IOC Report
SecuriteInfo.com.Riskware.Application.32484.16969.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Riskware.Application.32484.16969.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Windows\license.id
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF, CR, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Riskware.Application.32484.16969.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
19DE71A0000
heap
page read and write
7FF7A5D30000
unkown
page execute read
7FF7A581C000
unkown
page execute read
7FF7A6E6F000
unkown
page readonly
7FF7A4DDE000
unkown
page readonly
7FF7A4DE3000
unkown
page execute read
7FF7A4DC6000
unkown
page readonly
19DE7240000
heap
page read and write
19DE5630000
heap
page read and write
19DE5706000
heap
page read and write
7FF7A4D80000
unkown
page readonly
19DE56A0000
heap
page read and write
19DE5660000
heap
page read and write
19DE56FC000
heap
page read and write
19DE5712000
heap
page read and write
19DE7060000
trusted library allocation
page read and write
7FF7A4E16000
unkown
page read and write
7FF7A6E6F000
unkown
page readonly
7FF7A6730000
unkown
page execute read
7FF7A4D80000
unkown
page readonly
7FF7A4D81000
unkown
page execute read
19DE7245000
heap
page read and write
3FFE9AB000
stack
page read and write
19DE56F0000
heap
page read and write
19DE5680000
trusted library allocation
page read and write
19DE71A4000
heap
page read and write
19DE5620000
heap
page read and write
7FF7A4E1C000
unkown
page execute read
7FF7A6730000
unkown
page execute read
19DE5712000
heap
page read and write
7FF7A5D30000
unkown
page execute read
7FF7A4DDA000
unkown
page read and write
There are 22 hidden memdumps, click here to show them.