IOC Report
SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
xmr.330com.com
117.52.82.171

IPs

IP
Domain
Country
Malicious
211.108.74.247
unknown
Korea Republic of

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Xmrig
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
256E6EBC000
unkown
page read and write
294E3CC8000
heap
page read and write
256E506B000
heap
page read and write
294EBED8000
heap
page read and write
294E96D8000
heap
page read and write
B8515FE000
unkown
page read and write
256E6840000
heap
page read and write
294E3D0F000
heap
page read and write
B8516FC000
unkown
page read and write
294EB4D8000
heap
page read and write
AAB71FE000
stack
page read and write
256E6C54000
unkown
page read and write
294E3CCD000
heap
page read and write
256E4C00000
heap
page read and write
294E3C65000
heap
page read and write
256E6EAC000
unkown
page read and write
294E3D88000
direct allocation
page execute read
256E8BE0000
unkown
page read and write
256E7190000
unkown
page readonly
B851279000
unkown
page read and write
294E3D30000
heap
page read and write
AAB6CFE000
stack
page read and write
256E5050000
unkown
page readonly
294E6ED8000
heap
page read and write
256E6DF2000
unkown
page read and write
294E3E20000
direct allocation
page execute and read and write
B85177E000
unkown
page readonly
AAB73FE000
stack
page read and write
294E3DD0000
direct allocation
page execute and read and write
B85187E000
unkown
page readonly
256E6E9E000
unkown
page read and write
294ED2D8000
heap
page read and write
294E3D18000
heap
page read and write
256E6E54000
unkown
page read and write
256E6D90000
unkown
page read and write
256E6E8E000
unkown
page read and write
256E4CE0000
unkown
page read and write
294E3E90000
heap
page read and write
256E6CB6000
unkown
page read and write
256E6E76000
unkown
page read and write
294E3B50000
heap
page read and write
256E6790000
unkown
page readonly
B85127B000
unkown
page read and write
256E4D00000
unkown
page read and write
294EAAD8000
heap
page read and write
AAB6DFF000
stack
page read and write
AAB6AFE000
stack
page read and write
256E676E000
unkown
page read and write
294EC8D8000
heap
page read and write
294E3C36000
heap
page read and write
256E4D60000
unkown
page readonly
AAB72FF000
stack
page read and write
256E6EAA000
unkown
page read and write
294E3E10000
direct allocation
page execute and read and write
AAB6FFD000
stack
page read and write
256E6B90000
unkown
page read and write
7FF66165F000
unkown
page execute and write copy
294E3CC4000
heap
page read and write
256E6E34000
unkown
page read and write
294E82D8000
heap
page read and write
256E5060000
heap
page read and write
256E4D21000
unkown
page readonly
AAB76FF000
stack
page read and write
294E3EE5000
heap
page read and write
294E64D8000
heap
page read and write
294E3D50000
heap
page read and write
256E4DB8000
heap
page read and write
256E94E0000
unkown
page read and write
294E3C30000
heap
page read and write
294E3D20000
heap
page read and write
294E59D0000
heap
page read and write
294E3C92000
heap
page read and write
256E729E000
unkown
page read and write
256E6D84000
unkown
page read and write
256E6E9A000
unkown
page read and write
256E8CE0000
unkown
page read and write
294E3C61000
heap
page read and write
256E6ECF000
unkown
page read and write
256E4D90000
unkown
page read and write
294E5AD8000
heap
page read and write
256E4DB0000
heap
page read and write
256E6843000
heap
page read and write
256E6EB8000
unkown
page read and write
294E78D8000
heap
page read and write
7FF6617F1000
unkown
page write copy
294EA0D8000
heap
page read and write
B85167E000
unkown
page readonly
294E5A10000
heap
page read and write
256E4BF0000
unkown
page readonly
256E6D6A000
unkown
page read and write
AAB672B000
stack
page read and write
256E4D50000
unkown
page read and write
294E5A2A000
heap
page read and write
B851273000
unkown
page read and write
294E3EE0000
heap
page read and write
B8517FB000
unkown
page read and write
256E6D00000
unkown
page read and write
256E5065000
heap
page read and write
AAB70FB000
stack
page read and write
256E5270000
unkown
page readonly
256E6BF2000
unkown
page read and write
294E3C3C000
heap
page read and write
256E6D8A000
unkown
page read and write
294E3C52000
heap
page read and write
294E3D96000
direct allocation
page execute read
7FF661120000
unkown
page readonly
294E5A32000
heap
page read and write
294E3D80000
direct allocation
page execute read
294E8CD8000
heap
page read and write
B8511DE000
stack
page read and write
256E6680000
unkown
page read and write
There are 101 hidden memdumps, click here to show them.