IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
2383BC20000
heap
page read and write
7FF712960000
unkown
page readonly
7FF712961000
unkown
page execute read
7FF712964000
unkown
page readonly
7FF712961000
unkown
page execute read
7FF712964000
unkown
page readonly
7FF712962000
unkown
page readonly
7FF712962000
unkown
page read and write
2383BD70000
heap
page read and write
7FF712960000
unkown
page readonly
5040DED000
stack
page read and write
There are 1 hidden memdumps, click here to show them.