IOC Report
jp.exe

loading gif

Files

File Path
Type
Category
Malicious
jp.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jp.exe
"C:\Users\user\Desktop\jp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
C3DBAFC000
stack
page read and write
7FF601380000
unkown
page readonly
2BFD1A40000
heap
page read and write
7FF601381000
unkown
page execute read
7FF6013A5000
unkown
page write copy
7FF601381000
unkown
page execute read
C3DBCFF000
stack
page read and write
2BFD1B00000
heap
page read and write
7FF601380000
unkown
page readonly
7FF601398000
unkown
page readonly
C3DBBFF000
stack
page read and write
2BFD1AA0000
heap
page read and write
2BFD1A20000
heap
page read and write
2BFD1B1A000
heap
page read and write
7FF6013A7000
unkown
page readonly
7FF6013A7000
unkown
page readonly
2BFD1B0C000
heap
page read and write
2BFD1940000
heap
page read and write
7FF6013A5000
unkown
page read and write
7FF601398000
unkown
page readonly
There are 10 hidden memdumps, click here to show them.