IOC Report
SecuriteInfo.com.Trojan.Win32.647.23647.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Win32.647.23647.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.647.23647.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.647.23647.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
61D000
stack
page read and write
405000
unkown
page readonly
408000
unkown
page write copy
401000
unkown
page execute read
92A000
heap
page read and write
800000
heap
page read and write
7A0000
heap
page read and write
920000
heap
page read and write
40C000
unkown
page readonly
405000
unkown
page readonly
92E000
heap
page read and write
400000
unkown
page readonly
9D000
stack
page read and write
1D0000
heap
page read and write
408000
unkown
page read and write
40C000
unkown
page readonly
401000
unkown
page execute read
F0000
heap
page read and write
400000
unkown
page readonly
There are 9 hidden memdumps, click here to show them.