IOC Report
Loader.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Loader.exe
"C:\Users\user\Desktop\Loader.exe"
malicious
C:\Users\user\Desktop\Loader.exe
"C:\Users\user\Desktop\Loader.exe"
malicious
C:\Users\user\Desktop\Loader.exe
"C:\Users\user\Desktop\Loader.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://farewellnzu.icu/api
172.67.198.61
malicious
farewellnzu.icu
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://farewellnzu.icu/es
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://farewellnzu.icu/pi
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://farewellnzu.icu/apie)eE
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://farewellnzu.icu/apisb
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://farewellnzu.icu/4G
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://farewellnzu.icu/api0
unknown
https://farewellnzu.icu/apiimetb
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://farewellnzu.icu/apitb
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://farewellnzu.icu/
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
farewellnzu.icu
172.67.198.61

IPs

IP
Domain
Country
Malicious
172.67.198.61
farewellnzu.icu
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
284E000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
54EA000
trusted library allocation
page read and write
29B000
unkown
page write copy
2A1000
unkown
page write copy
5407000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
27C0000
heap
page read and write
545B000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
2C45000
heap
page read and write
54F9000
trusted library allocation
page read and write
29F000
unkown
page readonly
53FF000
trusted library allocation
page read and write
2AFB000
stack
page read and write
53EA000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
5519000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
29C000
unkown
page read and write
544E000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
29F000
unkown
page readonly
546C000
trusted library allocation
page read and write
2C9E000
heap
page read and write
2A1000
unkown
page write copy
546B000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
2CB2000
heap
page read and write
2CA9000
heap
page read and write
2CB1000
heap
page read and write
5400000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
2CAF000
heap
page read and write
5478000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
546C000
trusted library allocation
page read and write
2C4F000
stack
page read and write
54F0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
2CC0000
heap
page read and write
2CB7000
heap
page read and write
2C3C000
heap
page read and write
544E000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
2C0C000
heap
page read and write
27B0000
heap
page read and write
5449000
trusted library allocation
page read and write
2C3A000
heap
page read and write
2D2E000
stack
page read and write
56E0000
heap
page read and write
544B000
trusted library allocation
page read and write
54FF000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
2C0C000
heap
page read and write
56E1000
trusted library allocation
page read and write
56E1000
heap
page read and write
5435000
trusted library allocation
page read and write
4840000
heap
page read and write
2BD0000
heap
page read and write
54F0000
trusted library allocation
page read and write
2A1000
unkown
page write copy
275B000
stack
page read and write
46F0000
heap
page read and write
57B0000
trusted library allocation
page read and write
29F000
unkown
page readonly
5414000
trusted library allocation
page read and write
271000
unkown
page execute read
54F9000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
4FEE000
stack
page read and write
2CAE000
heap
page read and write
546C000
trusted library allocation
page read and write
2A1000
unkown
page write copy
293000
unkown
page readonly
54F0000
trusted library allocation
page read and write
4E8F000
stack
page read and write
54F0000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
53FA000
trusted library allocation
page read and write
2CB2000
heap
page read and write
271000
unkown
page execute read
5426000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
2CB9000
heap
page read and write
5445000
trusted library allocation
page read and write
27B5000
heap
page read and write
544A000
trusted library allocation
page read and write
2A1000
unkown
page write copy
5435000
trusted library allocation
page read and write
2A1000
unkown
page write copy
2CAE000
heap
page read and write
545C000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
2CB1000
heap
page read and write
4830000
remote allocation
page read and write
276D000
stack
page read and write
4F8F000
stack
page read and write
5418000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
5477000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
2CAE000
heap
page read and write
2CB1000
heap
page read and write
29F000
unkown
page readonly
5425000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
2CAE000
heap
page read and write
2C45000
heap
page read and write
54F0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
5477000
trusted library allocation
page read and write
270000
unkown
page readonly
547D000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
2E2F000
stack
page read and write
53F1000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
2CAB000
heap
page read and write
5507000
trusted library allocation
page read and write
27D0000
heap
page read and write
29B000
unkown
page execute and read and write
2CB7000
heap
page read and write
54F0000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
293000
unkown
page readonly
2BF0000
heap
page read and write
5460000
trusted library allocation
page read and write
455000
remote allocation
page execute and read and write
549A000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
27F0000
heap
page read and write
5478000
trusted library allocation
page read and write
29F000
unkown
page readonly
5481000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
2C3E000
heap
page read and write
54F0000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
293000
unkown
page readonly
54F0000
trusted library allocation
page read and write
546C000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
29F000
unkown
page readonly
2C3A000
heap
page read and write
47CE000
stack
page read and write
545B000
trusted library allocation
page read and write
2840000
heap
page read and write
2CB2000
heap
page read and write
2CB7000
heap
page read and write
5519000
trusted library allocation
page read and write
2CAF000
heap
page read and write
54F0000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
27D0000
heap
page read and write
452D000
stack
page read and write
2B4E000
stack
page read and write
547D000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
2CB2000
heap
page read and write
54F0000
trusted library allocation
page read and write
293000
unkown
page readonly
547C000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
266C000
stack
page read and write
480E000
stack
page read and write
543D000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
27C0000
heap
page read and write
53FA000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
5483000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
2CB2000
heap
page read and write
54F9000
trusted library allocation
page read and write
518E000
stack
page read and write
546B000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
2CB1000
heap
page read and write
54E7000
trusted library allocation
page read and write
271000
unkown
page execute read
50EF000
stack
page read and write
293000
unkown
page readonly
547C000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
442D000
stack
page read and write
544B000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
271000
unkown
page execute read
54F0000
trusted library allocation
page read and write
5474000
trusted library allocation
page read and write
474D000
stack
page read and write
54E1000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
546C000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
5474000
trusted library allocation
page read and write
54E7000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
270000
unkown
page readonly
546C000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
271000
unkown
page execute read
53DE000
stack
page read and write
52DD000
stack
page read and write
547D000
trusted library allocation
page read and write
2CAD000
heap
page read and write
54F0000
trusted library allocation
page read and write
4830000
remote allocation
page read and write
2C9E000
heap
page read and write
2C9E000
heap
page read and write
54F0000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
5788000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
4D8D000
stack
page read and write
5428000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
2C45000
heap
page read and write
545B000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
540F000
trusted library allocation
page read and write
27B7000
heap
page read and write
5427000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
528F000
stack
page read and write
5CED000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
2CAD000
heap
page read and write
53E6000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
270000
unkown
page readonly
545B000
trusted library allocation
page read and write
284A000
heap
page read and write
547D000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
270000
unkown
page readonly
5447000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
2CAB000
heap
page read and write
544B000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
2B0F000
stack
page read and write
5414000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
271000
unkown
page execute read
541F000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
2CB1000
heap
page read and write
2CB2000
heap
page read and write
2CBC000
heap
page read and write
53F5000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
54ED000
trusted library allocation
page read and write
2CB9000
heap
page read and write
54F0000
trusted library allocation
page read and write
53F3000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
2F6F000
stack
page read and write
54F0000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
53FC000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
2CB2000
heap
page read and write
2CB2000
heap
page read and write
2CAC000
heap
page read and write
54F0000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
2CB7000
heap
page read and write
544F000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
53FA000
trusted library allocation
page read and write
5140000
heap
page read and write
544F000
trusted library allocation
page read and write
29B000
unkown
page write copy
546B000
trusted library allocation
page read and write
4830000
remote allocation
page read and write
5873000
trusted library allocation
page read and write
2C9E000
heap
page read and write
293000
unkown
page readonly
2CB2000
heap
page read and write
547D000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5738000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
29B000
unkown
page write copy
2CB2000
heap
page read and write
2CC3000
heap
page read and write
54F0000
trusted library allocation
page read and write
2CC3000
heap
page read and write
5445000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
61F2000
trusted library allocation
page read and write
270000
unkown
page readonly
5417000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
53F8000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
283E000
stack
page read and write
29B000
unkown
page write copy
5850000
trusted library allocation
page read and write
4C8D000
stack
page read and write
54F0000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
546C000
trusted library allocation
page read and write
53E2000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
2BF8000
heap
page read and write
56E7000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
2CAC000
heap
page read and write
2CAC000
heap
page read and write
5411000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
270000
unkown
page readonly
29B000
unkown
page write copy
544A000
trusted library allocation
page read and write
5519000
trusted library allocation
page read and write
2C08000
heap
page read and write
54F0000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
2E6E000
stack
page read and write
5414000
trusted library allocation
page read and write
478D000
stack
page read and write
5443000
trusted library allocation
page read and write
There are 397 hidden memdumps, click here to show them.