IOC Report
R.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\R.exe
"C:\Users\user\Desktop\R.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\bin\x64\R.exe""

URLs

Name
IP
Malicious
https://www.r-project.orgD
unknown
https://bugs.R-project.org
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1148BC02000
heap
page read and write
8A59FF000
stack
page read and write
8A5BFF000
stack
page read and write
7FF78E661000
unkown
page execute read
7FF78E694000
unkown
page readonly
8A57FA000
stack
page read and write
1148BD02000
heap
page read and write
7FF78E667000
unkown
page write copy
7FF78E667000
unkown
page write copy
1148BBA0000
heap
page read and write
1148BC13000
heap
page read and write
7FF78E691000
unkown
page write copy
7FF78E660000
unkown
page readonly
7FF78E668000
unkown
page readonly
1148BC00000
heap
page read and write
7FF78E694000
unkown
page readonly
7FF78E661000
unkown
page execute read
7FF78E668000
unkown
page readonly
1148BB80000
heap
page read and write
1148BC2B000
heap
page read and write
7FF78E660000
unkown
page readonly
7FF78E691000
unkown
page read and write
1148BBB0000
heap
page read and write
There are 13 hidden memdumps, click here to show them.