IOC Report
RKVaYznwyT

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RKVaYznwyT.exe
"C:\Users\user\Desktop\RKVaYznwyT.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\HOSTNAME.EXE
hostname

Memdumps

Base Address
Regiontype
Protect
Malicious
C000048000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
C000120000
direct allocation
page read and write
C00002B000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C000040000
direct allocation
page read and write
6F9000
unkown
page write copy
C0000D6000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
1B1000
direct allocation
page read and write
C000100000
direct allocation
page read and write
70F000
unkown
page read and write
C0000D8000
direct allocation
page read and write
C000000000
direct allocation
page read and write
A5D000
stack
page read and write
81A000
unkown
page write copy
C0000C4000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
1A4000
direct allocation
page read and write
C000124000
direct allocation
page read and write
C000052000
direct allocation
page read and write
561000
unkown
page readonly
C000116000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
E2F000
stack
page read and write
C00007C000
direct allocation
page read and write
C000012000
direct allocation
page read and write
D678F3C000
stack
page read and write
C00010A000
direct allocation
page read and write
C000039000
direct allocation
page read and write
1A9000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C000114000
direct allocation
page read and write
401000
unkown
page execute read
C0000EC000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
400000
unkown
page readonly
B30000
heap
page read and write
C0000D4000
direct allocation
page read and write
C0000B4000
direct allocation
page read and write
72C000
unkown
page read and write
C0000A4000
direct allocation
page read and write
2B580930000
heap
page read and write
B3C000
heap
page read and write
2B580870000
heap
page read and write
6F8000
unkown
page read and write
401000
unkown
page execute read
C000029000
direct allocation
page read and write
C000016000
direct allocation
page read and write
C000004000
direct allocation
page read and write
B20000
heap
page read and write
C0000CE000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
D678FBF000
stack
page read and write
1E2F000
stack
page read and write
C0000FE000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
102F000
stack
page read and write
216F000
stack
page read and write
777000
unkown
page readonly
C000056000
direct allocation
page read and write
1E0000
direct allocation
page read and write
C000132000
direct allocation
page read and write
729000
unkown
page read and write
C0000C8000
direct allocation
page read and write
D67927F000
stack
page read and write
C000042000
direct allocation
page read and write
A60000
direct allocation
page read and write
80000
heap
page read and write
C0000AE000
direct allocation
page read and write
6F6000
unkown
page write copy
C00012C000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
81B000
unkown
page readonly
704000
unkown
page write copy
81B000
unkown
page readonly
B25000
heap
page read and write
C0000BA000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
C000035000
direct allocation
page read and write
C00003B000
direct allocation
page read and write
C00002E000
direct allocation
page read and write
2B580939000
heap
page read and write
2B580890000
heap
page read and write
2B580790000
heap
page read and write
160000
heap
page read and write
2B580B40000
heap
page read and write
C000110000
direct allocation
page read and write
A90000
direct allocation
page read and write
72D000
unkown
page readonly
C00009A000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
B39000
heap
page read and write
A80000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
72D000
unkown
page readonly
2B580B45000
heap
page read and write
A68000
direct allocation
page read and write
C000014000
direct allocation
page read and write
1A0000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
6F1000
unkown
page write copy
C000080000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
C000070000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
1C2F000
stack
page read and write
C0000CA000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C000024000
direct allocation
page read and write
81A000
unkown
page write copy
C00008A000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
777000
unkown
page readonly
C000128000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
180000
heap
page read and write
702000
unkown
page read and write
400000
unkown
page readonly
C0000A6000
direct allocation
page read and write
6F1000
unkown
page read and write
1A2F000
stack
page read and write
C0000E2000
direct allocation
page read and write
707000
unkown
page read and write
561000
unkown
page readonly
There are 127 hidden memdumps, click here to show them.