IOC Report
SecuriteInfo.com.Win64.Malware-gen.24437.6720.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.24437.6720.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.24437.6720.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 1440

URLs

Name
IP
Malicious
https://interactiedovspm.shop/T
unknown
malicious
weiggheticulop.shop
malicious
deicedosmzj.shop
malicious
cagedwifedsozm.shop
malicious
consciousourwi.shop
malicious
potentioallykeos.shop
malicious
https://interactiedovspm.shop/api
172.67.161.217
malicious
https://drinnkysoapmzv.shop/api
172.67.174.127
malicious
southedhiscuso.shop
malicious
interactiedovspm.shop
malicious
https://interactiedovspm.shop/
unknown
malicious
drinnkysoapmzv.shop
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://drinnkysoapmzv.shop/p
unknown
https://potentioallykeos.shop/h
unknown
https://potentioallykeos.shop/api)
unknown
https://potentioallykeos.shop/api
unknown
https://potentioallykeos.shop/
unknown
https://drinnkysoapmzv.shop/
unknown
https://github.com/quic-go/quic-go/wiki/Logging11579208921035624876269744694940757353008614341529031
unknown
https://potentioallykeos.shop/api9
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
interactiedovspm.shop
172.67.161.217
malicious
charecteristicdxp.shop
104.21.84.50
malicious
drinnkysoapmzv.shop
172.67.174.127
malicious
potentioallykeos.shop
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.161.217
interactiedovspm.shop
United States
malicious
172.67.174.127
drinnkysoapmzv.shop
United States
malicious
104.21.84.50
charecteristicdxp.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1FC6D540000
direct allocation
page read and write
malicious
1FC6D590000
direct allocation
page read and write
malicious
C0001BA000
direct allocation
page read and write
malicious
7FF698CEA000
unkown
page readonly
malicious
C000346000
direct allocation
page read and write
malicious
C000400000
direct allocation
page read and write
malicious
2FA0000
remote allocation
page execute and read and write
malicious
C000304000
direct allocation
page read and write
malicious
7FF698CEA000
unkown
page readonly
malicious
C000280000
direct allocation
page read and write
malicious
C00050D000
direct allocation
page read and write
328B000
heap
page read and write
1FC68080000
heap
page read and write
C0000F2000
direct allocation
page read and write
359E000
stack
page read and write
C00012E000
direct allocation
page read and write
C000271000
direct allocation
page read and write
C000156000
direct allocation
page read and write
1FC68042000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C000524000
direct allocation
page read and write
C000035000
direct allocation
page read and write
C0000CA000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
1FC67FE0000
direct allocation
page read and write
2F6D000
stack
page read and write
3281000
heap
page read and write
C000260000
direct allocation
page read and write
7FF698FC3000
unkown
page write copy
7FF698FBF000
unkown
page read and write
C0000C6000
direct allocation
page read and write
1FC67FB0000
heap
page read and write
C0000D6000
direct allocation
page read and write
55CF000
stack
page read and write
C000016000
direct allocation
page read and write
C000037000
direct allocation
page read and write
369F000
stack
page read and write
3330000
heap
page read and write
7FF698CA2000
unkown
page write copy
C00000E000
direct allocation
page read and write
3220000
heap
page read and write
C000534000
direct allocation
page read and write
C0000FA000
direct allocation
page read and write
C000246000
direct allocation
page read and write
5120000
remote allocation
page read and write
511D000
stack
page read and write
C000004000
direct allocation
page read and write
7FF698FBA000
unkown
page read and write
1FC6D481000
direct allocation
page read and write
C000264000
direct allocation
page read and write
C0000FC000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C00024A000
direct allocation
page read and write
7FF698CE2000
unkown
page write copy
C0000CE000
direct allocation
page read and write
2FE8000
remote allocation
page execute and read and write
C00013A000
direct allocation
page read and write
C000256000
direct allocation
page read and write
4EAD000
stack
page read and write
ABCB7FE000
stack
page read and write
7FF698CD4000
unkown
page read and write
C000030000
direct allocation
page read and write
C000180000
direct allocation
page read and write
1FC68060000
direct allocation
page read and write
C000250000
direct allocation
page read and write
323D000
heap
page read and write
C000242000
direct allocation
page read and write
5010000
heap
page read and write
4FAE000
stack
page read and write
C00000C000
direct allocation
page read and write
C000254000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C00025E000
direct allocation
page read and write
C000244000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
3251000
heap
page read and write
C000080000
direct allocation
page read and write
C000163000
direct allocation
page read and write
C000144000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000530000
direct allocation
page read and write
1FC68180000
direct allocation
page read and write
C000258000
direct allocation
page read and write
32D6000
heap
page read and write
C000158000
direct allocation
page read and write
7FF698F88000
unkown
page read and write
C000022000
direct allocation
page read and write
4FED000
stack
page read and write
C000012000
direct allocation
page read and write
1FC68070000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C000027000
direct allocation
page read and write
3269000
heap
page read and write
C000476000
direct allocation
page read and write
1FC6D588000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
C0000B4000
direct allocation
page read and write
7FF698CA8000
unkown
page write copy
3269000
heap
page read and write
1FC67F90000
heap
page read and write
C000108000
direct allocation
page read and write
3345000
heap
page read and write
7FF698F61000
unkown
page read and write
C000165000
direct allocation
page read and write
328B000
heap
page read and write
326D000
heap
page read and write
C000029000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C000262000
direct allocation
page read and write
32D5000
heap
page read and write
1FC6818C000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
1FC68210000
direct allocation
page read and write
1FC67FE9000
direct allocation
page read and write
7FF698CAB000
unkown
page write copy
7FF698FC3000
unkown
page write copy
7FF698FB6000
unkown
page read and write
C000090000
direct allocation
page read and write
7FF698FBF000
unkown
page write copy
4E50000
heap
page read and write
C00008E000
direct allocation
page read and write
C000041000
direct allocation
page read and write
326D000
heap
page read and write
C0000C0000
direct allocation
page read and write
C000266000
direct allocation
page read and write
3299000
heap
page read and write
C000248000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C00015F000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
3299000
heap
page read and write
C000082000
direct allocation
page read and write
C000518000
direct allocation
page read and write
32D5000
heap
page read and write
C0000F6000
direct allocation
page read and write
ABCB3FF000
stack
page read and write
7FF698A90000
unkown
page readonly
C0000EA000
direct allocation
page read and write
ABCAFFF000
stack
page read and write
C00010A000
direct allocation
page read and write
C00051A000
direct allocation
page read and write
328B000
heap
page read and write
5120000
remote allocation
page read and write
3228000
heap
page read and write
C000520000
direct allocation
page read and write
ABCBBFE000
stack
page read and write
3256000
heap
page read and write
C000043000
direct allocation
page read and write
C000114000
direct allocation
page read and write
C000278000
direct allocation
page read and write
345E000
stack
page read and write
1FC67FEB000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
7FF698CA7000
unkown
page read and write
7FF698CA2000
unkown
page read and write
324F000
heap
page read and write
32D7000
heap
page read and write
7FF698FDA000
unkown
page readonly
7FF698CAA000
unkown
page read and write
C00026C000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
355F000
stack
page read and write
C0000EC000
direct allocation
page read and write
7FF698A91000
unkown
page execute read
C0000E0000
direct allocation
page read and write
C0001FC000
direct allocation
page read and write
7FF698FC0000
unkown
page write copy
7FF698CA6000
unkown
page write copy
C000025000
direct allocation
page read and write
7FF698A91000
unkown
page execute read
323B000
heap
page read and write
7FF698A90000
unkown
page readonly
1FC68275000
heap
page read and write
1FC68183000
direct allocation
page read and write
5120000
remote allocation
page read and write
C0000EE000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C000006000
direct allocation
page read and write
7FF698CE8000
unkown
page read and write
C00011A000
direct allocation
page read and write
C000275000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C000126000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
3256000
heap
page read and write
54CE000
stack
page read and write
C000014000
direct allocation
page read and write
3340000
heap
page read and write
ABCBDFE000
stack
page read and write
323B000
heap
page read and write
C000528000
direct allocation
page read and write
326C000
heap
page read and write
7FF698F8E000
unkown
page read and write
560D000
stack
page read and write
ABCADFD000
stack
page read and write
1FC6D5D0000
direct allocation
page read and write
1FC68050000
direct allocation
page read and write
C000045000
direct allocation
page read and write
ABCB9FF000
stack
page read and write
C000098000
direct allocation
page read and write
1FC67FE4000
direct allocation
page read and write
2F2C000
stack
page read and write
7FF698CE5000
unkown
page read and write
3236000
heap
page read and write
7FF698FDA000
unkown
page readonly
C000018000
direct allocation
page read and write
3281000
heap
page read and write
1FC67EB0000
heap
page read and write
C000088000
direct allocation
page read and write
1FC68049000
direct allocation
page read and write
32D0000
heap
page read and write
C00005C000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
570E000
stack
page read and write
C00043C000
direct allocation
page read and write
1FC68270000
heap
page read and write
3281000
heap
page read and write
ABCB5FC000
stack
page read and write
C000020000
direct allocation
page read and write
3320000
heap
page read and write
C000000000
direct allocation
page read and write
7FF698CE6000
unkown
page write copy
3232000
heap
page read and write
1FC68088000
heap
page read and write
328B000
heap
page read and write
1FC68040000
direct allocation
page read and write
C000052000
direct allocation
page read and write
32C8000
heap
page read and write
1FC6D590000
direct allocation
page read and write
C000084000
direct allocation
page read and write
There are 225 hidden memdumps, click here to show them.