IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
http://mail.alkuwaiti.com
unknown
http://r3.o.lencr.org0
unknown
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
mail.alkuwaiti.com
50.87.219.149
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
50.87.219.149
mail.alkuwaiti.com
United States
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4E04000
trusted library allocation
page read and write
malicious
2DC1000
trusted library allocation
page read and write
malicious
2DF4000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2DEC000
trusted library allocation
page read and write
malicious
4AA6000
trusted library allocation
page read and write
746E000
stack
page read and write
69E0000
trusted library allocation
page execute and read and write
67B1000
heap
page read and write
65AF000
stack
page read and write
56D0000
trusted library section
page read and write
30B0000
heap
page read and write
5233000
heap
page read and write
1000000
heap
page read and write
6970000
trusted library allocation
page read and write
55EA000
heap
page read and write
E9CE000
stack
page read and write
2D60000
heap
page read and write
115F000
heap
page read and write
5B20000
trusted library allocation
page read and write
5950000
heap
page read and write
5D50000
heap
page read and write
3D99000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
E88E000
stack
page read and write
F6D000
trusted library allocation
page execute and read and write
5940000
trusted library section
page readonly
10F0000
trusted library allocation
page read and write
78A5000
trusted library allocation
page read and write
5C70000
trusted library allocation
page read and write
575E000
stack
page read and write
108A000
trusted library allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
1097000
trusted library allocation
page execute and read and write
1390000
trusted library allocation
page execute and read and write
FE2000
heap
page read and write
1115000
trusted library allocation
page execute and read and write
7410000
trusted library allocation
page read and write
51B6000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
6A8F000
stack
page read and write
5678000
heap
page read and write
EE4F000
stack
page read and write
3DD6000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
6980000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
B5D0000
trusted library section
page read and write
78C0000
trusted library allocation
page execute and read and write
51BE000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
308B000
stack
page read and write
58AB000
trusted library allocation
page read and write
58BE000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
1450000
heap
page read and write
40C1000
trusted library allocation
page read and write
51D6000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
E65000
heap
page read and write
1147000
heap
page read and write
1100000
trusted library allocation
page read and write
5B85000
heap
page read and write
FA8000
heap
page read and write
6EB0000
trusted library allocation
page execute and read and write
5657000
heap
page read and write
F60000
trusted library allocation
page read and write
EE8D000
stack
page read and write
1390000
trusted library allocation
page execute and read and write
2E06000
trusted library allocation
page read and write
108E000
stack
page read and write
10E4000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
5970000
trusted library allocation
page execute and read and write
58D2000
trusted library allocation
page read and write
5B1D000
stack
page read and write
1120000
heap
page read and write
5B60000
heap
page read and write
64AD000
stack
page read and write
1095000
trusted library allocation
page execute and read and write
109B000
trusted library allocation
page execute and read and write
E60000
heap
page read and write
2DE6000
trusted library allocation
page read and write
1102000
trusted library allocation
page read and write
51CA000
trusted library allocation
page read and write
40C9000
trusted library allocation
page read and write
107D000
trusted library allocation
page execute and read and write
102B000
heap
page read and write
1340000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
14BF000
stack
page read and write
585E000
stack
page read and write
51B0000
trusted library allocation
page read and write
40CD000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
6EA0000
heap
page read and write
4DC7000
trusted library allocation
page read and write
5FEE000
stack
page read and write
5380000
heap
page execute and read and write
EC0D000
stack
page read and write
112E000
heap
page read and write
622D000
stack
page read and write
F64000
trusted library allocation
page read and write
646E000
stack
page read and write
7A02000
trusted library allocation
page read and write
2DFF000
trusted library allocation
page read and write
561E000
stack
page read and write
400000
remote allocation
page execute and read and write
1090000
trusted library allocation
page read and write
4E6E000
stack
page read and write
2CFE000
stack
page read and write
11F5000
heap
page read and write
694F000
stack
page read and write
102F000
heap
page read and write
EC10000
heap
page read and write
EF8E000
stack
page read and write
111B000
trusted library allocation
page execute and read and write
6960000
trusted library allocation
page read and write
5790000
heap
page execute and read and write
66EE000
stack
page read and write
10B0000
heap
page read and write
1747000
heap
page read and write
FA5000
heap
page read and write
559E000
stack
page read and write
5200000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
13B8000
trusted library allocation
page read and write
B50000
unkown
page readonly
5240000
heap
page read and write
740B000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
1720000
heap
page read and write
2EF8000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
2D3C000
stack
page read and write
69D0000
heap
page read and write
58A0000
trusted library allocation
page read and write
1005000
heap
page read and write
2DE8000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
5CA0000
trusted library section
page read and write
69CE000
stack
page read and write
1039000
heap
page read and write
E68E000
stack
page read and write
51D1000
trusted library allocation
page read and write
49BB000
trusted library allocation
page read and write
138C000
stack
page read and write
1740000
heap
page read and write
5C50000
trusted library section
page read and write
ABA000
stack
page read and write
1110000
trusted library allocation
page read and write
571E000
stack
page read and write
5230000
heap
page read and write
51BB000
trusted library allocation
page read and write
55C0000
heap
page read and write
31C3000
trusted library allocation
page read and write
756F000
stack
page read and write
E6CE000
stack
page read and write
EACE000
stack
page read and write
5780000
trusted library allocation
page read and write
F63000
trusted library allocation
page execute and read and write
2DB1000
trusted library allocation
page read and write
1086000
trusted library allocation
page execute and read and write
7F6B0000
trusted library allocation
page execute and read and write
78A0000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
102D000
heap
page read and write
58CD000
trusted library allocation
page read and write
65EE000
stack
page read and write
51CE000
trusted library allocation
page read and write
55CC000
stack
page read and write
6AE7000
trusted library allocation
page read and write
FF0000
heap
page read and write
55D7000
heap
page read and write
5CC0000
heap
page read and write
10FD000
trusted library allocation
page execute and read and write
EB0D000
stack
page read and write
33E6000
trusted library allocation
page read and write
7420000
trusted library allocation
page execute and read and write
104E000
stack
page read and write
110A000
trusted library allocation
page execute and read and write
5B50000
heap
page read and write
10F6000
trusted library allocation
page read and write
10A0000
heap
page read and write
F8E000
heap
page read and write
1730000
heap
page execute and read and write
5960000
heap
page read and write
5654000
heap
page read and write
334F000
trusted library allocation
page read and write
636D000
stack
page read and write
13B0000
heap
page read and write
E20000
heap
page read and write
55D0000
heap
page read and write
F78000
heap
page read and write
7FB30000
trusted library allocation
page execute and read and write
30A0000
trusted library allocation
page read and write
6710000
heap
page read and write
BB8000
stack
page read and write
562F000
heap
page read and write
58E0000
trusted library allocation
page read and write
632E000
stack
page read and write
51C2000
trusted library allocation
page read and write
1092000
trusted library allocation
page read and write
E30000
heap
page read and write
1112000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
F9A000
heap
page read and write
58C6000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
ED4E000
stack
page read and write
537C000
stack
page read and write
6752000
heap
page read and write
10E3000
trusted library allocation
page execute and read and write
6E90000
heap
page read and write
5C90000
trusted library section
page read and write
15BE000
stack
page read and write
16C0000
trusted library allocation
page read and write
5D5E000
heap
page read and write
138E000
stack
page read and write
134E000
stack
page read and write
13A0000
heap
page execute and read and write
10ED000
trusted library allocation
page execute and read and write
6789000
heap
page read and write
5669000
heap
page read and write
1161000
heap
page read and write
6E60000
trusted library allocation
page read and write
1457000
heap
page read and write
2DAF000
trusted library allocation
page read and write
55FE000
heap
page read and write
2DEA000
trusted library allocation
page read and write
697D000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
1106000
trusted library allocation
page execute and read and write
51E2000
trusted library allocation
page read and write
589E000
stack
page read and write
E98E000
stack
page read and write
5CC5000
heap
page read and write
1117000
trusted library allocation
page execute and read and write
5672000
heap
page read and write
1082000
trusted library allocation
page read and write
6968000
trusted library allocation
page read and write
55C4000
heap
page read and write
1080000
trusted library allocation
page read and write
E8A000
stack
page read and write
51DD000
trusted library allocation
page read and write
5B40000
heap
page read and write
13A0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page execute and read and write
496D000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
684E000
stack
page read and write
6714000
heap
page read and write
5770000
trusted library allocation
page execute and read and write
6987000
trusted library allocation
page read and write
F70000
heap
page read and write
B52000
unkown
page readonly
16BE000
stack
page read and write
589E000
stack
page read and write
2DBD000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
593B000
stack
page read and write
5930000
heap
page read and write
F86000
stack
page read and write
491F000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
5616000
heap
page read and write
There are 260 hidden memdumps, click here to show them.