IOC Report
SecuriteInfo.com.W64.Gamehack.DF.gen.Eldorado.1858.10572.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W64.Gamehack.DF.gen.Eldorado.1858.10572.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W64.Gamehack.DF.gen.Eldorado.1858.10572.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W64.Gamehack.DF.gen.Eldorado.1858.10572.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://ocsp.thawte.com0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4586AFF000
stack
page read and write
17AB08C0000
heap
page read and write
17AB08F6000
heap
page read and write
7FF712FA0000
unkown
page readonly
4586BFF000
stack
page read and write
7FF712FA1000
unkown
page execute read
7FF712FA0000
unkown
page readonly
7FF712FC2000
unkown
page read and write
7FF712FA1000
unkown
page execute read
7FF712FC3000
unkown
page readonly
17AB08F0000
heap
page read and write
7FF712FC3000
unkown
page readonly
17AB07E0000
heap
page read and write
7FF712FB1000
unkown
page readonly
17AB0A80000
heap
page read and write
458670D000
stack
page read and write
17AB09F0000
heap
page read and write
17AB08FC000
heap
page read and write
17AB0907000
heap
page read and write
7FF712FB1000
unkown
page readonly
7FF712FC2000
unkown
page write copy
There are 11 hidden memdumps, click here to show them.