IOC Report
powershell.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\powershell.exe
"C:\Users\user\Desktop\powershell.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6A0107000
unkown
page readonly
7FF6A00A0000
unkown
page readonly
28FDBFB0000
heap
page read and write
28FDBED0000
heap
page read and write
7FF6A00A1000
unkown
page execute read
28FDBFF0000
heap
page read and write
28FDBFF8000
heap
page read and write
AD2CAFF000
stack
page read and write
7FF6A00AC000
unkown
page readonly
7FF6A00B5000
unkown
page readonly
AD2C7DC000
stack
page read and write
7FF6A00B4000
unkown
page read and write
7FF6A00AD000
unkown
page read and write
7FF6A00B4000
unkown
page write copy
There are 4 hidden memdumps, click here to show them.