IOC Report
SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsd4C7.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\polaritets\Klipbok.Vid
data
dropped
C:\Users\user\polaritets\Muskel.Nit
data
dropped
C:\Users\user\polaritets\Observationsposters.tor
data
dropped
C:\Users\user\polaritets\drupes.ret
data
dropped
C:\Users\user\polaritets\quodlibetic.fes
data
dropped
C:\Users\user\polaritets\roere.hid
data
dropped
C:\Users\user\polaritets\socialmedicin.sej
data
dropped
C:\Users\user\polaritets\toader.txt
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.4932.17674.exe"
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
69E2000
direct allocation
page execute and read and write
malicious
4D8000
heap
page read and write
2799000
heap
page read and write
2798000
heap
page read and write
4D0000
heap
page read and write
502000
heap
page read and write
49AC000
stack
page read and write
81F000
stack
page read and write
50E000
heap
page read and write
6F940000
unkown
page readonly
502000
heap
page read and write
50E000
heap
page read and write
513000
heap
page read and write
513000
heap
page read and write
9C0000
heap
page read and write
49E000
stack
page read and write
2340000
heap
page read and write
55E2000
direct allocation
page execute and read and write
408000
unkown
page readonly
408000
unkown
page readonly
2791000
heap
page read and write
44C000
unkown
page readonly
50E000
heap
page read and write
542000
heap
page read and write
40A000
unkown
page read and write
4AAD000
stack
page read and write
9C5000
heap
page read and write
502000
heap
page read and write
279C000
heap
page read and write
434000
unkown
page read and write
513000
heap
page read and write
51E000
heap
page read and write
4A0000
heap
page read and write
513000
heap
page read and write
546000
heap
page read and write
50E000
heap
page read and write
2310000
heap
page read and write
425000
unkown
page read and write
4BE2000
direct allocation
page execute and read and write
502000
heap
page read and write
400000
unkown
page readonly
543000
heap
page read and write
640000
heap
page read and write
6F946000
unkown
page readonly
50E000
heap
page read and write
2320000
heap
page read and write
6F941000
unkown
page execute read
50E000
heap
page read and write
2344000
heap
page read and write
50E000
heap
page read and write
543000
heap
page read and write
528000
heap
page read and write
502000
heap
page read and write
50E000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
279A000
heap
page read and write
44C000
unkown
page readonly
42C000
unkown
page read and write
6F944000
unkown
page readonly
2794000
heap
page read and write
513000
heap
page read and write
427000
unkown
page read and write
513000
heap
page read and write
513000
heap
page read and write
7DE2000
direct allocation
page execute and read and write
513000
heap
page read and write
91E2000
direct allocation
page execute and read and write
525000
heap
page read and write
19A000
stack
page read and write
513000
heap
page read and write
51A000
heap
page read and write
98000
stack
page read and write
53A000
heap
page read and write
502000
heap
page read and write
401000
unkown
page execute read
2796000
heap
page read and write
450000
heap
page read and write
543000
heap
page read and write
2797000
heap
page read and write
502000
heap
page read and write
502000
heap
page read and write
279A000
heap
page read and write
513000
heap
page read and write
87E2000
direct allocation
page execute and read and write
279C000
heap
page read and write
502000
heap
page read and write
3690000
trusted library allocation
page read and write
50E000
heap
page read and write
400000
unkown
page readonly
543000
heap
page read and write
40A000
unkown
page write copy
73E2000
direct allocation
page execute and read and write
50E000
heap
page read and write
401000
unkown
page execute read
5FE2000
direct allocation
page execute and read and write
There are 85 hidden memdumps, click here to show them.