IOC Report
6Sy6PrInNl.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6Sy6PrInNl.exe
"C:\Users\user\Desktop\6Sy6PrInNl.exe" -install
malicious
C:\Users\user\Desktop\6Sy6PrInNl.exe
"C:\Users\user\Desktop\6Sy6PrInNl.exe" /install
malicious
C:\Users\user\Desktop\6Sy6PrInNl.exe
"C:\Users\user\Desktop\6Sy6PrInNl.exe" /load
malicious
C:\Users\user\Desktop\6Sy6PrInNl.exe
"C:\Users\user\Desktop\6Sy6PrInNl.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
26B05665000
heap
page read and write
2478BC13000
heap
page read and write
26F23E61000
heap
page read and write
66E4000
trusted library allocation
page read and write
26B053A0000
heap
page read and write
28850A47000
heap
page read and write
9E3000
unkown
page readonly
26B0565A000
heap
page read and write
2F6E000
heap
page read and write
23B17823000
heap
page read and write
9E2000
unkown
page read and write
A03000
unkown
page readonly
52D0000
trusted library section
page read and write
B43ADFD000
stack
page read and write
23B16FB9000
heap
page read and write
26B05629000
heap
page read and write
8BA000
stack
page read and write
5290000
trusted library allocation
page read and write
9B3000
unkown
page readonly
4DD0000
heap
page read and write
26B0567E000
heap
page read and write
4D4D000
stack
page read and write
6680000
trusted library allocation
page read and write
3377000
heap
page read and write
2AF7000
stack
page read and write
9E4000
unkown
page readonly
2478BC00000
heap
page read and write
26F23E89000
heap
page read and write
A03000
unkown
page readonly
9CD397F000
stack
page read and write
28850A2A000
heap
page read and write
23B16E68000
heap
page read and write
2B30000
trusted library allocation
page read and write
980000
unkown
page readonly
A28000
unkown
page readonly
23B177BB000
heap
page read and write
342F000
heap
page read and write
23B17754000
heap
page read and write
4FA5000
trusted library allocation
page read and write
2B89000
heap
page read and write
E07DE7B000
stack
page read and write
28850900000
trusted library allocation
page read and write
33B3000
heap
page read and write
BC92BFE000
stack
page read and write
9CD357D000
stack
page read and write
26B05642000
heap
page read and write
19CA1EE5000
heap
page read and write
700F000
stack
page read and write
A03000
unkown
page readonly
6651000
trusted library allocation
page read and write
6B9EE7E000
stack
page read and write
315A000
trusted library section
page read and write
26F23E13000
heap
page read and write
32B4000
trusted library section
page read and write
26B05657000
heap
page read and write
6EEA000
trusted library allocation
page read and write
2478BC02000
heap
page read and write
26B05702000
heap
page read and write
A26000
unkown
page readonly
23B17700000
heap
page read and write
19CA1C20000
heap
page read and write
3154000
trusted library section
page read and write
34AC000
stack
page read and write
750000
heap
page read and write
26F23E3C000
heap
page read and write
4D50000
trusted library allocation
page read and write
23B16E29000
heap
page read and write
23B16E43000
heap
page read and write
28850A57000
heap
page read and write
19CA1E6B000
heap
page read and write
340E000
heap
page read and write
28850800000
heap
page read and write
26B05641000
heap
page read and write
30F2000
stack
page read and write
19CA1E87000
heap
page read and write
23B16D60000
trusted library allocation
page read and write
2B93000
heap
page read and write
2478BA40000
heap
page read and write
950477E000
stack
page read and write
1E7EC829000
heap
page read and write
26B05655000
heap
page read and write
2478BC40000
heap
page read and write
33B2000
heap
page read and write
33C7000
heap
page read and write
6B9F27F000
stack
page read and write
6B81000
trusted library allocation
page read and write
26B05613000
heap
page read and write
6687000
trusted library allocation
page read and write
32FB000
heap
page read and write
3130000
trusted library section
page read and write
23B16C60000
heap
page read and write
23B16E43000
heap
page read and write
4D4E000
stack
page read and write
2FCC000
heap
page read and write
28850A47000
heap
page read and write
19CA1F13000
heap
page read and write
2C10000
heap
page read and write
26B05632000
heap
page read and write
A28000
unkown
page readonly
19CA2500000
heap
page read and write
19CA1E64000
heap
page read and write
66AE000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write