IOC Report
SecuriteInfo.com.Trojan.GenericKD.70591578.24974.31588.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.GenericKD.70591578.24974.31588.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Hyper\Hyper.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.70591578.24974.31588.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.70591578.24974.31588.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.70591578.24974.31588.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://cdn.discordapp.com/attachments/1135629801705709640/1170156279776411779/Hyper.ytd
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1FE69E5F000
heap
page read and write
A4700FE000
stack
page read and write
1FE69E5C000
heap
page read and write
1FE69E5F000
heap
page read and write
2119CFE000
stack
page read and write
2119B79000
stack
page read and write
25E812D9000
heap
page read and write
1FE6A120000
heap
page read and write
25E81313000
heap
page read and write
1FE6D820000
heap
page read and write
1FE69E66000
heap
page read and write
1FE6B840000
heap
page read and write
1FE69DC0000
heap
page read and write
1FE69E5F000
heap
page read and write
1FE69CC0000
heap
page read and write
1FE6B8B0000
heap
page read and write
25E81315000
heap
page read and write
2119C7E000
stack
page read and write
2119BFE000
stack
page read and write
25E81311000
heap
page read and write
25E81180000
heap
page read and write
25E81313000
heap
page read and write
1FE69E56000
heap
page read and write
2119A7E000
stack
page read and write
25E81308000
heap
page read and write
1FE69E7C000
heap
page read and write
25E82C40000
heap
page read and write
1FE69E30000
heap
page read and write
25E812DD000
heap
page read and write
1FE6A0F0000
heap
page read and write
25E81304000
heap
page read and write
1FE6A125000
heap
page read and write
25E82C45000
heap
page read and write
1FE69DA0000
heap
page read and write
25E812A0000
heap
page read and write
25E81260000
heap
page read and write
21197CB000
stack
page read and write
25E812FA000
heap
page read and write
1FE6A12C000
heap
page read and write
A4701FA000
stack
page read and write
1FE69E60000
heap
page read and write
1FE6D824000
heap
page read and write
A46FFFF000
stack
page read and write
1FE69E38000
heap
page read and write
25E8130D000
heap
page read and write
25E812E0000
heap
page read and write
A46FEFC000
stack
page read and write
1FE69E50000
heap
page read and write
1FE69E4F000
heap
page read and write
25E82DD0000
heap
page read and write
1FE69E67000
heap
page read and write
1FE6B843000
heap
page read and write
25E81301000
heap
page read and write
25E81304000
heap
page read and write
2119AFF000
stack
page read and write
25E812D0000
heap
page read and write
25E812DF000
heap
page read and write
1FE69E52000
heap
page read and write
1FE69E59000
heap
page read and write
25E81329000
heap
page read and write
1FE6D020000
trusted library allocation
page read and write
25E81314000
heap
page read and write
25E81313000
heap
page read and write
25E812F9000
heap
page read and write
There are 54 hidden memdumps, click here to show them.