IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cqz53mx0.fnv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ixtqhfaq.xnb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ueeh2mli.5vx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xe3tlqns.qbm.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26512.27594.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
www.uggernauty.net/t94g/
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown

Domains

Name
IP
Malicious
241.42.69.40.in-addr.arpa
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
359C000
trusted library allocation
page read and write
malicious
4E20000
heap
page read and write
499E000
trusted library allocation
page read and write
994000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
791000
heap
page read and write
67F0000
trusted library allocation
page execute and read and write
248C000
stack
page read and write
67AF000
stack
page read and write
B3CE000
stack
page read and write
AD2000
trusted library allocation
page read and write
9A3000
trusted library allocation
page read and write
139D000
direct allocation
page execute and read and write
D70000
heap
page read and write
AC0000
trusted library allocation
page read and write
98E000
stack
page read and write
B15F000
stack
page read and write
4A40000
trusted library allocation
page execute and read and write
132000
unkown
page readonly
11FD000
direct allocation
page execute and read and write
B64C000
stack
page read and write
498B000
trusted library allocation
page read and write
808000
heap
page read and write
B20000
heap
page read and write
784000
heap
page read and write
7FF000
heap
page read and write
610000
heap
page read and write
9AD000
trusted library allocation
page execute and read and write
72E000
stack
page read and write
4B30000
trusted library allocation
page read and write
B4CE000
stack
page read and write
10D0000
direct allocation
page execute and read and write
B68E000
stack
page read and write
AC2000
trusted library allocation
page read and write
B95000
trusted library allocation
page read and write
49C3000
heap
page read and write
463C000
stack
page read and write
C90000
heap
page read and write
7C0000
heap
page read and write
126E000
direct allocation
page execute and read and write
AF0000
trusted library allocation
page read and write
B29E000
stack
page read and write
4E0D000
stack
page read and write
B70000
trusted library allocation
page read and write
6840000
trusted library allocation
page execute and read and write
6B9E000
stack
page read and write
49AD000
trusted library allocation
page read and write
B19D000
stack
page read and write
4BF0000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
B00000
trusted library allocation
page execute and read and write
6AAE000
stack
page read and write
4A00000
trusted library allocation
page read and write
BA0000
heap
page read and write
6850000
trusted library allocation
page read and write
6855000
trusted library allocation
page read and write
750000
heap
page read and write
B78E000
stack
page read and write
AF61000
heap
page read and write
AC6000
trusted library allocation
page execute and read and write
BA4000
heap
page read and write
4A52000
trusted library allocation
page read and write
24A1000
trusted library allocation
page read and write
4F7E000
stack
page read and write
6820000
trusted library allocation
page read and write
65B0000
heap
page read and write
AE5E000
stack
page read and write
AD7000
trusted library allocation
page execute and read and write
4E10000
heap
page read and write
B6E000
stack
page read and write
2490000
heap
page execute and read and write
4C10000
heap
page execute and read and write
834F000
heap
page read and write
67B0000
trusted library section
page read and write
4A50000
trusted library allocation
page read and write
75D000
stack
page read and write
4BC0000
trusted library section
page readonly
5E0000
heap
page read and write
49C0000
heap
page read and write
34A1000
trusted library allocation
page read and write
7F4F0000
trusted library allocation
page execute and read and write
130000
unkown
page readonly
6880000
trusted library allocation
page execute and read and write
7ED000
heap
page read and write
B80000
trusted library allocation
page read and write
11F9000
direct allocation
page execute and read and write
4E55000
heap
page read and write
9A0000
trusted library allocation
page read and write
777000
heap
page read and write
6AF0000
trusted library section
page read and write
6830000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
49A1000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
AC5F000
stack
page read and write
4B9B000
stack
page read and write
ACA000
trusted library allocation
page execute and read and write
4BD0000
heap
page read and write
1381000
direct allocation
page execute and read and write
ABE000
stack
page read and write
82F0000
heap
page read and write
49A6000
trusted library allocation
page read and write
4BA0000
heap
page read and write
1396000
direct allocation
page execute and read and write
49D0000
trusted library allocation
page read and write
6800000
trusted library allocation
page execute and read and write
68CE000
stack
page read and write
6AED000
stack
page read and write
B54C000
stack
page read and write
4A60000
trusted library allocation
page read and write
75E000
heap
page read and write
834000
heap
page read and write
67E0000
trusted library allocation
page read and write
993000
trusted library allocation
page execute and read and write
B60000
heap
page read and write
1418000
direct allocation
page execute and read and write
6860000
trusted library allocation
page read and write
831000
heap
page read and write
4A5A000
trusted library allocation
page read and write
AFE000
stack
page read and write
ADB000
trusted library allocation
page execute and read and write
567000
stack
page read and write
44A8000
trusted library allocation
page read and write
855E000
stack
page read and write
4BE0000
trusted library allocation
page execute and read and write
99D000
trusted library allocation
page execute and read and write
67D1000
trusted library allocation
page read and write
4B40000
trusted library allocation
page execute and read and write
82F5000
heap
page read and write
69CE000
stack
page read and write
4E30000
heap
page read and write
AD5F000
stack
page read and write
94E000
stack
page read and write
B4F0000
heap
page read and write
4B20000
trusted library allocation
page read and write
9B0000
heap
page read and write
6810000
trusted library allocation
page read and write
4BB0000
heap
page read and write
6A0E000
stack
page read and write
34A9000
trusted library allocation
page read and write
6CB2000
trusted library allocation
page read and write
4E15000
heap
page read and write
4A30000
heap
page read and write
244E000
stack
page read and write
AF5D000
stack
page read and write
B90000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
740000
trusted library allocation
page read and write
469000
stack
page read and write
5D0000
heap
page read and write
There are 141 hidden memdumps, click here to show them.