IOC Report
ts.exe_

loading gif

Files

File Path
Type
Category
Malicious
ts.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\06B049A8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Desktop\62366813.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ts.exe
C:\Users\user\Desktop\ts.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
228231C0000
direct allocation
page read and write
malicious
22823350000
direct allocation
page read and write
malicious
7FFA0AED1000
unkown
page execute read
malicious
7FF7A58FC000
unkown
page write copy
7FF7A58FB000
unkown
page read and write
7FF7A5880000
unkown
page readonly
7FF7A58E2000
unkown
page readonly
7FF7A58FB000
unkown
page write copy
22823180000
heap
page read and write
7FFA0AEE8000
unkown
page read and write
7FF7A591A000
unkown
page read and write
228231A0000
heap
page read and write
7FF7A5881000
unkown
page execute read
7FF7A5881000
unkown
page execute read
7FFA0AEE7000
unkown
page readonly
22823430000
heap
page read and write
7FFA0AED0000
unkown
page readonly
7FF7A5880000
unkown
page readonly
22823435000
heap
page read and write
7D6E77B000
stack
page read and write
7FFA0AEEA000
unkown
page readonly
22823040000
heap
page read and write
7FF7A58E2000
unkown
page readonly
7FF7A591D000
unkown
page readonly
22823258000
heap
page read and write
7FF7A591D000
unkown
page readonly
22823250000
heap
page read and write
There are 17 hidden memdumps, click here to show them.