IOC Report
6Sy6PrInNl.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6Sy6PrInNl.exe
"C:\Users\user\Desktop\6Sy6PrInNl.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
158AE38B000
heap
page read and write
34E9DFF000
stack
page read and write
158AD86A000
heap
page read and write
18C7C25D000
heap
page read and write
158AE807000
heap
page read and write
3340000
heap
page read and write
364B000
heap
page read and write
1BFF0256000
heap
page read and write
367F000
heap
page read and write
367E000
heap
page read and write
1BFF024D000
heap
page read and write
158AD8F5000
heap
page read and write
18C7C302000
heap
page read and write
158AE379000
heap
page read and write
29897F60000
heap
page read and write
158AD87A000
heap
page read and write
18C7BFD0000
heap
page read and write
3B64000
heap
page read and write
158AD730000
heap
page read and write
18C7C27C000
heap
page read and write
57DA000
trusted library section
page read and write
E72D27B000
stack
page read and write
158AE389000
heap
page read and write
18C7C27C000
heap
page read and write
1BFF0266000
heap
page read and write
1BFF027F000
heap
page read and write
158AE313000
heap
page read and write
158AD902000
heap
page read and write
59CF000
trusted library allocation
page read and write
158AD913000
heap
page read and write
120E000
unkown
page read and write
158AD8C0000
heap
page read and write
1233000
unkown
page readonly
112A000
stack
page read and write
7090000
trusted library allocation
page read and write
364B000
heap
page read and write
158AD854000
heap
page read and write
158AD813000
heap
page read and write
5820000
trusted library allocation
page read and write
3648000
heap
page read and write
18C7C27E000
heap
page read and write
59AA000
trusted library allocation
page read and write
158AE300000
heap
page read and write
18C7C130000
trusted library allocation
page read and write
158AE39C000
heap
page read and write
11D0000
unkown
page readonly
158AD916000
heap
page read and write
59CD000
trusted library allocation
page read and write
158AE39D000
heap
page read and write
3655000
heap
page read and write
158AE39C000
heap
page read and write
18C7C229000
heap
page read and write
13F88F8000
stack
page read and write
36D8000
heap
page read and write
57BE000
stack
page read and write
1234000
unkown
page readonly
158AE100000
remote allocation
page read and write
5947000
trusted library allocation
page read and write
57CA000
trusted library section
page read and write
13F877F000
stack
page read and write
158AE39E000
heap
page read and write
57EA000
trusted library section
page read and write
158AE399000
heap
page read and write
158AE820000
heap
page read and write
158AD87A000
heap
page read and write
29898079000
heap
page read and write
E72D5FE000
stack
page read and write
B52A7B000
stack
page read and write
158AE100000
remote allocation
page read and write
1233000
unkown
page write copy
B52B77000
stack
page read and write
594D000
trusted library allocation
page read and write
1159000
stack
page read and write
3651000
heap
page read and write
B52D7F000
stack
page read and write
1131000
stack
page read and write
1000000
heap
page read and write
158AE397000
heap
page read and write
18C7C266000
heap
page read and write
18C7C23C000
heap
page read and write
158AE3A3000
heap
page read and write
158AE371000
heap
page read and write
57C4000
trusted library section
page read and write
11D0000
unkown
page readonly
11D1000
unkown
page execute read
158AE38F000
heap
page read and write
13F81FB000
stack
page read and write
13F85FA000
stack
page read and write
158AD8E1000
heap
page read and write
158AD8B1000
heap
page read and write
158AE3AA000
heap
page read and write
57D4000
trusted library section
page read and write
E72D3FB000
stack
page read and write
1232000
unkown
page read and write
57E4000
trusted library section
page read and write
18C7C288000
heap
page read and write
158AE371000
heap
page read and write
709A000
trusted library allocation
page read and write
158AE397000
heap
page read and write
158AE380000
heap
page read and write
158AD800000
heap
page read and write
158AE397000
heap
page read and write
594E000
trusted library allocation
page read and write
29898051000
heap
page read and write
3BD0000
heap
page read and write
34E9E7D000
stack
page read and write
1BFF0270000
heap
page read and write
34E992A000
stack
page read and write
29898067000
heap
page read and write
3647000
heap
page read and write
158AE389000
heap
page read and write
1203000
unkown
page readonly
29898029000
heap
page read and write
158AE385000
heap
page read and write
3280000
trusted library allocation
page readonly