IOC Report
1PI1dOAtKY

loading gif

Files

File Path
Type
Category
Malicious
1PI1dOAtKY.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1PI1dOAtKY.exe
"C:\Users\user\Desktop\1PI1dOAtKY.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://http://Mozilla/5.0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
187C3980000
heap
page read and write
7FF746DE1000
unkown
page readonly
7FF2CFC000
stack
page read and write
7FF746D70000
unkown
page readonly
7FF746D71000
unkown
page execute read
7FF746DE1000
unkown
page readonly
187C3A77000
heap
page read and write
187C3970000
heap
page read and write
7FF746E0A000
unkown
page readonly
7FF2DFF000
stack
page read and write
7FF746D71000
unkown
page execute read
187C39EF000
heap
page read and write
7FF746E0A000
unkown
page readonly
187C39BC000
heap
page read and write
187C39FC000
heap
page read and write
7FF746D70000
unkown
page readonly
187C39FF000
heap
page read and write
187C3B80000
heap
page read and write
187C39DA000
heap
page read and write
187C3BA1000
heap
page read and write
187C39B0000
heap
page read and write
7FF746E03000
unkown
page write copy
187C3C3D000
heap
page read and write
187C39D0000
heap
page read and write
187C3A0C000
heap
page read and write
7FF2EFF000
stack
page read and write
187C3BA0000
heap
page read and write
187C3CA0000
heap
page read and write
7FF746E03000
unkown
page read and write
187C39EC000
heap
page read and write
187C3A76000
heap
page read and write
187C3A0E000
heap
page read and write
There are 22 hidden memdumps, click here to show them.