IOC Report
plushvcionattkingstoreff6.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\plushvcionattkingstoreff6.exe
"C:\Users\user\Desktop\plushvcionattkingstoreff6.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://github.com/googlefonts/lexend)6_ju
unknown
https://scripts.sil.org/OFLThis
unknown
https://scripts.sil.org/OFLhttps://www.lexend.comBonnie
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
246EC910000
heap
page read and write
7FF7AEDCD000
unkown
page readonly
7FF7AEAF1000
unkown
page readonly
7FF7AEDCB000
unkown
page read and write
7FF7AE9D1000
unkown
page execute read
EDF7DBC000
stack
page read and write
7FF7AE9D0000
unkown
page readonly
7FF7AEDCD000
unkown
page readonly
7FF7AEB3D000
unkown
page read and write
7FF7AE9D1000
unkown
page execute read
7FF7AE9D0000
unkown
page readonly
7FF7AEB3E000
unkown
page write copy
246EC830000
heap
page read and write
7FF7AEAF2000
unkown
page readonly
246EC91C000
heap
page read and write
EDF80FE000
stack
page read and write
7FF7AEB3D000
unkown
page write copy
246EC750000
heap
page read and write
7FF7AEAF1000
unkown
page read and write
There are 9 hidden memdumps, click here to show them.