IOC Report
task.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\task.exe
"C:\Users\user\Desktop\task.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://ocsp.sectigo.com0#
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6BA7D1000
unkown
page execute read
7FF6BA804000
unkown
page readonly
1F8A40A0000
heap
page read and write
1F8A4060000
heap
page read and write
1F8A4070000
heap
page read and write
1F8A40AB000
heap
page read and write
7FF6BA804000
unkown
page read and write
7E5ECFC000
stack
page read and write
7FF6BA826000
unkown
page readonly
7FF6BA814000
unkown
page read and write
7FF6BA7D0000
unkown
page readonly
7FF6BA814000
unkown
page write copy
There are 2 hidden memdumps, click here to show them.