IOC Report
SecuriteInfo.com.TROJ_FR.26501A77.11990.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.TROJ_FR.26501A77.11990.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.TROJ_FR.26501A77.11990.exe
"C:\Users\user\Desktop\SecuriteInfo.com.TROJ_FR.26501A77.11990.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nmap.org/ncat5.59BETA1Version
unknown
http://nmap.org/ncat
unknown
http://nmap.org/ncat/.
unknown
http://www.openssl.org/support/faq.html
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
6D6000
unkown
page readonly
malicious
6D6000
unkown
page readonly
malicious
103F000
stack
page read and write
726000
unkown
page read and write
59D000
unkown
page execute read
725000
unkown
page readonly
C7A000
heap
page read and write
581000
unkown
page execute read
C7E000
heap
page read and write
725000
unkown
page readonly
72D000
unkown
page read and write
BB0000
heap
page read and write
59D000
unkown
page execute read
1040000
heap
page read and write
C70000
heap
page read and write
738000
unkown
page readonly
726000
unkown
page write copy
F3F000
stack
page read and write
1170000
heap
page read and write
727000
unkown
page write copy
B3D000
stack
page read and write
735000
unkown
page read and write
72F000
unkown
page write copy
BD5000
heap
page read and write
C5E000
stack
page read and write
581000
unkown
page execute read
580000
unkown
page readonly
C1E000
stack
page read and write
BD0000
heap
page read and write
BA0000
heap
page read and write
738000
unkown
page readonly
580000
unkown
page readonly
A3C000
stack
page read and write
There are 23 hidden memdumps, click here to show them.