IOC Report
esphvcionattkingstoreff5.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\esphvcionattkingstoreff5.exe
"C:\Users\user\Desktop\esphvcionattkingstoreff5.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://github.com/googlefonts/lexend)6_ju
unknown
https://scripts.sil.org/OFLThis
unknown
https://scripts.sil.org/OFLhttps://www.lexend.comBonnie
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

Memdumps

Base Address
Regiontype
Protect
Malicious
1004FF000
stack
page read and write
7FF636B2A000
unkown
page read and write
1C9CBA1C000
heap
page read and write
7FF636ADF000
unkown
page read and write
7FF6369C1000
unkown
page execute read
7FF636ADF000
unkown
page readonly
7FF6369C0000
unkown
page readonly
7FF636AE0000
unkown
page readonly
1C9CBA10000
heap
page read and write
7FF6369C1000
unkown
page execute read
7FF636DBA000
unkown
page readonly
7FF636B2B000
unkown
page write copy
7FF636B2A000
unkown
page write copy
7FF636DBA000
unkown
page readonly
7FF6369C0000
unkown
page readonly
1C9CB970000
heap
page read and write
1000FC000
stack
page read and write
1C9CB890000
heap
page read and write
There are 8 hidden memdumps, click here to show them.