IOC Report
KrMhCpCNtm.exe

loading gif

Files

File Path
Type
Category
Malicious
KrMhCpCNtm.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KrMhCpCNtm.exe
"C:\Users\user\Desktop\KrMhCpCNtm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://ocsp.thawte.com0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1EEFC8D0000
heap
page read and write
7FF667360000
unkown
page readonly
7FF667372000
unkown
page readonly
1EEFC7F0000
heap
page read and write
1EEFC959000
heap
page read and write
1EEFC95C000
heap
page read and write
1EEFC950000
heap
page read and write
22DB3FF000
stack
page read and write
7FF667384000
unkown
page write copy
7FF667361000
unkown
page execute read
7FF667372000
unkown
page readonly
7FF667385000
unkown
page readonly
1EEFE340000
heap
page read and write
22DAFDC000
stack
page read and write
7FF667385000
unkown
page readonly
1EEFC900000
heap
page read and write
22DB2FF000
stack
page read and write
7FF667360000
unkown
page readonly
7FF667361000
unkown
page execute read
7FF667384000
unkown
page read and write
There are 10 hidden memdumps, click here to show them.