IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF67A812000
unkown
page read and write
7FF67A814000
unkown
page readonly
22888800000
heap
page read and write
D3F1FFD000
stack
page read and write
7FF67A810000
unkown
page readonly
22888630000
heap
page read and write
7FF67A812000
unkown
page readonly
7FF67A811000
unkown
page execute read
7FF67A810000
unkown
page readonly
7FF67A811000
unkown
page execute read
7FF67A814000
unkown
page readonly
There are 1 hidden memdumps, click here to show them.