Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.awlc7038.vip/b31a/
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
A02D000
|
stack
|
page read and write
|
||
2D8E000
|
trusted library allocation
|
page read and write
|
||
71D2000
|
trusted library allocation
|
page read and write
|
||
4C1C000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page execute and read and write
|
||
29B0000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page execute and read and write
|
||
D53000
|
trusted library allocation
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
52E0000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
15A0000
|
direct allocation
|
page execute and read and write
|
||
A06D000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
D44000
|
trusted library allocation
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
2A9B000
|
stack
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
18E8000
|
direct allocation
|
page execute and read and write
|
||
D9E000
|
heap
|
page read and write
|
||
550E000
|
heap
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
trusted library allocation
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
D72000
|
trusted library allocation
|
page read and write
|
||
D6A000
|
trusted library allocation
|
page execute and read and write
|
||
7ADE000
|
stack
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
D7B000
|
trusted library allocation
|
page execute and read and write
|
||
70AA000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library section
|
page readonly
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
A3A000
|
stack
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page execute and read and write
|
||
F8E000
|
stack
|
page read and write
|
||
A334000
|
heap
|
page read and write
|
||
D77000
|
trusted library allocation
|
page execute and read and write
|
||
D66000
|
trusted library allocation
|
page execute and read and write
|
||
1060000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1851000
|
direct allocation
|
page execute and read and write
|
||
7F420000
|
trusted library allocation
|
page execute and read and write
|
||
D4D000
|
trusted library allocation
|
page execute and read and write
|
||
2B10000
|
heap
|
page execute and read and write
|
||
1230000
|
heap
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
D43000
|
trusted library allocation
|
page execute and read and write
|
||
76EF000
|
stack
|
page read and write
|
||
186D000
|
direct allocation
|
page execute and read and write
|
||
782F000
|
stack
|
page read and write
|
||
6FF0000
|
trusted library section
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
DD1000
|
heap
|
page read and write
|
||
A66E000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
trusted library section
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
16C9000
|
direct allocation
|
page execute and read and write
|
||
1287000
|
heap
|
page read and write
|
||
A330000
|
heap
|
page read and write
|
||
A56D000
|
stack
|
page read and write
|
||
3B21000
|
trusted library allocation
|
page read and write
|
||
173E000
|
direct allocation
|
page execute and read and write
|
||
6BE0000
|
trusted library allocation
|
page read and write
|
||
1866000
|
direct allocation
|
page execute and read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page execute and read and write
|
||
5050000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
29C8000
|
trusted library allocation
|
page read and write
|
||
16CD000
|
direct allocation
|
page execute and read and write
|
||
3B29000
|
trusted library allocation
|
page read and write
|
||
523B000
|
stack
|
page read and write
|
||
A230000
|
heap
|
page read and write
|
||
3D4A000
|
trusted library allocation
|
page read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
B37000
|
stack
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
4F65000
|
trusted library allocation
|
page read and write
|
||
2ADD000
|
trusted library allocation
|
page read and write
|
||
D5D000
|
trusted library allocation
|
page execute and read and write
|
||
A22D000
|
stack
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
E6D000
|
stack
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
5063000
|
heap
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page read and write
|
||
A52F000
|
stack
|
page read and write
|
||
2C18000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
6F2000
|
unkown
|
page readonly
|
||
2BC6000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
52E5000
|
heap
|
page read and write
|
||
6F0000
|
unkown
|
page readonly
|
There are 119 hidden memdumps, click here to show them.