IOC Report
2yylp1mMbi.exe

loading gif

Files

File Path
Type
Category
Malicious
2yylp1mMbi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Esher
ASCII text, with very long lines (28724), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\autA19A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autA1D9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\gobioid
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2yylp1mMbi.exe
"C:\Users\user\Desktop\2yylp1mMbi.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\2yylp1mMbi.exe"
malicious

URLs

Name
IP
Malicious
https://sectigo.com/CPS0
unknown
http://mail.worlorderbillions.top
unknown
https://account.dyn.com/
unknown
http://worlorderbillions.top
unknown

Domains

Name
IP
Malicious
mail.worlorderbillions.top
unknown
malicious
worlorderbillions.top
185.244.151.84

IPs

IP
Domain
Country
Malicious
185.244.151.84
worlorderbillions.top
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
21E0000
direct allocation
page read and write
malicious
2FCE000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2F81000
trusted library allocation
page read and write
malicious
4090000
direct allocation
page read and write
3BA0000
heap
page read and write
638E000
stack
page read and write
6230000
trusted library allocation
page execute and read and write
4013000
direct allocation
page read and write
3EF0000
direct allocation
page read and write
1026000
trusted library allocation
page execute and read and write
4013000
direct allocation
page read and write
57EF000
stack
page read and write
4013000
direct allocation
page read and write
6257000
heap
page read and write
155F000
heap
page read and write
69CE000
stack
page read and write
DDD000
stack
page read and write
1030000
trusted library allocation
page read and write
7FC50000
trusted library allocation
page execute and read and write
2EDD000
stack
page read and write
6AF0000
heap
page read and write
8AF000
unkown
page read and write
5340000
heap
page execute and read and write
10A0000
trusted library allocation
page execute and read and write
4090000
direct allocation
page read and write
3EF0000
direct allocation
page read and write
6247000
trusted library allocation
page read and write
1520000
heap
page read and write
10B0000
trusted library allocation
page read and write
1497000
heap
page read and write
538E000
stack
page read and write
1453000
heap
page read and write
6262000
heap
page read and write
151D000
heap
page read and write
2230000
heap
page read and write
1497000
heap
page read and write
1452000
heap
page read and write
596C000
trusted library allocation
page read and write
8B3000
unkown
page write copy
1460000
heap
page read and write
2EE0000
trusted library allocation
page read and write
145A000
heap
page read and write
41B9000
direct allocation
page read and write
1010000
trusted library allocation
page read and write
21D0000
direct allocation
page execute and read and write
5986000
trusted library allocation
page read and write
422E000
direct allocation
page read and write
1110000
heap
page read and write
1470000
heap
page read and write
41B9000
direct allocation
page read and write
1050000
trusted library allocation
page read and write
3FEC000
trusted library allocation
page read and write
53F0000
heap
page read and write
1318000
trusted library allocation
page read and write
109E000
stack
page read and write
147F000
heap
page read and write
1460000
heap
page read and write
53E3000
heap
page read and write
145A000
heap
page read and write
41B9000
direct allocation
page read and write
1000000
trusted library allocation
page read and write
2EEE000
trusted library allocation
page read and write
422E000
direct allocation
page read and write
8B8000
unkown
page readonly
1497000
heap
page read and write
41BD000
direct allocation
page read and write
1022000
trusted library allocation
page read and write
100D000
trusted library allocation
page execute and read and write
155D000
heap
page read and write
41BD000
direct allocation
page read and write
AD9000
stack
page read and write
2DD0000
heap
page read and write
119A000
heap
page read and write
103B000
trusted library allocation
page execute and read and write
3FA9000
trusted library allocation
page read and write
41B9000
direct allocation
page read and write
8B8000
unkown
page readonly
1032000
trusted library allocation
page read and write
1498000
heap
page read and write
56EE000
stack
page read and write
14EA000
heap
page read and write
1182000
heap
page read and write
1480000
heap
page read and write
13F0000
trusted library allocation
page read and write
2F70000
heap
page execute and read and write
422E000
direct allocation
page read and write
147F000
heap
page read and write
1148000
heap
page read and write
41B9000
direct allocation
page read and write
13BE000
stack
page read and write
58EE000
stack
page read and write
422E000
direct allocation
page read and write
101D000
trusted library allocation
page execute and read and write
2EFA000
trusted library allocation
page read and write
146F000
heap
page read and write
D9D000
stack
page read and write
2FCC000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
658E000
stack
page read and write
2FF6000
trusted library allocation
page read and write
8A5000
unkown
page readonly
113A000
heap
page read and write
1497000
heap
page read and write
5930000
trusted library allocation
page read and write
FD0000
heap
page read and write
7F0000
unkown
page readonly
102A000
trusted library allocation
page execute and read and write
4013000
direct allocation
page read and write
8A5000
unkown
page readonly
41BD000
direct allocation
page read and write
1145000
heap
page read and write
10C0000
trusted library allocation
page read and write
55EC000
stack
page read and write
41BD000
direct allocation
page read and write
1118000
heap
page read and write
154E000
heap
page read and write
1497000
heap
page read and write
1497000
heap
page read and write
10D0000
heap
page read and write
FD5000
heap
page read and write
DF0000
heap
page read and write
5939000
trusted library allocation
page read and write
7F1000
unkown
page execute read
2DAE000
stack
page read and write
6240000
trusted library allocation
page read and write
5990000
trusted library allocation
page execute and read and write
2FD6000
trusted library allocation
page read and write
63D0000
trusted library allocation
page read and write
1520000
heap
page read and write
F60000
heap
page read and write
D50000
heap
page read and write
3EF0000
direct allocation
page read and write
112E000
heap
page read and write
BD8000
stack
page read and write
146F000
heap
page read and write
6D90000
heap
page read and write
21B0000
heap
page read and write
2FFA000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
41B9000
direct allocation
page read and write
4090000
direct allocation
page read and write
156D000
heap
page read and write
2F0D000
trusted library allocation
page read and write
CEA000
stack
page read and write
1520000
heap
page read and write
618E000
stack
page read and write
DE0000
heap
page read and write
1470000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
41BD000
direct allocation
page read and write
1020000
trusted library allocation
page read and write
41BD000
direct allocation
page read and write
4013000
direct allocation
page read and write
2F5C000
stack
page read and write
4090000
direct allocation
page read and write
1003000
trusted library allocation
page execute and read and write
2F06000
trusted library allocation
page read and write
53E0000
heap
page read and write
154E000
heap
page read and write
FF0000
trusted library allocation
page read and write
2EF2000
trusted library allocation
page read and write
13CE000
stack
page read and write
533E000
stack
page read and write
6190000
trusted library allocation
page read and write
8AF000
unkown
page write copy
13EC000
stack
page read and write
1497000
heap
page read and write
1428000
heap
page read and write
4090000
direct allocation
page read and write
7F0000
unkown
page readonly
1CEE000
stack
page read and write
87F000
unkown
page readonly
5960000
trusted library allocation
page read and write
11E7000
heap
page read and write
20EE000
stack
page read and write
13DB000
stack
page read and write
10E0000
heap
page read and write
87F000
unkown
page readonly
3EF0000
direct allocation
page read and write
2FE8000
trusted library allocation
page read and write
422E000
direct allocation
page read and write
11D0000
heap
page read and write
147E000
heap
page read and write
52FE000
stack
page read and write
1497000
heap
page read and write
6ACE000
stack
page read and write
2EEB000
trusted library allocation
page read and write
422E000
direct allocation
page read and write
E40000
heap
page read and write
3F81000
trusted library allocation
page read and write
1471000
heap
page read and write
1400000
heap
page read and write
1420000
heap
page read and write
43E000
system
page execute and read and write
4013000
direct allocation
page read and write
7F1000
unkown
page execute read
1035000
trusted library allocation
page execute and read and write
3BA4000
heap
page read and write
6250000
heap
page read and write
1497000
heap
page read and write
400000
system
page execute and read and write
1037000
trusted library allocation
page execute and read and write
2F01000
trusted library allocation
page read and write
622F000
stack
page read and write
1497000
heap
page read and write
3EF0000
direct allocation
page read and write
2EFE000
trusted library allocation
page read and write
2EE6000
trusted library allocation
page read and write
4090000
direct allocation
page read and write
13FC000
stack
page read and write
1497000
heap
page read and write
3EF0000
direct allocation
page read and write
There are 205 hidden memdumps, click here to show them.