IOC Report
SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.618554.7337.5785.exe"
malicious

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
https://gamesfileapp.com/455474F642F2D352/93243153651/53446B44EFA2F130/72980820451?33FCE66818B56E8D1729808204
172.67.68.136
https://curl.se/docs/alt-svc.html
unknown
https://curl.se/docs/http-cookies.html
unknown
https://gamesfileapp.com/455474F642F2D352/93243153651/53446B44EFA2F130/72980820451?33FCE66818B56E8D1
unknown

Domains

Name
IP
Malicious
gamesfileapp.com
172.67.68.136

IPs

IP
Domain
Country
Malicious
172.67.68.136
gamesfileapp.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
F1F000
unkown
page readonly
12F7000
stack
page read and write
77C1000
heap
page read and write
77C7000
heap
page read and write
16BE000
stack
page read and write
14F0000
heap
page read and write
1940000
heap
page read and write
52DE000
stack
page read and write
D01000
unkown
page execute read
79D0000
trusted library allocation
page read and write
17BF000
stack
page read and write
EB9000
unkown
page readonly
79E0000
trusted library allocation
page read and write
6AB2000
trusted library allocation
page read and write
5550000
heap
page read and write
3148000
heap
page read and write
14D8000
heap
page read and write
7690000
trusted library allocation
page read and write
14D1000
heap
page read and write
313E000
heap
page read and write
14D4000
heap
page read and write
3147000
heap
page read and write
14E4000
heap
page read and write
3138000
heap
page read and write
17D0000
heap
page read and write
1350000
heap
page read and write
312B000
heap
page read and write
3230000
heap
page read and write
14B0000
heap
page read and write
14E2000
heap
page read and write
3147000
heap
page read and write
7790000
heap
page read and write
1515000
heap
page read and write
3147000
heap
page read and write
3100000
heap
page read and write
F10000
unkown
page readonly
14DC000
heap
page read and write
3145000
heap
page read and write
D01000
unkown
page execute read
167E000
stack
page read and write
14D8000
heap
page read and write
78CC000
stack
page read and write
76B0000
trusted library allocation
page read and write
1900000
heap
page read and write
14BF000
heap
page read and write
3144000
heap
page read and write
3122000
heap
page read and write
3145000
heap
page read and write
314B000
heap
page read and write
3146000
heap
page read and write
310B000
heap
page read and write
3133000
heap
page read and write
7FB62000
trusted library allocation
page execute read
312B000
heap
page read and write
1578000
heap
page read and write
313E000
heap
page read and write
313E000
heap
page read and write
3142000
heap
page read and write
14B0000
heap
page read and write
1910000
remote allocation
page read and write
1910000
remote allocation
page read and write
312C000
heap
page read and write
14C0000
heap
page read and write
148E000
heap
page read and write
EB9000
unkown
page readonly
7690000
trusted library allocation
page read and write
1430000
heap
page read and write
FD8000
stack
page read and write
310D000
heap
page read and write
3144000
heap
page read and write
F0C000
unkown
page write copy
F1F000
unkown
page readonly
3155000
heap
page read and write
14AB000
heap
page read and write
3144000
heap
page read and write
F10000
unkown
page readonly
1480000
heap
page read and write
14CD000
heap
page read and write
311F000
heap
page read and write
1512000
heap
page read and write
3149000
heap
page read and write
3155000
heap
page read and write
3150000
heap
page read and write
3100000
heap
page read and write
14DA000
heap
page read and write
315A000
heap
page read and write
14BF000
heap
page read and write
30F0000
heap
page read and write
3146000
heap
page read and write
3122000
heap
page read and write
3154000
heap
page read and write
14DC000
heap
page read and write
1563000
heap
page read and write
7FB60000
trusted library allocation
page execute read
301000
unkown
page execute read
3147000
heap
page read and write
3147000
heap
page read and write
3234000
heap
page read and write
301000
unkown
page execute read
148A000
heap
page read and write
3133000
heap
page read and write
1567000
heap
page read and write
1910000
remote allocation
page read and write
313E000
heap
page read and write
14AC000
heap
page read and write
7FB64000
trusted library allocation
page execute read
76A0000
trusted library allocation
page read and write
14BE000
heap
page read and write
301000
unkown
page execute read
79F0000
trusted library allocation
page read and write
147D000
stack
page read and write
314B000
heap
page read and write
14C8000
heap
page read and write
1320000
heap
page read and write
79CE000
stack
page read and write
155E000
heap
page read and write
300000
unkown
page readonly
300000
unkown
page readonly
157C000
heap
page read and write
53DD000
stack
page read and write
155C000
heap
page read and write
3133000
heap
page read and write
3134000
heap
page read and write
14A6000
heap
page read and write
14EB000
heap
page read and write
F0C000
unkown
page read and write
194A000
heap
page read and write
150C000
heap
page read and write
312B000
heap
page read and write
310D000
heap
page read and write
14FC000
heap
page read and write
310B000
heap
page read and write
311F000
heap
page read and write
14DC000
heap
page read and write
There are 124 hidden memdumps, click here to show them.