IOC Report
stage2.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\stage2.exe
"C:\Users\user\Desktop\stage2.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
2AE0000
heap
page read and write
2AA0000
heap
page read and write
27FD000
stack
page read and write
781000
unkown
page execute read
780000
unkown
page readonly
784000
unkown
page readonly
786000
unkown
page readonly
781000
unkown
page execute read
2D7E000
stack
page read and write
2B6E000
stack
page read and write
2B2E000
stack
page read and write
2DBF000
stack
page read and write
786000
unkown
page readonly
780000
unkown
page readonly
2A3D000
stack
page read and write
2E40000
heap
page read and write
2B78000
heap
page read and write
784000
unkown
page readonly
2B70000
heap
page read and write
2AB0000
heap
page read and write
There are 10 hidden memdumps, click here to show them.