IOC Report
SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.GenCBL.BUN.tr.26826.17558.dll",#1

Memdumps

Base Address
Regiontype
Protect
Malicious
200B55B1000
heap
page read and write
200B6F2A000
heap
page read and write
25266EC2000
heap
page read and write
F9486FE000
stack
page read and write
200B5510000
heap
page read and write
25266EEA000
heap
page read and write
200B55AD000
heap
page read and write
F9485FE000
stack
page read and write
25267105000
heap
page read and write
200B55A2000
heap
page read and write
25266EDE000
heap
page read and write
2526A920000
heap
page read and write
200B55A7000
heap
page read and write
25266EC4000
heap
page read and write
200B6F20000
heap
page read and write
25266EE7000
heap
page read and write
200B559A000
heap
page read and write
200B55AB000
heap
page read and write
200B55AB000
heap
page read and write
25266ED0000
heap
page read and write
2526A900000
heap
page read and write
F9487FD000
stack
page read and write
25266EBB000
heap
page read and write
25266EC6000
heap
page read and write
25266EEA000
heap
page read and write
200B55A7000
heap
page read and write
200B5588000
heap
page read and write
200B5580000
heap
page read and write
25266EEB000
heap
page read and write
200B6F30000
trusted library allocation
page read and write
25267000000
heap
page read and write
200B557D000
heap
page read and write
25266ED3000
heap
page read and write
25267100000
heap
page read and write
25266ECA000
heap
page read and write
200B55A3000
heap
page read and write
A8754FD000
stack
page read and write
25266EEA000
heap
page read and write
25266F07000
heap
page read and write
200B5599000
heap
page read and write
25266D20000
heap
page read and write
A8751AF000
stack
page read and write
25266EBD000
heap
page read and write
F94812C000
stack
page read and write
200B55A9000
heap
page read and write
200B55A9000
heap
page read and write
25266EF2000
heap
page read and write
25266EE1000
heap
page read and write
25266F03000
heap
page read and write
2526710B000
heap
page read and write
A87512F000
stack
page read and write
F9484FF000
stack
page read and write
25266EBA000
heap
page read and write
200B55A9000
heap
page read and write
200B557F000
heap
page read and write
25266EC4000
heap
page read and write
200B55AB000
heap
page read and write
2526A903000
heap
page read and write
25266EC4000
heap
page read and write
200B5550000
heap
page read and write
200B6F25000
heap
page read and write
25266EA0000
heap
page read and write
A87547D000
stack
page read and write
25266E20000
heap
page read and write
A87557F000
stack
page read and write
200B5598000
heap
page read and write
A8750AB000
stack
page read and write
25266EE1000
heap
page read and write
25266EE5000
heap
page read and write
25266F0F000
heap
page read and write
25267002000
heap
page read and write
200B55AB000
heap
page read and write
200B5570000
heap
page read and write
25266EFE000
heap
page read and write
2526A010000
trusted library allocation
page read and write
25266E00000
heap
page read and write
25266EEA000
heap
page read and write
200B5430000
heap
page read and write
25266EA8000
heap
page read and write
200B5579000
heap
page read and write
F9488FD000
stack
page read and write
200B5588000
heap
page read and write
25266ECD000
heap
page read and write
There are 73 hidden memdumps, click here to show them.