IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.elf
ISO-8859 text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.20871.16748.exe"

URLs

Name
IP
Malicious
http://www.winimage.com/zLibDll
unknown
http://www.winimage.com/zLibDll-1.2.3rbr
unknown
http://fastmm.sourceforge.net).
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4BE0000
direct allocation
page read and write
874000
heap
page read and write
2D7E000
stack
page read and write
874000
heap
page read and write
874000
heap
page read and write
636000
unkown
page write copy
4C03000
direct allocation
page read and write
874000
heap
page read and write
874000
heap
page read and write
2538000
direct allocation
page read and write
2533000
direct allocation
page read and write
930000
heap
page read and write
874000
heap
page read and write
9F0000
heap
page read and write
25B2000
direct allocation
page read and write
874000
heap
page read and write
A1F000
heap
page read and write
47B8000
heap
page read and write
874000
heap
page read and write
4770000
heap
page read and write
9F2000
heap
page read and write
874000
heap
page read and write
19C000
stack
page read and write
A01000
heap
page read and write
252E000
direct allocation
page read and write
9F6000
heap
page read and write
4BC6000
direct allocation
page read and write
25DC000
direct allocation
page read and write
874000
heap
page read and write
582E000
stack
page read and write
2D40000
trusted library allocation
page read and write
A40000
heap
page read and write
47A5000
heap
page read and write
404000
unkown
page execute read
874000
heap
page read and write
24FC000
direct allocation
page read and write
874000
heap
page read and write
9AD000
heap
page read and write
874000
heap
page read and write
646000
unkown
page write copy
A63000
heap
page read and write
592F000
stack
page read and write
2500000
direct allocation
page read and write
25B2000
direct allocation
page read and write
97A000
heap
page read and write
24DA000
heap
page read and write
874000
heap
page read and write
4C00000
direct allocation
page read and write
A0F000
heap
page read and write
874000
heap
page read and write
4BC4000
direct allocation
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
4FF0000
trusted library allocation
page read and write
4D4000
unkown
page execute read
874000
heap
page read and write
47A9000
heap
page read and write
A0E000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
4EF1000
heap
page read and write
635000
unkown
page execute and read and write
874000
heap
page read and write
47D4000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
A0F000
heap
page read and write
4BF4000
direct allocation
page read and write
874000
heap
page read and write
A0F000
heap
page read and write
66E000
unkown
page readonly
874000
heap
page read and write
96000
stack
page read and write
2DBE000
stack
page read and write
4BD4000
direct allocation
page read and write
874000
heap
page read and write
4AAF000
stack
page read and write
97E000
heap
page read and write
2F73000
heap
page read and write
9F6000
heap
page read and write
A27000
heap
page read and write
9F5000
heap
page read and write
1F0000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
2508000
direct allocation
page read and write
401000
unkown
page execute read
874000
heap
page read and write
64A000
unkown
page readonly
9AC000
heap
page read and write
641000
unkown
page read and write
24D0000
heap
page read and write
47A2000
heap
page read and write
4780000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
25B0000
direct allocation
page read and write
874000
heap
page read and write
870000
heap
page read and write
874000
heap
page read and write
63D000
unkown
page read and write
9F0000
heap
page read and write
874000
heap
page read and write
9FF000
heap
page read and write
9F0000
heap
page read and write
A5B000
heap
page read and write
874000
heap
page read and write
2509000
direct allocation
page read and write
2573000
direct allocation
page read and write
874000
heap
page read and write
24D6000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
47AF000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
970000
heap
page read and write
2508000
direct allocation
page read and write
4BC8000
direct allocation
page read and write
874000
heap
page read and write
A1F000
heap
page read and write
9FB000
heap
page read and write
4AB0000
direct allocation
page read and write
4C04000
direct allocation
page read and write
874000
heap
page read and write
874000
heap
page read and write
874000
heap
page read and write
9F6000
heap
page read and write
9C8000
heap
page read and write
A43000
heap
page read and write
400000
unkown
page readonly
874000
heap
page read and write
900000
heap
page read and write
4EF0000
heap
page read and write
9A6000
heap
page read and write
4BB0000
direct allocation
page read and write
4771000
heap
page read and write
636000
unkown
page read and write
810000
heap
page read and write
874000
heap
page read and write
49AF000
stack
page read and write
2560000
direct allocation
page read and write
8C0000
unclassified section
page read and write
9C8000
heap
page read and write
250C000
direct allocation
page read and write
346E000
stack
page read and write
2E1E000
stack
page read and write
2501000
direct allocation
page read and write
874000
heap
page read and write
9F0000
heap
page read and write
4EF1000
heap
page read and write
2F70000
heap
page read and write
24F9000
direct allocation
page read and write
4BAF000
stack
page read and write
9F6000
heap
page read and write
24FB000
direct allocation
page execute and read and write
9FE000
heap
page read and write
3420000
heap
page read and write
2528000
direct allocation
page read and write
5A2F000
stack
page read and write
24E0000
direct allocation
page read and write
644000
unkown
page read and write
910000
direct allocation
page execute and read and write
874000
heap
page read and write
There are 172 hidden memdumps, click here to show them.