IOC Report
SecuriteInfo.com.FileRepMalware.7137.26178.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.7137.26178.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\Options.ini
ASCII text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7137.26178.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.7137.26178.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF681951000
unkown
page read and write
2819AEB7000
direct allocation
page read and write
7FF681900000
unkown
page readonly
2819AEC7000
direct allocation
page read and write
2819AED7000
direct allocation
page read and write
281996E0000
heap
page read and write
2819AECC000
direct allocation
page read and write
2819AEE1000
direct allocation
page read and write
2819AF11000
direct allocation
page read and write
2819AEEF000
direct allocation
page read and write
2819AEDF000
direct allocation
page read and write
974AFFC000
stack
page read and write
2819AEC1000
direct allocation
page read and write
281995E0000
heap
page read and write
2819AEE4000
direct allocation
page read and write
2819AEA6000
direct allocation
page read and write
2819AEFB000
direct allocation
page read and write
7FF681940000
unkown
page execute and read and write
2819AEAF000
direct allocation
page read and write
28199590000
heap
page read and write
2819AEBF000
direct allocation
page read and write
7FF681950000
unkown
page execute and read and write
2819AF01000
direct allocation
page read and write
2819AEB2000
direct allocation
page read and write
2819AEE9000
direct allocation
page read and write
281995D0000
direct allocation
page read and write
2819AF03000
direct allocation
page read and write
2819AEF1000
direct allocation
page read and write
2819AF05000
direct allocation
page read and write
2819AEC5000
direct allocation
page read and write
2819AEDB000
direct allocation
page read and write
2819AEF3000
direct allocation
page read and write
281995C0000
heap
page read and write
2819AEF8000
direct allocation
page read and write
7FF68192C000
unkown
page execute and read and write
2819AED0000
direct allocation
page read and write
2819AEBB000
direct allocation
page read and write
281995C5000
heap
page read and write
2819AEBD000
direct allocation
page read and write
2819AECE000
direct allocation
page read and write
2819AED2000
direct allocation
page read and write
2819AEF5000
direct allocation
page read and write
7FF681900000
unkown
page readonly
281995EC000
heap
page read and write
281995E6000
heap
page read and write
7FF68194A000
unkown
page execute and read and write
2819AEE6000
direct allocation
page read and write
281994B0000
heap
page read and write
2819AEB5000
direct allocation
page read and write
2819AF09000
direct allocation
page read and write
7FF681951000
unkown
page write copy
7FF681901000
unkown
page execute and read and write
7FF68193F000
unkown
page execute and write copy
2819AEFF000
direct allocation
page read and write
2819AEB9000
direct allocation
page read and write
2819AEED000
direct allocation
page read and write
2819AEDD000
direct allocation
page read and write
2819AF0B000
direct allocation
page read and write
2819AF07000
direct allocation
page read and write
2819AED5000
direct allocation
page read and write
2819AED9000
direct allocation
page read and write
2819AEFD000
direct allocation
page read and write
2819AEC9000
direct allocation
page read and write
7FF68194F000
unkown
page execute and write copy
2819AEA0000
direct allocation
page read and write
2819AEEB000
direct allocation
page read and write
There are 56 hidden memdumps, click here to show them.