IOC Report
SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe
"C:\Users\user\Desktop\SecuriteInfo.com.BScope.Trojan.Download.7332.18301.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2252000
direct allocation
page read and write
21F5000
direct allocation
page read and write
2292000
direct allocation
page read and write
27EE000
stack
page read and write
22A0000
direct allocation
page read and write
2246000
direct allocation
page read and write
2205000
direct allocation
page read and write
2254000
direct allocation
page read and write
685000
heap
page read and write
1F0000
heap
page read and write
22C4000
direct allocation
page read and write
228B000
direct allocation
page read and write
2370000
heap
page read and write
2256000
direct allocation
page read and write
21E1000
direct allocation
page read and write
220E000
direct allocation
page read and write
2223000
direct allocation
page read and write
22E1000
direct allocation
page read and write
66C000
heap
page read and write
4110000
trusted library allocation
page read and write
66F000
heap
page read and write
603000
heap
page read and write
224E000
direct allocation
page read and write
22CC000
direct allocation
page read and write
2266000
direct allocation
page read and write
2231000
direct allocation
page read and write
21FE000
direct allocation
page read and write
6A9000
heap
page read and write
4CA000
unkown
page read and write
21EC000
direct allocation
page read and write
4CE000
unkown
page read and write
2330000
heap
page read and write
600000
heap
page read and write
639000
heap
page read and write
292E000
stack
page read and write
4D2000
unkown
page read and write
2281000
direct allocation
page read and write
667000
heap
page read and write
635000
heap
page read and write
226D000
direct allocation
page read and write
684000
heap
page read and write
4D4000
unkown
page write copy
2202000
direct allocation
page read and write
2299000
direct allocation
page read and write
22DA000
direct allocation
page read and write
640000
heap
page read and write
4CA000
unkown
page write copy
500000
heap
page read and write
54E000
stack
page read and write
22A8000
direct allocation
page read and write
610000
heap
page read and write
21CC000
direct allocation
page read and write
64A000
heap
page read and write
586000
heap
page read and write
2250000
direct allocation
page read and write
4D9000
unkown
page readonly
22E8000
direct allocation
page read and write
22B6000
direct allocation
page read and write
2275000
direct allocation
page read and write
2209000
direct allocation
page read and write
630000
heap
page read and write
90F000
stack
page read and write
19B000
stack
page read and write
221B000
direct allocation
page read and write
401000
unkown
page execute read
222A000
direct allocation
page read and write
620000
direct allocation
page execute and read and write
580000
heap
page read and write
22D3000
direct allocation
page read and write
2238000
direct allocation
page read and write
677000
heap
page read and write
674000
heap
page read and write
5E0000
heap
page read and write
96000
stack
page read and write
22AF000
direct allocation
page read and write
22BD000
direct allocation
page read and write
2213000
direct allocation
page read and write
64E000
heap
page read and write
2200000
direct allocation
page read and write
28EF000
stack
page read and write
2A2F000
stack
page read and write
400000
unkown
page readonly
There are 72 hidden memdumps, click here to show them.