
heap
page read and write
A67000
heap
page read and write
AD7000
heap
page read and write
B7225F9000
unkown
page read and write
A94000
heap
page read and write
A41000
heap
page read and write
6A3F0000
trusted library allocation
page read and write
AA6000
heap
page read and write
298B9829000
unkown
page read and write
AA0000
heap
page read and write
169000
unkown
page read and write
6FE1D000
trusted library allocation
page read and write
6A311000
trusted library allocation
page read and write
298B9902000
unkown
page read and write
A68000
heap
page read and write
6A30C000
trusted library allocation
page read and write
6A434000
trusted library allocation
page read and write
161000
unkown
page readonly
68710000
trusted library allocation
page read and write
AC6000
heap
page read and write
6FDF5000
trusted library allocation
page read and write
A95000
heap
page read and write
6A43C000
trusted library allocation
page read and write
6FDC1000
trusted library allocation
page read and write
A59000
heap
page read and write
A6A000
heap
page read and write
A2E000
heap
page read and write
6A355000
trusted library allocation
page read and write
6A432000
trusted library allocation
page read and write
A0A000
heap
page read and write
A95000
heap
page read and write
A62000
heap
page read and write
AFA000
heap
page read and write
E383AFF000
stack
page read and write
A8F000
heap
page read and write
1FE2F413000
heap
page read and write
6A328000
trusted library allocation
page read and write
6A3F5000
trusted library allocation
page read and write
AB9000
heap
page read and write
AAE000
heap
page read and write
298B9780000
heap
page read and write
151000
unkown
page execute read
298BB270000
unkown
page read and write
68784000
trusted library allocation
page read and write
6A388000
trusted library allocation
page read and write
2527000
heap
page read and write
A91000
heap
page read and write
A6D000
heap
page read and write
1FE2FC00000
heap
page read and write
6A401000
trusted library allocation
page read and write
6A384000
trusted library allocation
page read and write
3674000
trusted library allocation
page read and write
A99000
heap
page read and write
A51000
heap
page read and write
1FE2F400000
heap
page read and write
A3B000
heap
page read and write
A64000
heap
page read and write
6A3F8000
trusted library allocation
page read and write
AD9000
heap
page read and write
AA6000
heap
page read and write
AAE000
heap
page read and write
2520000
heap
page read and write
A25000
heap
page read and write
6A29C000
trusted library allocation
page read and write
A44000
heap
page read and write
E383E7D000
unkown
page read and write
6A3F8000
trusted library allocation
page read and write
A91000
heap
page read and write
AB9000
heap
page read and write
A45000
heap
page read and write
6A3F8000
trusted library allocation
page read and write
6A240000
trusted library allocation
page read and write
A95000
heap
page read and write
68701000
trusted library allocation
page read and write
A82000
heap
page read and write
6A43C000
trusted library allocation
page read and write
6FE8D000
trusted library allocation
page read and write
6A3AD000
trusted library allocation
page read and write
AB5000
heap
page read and write
ACF000
heap
page read and write
A8F000
heap
page read and write
A7A000
heap
page read and write
AA6000
heap
page read and write
252E000
heap
page read and write
6A2C8000
trusted library allocation
page read and write
AC1000
heap
page read and write
6FE14000
trusted library allocation
page read and write
6A2A8000
trusted library allocation
page read and write
A8F000
heap
page read and write
A53000
heap
page read and write
6FE1C000
trusted library allocation
page read and write
ABD000
heap
page read and write
A71000
heap
page read and write
6879C000
trusted library allocation
page read and write
298B9855000
unkown
page read and write
3672000
trusted library allocation
page read and write
A7E000
heap
page read and write
1FE2F502000
heap
page read and write
A6D000
heap
page read and write
6FE72000
trusted library allocation
page read and write
ABD000
heap
page read and write
3678000
trusted library allocation
page read and write
293000
unkown
page readonly
298B9790000
unkown
page write copy
AB9000
heap
page read and write
B72247F000
unkown
page read and write
6A2C0000
trusted library allocation
page read and write
AC1000
heap
page read and write
A7C000
heap
page read and write
A7A000
heap
page read and write
6FE81000
trusted library allocation
page read and write
AB3000
heap
page read and write
AD2000
heap
page read and write
AB5000
heap
page read and write
6FE3D000
trusted library allocation
page read and write
A8F000
heap
page read and write
6A300000
trusted library allocation
page read and write
A8B000
heap
page read and write
AB9000
heap
page read and write
A22000
heap
page read and write
6A42C000
trusted library allocation
page read and write
A56000
heap
page read and write
151000
unkown
page execute read
6A439000
trusted library allocation
page read and write
6FE3D000
trusted library allocation
page read and write
6FE8D000
trusted library allocation
page read and write
6FDC5000
trusted library allocation
page read and write
6A2B5000
trusted library allocation
page read and write
6FE14000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
6FE86000
trusted library allocation
page read and write
6A310000
trusted library allocation
page read and write
B7224FB000
unkown
page read and write
1FE2FBD0000
trusted library allocation
page read and write
A61000
heap
page read and write
2DD000
stack
page read and write
292000
unkown
page write copy
A38000
heap
page read and write
AAB000
heap
page read and write
A6A000
heap
page read and write
B72218B000
stack
page read and write
1FE2F441000
heap
page read and write
A5C000
heap
page read and write
68711000
trusted library allocation
page read and write
AC1000
heap
page read and write
AC1000
heap
page read and write
AB5000
heap
page read and write
298B9710000
heap
page read and write
A32000
heap
page read and write
16A000
unkown
page write copy
A22000
heap
page read and write
6A42C000
trusted library allocation
page read and write
68790000
trusted library allocation
page read and write
1FE2F429000
heap
page read and write
6FE14000
trusted library allocation
page read and write
E383D7E000
unkown
page read and write
6A3CD000
trusted library allocation
page read and write
A8F000
heap
page read and write
A38000
heap
page read and write
6A241000
trusted library allocation
page read and write
1FE2F310000
heap
page read and write
A32000
heap
page read and write
6FE8B000
trusted library allocation
page read and write
687C4000
trusted library allocation
page read and write
322E000
stack
page read and write
E383C7C000
stack
page read and write
6A3F8000
trusted library allocation
page read and write
1FE2F2C0000
heap
page read and write
6A2B9000
trusted library allocation
page read and write
A60000
heap
page read and write
6A3F8000
trusted library allocation
page read and write
6A430000
trusted library allocation
page read and write
A5A000
heap
page read and write
A25000
heap
page read and write
AB9000
heap
page read and write
A9B000
heap
page read and write
31AE000
stack
page read and write
AB5000
heap
page read and write
6A3F0000
trusted library allocation
page read and write
68795000
trusted library allocation
page read and write
298B9840000
unkown
page read and write
ABD000
heap
page read and write
A71000
heap
page read and write
3671000
trusted library allocation
page read and write
169000
unkown
page write copy
6A255000
trusted library allocation
page read and write
B72267F000
unkown
page read and write
A5F000
heap
page read and write
A86000
heap
page read and write
1FE2FBB0000
trusted library allocation
page read and write
6A43E000
trusted library allocation
page read and write
6FE99000
trusted library allocation
page read and write
6A35D000
trusted library allocation
page read and write
298B9802000
unkown
page read and write
298B985F000
unkown
page read and write
6A3F0000
trusted library allocation
page read and write
150000
unkown
page readonly
2527000
heap
page read and write
A32000
heap
page read and write
AFE000
heap
page read and write
A32000
heap
page read and write
A2F000
heap
page read and write
6A30C000
trusted library allocation
page read and write
68788000
trusted library allocation
page read and write
A87000
heap
page read and write
AAE000
heap
page read and write
252C000
heap
page read and write
1FE2F402000
heap
page read and write
A3B000
heap
page read and write
There are 346 hidden memdumps, click here to show them.