IOC Report
win32_remote.exe

loading gif

Files

File Path
Type
Category
Malicious
win32_remote.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\win32_remote.exe
"C:\Users\user\Desktop\win32_remote.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
C79000
unkown
page read and write
29D0000
heap
page read and write
2C60000
heap
page read and write
BB0000
heap
page read and write
C79000
unkown
page write copy
2D6F000
stack
page read and write
CCE000
stack
page read and write
D05000
heap
page read and write
D60000
heap
page read and write
A5C000
stack
page read and write
BD0000
unkown
page readonly
102F000
stack
page read and write
D00000
heap
page read and write
C50000
unkown
page readonly
D6A000
heap
page read and write
2C4E000
stack
page read and write
C50000
unkown
page readonly
BD1000
unkown
page execute read
B5C000
stack
page read and write
2EAF000
stack
page read and write
D6E000
heap
page read and write
C7E000
unkown
page readonly
BD0000
unkown
page readonly
CE0000
heap
page read and write
2DAE000
stack
page read and write
D94000
heap
page read and write
BC0000
heap
page read and write
C7E000
unkown
page readonly
BD1000
unkown
page execute read
There are 19 hidden memdumps, click here to show them.