Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.PWSX-gen.18165.6818.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.18165.6818.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\188E93\31437F.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18165.6818.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18165.6818.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18165.6818.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18165.6818.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
http://24.199.107.111/index.php/0672554332862
|
24.199.107.111
|
||
http://alphastand.top/alien/fre.php
|
|||
http://www.ctvnews.ca/rss/business/ctv-news-business-headlines-1.867648
|
unknown
|
||
http://www.ctvnews.ca/rss/ctvnews-ca-top-stories-public-rss-1.822009
|
unknown
|
||
http://xml.weather.yahoo.com/ns/rss/1.0
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://www.ibsensoftware.com/
|
unknown
|
||
http://weather.yahooapis.com/forecastrss?w=4118
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
windowsupdatebg.s.llnwi.net
|
69.164.42.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
24.199.107.111
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
10F8000
|
heap
|
page read and write
|
||
2FD4000
|
heap
|
page read and write
|
||
444E000
|
trusted library allocation
|
page read and write
|
||
2AC2000
|
trusted library allocation
|
page read and write
|
||
44CA000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
2870000
|
trusted library allocation
|
page execute and read and write
|
||
9B5F000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library section
|
page read and write
|
||
A0E0000
|
trusted library section
|
page read and write
|
||
9E90000
|
trusted library allocation
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
4363000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
44E4000
|
trusted library allocation
|
page read and write
|
||
27DD000
|
trusted library allocation
|
page execute and read and write
|
||
B92000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
3A79000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library allocation
|
page execute and read and write
|
||
7252000
|
trusted library allocation
|
page read and write
|
||
27F6000
|
trusted library allocation
|
page execute and read and write
|
||
4FDD000
|
trusted library allocation
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
4F45000
|
trusted library allocation
|
page read and write
|
||
4BAC000
|
stack
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
4F16000
|
trusted library allocation
|
page read and write
|
||
EDE000
|
stack
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page execute and read and write
|
||
E97000
|
heap
|
page read and write
|
||
B5E000
|
heap
|
page read and write
|
||
5255000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
4EF4000
|
trusted library allocation
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
7F8A0000
|
trusted library allocation
|
page execute and read and write
|
||
B77000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page execute and read and write
|
||
7120000
|
trusted library section
|
page read and write
|
||
4FD9000
|
trusted library allocation
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
4FD2000
|
trusted library allocation
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
2953000
|
heap
|
page read and write
|
||
2AB9000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
522B000
|
stack
|
page read and write
|
||
70AF000
|
stack
|
page read and write
|
||
27ED000
|
trusted library allocation
|
page execute and read and write
|
||
12EF000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6D2E000
|
stack
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
5180000
|
heap
|
page execute and read and write
|
||
5250000
|
heap
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
103D000
|
stack
|
page read and write
|
||
4AAB000
|
stack
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
49F000
|
remote allocation
|
page execute and read and write
|
||
27D4000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
trusted library section
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
stack
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
6D2000
|
unkown
|
page readonly
|
||
27E3000
|
trusted library allocation
|
page read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
6B5E000
|
heap
|
page read and write
|
||
27FA000
|
trusted library allocation
|
page execute and read and write
|
||
280B000
|
trusted library allocation
|
page execute and read and write
|
||
C50000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
5230000
|
trusted library section
|
page readonly
|
||
6CE0000
|
trusted library allocation
|
page execute and read and write
|
||
27D3000
|
trusted library allocation
|
page execute and read and write
|
||
2AE9000
|
trusted library allocation
|
page read and write
|
||
2890000
|
trusted library allocation
|
page execute and read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
2C4D000
|
trusted library allocation
|
page read and write
|
||
4F11000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
4F1D000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
797E000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page execute and read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
4F0E000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
2AEB000
|
trusted library allocation
|
page read and write
|
||
7730000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
4315000
|
trusted library allocation
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
28A5000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
heap
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
2807000
|
trusted library allocation
|
page execute and read and write
|
||
27F2000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
5A60000
|
heap
|
page read and write
|
||
6F6F000
|
stack
|
page read and write
|
||
6B50000
|
heap
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
There are 138 hidden memdumps, click here to show them.