IOC Report
SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
malicious

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://ocsp.sectigo.com0A
unknown
https://sectigo.com/CPS0
unknown
http://us2.smtp.mailhostbox.com
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.198.143

IPs

IP
Domain
Country
Malicious
208.91.198.143
us2.smtp.mailhostbox.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2F71000
trusted library allocation
page read and write
malicious
3FFE000
trusted library allocation
page read and write
malicious
1914000
trusted library allocation
page read and write
E25000
heap
page read and write
5940000
trusted library allocation
page read and write
F20000
heap
page read and write
2FC3000
trusted library allocation
page read and write
E95000
heap
page read and write
18BD000
stack
page read and write
2FF9000
trusted library allocation
page read and write
7750000
heap
page read and write
A2DF000
stack
page read and write
D39000
stack
page read and write
FED000
trusted library allocation
page execute and read and write
FE0000
trusted library allocation
page read and write
12BE000
stack
page read and write
1770000
heap
page read and write
1902000
trusted library allocation
page read and write
2DCE000
stack
page read and write
1170000
trusted library allocation
page read and write
1095000
heap
page read and write
1367000
heap
page read and write
7650000
trusted library section
page read and write
1380000
trusted library allocation
page read and write
3E29000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
53D0000
trusted library section
page readonly
57D0000
trusted library section
page read and write
C39000
stack
page read and write
A1DF000
stack
page read and write
1200000
heap
page read and write
59DD000
trusted library allocation
page read and write
E88000
heap
page read and write
5F80000
heap
page read and write
43E000
remote allocation
page execute and read and write
1330000
trusted library allocation
page read and write
F07000
heap
page read and write
57DE000
stack
page read and write
6200000
trusted library allocation
page execute and read and write
569E000
stack
page read and write
1920000
trusted library allocation
page read and write
57F5000
heap
page read and write
1024000
heap
page read and write
2E10000
heap
page execute and read and write
57E0000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
1031000
heap
page read and write
5300000
trusted library allocation
page read and write
8AF7000
trusted library allocation
page read and write
1340000
trusted library allocation
page execute and read and write
102F000
heap
page read and write
581D000
stack
page read and write
53B0000
trusted library allocation
page read and write
117D000
trusted library allocation
page execute and read and write
7070000
heap
page read and write
770E000
stack
page read and write
E60000
heap
page read and write
53AA000
trusted library allocation
page read and write
5450000
heap
page read and write
FFB000
heap
page read and write
18DE000
trusted library allocation
page read and write
3F13000
trusted library allocation
page read and write
59A0000
trusted library allocation
page execute and read and write
5360000
heap
page read and write
E53000
trusted library allocation
page execute and read and write
F0E000
heap
page read and write
18FD000
trusted library allocation
page read and write
624D000
stack
page read and write
59A0000
trusted library allocation
page read and write
5600000
heap
page execute and read and write
43C000
remote allocation
page execute and read and write
794F000
stack
page read and write
1306000
trusted library allocation
page execute and read and write
17BC000
stack
page read and write
61D0000
trusted library allocation
page read and write
2E0B000
stack
page read and write
1180000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
EF8000
stack
page read and write
A92000
unkown
page readonly
1910000
trusted library allocation
page read and write
18F6000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
16B8000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
56DE000
stack
page read and write
FF0000
heap
page read and write
1385000
trusted library allocation
page read and write
130A000
trusted library allocation
page execute and read and write
7754000
heap
page read and write
7F920000
trusted library allocation
page execute and read and write
59D0000
trusted library allocation
page read and write
F30000
heap
page read and write
53E0000
heap
page read and write
5FA0000
heap
page read and write
DA0000
heap
page read and write
2FC7000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
169F000
stack
page read and write
18EE000
trusted library allocation
page read and write
2EAB000
trusted library allocation
page read and write
1195000
trusted library allocation
page execute and read and write
5A07000
trusted library allocation
page read and write
599E000
stack
page read and write
3F71000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
13A0000
heap
page read and write
59A8000
trusted library allocation
page read and write
1186000
trusted library allocation
page execute and read and write
2FED000
trusted library allocation
page read and write
1750000
trusted library allocation
page execute and read and write
591E000
stack
page read and write
F10000
heap
page read and write
E5D000
trusted library allocation
page execute and read and write
FDD000
trusted library allocation
page execute and read and write
57F0000
heap
page read and write
59F0000
trusted library allocation
page read and write
106D000
heap
page read and write
532D000
trusted library allocation
page read and write
6340000
heap
page read and write
18D0000
trusted library allocation
page read and write
594E000
trusted library allocation
page read and write
106E000
stack
page read and write
64ED000
stack
page read and write
7752000
heap
page read and write
3EC5000
trusted library allocation
page read and write
118A000
trusted library allocation
page execute and read and write
1370000
trusted library allocation
page read and write
18D6000
trusted library allocation
page read and write
3FD4000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
10BC000
heap
page read and write
BCA000
stack
page read and write
531E000
trusted library allocation
page read and write
131B000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
2E8D000
trusted library allocation
page read and write
7A4E000
stack
page read and write
559E000
stack
page read and write
FBE000
stack
page read and write
18DB000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
FD3000
trusted library allocation
page execute and read and write
1317000
trusted library allocation
page execute and read and write
5900000
trusted library allocation
page read and write
1182000
trusted library allocation
page read and write
18E2000
trusted library allocation
page read and write
18F1000
trusted library allocation
page read and write
66C8000
heap
page read and write
4FBB000
stack
page read and write
E50000
trusted library allocation
page read and write
5370000
trusted library allocation
page execute and read and write
55E0000
heap
page read and write
F70000
heap
page read and write
3E21000
trusted library allocation
page read and write
2C80000
heap
page read and write
1960000
heap
page read and write
A90000
unkown
page readonly
1300000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
18EA000
trusted library allocation
page read and write
DB0000
heap
page read and write
1760000
trusted library allocation
page read and write
5F70000
heap
page read and write
6A50000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
53F0000
heap
page read and write
7760000
heap
page read and write
1192000
trusted library allocation
page read and write
109F000
heap
page read and write
FE3000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
E54000
trusted library allocation
page read and write
A0DE000
stack
page read and write
11FE000
stack
page read and write
E68000
heap
page read and write
1310000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
FFE000
heap
page read and write
EFB000
heap
page read and write
3E77000
trusted library allocation
page read and write
5400000
heap
page read and write
555C000
stack
page read and write
61C0000
trusted library allocation
page execute and read and write
4E9E000
stack
page read and write
137F000
trusted library allocation
page read and write
5403000
heap
page read and write
5326000
trusted library allocation
page read and write
116E000
unkown
page read and write
12FE000
stack
page read and write
57C0000
trusted library section
page read and write
5950000
trusted library allocation
page execute and read and write
14AE000
stack
page read and write
632D000
stack
page read and write
1197000
trusted library allocation
page execute and read and write
2E63000
trusted library allocation
page read and write
5453000
heap
page read and write
58FD000
stack
page read and write
B40000
unclassified section
page readonly
B2A000
unkown
page readonly
BF0000
unclassified section
page readonly
692E000
stack
page read and write
11B0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
55DB000
stack
page read and write
530B000
trusted library allocation
page read and write
18C0000
trusted library allocation
page read and write
16A0000
heap
page execute and read and write
62EE000
stack
page read and write
E20000
heap
page read and write
E92000
heap
page read and write
542C000
stack
page read and write
119B000
trusted library allocation
page execute and read and write
7272000
trusted library allocation
page read and write
1950000
heap
page execute and read and write
FD4000
trusted library allocation
page read and write
5690000
trusted library section
page read and write
2E5C000
trusted library allocation
page read and write
4E5E000
stack
page read and write
6A2F000
stack
page read and write
2CCE000
stack
page read and write
3F99000
trusted library allocation
page read and write
66B0000
heap
page read and write
5380000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
774E000
stack
page read and write
66F2000
heap
page read and write
1360000
heap
page read and write
2C50000
trusted library allocation
page read and write
61F0000
heap
page read and write
66F5000
heap
page read and write
There are 225 hidden memdumps, click here to show them.