IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\example.txt
ISO-8859 text, with no line terminators
dropped
C:\Users\user\Music\vkiwdonilg\Builder.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
https://curl.se/docs/alt-svc.html
unknown
https://curl.se/docs/http-cookies.html
unknown
http://72.5.42.222:8568/api/newLog
unknown

IPs

IP
Domain
Country
Malicious
72.5.42.222
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2B9C5AE5000
heap
page read and write
2B9C5D10000
trusted library allocation
page read and write
2B9C5A11000
heap
page read and write
2B9C5942000
heap
page read and write
2B9C5AE5000
heap
page read and write
2B9CA73C000
heap
page read and write
7FF76BE5F000
unkown
page readonly
2B9C5BE3000
heap
page read and write
2B9C5B66000
heap
page read and write
2B9C5AE7000
heap
page read and write
7FF76BE65000
unkown
page readonly
2B9C5A11000
heap
page read and write
2B9C5AE5000
heap
page read and write
2B9C6810000
heap
page read and write
7FF76BC2C000
unkown
page execute read
2B9C5E11000
heap
page read and write
7FF76BC26000
unkown
page execute read
2B9C5890000
trusted library allocation
page read and write
2B9C5BD6000
heap
page read and write
2B9C619B000
heap
page read and write
7FF76BC11000
unkown
page execute read
2B9CBC62000
heap
page read and write
2B9C5942000
heap
page read and write
2B9C58E3000
heap
page read and write
2B9CA82D000
heap
page read and write
2B9C5942000
heap
page read and write
7FF76BE42000
unkown
page write copy
2B9C780D000
heap
page read and write
2B9C5A24000
heap
page read and write
2B9C5B11000
heap
page read and write
2B9C5BD6000
heap
page read and write
2B9C5943000
heap
page read and write
2B9CA985000
heap
page read and write
2B9C5890000
trusted library allocation
page read and write
7FF76BC10000
unkown
page readonly
2B9C5AE6000
heap
page read and write
2B9C5A65000
heap
page read and write
2B9C5A65000
heap
page read and write
7FF76BDEC000
unkown
page readonly
2B9C58CB000
heap
page read and write
2B9C58D6000
heap
page read and write
2B9C6955000
heap
page read and write
2B9C5890000
trusted library allocation
page read and write
2B9C7279000
heap
page read and write
2B9CB262000
heap
page read and write
2B9C5A11000
heap
page read and write
2B9C8959000
heap
page read and write
2B9C5890000
trusted library allocation
page read and write
2B9C64B2000
heap
page read and write
2B9C5890000
trusted library allocation
page read and write
2B9C5BE3000
heap
page read and write
2B9C5B66000
heap
page read and write
7FF76BDE4000
unkown
page execute read
2B9C5AE5000
heap
page read and write
2B9C5BE4000
heap
page read and write
2B9CA0B9000
heap
page read and write
2B9C5B64000
heap
page read and write
2B9C5B66000
heap
page read and write
2B9C5D10000
trusted library allocation
page read and write
7FF76BE49000
unkown
page readonly
2B9C8F6D000
heap
page read and write
2B9C5AE7000
heap
page read and write
2B9C5E10000
heap
page read and write
2B9C5A65000
heap
page read and write
2B9C5D10000
trusted library allocation
page read and write
2B9C820D000
heap
page read and write
2B9C5F7A000
heap
page read and write
2B9C58CC000
heap
page read and write
2B9C6879000
heap
page read and write
2B9C5D10000
trusted library allocation
page read and write
2B9CA78B000
heap
page read and write
2B9C5D10000
trusted library allocation
page read and write
2B9C5B64000
heap
page read and write
2B9C5B11000
heap
page read and write
2B9C5AE5000
heap
page read and write
2B9C996D000
heap
page read and write
2B9C5943000
heap
page read and write
7FF76BDE1000
unkown
page execute read
7FF76BC21000
unkown
page execute read
There are 69 hidden memdumps, click here to show them.