Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
createdump.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\createdump.exe
|
"C:\Users\user\Desktop\createdump.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF68D621000
|
unkown
|
page execute read
|
||
20D49A02000
|
heap
|
page read and write
|
||
A89B27E000
|
stack
|
page read and write
|
||
7FF68D628000
|
unkown
|
page readonly
|
||
7FF68D62C000
|
unkown
|
page read and write
|
||
20D49C70000
|
heap
|
page read and write
|
||
7FF68D620000
|
unkown
|
page readonly
|
||
7FF68D621000
|
unkown
|
page execute read
|
||
7FF68D620000
|
unkown
|
page readonly
|
||
20D49940000
|
heap
|
page read and write
|
||
A89AF7D000
|
stack
|
page read and write
|
||
7FF68D62D000
|
unkown
|
page readonly
|
||
7FF68D62C000
|
unkown
|
page write copy
|
||
20D49930000
|
heap
|
page read and write
|
||
20D49960000
|
heap
|
page read and write
|
||
A89B0FF000
|
stack
|
page read and write
|
||
7FF68D62D000
|
unkown
|
page readonly
|
||
7FF68D628000
|
unkown
|
page readonly
|
||
20D499FB000
|
heap
|
page read and write
|
||
20D499F0000
|
heap
|
page read and write
|
There are 10 hidden memdumps, click here to show them.