IOC Report
grade.exe

loading gif

Files

File Path
Type
Category
Malicious
grade.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\grade.exe
"C:\Users\user\Desktop\grade.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF684123000
unkown
page readonly
51F194D000
stack
page read and write
1F53B540000
heap
page read and write
1F53B5BD000
heap
page read and write
7FF68410F000
unkown
page readonly
1F53B5B0000
heap
page read and write
7FF6840F0000
unkown
page readonly
7FF6840F1000
unkown
page execute read
7FF68411A000
unkown
page write copy
1F53B720000
heap
page read and write
7FF6840F0000
unkown
page readonly
7FF684123000
unkown
page readonly
1F53B560000
heap
page read and write
1F53B460000
heap
page read and write
7FF6840F1000
unkown
page execute read
7FF68411A000
unkown
page read and write
7FF68410F000
unkown
page readonly
There are 7 hidden memdumps, click here to show them.