IOC Report
Implosions.exe

loading gif

Files

File Path
Type
Category
Malicious
Implosions.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Implosions.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Implosions.exe
"C:\Users\user\Desktop\Implosions.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/ip%appdata%
unknown
https://api.ipify.orgcookiesSaturnWalletWeb
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
792000
unkown
page readonly
malicious
5F10000
trusted library allocation
page execute and read and write
7BCE000
stack
page read and write
1210000
heap
page read and write
1110000
heap
page read and write
107D000
trusted library allocation
page execute and read and write
4F8D000
trusted library allocation
page read and write
106F000
stack
page read and write
5FB0000
trusted library allocation
page read and write
52F0000
heap
page read and write
10C0000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
10A2000
trusted library allocation
page read and write
3AD1000
trusted library allocation
page read and write
C80000
heap
page read and write
B57000
stack
page read and write
5BBD000
heap
page read and write
EB4000
heap
page read and write
80D0000
trusted library allocation
page read and write
A36F000
stack
page read and write
1215000
heap
page read and write
10A7000
trusted library allocation
page execute and read and write
EB7000
heap
page read and write
2ABE000
stack
page read and write
5000000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
1074000
trusted library allocation
page read and write
5D20000
heap
page read and write
5BA0000
heap
page read and write
6078000
heap
page read and write
5071000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
545D000
stack
page read and write
6050000
trusted library allocation
page execute and read and write
4F81000
trusted library allocation
page read and write
3AE1000
trusted library allocation
page read and write
5D10000
heap
page read and write
5D46000
heap
page read and write
F16000
heap
page read and write
E5E000
stack
page read and write
E90000
heap
page read and write
5BAA000
heap
page read and write
5080000
trusted library allocation
page read and write
A46F000
stack
page read and write
7A8E000
stack
page read and write
C85000
heap
page read and write
794E000
stack
page read and write
5358000
heap
page read and write
1070000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
1073000
trusted library allocation
page execute and read and write
606C000
heap
page read and write
108D000
trusted library allocation
page execute and read and write
4F6B000
trusted library allocation
page read and write
50B0000
heap
page read and write
E70000
heap
page read and write
E7E000
heap
page read and write
EA5000
heap
page read and write
508F000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
10AB000
trusted library allocation
page execute and read and write
2AEA000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
4C0D000
stack
page read and write
6040000
trusted library allocation
page read and write
55D0000
trusted library section
page readonly
780E000
stack
page read and write
10D0000
heap
page execute and read and write
7A4F000
stack
page read and write
1096000
trusted library allocation
page execute and read and write
534C000
stack
page read and write
5300000
heap
page read and write
4B0C000
stack
page read and write
1083000
trusted library allocation
page read and write
6030000
heap
page execute and read and write
5290000
trusted library allocation
page read and write
4FC5000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
5023000
heap
page execute and read and write
7B8E000
stack
page read and write
1200000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
E78000
heap
page read and write
5180000
trusted library allocation
page execute and read and write
4FB0000
trusted library allocation
page read and write
5B90000
heap
page read and write
5350000
heap
page read and write
5BC7000
heap
page read and write
4FFB000
trusted library allocation
page read and write
2AC0000
heap
page read and write
BC0000
heap
page read and write
5020000
heap
page execute and read and write
6060000
heap
page read and write
7CF2000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
EB2000
heap
page read and write
109A000
trusted library allocation
page execute and read and write
60A2000
heap
page read and write
790000
unkown
page readonly
4FD0000
trusted library allocation
page read and write
115E000
stack
page read and write
E60000
trusted library allocation
page read and write
C4E000
stack
page read and write
F4B000
heap
page read and write
4F60000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
1092000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page execute and read and write
C0E000
stack
page read and write
1080000
trusted library allocation
page read and write
7CCE000
stack
page read and write
10E0000
trusted library allocation
page execute and read and write
50B3000
heap
page read and write
5280000
heap
page read and write
10F0000
heap
page read and write
790E000
stack
page read and write
A58000
stack
page read and write
BB0000
heap
page read and write
There are 112 hidden memdumps, click here to show them.