IOC Report
k4r0jp3daA.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\k4r0jp3daA.exe
"C:\Users\user\Desktop\k4r0jp3daA.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
556000
unkown
page readonly
2DA0000
heap
page read and write
2C4F000
stack
page read and write
554000
unkown
page readonly
2A48000
heap
page read and write
275D000
stack
page read and write
271D000
stack
page read and write
27D0000
heap
page read and write
2A3E000
stack
page read and write
2790000
heap
page read and write
2A40000
heap
page read and write
2CCF000
stack
page read and write
551000
unkown
page execute read
554000
unkown
page readonly
551000
unkown
page execute read
2C8E000
stack
page read and write
550000
unkown
page readonly
27E0000
heap
page read and write
550000
unkown
page readonly
556000
unkown
page readonly
There are 10 hidden memdumps, click here to show them.