IOC Report
Kofc4rRZdp.exe

loading gif

Files

File Path
Type
Category
Malicious
Kofc4rRZdp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\42ZqUg._
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Kofc4rRZdp.exe
"C:\Users\user\Desktop\Kofc4rRZdp.exe"
malicious
C:\Windows\SysWOW64\regsvr32.exe
"C:\Windows\System32\regsvr32.exe" /u /s .\42ZQUg._

Memdumps

Base Address
Regiontype
Protect
Malicious
2D97000
heap
page read and write
2D39000
heap
page read and write
762000
unkown
page read and write
4956000
direct allocation
page read and write
970000
heap
page read and write
549F000
stack
page read and write
2D44000
heap
page read and write
2D30000
heap
page read and write
2990000
heap
page readonly
2D6C000
heap
page read and write
4FA0000
trusted library allocation
page read and write
29ED000
stack
page read and write
920000
heap
page read and write
711000
unkown
page execute read
710000
unkown
page readonly
742000
unkown
page readonly
3241000
trusted library allocation
page read and write
2916000
stack
page read and write
2D50000
heap
page read and write
910000
heap
page read and write
960000
direct allocation
page execute and read and write
772C000
stack
page read and write
76EF000
stack
page read and write
2CD0000
heap
page read and write
2D84000
heap
page read and write
2D37000
heap
page read and write
2D39000
heap
page read and write
2D84000
heap
page read and write
4951000
direct allocation
page execute read
2CFB000
stack
page read and write
45A0000
direct allocation
page read and write
2FCD000
stack
page read and write
300E000
stack
page read and write
2D3A000
heap
page read and write
4A71000
direct allocation
page execute read
2D84000
heap
page read and write
2D5B000
heap
page read and write
4F90000
heap
page read and write
2D99000
heap
page read and write
782D000
stack
page read and write
3260000
heap
page read and write
2D36000
heap
page read and write
2D56000
heap
page read and write
2D6C000
heap
page read and write
4B68000
direct allocation
page read and write
2D3A000
heap
page read and write
2D39000
heap
page read and write
310E000
stack
page read and write
2D5B000
heap
page read and write
525E000
stack
page read and write
2D63000
heap
page read and write
29F0000
heap
page read and write
2D63000
heap
page read and write
76D000
unkown
page readonly
325A000
trusted library allocation
page read and write
4E50000
heap
page read and write
2C1E000
stack
page read and write
29A0000
heap
page read and write
74E000
unkown
page read and write
4FC0000
heap
page read and write
75E000
unkown
page read and write
2D27000
heap
page read and write
76C000
unkown
page readonly
75EE000
stack
page read and write
4FD0000
heap
page read and write
6C50000
trusted library allocation
page read and write
2D2A000
heap
page read and write
2B9E000
stack
page read and write
2D40000
heap
page read and write
2C5F000
stack
page read and write
2D6C000
heap
page read and write
2D74000
heap
page read and write
2D39000
heap
page read and write
74E000
unkown
page write copy
76C000
unkown
page write copy
742000
unkown
page readonly
4D27000
direct allocation
page read and write
2CEC000
stack
page read and write
97A000
heap
page read and write
3267000
heap
page read and write
2D2F000
heap
page read and write
2980000
heap
page read and write
89C000
stack
page read and write
535E000
stack
page read and write
2BDF000
stack
page read and write
539E000
stack
page read and write
2D00000
heap
page read and write
326B000
heap
page read and write
4FA0000
heap
page read and write
2D84000
heap
page read and write
4A7B000
direct allocation
page readonly
2D40000
heap
page read and write
2D41000
heap
page read and write
2D63000
heap
page read and write
85B000
stack
page read and write
2D76000
heap
page read and write
710000
unkown
page readonly
29A5000
heap
page read and write
2D6C000
heap
page read and write
2D08000
heap
page read and write
2DC0000
heap
page read and write
3214000
heap
page read and write
2D6C000
heap
page read and write
2D39000
heap
page read and write
711000
unkown
page execute read
4570000
heap
page read and write
2D62000
heap
page read and write
757000
unkown
page read and write
900000
heap
page read and write
2D99000
heap
page read and write
3210000
heap
page read and write
2D84000
heap
page read and write
There are 102 hidden memdumps, click here to show them.