IOC Report
SecuriteInfo.com.Trojan.GenericKD.71649694.17364.11303.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.GenericKD.71649694.17364.11303.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71649694.17364.11303.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.71649694.17364.11303.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF71AE11000
unkown
page execute read
7FF71AE1A000
unkown
page readonly
7FF71AE1F000
unkown
page write copy
1B283840000
heap
page read and write
1B283590000
trusted library allocation
page read and write
7FF71AE11000
unkown
page execute read
1B283530000
heap
page read and write
7FF71AE22000
unkown
page write copy
1B2835C0000
heap
page read and write
1B283790000
trusted library allocation
page read and write
1B283540000
heap
page read and write
7FF71AE23000
unkown
page readonly
A545DFC000
stack
page read and write
7FF71AE1F000
unkown
page read and write
7FF71AE10000
unkown
page readonly
7FF71AE23000
unkown
page readonly
7FF71AE22000
unkown
page write copy
1B283560000
heap
page read and write
7FF71AE1A000
unkown
page readonly
7FF71AE10000
unkown
page readonly
1B2835C8000
heap
page read and write
There are 11 hidden memdumps, click here to show them.