IOC Report
SecuriteInfo.com.Win64.PWSX-gen.17202.22243.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.17202.22243.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.PWSX-gen.17202.22243.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
14287181000
trusted library allocation
page read and write
malicious
14286F60000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
14285745000
heap
page read and write
142870C0000
heap
page execute and read and write
14285730000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
2A328FD000
stack
page read and write
1429FA00000
heap
page read and write
1428551B000
heap
page read and write
142854BC000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
142854B0000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848E34000
trusted library allocation
page read and write
142854F2000
heap
page read and write
1429F960000
trusted library section
page read and write
7FF848E20000
trusted library allocation
page read and write
1429F190000
trusted library allocation
page read and write
7FF425170000
trusted library allocation
page execute and read and write
7FF848E6C000
trusted library allocation
page execute and read and write
14285523000
heap
page read and write
2A32532000
stack
page read and write
142854ED000
heap
page read and write
7FF848FDF000
trusted library allocation
page read and write
7FF848FC9000
trusted library allocation
page read and write
1429936D000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
2A32BFE000
stack
page read and write
14285740000
heap
page read and write
14285420000
unkown
page readonly
142856F0000
heap
page read and write
14287161000
trusted library allocation
page read and write
14287150000
heap
page execute and read and write
2A331FA000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
142855B0000
heap
page read and write
14286F13000
trusted library allocation
page read and write
14286F00000
trusted library allocation
page read and write
14285690000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
142856C5000
heap
page read and write
2A329FE000
stack
page read and write
2A32CFB000
stack
page read and write
142856C0000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
142854CE000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
142873DD000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
14285422000
unkown
page readonly
7FF848E28000
trusted library allocation
page read and write
142856D0000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
7FF848EC6000
trusted library allocation
page read and write
2A332FC000
stack
page read and write
142854D9000
heap
page read and write
14286F70000
heap
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page execute and read and write
142854EF000
heap
page read and write
14297168000
trusted library allocation
page read and write
14286F10000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
14285589000
heap
page read and write
7FF848FC4000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
142855A8000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
14297161000
trusted library allocation
page read and write
1428559B000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
7FF848ECC000
trusted library allocation
page execute and read and write
1428551D000
heap
page read and write
14298C98000
trusted library allocation
page read and write
There are 69 hidden memdumps, click here to show them.