IOC Report
esphvcioffattkingstore444d7.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\esphvcioffattkingstore444d7.exe
"C:\Users\user\Desktop\esphvcioffattkingstore444d7.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://github.com/googlefonts/lexend)6_ju
unknown
https://scripts.sil.org/OFLThis
unknown
https://scripts.sil.org/OFLhttps://www.lexend.comBonnie
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF73A029000
unkown
page write copy
7FF739FDE000
unkown
page readonly
70517C000
stack
page read and write
7FF739EC1000
unkown
page execute read
7FF739FDE000
unkown
page read and write
7FF73A2B9000
unkown
page readonly
7FF73A029000
unkown
page read and write
19A7487C000
heap
page read and write
7054FE000
stack
page read and write
7FF739EC0000
unkown
page readonly
7FF739EC1000
unkown
page execute read
7FF739EC0000
unkown
page readonly
19A74A60000
heap
page read and write
7FF739FDF000
unkown
page readonly
19A74980000
heap
page read and write
7FF73A02A000
unkown
page write copy
7FF73A2B9000
unkown
page readonly
19A74870000
heap
page read and write
There are 8 hidden memdumps, click here to show them.