IOC Report
z1RFT798549034687-HJW90789-VXT9KGUINUII.exe

loading gif

Files

File Path
Type
Category
Malicious
z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\spiketop
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
"C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
malicious

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://ocsp.sectigo.com0
unknown
http://cp8nl.hyperhost.ua
unknown

Domains

Name
IP
Malicious
cp8nl.hyperhost.ua
185.174.175.187
malicious
241.42.69.40.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.174.175.187
cp8nl.hyperhost.ua
Ukraine
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2C59000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
1690000
direct allocation
page read and write
malicious
2C2E000
trusted library allocation
page read and write
malicious
2BE1000
trusted library allocation
page read and write
malicious
5D80000
heap
page read and write
47E0000
direct allocation
page read and write
516C000
stack
page read and write
4909000
direct allocation
page read and write
2B7E000
trusted library allocation
page read and write
4763000
direct allocation
page read and write
2C2C000
trusted library allocation
page read and write
3F32000
heap
page read and write
47E0000
direct allocation
page read and write
2B7A000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
9AA000
heap
page read and write
55B0000
trusted library allocation
page read and write
100D000
trusted library allocation
page execute and read and write
2B72000
trusted library allocation
page read and write
8AF000
stack
page read and write
497E000
direct allocation
page read and write
6920000
heap
page read and write
3B1E000
heap
page read and write
47E0000
direct allocation
page read and write
2B92000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
490D000
direct allocation
page read and write
2BA3000
heap
page read and write
15E0000
heap
page read and write
1016000
trusted library allocation
page execute and read and write
490D000
direct allocation
page read and write
2FC0000
heap
page read and write
5C7E000
stack
page read and write
1DE000
stack
page read and write
552F000
stack
page read and write
159F000
stack
page read and write
556E000
stack
page read and write
482000
unkown
page readonly
29E0000
trusted library allocation
page execute and read and write
1020000
trusted library allocation
page read and write
130000
heap
page read and write
3FFB000
heap
page read and write
4640000
direct allocation
page read and write
5030000
heap
page read and write
5FF7000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
4763000
direct allocation
page read and write
9A000
stack
page read and write
61AD000
stack
page read and write
401000
unkown
page execute read
497E000
direct allocation
page read and write
E68000
heap
page read and write
52EC000
stack
page read and write
29F0000
trusted library allocation
page read and write
491000
unkown
page write copy
490000
unkown
page write copy
CE5000
heap
page read and write
497E000
direct allocation
page read and write
2B81000
trusted library allocation
page read and write
490D000
direct allocation
page read and write
55CC000
trusted library allocation
page read and write
64EE000
stack
page read and write
3FFB000
heap
page read and write
43E000
system
page execute and read and write
2C55000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
E97000
heap
page read and write
1E0000
heap
page read and write
2B6E000
trusted library allocation
page read and write
1012000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
497E000
direct allocation
page read and write
4078000
heap
page execute and read and write
400000
unkown
page readonly
1025000
trusted library allocation
page execute and read and write
3C48000
trusted library allocation
page read and write
2B4C000
stack
page read and write
19E000
stack
page read and write
4909000
direct allocation
page read and write
108E000
stack
page read and write
5EB6000
trusted library allocation
page read and write
490D000
direct allocation
page read and write
4AB000
unkown
page readonly
4640000
direct allocation
page read and write
3DD0000
heap
page read and write
4909000
direct allocation
page read and write
2FC5000
heap
page read and write
5FAF000
stack
page read and write
E65000
heap
page read and write
1680000
heap
page read and write
119F000
stack
page read and write
3F0E000
heap
page read and write
2BC0000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
E38000
heap
page read and write
5EA0000
trusted library allocation
page execute and read and write
2BD0000
heap
page execute and read and write
400A000
heap
page read and write
F1D000
heap
page read and write
3FFB000
heap
page read and write
100000
heap
page read and write
1E4000
heap
page read and write
F30000
heap
page read and write
5DC8000
heap
page read and write
C00000
heap
page read and write
44D8000
heap
page read and write
5DD7000
heap
page read and write
3E75000
heap
page read and write
3C09000
trusted library allocation
page read and write
4909000
direct allocation
page read and write
4763000
direct allocation
page read and write
101A000
trusted library allocation
page execute and read and write
150000
heap
page read and write
1090000
heap
page read and write
497E000
direct allocation
page read and write
490000
unkown
page read and write
EBF000
heap
page read and write
4AB000
unkown
page readonly
47E0000
direct allocation
page read and write
3ECC000
heap
page read and write
400000
system
page execute and read and write
3B99000
heap
page read and write
FFD000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
FF4000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
3FD0000
heap
page read and write
65EF000
stack
page read and write
4909000
direct allocation
page read and write
4640000
direct allocation
page read and write
47E0000
direct allocation
page read and write
4640000
direct allocation
page read and write
490D000
direct allocation
page read and write
FF0000
trusted library allocation
page read and write
3F57000
heap
page read and write
490D000
direct allocation
page read and write
482000
unkown
page readonly
3BE1000
trusted library allocation
page read and write
15DE000
stack
page read and write
E30000
heap
page read and write
3EB9000
heap
page read and write
3CD0000
heap
page read and write
4640000
direct allocation
page read and write
E5A000
heap
page read and write
1027000
trusted library allocation
page execute and read and write
4CDD000
stack
page read and write
2B0F000
stack
page read and write
4640000
direct allocation
page read and write
FF3000
trusted library allocation
page execute and read and write
3EEC000
heap
page read and write
2B66000
trusted library allocation
page read and write
47E0000
direct allocation
page read and write
2B6B000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
51E0000
heap
page execute and read and write
2E8D000
heap
page read and write
2BA0000
heap
page read and write
2C47000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
CE0000
heap
page read and write
400000
unkown
page readonly
8B4000
stack
page read and write
6770000
trusted library allocation
page execute and read and write
1022000
trusted library allocation
page read and write
542E000
stack
page read and write
3EBF000
heap
page read and write
89A000
stack
page read and write
55C0000
trusted library allocation
page read and write
F90000
heap
page read and write
102B000
trusted library allocation
page execute and read and write
4A7000
unkown
page read and write
2C36000
trusted library allocation
page read and write
370E000
stack
page read and write
401000
unkown
page execute read
55B9000
trusted library allocation
page read and write
4763000
direct allocation
page read and write
2BB0000
trusted library allocation
page read and write
3EA6000
heap
page read and write
5FEE000
stack
page read and write
2C61000
trusted library allocation
page read and write
43DB000
heap
page read and write
3B0F000
stack
page read and write
4909000
direct allocation
page read and write
5EC0000
trusted library allocation
page execute and read and write
2B60000
trusted library allocation
page read and write
F0C000
heap
page read and write
53EF000
stack
page read and write
2A00000
heap
page read and write
16D0000
heap
page read and write
110000
heap
page read and write
6730000
trusted library allocation
page read and write
999000
stack
page read and write
FC0000
heap
page read and write
5FF0000
trusted library allocation
page read and write
5D92000
heap
page read and write
51CE000
stack
page read and write
7FDE0000
trusted library allocation
page execute and read and write
497E000
direct allocation
page read and write
4763000
direct allocation
page read and write
155000
heap
page read and write
492000
unkown
page read and write
9AE000
heap
page read and write
3B9B000
heap
page read and write
2B86000
trusted library allocation
page read and write
5DA1000
heap
page read and write
5D9F000
heap
page read and write
163E000
stack
page read and write
3EC6000
heap
page read and write
407D000
heap
page read and write
4763000
direct allocation
page read and write
9DA000
heap
page read and write
400B000
heap
page read and write
5F0E000
stack
page read and write
6760000
heap
page read and write
There are 206 hidden memdumps, click here to show them.