IOC Report
I4haBqkYuV.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\I4haBqkYuV.exe
"C:\Users\user\Desktop\I4haBqkYuV.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6020B6000
unkown
page execute read
A54194C000
stack
page read and write
7FF601EBB000
unkown
page execute read
7FF601EBB000
unkown
page execute read
7FF601EA9000
unkown
page execute read
7FF602178000
unkown
page readonly
7FF601D90000
unkown
page readonly
7FF601EA9000
unkown
page execute read
7FF6020A0000
unkown
page execute read
7FF6020BD000
unkown
page readonly
7FF602147000
unkown
page write copy
2476EFD0000
heap
page read and write
2476F0CC000
heap
page read and write
7FF602151000
unkown
page readonly
A541CFE000
stack
page read and write
7FF602182000
unkown
page readonly
7FF602179000
unkown
page readonly
7FF602182000
unkown
page readonly
7FF602146000
unkown
page readonly
2476F0C6000
heap
page read and write
7FF602178000
unkown
page read and write
2476F0C0000
heap
page read and write
7FF6020B6000
unkown
page execute read
7FF6020BD000
unkown
page readonly
7FF601D90000
unkown
page readonly
7FF602147000
unkown
page read and write
2476EEF0000
heap
page read and write
7FF602151000
unkown
page readonly
A541EFF000
stack
page read and write
7FF601E93000
unkown
page execute read
7FF601E93000
unkown
page execute read
7FF602146000
unkown
page readonly
A541DFE000
stack
page read and write
7FF6020A0000
unkown
page execute read
There are 24 hidden memdumps, click here to show them.