IOC Report
Launcher.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Launcher.exe
"C:\Users\user\Desktop\Launcher.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
kaminiasbbefow.shop
malicious
https://kaminiasbbefow.shop/pi
unknown
https://kaminiasbbefow.shop/C
unknown
https://kaminiasbbefow.shop/)
unknown
https://kaminiasbbefow.shop/re1j
unknown
https://kaminiasbbefow.shop/api
188.114.96.3
https://kaminiasbbefow.shop/
unknown

Domains

Name
IP
Malicious
kaminiasbbefow.shop
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
kaminiasbbefow.shop
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1650000
heap
page read and write
500000
unkown
page readonly
1470000
direct allocation
page execute and read and write
2E3E000
stack
page read and write
D80000
heap
page read and write
DB0000
heap
page read and write
A46000
heap
page read and write
14C0000
heap
page read and write
FE0000
heap
page read and write
501000
unkown
page execute read
15CF000
stack
page read and write
25CF000
stack
page read and write
A96000
heap
page read and write
8FA000
stack
page read and write
A20000
heap
page read and write
A8E000
heap
page read and write
520000
unkown
page readonly
940000
heap
page read and write
2F3E000
trusted library allocation
page read and write
52B000
unkown
page read and write
A62000
heap
page read and write
A92000
heap
page read and write
A59000
heap
page read and write
260D000
stack
page read and write
500000
unkown
page readonly
579000
unkown
page readonly
33AF000
stack
page read and write
2E59000
trusted library allocation
page read and write
165B000
heap
page read and write
2EDD000
trusted library allocation
page read and write
A1E000
stack
page read and write
270D000
stack
page read and write
ADD000
heap
page read and write
2E54000
trusted library allocation
page read and write
2CFF000
stack
page read and write
A76000
heap
page read and write
2E52000
trusted library allocation
page read and write
501000
unkown
page execute read
2F53000
trusted library allocation
page read and write
578000
unkown
page write copy
2F09000
trusted library allocation
page read and write
2E9E000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
520000
unkown
page readonly
14BE000
stack
page read and write
3430000
heap
page read and write
950000
heap
page read and write
24CF000
stack
page read and write
3150000
heap
page read and write
12FC000
stack
page read and write
2F39000
trusted library allocation
page read and write
450000
remote allocation
page execute and read and write
F7C000
stack
page read and write
284E000
stack
page read and write
A40000
heap
page read and write
A2A000
heap
page read and write
995000
heap
page read and write
AE5000
heap
page read and write
AE8000
heap
page read and write
52B000
unkown
page write copy
1420000
heap
page read and write
9DE000
stack
page read and write
2F50000
trusted library allocation
page read and write
2D3E000
stack
page read and write
ADF000
heap
page read and write
2E56000
trusted library allocation
page read and write
2BFE000
stack
page read and write
274D000
stack
page read and write
141E000
stack
page read and write
1662000
heap
page read and write
2F0C000
trusted library allocation
page read and write
30EF000
stack
page read and write
5DB000
stack
page read and write
FD0000
heap
page read and write
990000
heap
page read and write
579000
unkown
page readonly
32AE000
stack
page read and write
400000
remote allocation
page execute and read and write
There are 69 hidden memdumps, click here to show them.