IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.16719.9062.exe"
malicious

URLs

Name
IP
Malicious
www.awlc7038.vip/b31a/
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
3BE7000
trusted library allocation
page read and write
malicious
A02D000
stack
page read and write
2D8E000
trusted library allocation
page read and write
71D2000
trusted library allocation
page read and write
4C1C000
stack
page read and write
52D0000
trusted library allocation
page execute and read and write
29B0000
heap
page read and write
FE0000
heap
page read and write
29A0000
trusted library allocation
page execute and read and write
D53000
trusted library allocation
page read and write
127E000
stack
page read and write
F6E000
stack
page read and write
52E0000
heap
page read and write
4F60000
trusted library allocation
page read and write
52C0000
heap
page read and write
53FE000
stack
page read and write
15A0000
direct allocation
page execute and read and write
A06D000
stack
page read and write
4F90000
trusted library allocation
page read and write
B80000
heap
page read and write
5500000
heap
page read and write
D1E000
stack
page read and write
2AD6000
trusted library allocation
page read and write
D44000
trusted library allocation
page read and write
6E4E000
stack
page read and write
2A9B000
stack
page read and write
796E000
stack
page read and write
BC0000
heap
page read and write
108E000
stack
page read and write
18E8000
direct allocation
page execute and read and write
D9E000
heap
page read and write
550E000
heap
page read and write
5030000
heap
page read and write
5430000
heap
page read and write
2AD1000
trusted library allocation
page read and write
5400000
heap
page read and write
4FD0000
heap
page read and write
2AA0000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
5410000
heap
page read and write
D72000
trusted library allocation
page read and write
D6A000
trusted library allocation
page execute and read and write
7ADE000
stack
page read and write
772E000
stack
page read and write
786E000
stack
page read and write
D90000
heap
page read and write
D7B000
trusted library allocation
page execute and read and write
70AA000
trusted library allocation
page read and write
5040000
trusted library section
page readonly
1230000
trusted library allocation
page read and write
5060000
heap
page read and write
CDE000
stack
page read and write
75EE000
stack
page read and write
70A0000
trusted library allocation
page read and write
E7A000
heap
page read and write
A3A000
stack
page read and write
4FF0000
trusted library allocation
page execute and read and write
F8E000
stack
page read and write
A334000
heap
page read and write
D77000
trusted library allocation
page execute and read and write
D66000
trusted library allocation
page execute and read and write
1060000
heap
page read and write
B90000
heap
page read and write
1851000
direct allocation
page execute and read and write
7F420000
trusted library allocation
page execute and read and write
D4D000
trusted library allocation
page execute and read and write
2B10000
heap
page execute and read and write
1230000
heap
page read and write
D50000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
D43000
trusted library allocation
page execute and read and write
76EF000
stack
page read and write
186D000
direct allocation
page execute and read and write
782F000
stack
page read and write
6FF0000
trusted library section
page read and write
299E000
stack
page read and write
DD1000
heap
page read and write
A66E000
stack
page read and write
6CF0000
trusted library allocation
page read and write
6BD0000
trusted library section
page read and write
2AB0000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
16C9000
direct allocation
page execute and read and write
1287000
heap
page read and write
A330000
heap
page read and write
A56D000
stack
page read and write
3B21000
trusted library allocation
page read and write
173E000
direct allocation
page execute and read and write
6BE0000
trusted library allocation
page read and write
1866000
direct allocation
page execute and read and write
2B00000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
5050000
heap
page read and write
4F70000
trusted library allocation
page read and write
29C8000
trusted library allocation
page read and write
16CD000
direct allocation
page execute and read and write
3B29000
trusted library allocation
page read and write
523B000
stack
page read and write
A230000
heap
page read and write
3D4A000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
1280000
heap
page read and write
5600000
trusted library allocation
page read and write
52F0000
heap
page execute and read and write
FC0000
heap
page read and write
B37000
stack
page read and write
6D4E000
stack
page read and write
4F65000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
D5D000
trusted library allocation
page execute and read and write
A22D000
stack
page read and write
4FE2000
trusted library allocation
page read and write
E6D000
stack
page read and write
2AF0000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
5063000
heap
page read and write
2ABB000
trusted library allocation
page read and write
A52F000
stack
page read and write
2C18000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
709E000
stack
page read and write
E7E000
heap
page read and write
6F2000
unkown
page readonly
2BC6000
trusted library allocation
page read and write
D80000
heap
page read and write
52E5000
heap
page read and write
6F0000
unkown
page readonly
There are 119 hidden memdumps, click here to show them.