IOC Report
powershell.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\powershell.exe
"C:\Users\user\Desktop\powershell.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6D72A1000
unkown
page execute read
1BDCC9B8000
heap
page read and write
1BDCC980000
heap
page read and write
7FF6D72AC000
unkown
page read and write
1BDCC990000
heap
page read and write
7FF6D7306000
unkown
page readonly
7FF6D72B4000
unkown
page readonly
7FF6D72A0000
unkown
page readonly
1068DBC000
stack
page read and write
1BDCC9B0000
heap
page read and write
7FF6D72AB000
unkown
page readonly
7FF6D72B3000
unkown
page read and write
7FF6D72B3000
unkown
page write copy
There are 3 hidden memdumps, click here to show them.