IOC Report
createdump.exe

loading gif

Files

File Path
Type
Category
Malicious
createdump.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\createdump.exe
"C:\Users\user\Desktop\createdump.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF68D621000
unkown
page execute read
20D49A02000
heap
page read and write
A89B27E000
stack
page read and write
7FF68D628000
unkown
page readonly
7FF68D62C000
unkown
page read and write
20D49C70000
heap
page read and write
7FF68D620000
unkown
page readonly
7FF68D621000
unkown
page execute read
7FF68D620000
unkown
page readonly
20D49940000
heap
page read and write
A89AF7D000
stack
page read and write
7FF68D62D000
unkown
page readonly
7FF68D62C000
unkown
page write copy
20D49930000
heap
page read and write
20D49960000
heap
page read and write
A89B0FF000
stack
page read and write
7FF68D62D000
unkown
page readonly
7FF68D628000
unkown
page readonly
20D499FB000
heap
page read and write
20D499F0000
heap
page read and write
There are 10 hidden memdumps, click here to show them.