IOC Report
autocad.exe

loading gif

Files

File Path
Type
Category
Malicious
autocad.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\autocad.exe
"C:\Users\user\Desktop\autocad.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
129B000
heap
page read and write
7FF785DF1000
unkown
page readonly
7FF785E0C000
unkown
page read and write
FB0000
heap
page read and write
7FF785DA0000
unkown
page readonly
2E50000
heap
page read and write
7FF785E00000
unkown
page read and write
2E53000
heap
page read and write
1240000
heap
page read and write
1245000
heap
page read and write
165F000
stack
page read and write
1200000
heap
page read and write
1296000
heap
page read and write
34AE000
stack
page read and write
7FF785E0F000
unkown
page readonly
7FF785DFB000
unkown
page write copy
7FF785DFB000
unkown
page read and write
2F5F000
stack
page read and write
7FF785DF1000
unkown
page readonly
7FF785E07000
unkown
page read and write
7FF785DA1000
unkown
page execute read
155E000
stack
page read and write
1290000
heap
page read and write
FA0000
heap
page read and write
FE0000
heap
page read and write
F50000
stack
page read and write
339D000
stack
page read and write
33A0000
heap
page read and write
F5D000
stack
page read and write
There are 19 hidden memdumps, click here to show them.