IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.31904.27419.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.31904.27419.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.31904.27419.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fbgschxn.kih.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1dar5yr.bdu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lngavjba.apm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zxo0n2ij.imt.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31904.27419.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31904.27419.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.31904.27419.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://phoenixblowers.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ocsp.sectigo.com05
unknown

Domains

Name
IP
Malicious
phoenixblowers.com
43.255.154.55
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
43.255.154.55
phoenixblowers.com
Singapore
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
28F1000
trusted library allocation
page read and write
malicious
2917000
trusted library allocation
page read and write
malicious
3736000
trusted library allocation
page read and write
malicious
5D54000
heap
page read and write
7FAF0000
trusted library allocation
page execute and read and write
623D000
stack
page read and write
24A0000
trusted library allocation
page read and write
629E000
stack
page read and write
4E12000
trusted library allocation
page read and write
EF2000
trusted library allocation
page read and write
66BE000
stack
page read and write
68F0000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
3ED5000
trusted library allocation
page read and write
28ED000
trusted library allocation
page read and write
C8A000
heap
page read and write
2981000
trusted library allocation
page read and write
2530000
trusted library allocation
page execute and read and write
F05000
trusted library allocation
page execute and read and write
2890000
heap
page execute and read and write
F02000
trusted library allocation
page read and write
FC0000
heap
page read and write
D2C000
heap
page read and write
362000
unkown
page execute and read and write
F0B000
trusted library allocation
page execute and read and write
9DE000
heap
page read and write
7100000
trusted library allocation
page execute and read and write
7570000
trusted library allocation
page read and write
5D2C000
heap
page read and write
A7E000
heap
page read and write
24BA000
trusted library allocation
page execute and read and write
24C7000
trusted library allocation
page execute and read and write
7096000
trusted library allocation
page read and write
26CE000
stack
page read and write
25A0000
trusted library allocation
page read and write
AA6B000
heap
page read and write
7110000
trusted library allocation
page read and write
7360000
heap
page read and write
249D000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
8CD0000
heap
page read and write
26D9000
trusted library allocation
page read and write
5DC6000
heap
page read and write
6BF0000
trusted library allocation
page read and write
7BE0000
heap
page read and write
642C000
trusted library allocation
page read and write
8F20000
trusted library allocation
page read and write
709D000
trusted library allocation
page read and write
ED0000
trusted library allocation
page read and write
FB4000
trusted library allocation
page read and write
810000
heap
page read and write
6470000
trusted library allocation
page read and write
FAE000
stack
page read and write
A3E000
heap
page read and write
27B3000
trusted library allocation
page read and write
7BA000
stack
page read and write
C7E000
heap
page read and write
4F8C000
stack
page read and write
4E32000
trusted library allocation
page read and write
38A1000
trusted library allocation
page read and write
C68000
heap
page read and write
EC3000
trusted library allocation
page execute and read and write
EC4000
trusted library allocation
page read and write
4E26000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
7540000
heap
page read and write
7160000
heap
page read and write
A05000
heap
page read and write
25C0000
heap
page read and write
9B7000
heap
page read and write
8E0E000
stack
page read and write
8FA6000
trusted library allocation
page read and write
AA9B000
heap
page read and write
7091000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
410000
unkown
page readonly
28A1000
trusted library allocation
page read and write
633D000
stack
page read and write
4E1A000
trusted library allocation
page read and write
4A9000
stack
page read and write
24CB000
trusted library allocation
page execute and read and write
F40000
trusted library allocation
page read and write
CDD000
heap
page read and write
F30000
trusted library allocation
page execute and read and write
4E0E000
trusted library allocation
page read and write
74BE000
stack
page read and write
7150000
heap
page execute and read and write
A12000
heap
page read and write
6410000
trusted library allocation
page execute and read and write
93D2000
trusted library allocation
page read and write
8F10000
trusted library section
page read and write
60BE000
stack
page read and write
E70000
heap
page read and write
66FE000
stack
page read and write
7070000
trusted library allocation
page read and write
ECD000
trusted library allocation
page execute and read and write
29EC000
trusted library allocation
page read and write
61FE000
stack
page read and write
8F30000
trusted library allocation
page read and write
497C000
stack
page read and write
4E1E000
trusted library allocation
page read and write
6420000
trusted library allocation
page read and write
67FE000
stack
page read and write
252E000
stack
page read and write
6550000
trusted library allocation
page execute and read and write
CCE000
stack
page read and write
63EE000
stack
page read and write
EE0000
heap
page read and write
C60000
heap
page read and write
5D4D000
heap
page read and write
6C00000
trusted library allocation
page read and write
657E000
stack
page read and write
28DF000
trusted library allocation
page read and write
73BB000
stack
page read and write
2490000
trusted library allocation
page read and write
48A8000
trusted library allocation
page read and write
6477000
trusted library allocation
page read and write
646E000
stack
page read and write
6560000
trusted library allocation
page read and write
24B0000
trusted library allocation
page read and write
62A0000
heap
page read and write
9DB000
heap
page read and write
4E21000
trusted library allocation
page read and write
CED000
heap
page read and write
543E000
stack
page read and write
7BD0000
heap
page read and write
474E000
stack
page read and write
70D0000
trusted library allocation
page read and write
FC7000
heap
page read and write
707B000
trusted library allocation
page read and write
7560000
heap
page read and write
24B6000
trusted library allocation
page execute and read and write
7C04000
heap
page read and write
5DBC000
heap
page read and write
647D000
stack
page read and write
2494000
trusted library allocation
page read and write
ABD000
heap
page read and write
4E40000
heap
page read and write
6930000
trusted library allocation
page execute and read and write
7340000
trusted library section
page readonly
6BDE000
stack
page read and write
292F000
trusted library allocation
page read and write
25B0000
heap
page read and write
9D0000
heap
page read and write
C96000
heap
page read and write
486C000
stack
page read and write
68D0000
trusted library allocation
page read and write
820000
heap
page read and write
7370000
heap
page read and write
70E0000
trusted library allocation
page read and write
D39000
heap
page read and write
6400000
trusted library allocation
page read and write
6408000
trusted library allocation
page read and write
4FB0000
heap
page execute and read and write
60FE000
stack
page read and write
258C000
stack
page read and write
24E0000
trusted library allocation
page read and write
52FE000
stack
page read and write
7330000
trusted library allocation
page execute and read and write
70B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page execute and read and write
D2F000
heap
page read and write
5D40000
heap
page read and write
4E43000
heap
page read and write
650E000
stack
page read and write
B45000
heap
page read and write
286E000
stack
page read and write
25B3000
heap
page read and write
6340000
heap
page read and write
F20000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
51FE000
stack
page read and write
4E06000
trusted library allocation
page read and write
699B000
stack
page read and write
AB7000
heap
page read and write
C94000
heap
page read and write
27B5000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
619E000
stack
page read and write
F07000
trusted library allocation
page execute and read and write
2540000
heap
page execute and read and write
9F8000
heap
page read and write
2870000
trusted library allocation
page read and write
4CEE000
stack
page read and write
B40000
heap
page read and write
5D2E000
heap
page read and write
F50000
trusted library allocation
page read and write
B30000
heap
page read and write
8FA0000
trusted library allocation
page read and write
F60000
heap
page read and write
3FF000
unkown
page execute and read and write
26D1000
trusted library allocation
page read and write
8F0E000
stack
page read and write
BBF0000
trusted library allocation
page read and write
8F50000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
EDD000
trusted library allocation
page execute and read and write
AF8000
stack
page read and write
8F40000
trusted library section
page read and write
36F5000
trusted library allocation
page read and write
7580000
trusted library allocation
page execute and read and write
40E000
unkown
page execute and read and write
24C2000
trusted library allocation
page read and write
2493000
trusted library allocation
page execute and read and write
900000
heap
page read and write
4A7E000
stack
page read and write
5C1E000
stack
page read and write
360000
unkown
page readonly
4BEE000
stack
page read and write
B20000
heap
page read and write
FB0000
trusted library allocation
page read and write
6ADD000
stack
page read and write
65BD000
stack
page read and write
D23000
heap
page read and write
3ED9000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
AA12000
heap
page read and write
BCE000
stack
page read and write
A89000
heap
page read and write
24B2000
trusted library allocation
page read and write
5A7000
stack
page read and write
554D000
stack
page read and write
9B0000
heap
page read and write
4E2D000
trusted library allocation
page read and write
51BC000
stack
page read and write
360000
unkown
page execute and read and write
A85000
heap
page read and write
28D6000
trusted library allocation
page read and write
7565000
heap
page read and write
5D20000
heap
page read and write
7F780000
trusted library allocation
page execute and read and write
2480000
trusted library allocation
page read and write
70A2000
trusted library allocation
page read and write
4FC0000
heap
page read and write
AB9000
heap
page read and write
6AF0000
heap
page read and write
68D7000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
24AD000
trusted library allocation
page execute and read and write
94E000
stack
page read and write
38C9000
trusted library allocation
page read and write
547D000
stack
page read and write
708E000
trusted library allocation
page read and write
5FBE000
stack
page read and write
6920000
heap
page read and write
7300000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
6A9C000
stack
page read and write
EB0000
trusted library allocation
page read and write
98E000
stack
page read and write
AB30000
trusted library section
page read and write
AA71000
heap
page read and write
990000
heap
page read and write
362000
unkown
page readonly
AA10000
heap
page read and write
70D5000
trusted library allocation
page read and write
62EE000
stack
page read and write
EF6000
trusted library allocation
page execute and read and write
470E000
stack
page read and write
615F000
stack
page read and write
5DEE000
heap
page read and write
4E0B000
trusted library allocation
page read and write
EFA000
trusted library allocation
page execute and read and write
533E000
stack
page read and write
390A000
trusted library allocation
page read and write
8F90000
trusted library allocation
page execute and read and write
7302000
trusted library allocation
page read and write
There are 259 hidden memdumps, click here to show them.