IOC Report
3mF4sIPmhE.exe

loading gif

Files

File Path
Type
Category
Malicious
3mF4sIPmhE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3mF4sIPmhE.exe
"C:\Users\user\Desktop\3mF4sIPmhE.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\Desktop\3mF4sIPmhE.exe" "3mF4sIPmhE.exe" ENABLE
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
troia23.duckdns.org
18.229.140.246
malicious

IPs

IP
Domain
Country
Malicious
18.229.140.246
troia23.duckdns.org
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\bcb4c719d2ef301534574d61226c5663
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
3611000
trusted library allocation
page read and write
malicious
F72000
unkown
page readonly
malicious
5950000
unclassified section
page read and write
3275000
heap
page read and write
3299000
heap
page read and write
3251000
heap
page read and write
146F000
heap
page read and write
329F000
heap
page read and write
32F1000
heap
page read and write
32A2000
heap
page read and write
56D2000
heap
page read and write
32AA000
heap
page read and write
30EE000
stack
page read and write
328E000
heap
page read and write
329B000
heap
page read and write
194C000
stack
page read and write
326C000
heap
page read and write
56E0000
heap
page read and write
32A2000
heap
page read and write
3255000
heap
page read and write
1428000
trusted library allocation
page read and write
32D1000
heap
page read and write
32A3000
heap
page read and write
329F000
heap
page read and write
14D1000
heap
page read and write
326B000
heap
page read and write
57A0000
trusted library allocation
page read and write
32FE000
heap
page read and write
30FB000
stack
page read and write
326B000
heap
page read and write
32F9000
heap
page read and write
32A7000
heap
page read and write
58E9000
stack
page read and write
36C0000
heap
page read and write
32AB000
heap
page read and write
3245000
heap
page read and write
32FE000
heap
page read and write
32F0000
heap
page read and write
32B0000
heap
page read and write
32EF000
heap
page read and write
50E0000
heap
page read and write
7F940000
trusted library allocation
page execute and read and write
32CF000
heap
page read and write
56D5000
heap
page read and write
56DE000
heap
page read and write
1400000
heap
page read and write
56DE000
heap
page read and write
565F000
stack
page read and write
1960000
heap
page read and write
328E000
heap
page read and write
326B000
heap
page read and write
58AC000
stack
page read and write
3220000
heap
page read and write
353E000
stack
page read and write
3291000
heap
page read and write
32D1000
heap
page read and write
582C000
stack
page read and write
3257000
heap
page read and write
3255000
heap
page read and write
174A000
trusted library allocation
page execute and read and write
3668000
trusted library allocation
page read and write
329F000
heap
page read and write
329A000
heap
page read and write
177A000
trusted library allocation
page execute and read and write
56DA000
heap
page read and write
5730000
trusted library allocation
page execute and read and write
32AA000
heap
page read and write
1750000
trusted library allocation
page read and write
33FE000
unkown
page read and write
343D000
stack
page read and write
32B0000
heap
page read and write
324A000
heap
page read and write
3220000
heap
page read and write
32F8000
heap
page read and write
1767000
trusted library allocation
page execute and read and write
570E000
stack
page read and write
2DB5000
heap
page read and write
3238000
heap
page read and write
3235000
heap
page read and write
32AC000
heap
page read and write
324C000
heap
page read and write
329F000
heap
page read and write
4F90000
heap
page read and write
56DE000
heap
page read and write
3249000
heap
page read and write
1336000
stack
page read and write
326E000
heap
page read and write
5DB0000
heap
page read and write
328E000
heap
page read and write
32A6000
heap
page read and write
178B000
trusted library allocation
page execute and read and write
3259000
heap
page read and write
5E30000
heap
page read and write
3297000
heap
page read and write
32A3000
heap
page read and write
3236000
heap
page read and write
57E3000
heap
page read and write
3244000
heap
page read and write
2D0B000
stack
page read and write
32A6000
heap
page read and write
36C6000
heap
page read and write
35D0000
heap
page read and write
3259000
heap
page read and write
1966000
heap
page read and write
5D30000
trusted library allocation
page execute and read and write
3256000
heap
page read and write
329B000
heap
page read and write
328E000
heap
page read and write
32EF000
heap
page read and write
1420000
trusted library allocation
page read and write
3259000
heap
page read and write
1A6E000
stack
page read and write
56DE000
heap
page read and write
3246000
heap
page read and write
329D000
heap
page read and write
1B20000
heap
page execute and read and write
56E0000
heap
page read and write
1423000
trusted library allocation
page read and write
3673000
trusted library allocation
page read and write
329B000
heap
page read and write
F70000
unkown
page readonly
32A0000
heap
page read and write
5720000
trusted library allocation
page read and write
32EF000
heap
page read and write
32A2000
heap
page read and write
4611000
trusted library allocation
page read and write
3258000
heap
page read and write
1405000
heap
page read and write
3208000
heap
page read and write
3245000
heap
page read and write
3249000
heap
page read and write
57E0000
heap
page read and write
324A000
heap
page read and write
1787000
trusted library allocation
page execute and read and write
32FE000
heap
page read and write
3251000
heap
page read and write
14CD000
heap
page read and write
123A000
stack
page read and write
32A5000
heap
page read and write
3248000
heap
page read and write
3254000
heap
page read and write
3644000
trusted library allocation
page read and write
3295000
heap
page read and write
1370000
heap
page read and write
1742000
trusted library allocation
page execute and read and write
17A0000
heap
page read and write
32CF000
heap
page read and write
3650000
heap
page read and write
3238000
heap
page read and write
329A000
heap
page read and write
56D2000
heap
page read and write
3220000
heap
page read and write
2DB0000
heap
page read and write
3299000
heap
page read and write
3214000
heap
page read and write
57B0000
trusted library allocation
page read and write
3246000
heap
page read and write
3295000
heap
page read and write
2DFD000
unkown
page read and write
3291000
heap
page read and write
32AA000
heap
page read and write
56B0000
heap
page read and write
3259000
heap
page read and write
32F5000
heap
page read and write
3259000
heap
page read and write
326D000
heap
page read and write
3293000
heap
page read and write
143A000
heap
page read and write
3200000
heap
page read and write
1A70000
heap
page read and write
3275000
heap
page read and write
32FB000
heap
page read and write
1430000
heap
page read and write
14DB000
heap
page read and write
3275000
heap
page read and write
56DE000
heap
page read and write
1752000
trusted library allocation
page execute and read and write
30FE000
stack
page read and write
3245000
heap
page read and write
32F7000
heap
page read and write
2D90000
heap
page read and write
32F4000
heap
page read and write
1782000
trusted library allocation
page read and write
329F000
heap
page read and write
32FE000
heap
page read and write
3293000
heap
page read and write
57C0000
trusted library allocation
page execute and read and write
32D1000
heap
page read and write
3259000
heap
page read and write
3256000
heap
page read and write
3258000
heap
page read and write
18F0000
heap
page read and write
368D000
trusted library allocation
page read and write
56D1000
heap
page read and write
56DE000
heap
page read and write
32AA000
heap
page read and write
1380000
heap
page read and write
3258000
heap
page read and write
30F4000
stack
page read and write
143E000
heap
page read and write
2D70000
heap
page read and write
2D80000
heap
page read and write
1780000
trusted library allocation
page read and write
329B000
heap
page read and write
1772000
trusted library allocation
page execute and read and write
18EE000
stack
page read and write
3295000
heap
page read and write
3245000
heap
page read and write
32A1000
heap
page read and write
56E5000
heap
page read and write
175A000
trusted library allocation
page execute and read and write
32A2000
heap
page read and write
56D9000
heap
page read and write
32EF000
heap
page read and write
3298000
heap
page read and write
328E000
heap
page read and write
3211000
heap
page read and write
586B000
stack
page read and write
176A000
trusted library allocation
page execute and read and write
329A000
heap
page read and write
324A000
heap
page read and write
1A88000
trusted library allocation
page read and write
3275000
heap
page read and write
5DC0000
heap
page read and write
324C000
heap
page read and write
555E000
stack
page read and write
There are 216 hidden memdumps, click here to show them.