IOC Report
lkOawAWJRO.exe

loading gif

Files

File Path
Type
Category
Malicious
lkOawAWJRO.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FuLvJKHyBveQGVRTqGwm.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lkOawAWJRO.exe
"C:\Users\user\Desktop\lkOawAWJRO.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
analforeverlovyu.top
malicious
+sevtvr17pt.top
malicious
sevtvr17pt.top
malicious
http://sevtvr17pt.top/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://keruzam.com/update.php?compName
unknown
http://sevtvr17pt.top/v1/upload.php
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://sevtvr17pt.top:80/v1/upload.php
unknown
https://keruzam.com/update.php?compName=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sevtvr17pt.top
80.66.81.78
malicious

IPs

IP
Domain
Country
Malicious
80.66.81.78
sevtvr17pt.top
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4106000
heap
page read and write
malicious
6A03A000
direct allocation
page read and write
18A3000
heap
page read and write
6A043000
direct allocation
page read and write
6B1000
unkown
page read and write
6C1000
unkown
page execute read
74C000
unkown
page readonly
1248000
heap
page read and write
1110000
heap
page read and write
18C8000
heap
page read and write
75F000
unkown
page read and write
1883000
heap
page read and write
6C0000
unkown
page readonly
E73000
heap
page read and write
148D000
stack
page read and write
D89B000
heap
page read and write
E15000
heap
page read and write
6C0000
unkown
page readonly
E32000
heap
page read and write
3CAE000
stack
page read and write
187E000
heap
page read and write
9FF000
stack
page read and write
C28000
stack
page read and write
6A2F9000
direct allocation
page read and write
9BE000
stack
page read and write
E74000
heap
page read and write
E0A000
heap
page read and write
6CE000
unkown
page read and write
E18000
heap
page read and write
69B000
unkown
page write copy
6A05B000
direct allocation
page read and write
D20000
heap
page read and write
18B0000
heap
page read and write
6A8000
unkown
page read and write
6CE000
unkown
page write copy
DF4000
heap
page read and write
133E000
stack
page read and write
6A0000
heap
page read and write
D831000
heap
page read and write
1210000
heap
page read and write
D85B000
heap
page read and write
6D1000
unkown
page readonly
6B4000
unkown
page read and write
6D1000
unkown
page readonly
6AD000
unkown
page write copy
CC0000
heap
page read and write
E6B000
heap
page read and write
8E0000
heap
page read and write
18A3000
heap
page read and write
113E000
stack
page read and write
6A375000
direct allocation
page read and write
1873000
heap
page read and write
140000
unkown
page readonly
6C211000
unkown
page execute read
69CC0000
direct allocation
page read and write
B10000
heap
page read and write
E0A000
heap
page read and write
1240000
heap
page read and write
18A4000
heap
page read and write
D8E4000
heap
page read and write
18C6000
heap
page read and write
BDC000
stack
page read and write
DAC000
stack
page read and write
18A3000
heap
page read and write
DC0000
heap
page read and write
6D1000
unkown
page readonly
13F0000
heap
page read and write
187E000
heap
page read and write
69CF3000
direct allocation
page read and write
E3E000
heap
page read and write
D8DB000
heap
page read and write
18BB000
heap
page read and write
DCE000
heap
page read and write
6A056000
direct allocation
page read and write
E7E000
heap
page read and write
14B0000
remote allocation
page read and write
18B5000
heap
page read and write
E28000
heap
page read and write
DED000
heap
page read and write
14B0000
remote allocation
page read and write
168E000
stack
page read and write
6C339000
unkown
page read and write
6A040000
direct allocation
page read and write
3EEE000
stack
page read and write
40EF000
stack
page read and write
141000
unkown
page execute read
18B7000
heap
page read and write
65C000
stack
page read and write
1F55000
heap
page read and write
186F000
heap
page read and write
18C0000
heap
page read and write
18C3000
heap
page read and write
188F000
stack
page read and write
6B2000
unkown
page write copy
6CA000
unkown
page readonly
6C1000
unkown
page execute read
443F000
stack
page read and write
1873000
heap
page read and write
6CE000
unkown
page read and write
6CA000
unkown
page readonly
187D000
heap
page read and write
69C000
unkown
page write copy
CC5000
heap
page read and write
18AA000
heap
page read and write
37DD000
stack
page read and write
E6D000
heap
page read and write
59A000
stack
page read and write
11EE000
heap
page read and write
75F000
unkown
page write copy
6CA000
unkown
page readonly
1220000
heap
page read and write
E0D000
heap
page read and write
D764000
heap
page read and write
18A9000
heap
page read and write
E6B000
heap
page read and write
1900000
heap
page read and write
C57000
stack
page read and write
6A372000
direct allocation
page read and write
6CE000
unkown
page write copy
E18000
heap
page read and write
11E0000
heap
page read and write
6B6000
unkown
page write copy
3800000
heap
page read and write
E26000
heap
page read and write
1347000
heap
page read and write
E0A000
heap
page read and write
55D000
stack
page read and write
447B000
stack
page read and write
14C6000
heap
page read and write
A6B000
heap
page read and write
1A90000
heap
page read and write
E30000
heap
page read and write
E46000
heap
page read and write
E28000
heap
page read and write
18D3000
heap
page read and write
6C1000
unkown
page execute read
D84A000
heap
page read and write
C42000
stack
page read and write
D830000
heap
page read and write
D555000
heap
page read and write
807000
heap
page read and write
DA0000
heap
page read and write
140000
unkown
page readonly
6D1000
unkown
page readonly
6D1000
unkown
page readonly
A9C000
stack
page read and write
18AA000
heap
page read and write
69DF5000
direct allocation
page read and write
DF4000
heap
page read and write
185E000
heap
page read and write
6B0000
heap
page read and write
6C1000
unkown
page execute read
11EA000
heap
page read and write
18AE000
heap
page read and write
E3B000
heap
page read and write
DED000
heap
page read and write
E18000
heap
page read and write
3EAF000
stack
page read and write
D831000
heap
page read and write
18BA000
heap
page read and write
D849000
heap
page read and write
164F000
stack
page read and write
1810000
heap
page read and write
6CA000
unkown
page readonly
14C0000
heap
page read and write
6D1000
unkown
page readonly
D89B000
heap
page read and write
DF4000
heap
page read and write
E46000
heap
page read and write
1876000
heap
page read and write
69E34000
direct allocation
page read and write
69CC1000
direct allocation
page execute read
186C000
heap
page read and write
E46000
heap
page read and write
18A4000
heap
page read and write
D8E4000
heap
page read and write
DC45000
heap
page read and write
E16000
heap
page read and write
6CA000
unkown
page readonly
6CE000
unkown
page write copy
380A000
heap
page read and write
69B000
unkown
page read and write
FFD000
stack
page read and write
18D3000
heap
page read and write
6B8000
unkown
page read and write
144E000
stack
page read and write
A60000
heap
page read and write
D8A3000
heap
page read and write
191D000
heap
page read and write
3A6D000
stack
page read and write
97F000
unkown
page read and write
18CE000
heap
page read and write
800000
heap
page read and write
6C0000
unkown
page readonly
1879000
heap
page read and write
5CD000
unkown
page write copy
3C6D000
stack
page read and write
467C000
stack
page read and write
74C000
unkown
page readonly
6C2ED000
unkown
page read and write
5CC000
unkown
page write copy
B00000
heap
page read and write
6C0000
unkown
page readonly
141000
unkown
page execute read
93E000
unkown
page read and write
6C1000
unkown
page execute read
DAB0000
heap
page read and write
6AE000
unkown
page read and write
10FF000
stack
page read and write
18A3000
heap
page read and write
6A04A000
direct allocation
page read and write
6A048000
direct allocation
page read and write
A5B000
stack
page read and write
5D2000
unkown
page read and write
7F0000
heap
page read and write
CB0000
heap
page read and write
1873000
heap
page read and write
E18000
heap
page read and write
E76000
heap
page read and write
144D000
stack
page read and write
6A364000
direct allocation
page readonly
E36000
heap
page read and write
6C33C000
unkown
page readonly
6C0000
unkown
page readonly
187E000
heap
page read and write
800000
heap
page read and write
6CE000
unkown
page read and write
8F0000
heap
page read and write
BF6000
stack
page read and write
6C1000
unkown
page execute read
E6D000
heap
page read and write
AF0000
heap
page read and write
6C210000
unkown
page readonly
5CC000
unkown
page read and write
762000
unkown
page readonly
D831000
heap
page read and write
187E000
heap
page read and write
EFE000
stack
page read and write
D8E4000
heap
page read and write
11FC000
stack
page read and write
18D3000
heap
page read and write
E69000
heap
page read and write
E18000
heap
page read and write
DA31000
heap
page read and write
18A3000
heap
page read and write
6C338000
unkown
page readonly
18A4000
heap
page read and write
B30000
heap
page read and write
E16000
heap
page read and write
6AF000
unkown
page write copy
E1C2000
heap
page read and write
D839000
heap
page read and write
45C000
stack
page read and write
E69000
heap
page read and write
E16000
heap
page read and write
69FF9000
direct allocation
page read and write
14B0000
remote allocation
page read and write
DF0000
heap
page read and write
6C0000
unkown
page readonly
423E000
stack
page read and write
18A4000
heap
page read and write
DCA000
heap
page read and write
DB0000
heap
page read and write
6A03C000
direct allocation
page read and write
762000
unkown
page readonly
6C2EF000
unkown
page readonly
6CA000
unkown
page readonly
DCBE000
stack
page read and write
C0E000
stack
page read and write
141000
unkown
page execute read
1878000
heap
page read and write
There are 261 hidden memdumps, click here to show them.