IOC Report
SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe"
malicious

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4D9E000
trusted library allocation
page read and write
AD3000
heap
page read and write
B2E000
heap
page read and write
6C8E000
stack
page read and write
B5C000
heap
page read and write
F7E000
stack
page read and write
920000
heap
page read and write
D30000
heap
page read and write
C9B000
trusted library allocation
page execute and read and write
B22000
heap
page read and write
FD5000
trusted library allocation
page read and write
4A3E000
stack
page read and write
CC0000
heap
page read and write
C8F000
stack
page read and write
A63000
trusted library allocation
page execute and read and write
4D86000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
52ED000
stack
page read and write
38A9000
trusted library allocation
page read and write
6A1E000
heap
page read and write
CB0000
trusted library allocation
page read and write
52F0000
heap
page read and write
A90000
heap
page read and write
4FD0000
trusted library allocation
page execute and read and write
F80000
heap
page execute and read and write
A9E000
heap
page read and write
A8A000
trusted library allocation
page execute and read and write
B5F000
heap
page read and write
4E22000
trusted library allocation
page read and write
6A10000
heap
page read and write
A70000
trusted library allocation
page read and write
460000
unkown
page readonly
CF0000
heap
page read and write
FF0000
heap
page read and write
4D8B000
trusted library allocation
page read and write
860000
heap
page read and write
870000
heap
page read and write
5320000
heap
page read and write
4F80000
heap
page read and write
4FCC000
stack
page read and write
8750000
trusted library allocation
page read and write
A9A000
heap
page read and write
CE0000
trusted library allocation
page execute and read and write
4DAD000
trusted library allocation
page read and write
C92000
trusted library allocation
page read and write
4E80000
trusted library section
page readonly
5324000
heap
page read and write
A86000
trusted library allocation
page execute and read and write
D20000
trusted library allocation
page read and write
5000000
heap
page read and write
A60000
trusted library allocation
page read and write
50C0000
trusted library allocation
page execute and read and write
A73000
trusted library allocation
page read and write
4EA0000
heap
page read and write
50F0000
heap
page execute and read and write
4F60000
trusted library allocation
page read and write
A64000
trusted library allocation
page read and write
FF7000
heap
page read and write
4F8000
stack
page read and write
4F50000
heap
page read and write
38A1000
trusted library allocation
page read and write
AC6000
heap
page read and write
FD0000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
A80000
trusted library allocation
page read and write
4F85000
heap
page read and write
AB8000
heap
page read and write
5F7000
stack
page read and write
A6D000
trusted library allocation
page execute and read and write
542E000
stack
page read and write
4E20000
trusted library allocation
page read and write
A7D000
trusted library allocation
page execute and read and write
4DA6000
trusted library allocation
page read and write
4E60000
trusted library allocation
page execute and read and write
C97000
trusted library allocation
page execute and read and write
926000
heap
page read and write
462000
unkown
page readonly
4DA1000
trusted library allocation
page read and write
4EA3000
heap
page read and write
FCD000
stack
page read and write
7112000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
28A1000
trusted library allocation
page read and write
8BE000
stack
page read and write
4FE0000
trusted library allocation
page read and write
289E000
stack
page read and write
5300000
heap
page read and write
4DD0000
trusted library allocation
page read and write
4E90000
heap
page read and write
4E10000
heap
page read and write
4E30000
trusted library allocation
page execute and read and write
There are 84 hidden memdumps, click here to show them.