IOC Report
remcmdstub.exe

loading gif

Files

File Path
Type
Category
Malicious
remcmdstub.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\remcmdstub.exe
"C:\Users\user\Desktop\remcmdstub.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
34A000
unkown
page readonly
341000
unkown
page execute read
34D000
unkown
page read and write
790000
heap
page read and write
7EE000
stack
page read and write
E3F000
stack
page read and write
340000
unkown
page readonly
350000
unkown
page readonly
34A000
unkown
page readonly
F7F000
stack
page read and write
E7E000
stack
page read and write
350000
unkown
page readonly
341000
unkown
page execute read
7A0000
heap
page read and write
2790000
heap
page read and write
72C000
stack
page read and write
C00000
heap
page read and write
34D000
unkown
page write copy
AFC000
stack
page read and write
C4E000
heap
page read and write
340000
unkown
page readonly
C4A000
heap
page read and write
C40000
heap
page read and write
There are 13 hidden memdumps, click here to show them.