IOC Report
SETUP.EXE

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SETUP.EXE
"C:\Users\user\Desktop\SETUP.EXE"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
1BAABC50000
heap
page read and write
7FF6020D0000
unkown
page readonly
7FF6020E6000
unkown
page write copy
1BAABDA8000
heap
page read and write
7FF6020DD000
unkown
page read and write
1BAABDA0000
heap
page read and write
7FF6020D0000
unkown
page readonly
7FF6020E6000
unkown
page read and write
7FF6020D1000
unkown
page execute read
1BAABD30000
heap
page read and write
7FF6020D1000
unkown
page execute read
7FF6020DE000
unkown
page readonly
7FF6020DD000
unkown
page readonly
7FF6020E8000
unkown
page readonly
2C5DF8C000
stack
page read and write
7FF6020E8000
unkown
page readonly
There are 6 hidden memdumps, click here to show them.