IOC Report
SecuriteInfo.com.HEUR.Trojan.Win32.DelShad.vho.25230.12529.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.HEUR.Trojan.Win32.DelShad.vho.25230.12529.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\7ZSfx000.cmd
ASCII text, with CRLF line terminators
dropped
C:\ez-az!\EasyVBO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.HEUR.Trojan.Win32.DelShad.vho.25230.12529.exe
"C:\Users\user\Desktop\SecuriteInfo.com.HEUR.Trojan.Win32.DelShad.vho.25230.12529.exe"
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7ZSfx000.cmd" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.winsms.co.za/api/credits.ASP?User=
unknown
https://www.google.com/
unknown
http://www.easyas.co.zaBYour
unknown
https://www.easyas.co.za/downloads/7zEasyVBO.exef
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
57A000
heap
page read and write
500000
heap
page read and write
2AAF000
stack
page read and write
14002B000
unkown
page write copy
858000
direct allocation
page read and write
46EC000
stack
page read and write
278E000
stack
page read and write
23B0000
heap
page read and write
599000
heap
page read and write
526000
heap
page read and write
575000
heap
page read and write
5E6000
heap
page read and write
599000
heap
page read and write
1C0000
heap
page read and write
140031000
unkown
page readonly
190000
heap
page read and write
140001000
unkown
page execute read
56E000
heap
page read and write
520000
heap
page read and write
563000
heap
page read and write
56E000
heap
page read and write
23AA000
heap
page read and write
23B0000
heap
page read and write
8B0000
heap
page read and write
140000000
unkown
page readonly
5D7000
heap
page read and write
140001000
unkown
page execute read
14002B000
unkown
page read and write
5C9000
heap
page read and write
57A000
heap
page read and write
1A0000
heap
page read and write
893000
heap
page read and write
52C000
heap
page read and write
563000
heap
page read and write
5C9000
heap
page read and write
890000
heap
page read and write
29C7000
heap
page read and write
23A0000
heap
page read and write
298F000
stack
page read and write
71E000
stack
page read and write
53B000
heap
page read and write
5D7000
heap
page read and write
53A000
heap
page read and write
4D6F000
heap
page read and write
8B5000
heap
page read and write
5EC000
heap
page read and write
140031000
unkown
page readonly
140000000
unkown
page readonly
48CB000
heap
page read and write
45F3000
heap
page read and write
140024000
unkown
page readonly
23AF000
heap
page read and write
48CE000
heap
page read and write
81E000
stack
page read and write
148000
stack
page read and write
3DF0000
trusted library allocation
page read and write
574000
heap
page read and write
140024000
unkown
page readonly
5F0000
heap
page read and write
58E000
heap
page read and write
840000
direct allocation
page read and write
There are 51 hidden memdumps, click here to show them.