IOC Report
SecuriteInfo.com.FileRepMalware.23518.16980.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.23518.16980.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.23518.16980.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://106.14.141.209/hkDF
malicious
http://106.14.141.209:8087/hkDF
106.14.141.209
malicious
http://106.14.141.209:8087/hkDF&
unknown
http://106.14.141.209:8087/hkDFly
unknown
http://106.14.141.209:8087/hkDFN
unknown

Domains

Name
IP
Malicious
18.31.95.13.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
106.14.141.209
unknown
China
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
29C510F0000
direct allocation
page execute and read and write
malicious
C000110000
direct allocation
page read and write
malicious
F9A47FA000
stack
page read and write
C000033000
direct allocation
page read and write
681000
unkown
page execute read
F9A49FE000
stack
page read and write
907000
unkown
page readonly
C00010E000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
872000
unkown
page readonly
29C2A49C000
heap
page read and write
C00007A000
direct allocation
page read and write
29C2A4F0000
heap
page read and write
F9A4BFE000
stack
page read and write
907000
unkown
page readonly
29C2A430000
direct allocation
page read and write
29C4F8C0000
direct allocation
page read and write
76C000
unkown
page readonly
F9A5BFE000
stack
page read and write
F9A51FE000
stack
page read and write
29C2A770000
heap
page read and write
906000
unkown
page write copy
29C2A775000
heap
page read and write
C000018000
direct allocation
page read and write
29C2A3F0000
heap
page read and write
726000
unkown
page readonly
C000041000
direct allocation
page read and write
7EC000
unkown
page read and write
C000002000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000052000
direct allocation
page read and write
7D6000
unkown
page read and write
680000
unkown
page readonly
C000122000
direct allocation
page read and write
7DA000
unkown
page write copy
C000031000
direct allocation
page read and write
81D000
unkown
page read and write
76F000
unkown
page readonly
7D6000
unkown
page write copy
29C2A508000
heap
page read and write
29C2A760000
direct allocation
page read and write
F9A59F8000
stack
page read and write
29C2A3E0000
heap
page read and write
680000
unkown
page readonly
29C2A439000
direct allocation
page read and write
C000021000
direct allocation
page read and write
C000076000
direct allocation
page read and write
F9A4DFE000
stack
page read and write
681000
unkown
page execute read
C00001C000
direct allocation
page read and write
C000060000
direct allocation
page read and write
F9A53FE000
stack
page read and write
C000102000
direct allocation
page read and write
F9A5FFE000
stack
page read and write
C00002C000
direct allocation
page read and write
76C000
unkown
page readonly
C000008000
direct allocation
page read and write
7DC000
unkown
page read and write
29C2A499000
heap
page read and write
F9A55FF000
stack
page read and write
C00005C000
direct allocation
page read and write
847000
unkown
page read and write
7DD000
unkown
page write copy
29C4F7A0000
direct allocation
page read and write
29C2A434000
direct allocation
page read and write
C000128000
direct allocation
page read and write
C000114000
direct allocation
page read and write
84A000
unkown
page readonly
C000072000
direct allocation
page read and write
F9A5DFE000
stack
page read and write
C000014000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000124000
direct allocation
page read and write
29C2A514000
heap
page read and write
C000010000
direct allocation
page read and write
844000
unkown
page read and write
29C2A4F9000
heap
page read and write
F9A57FD000
stack
page read and write
84A000
unkown
page readonly
906000
unkown
page write copy
F9A4FFF000
stack
page read and write
C00000E000
direct allocation
page read and write
C000064000
direct allocation
page read and write
76F000
unkown
page readonly
29C2A43D000
direct allocation
page read and write
29C4F788000
direct allocation
page read and write
C000036000
direct allocation
page read and write
C000004000
direct allocation
page read and write
726000
unkown
page readonly
872000
unkown
page readonly
C000016000
direct allocation
page read and write
C000054000
direct allocation
page read and write
29C2A506000
heap
page read and write
C000000000
direct allocation
page read and write
29C4F780000
direct allocation
page read and write
29C2A490000
heap
page read and write
C00004E000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
29C2A410000
heap
page read and write
There are 91 hidden memdumps, click here to show them.