Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe.log
|
CSV text
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
17AE4894000
|
heap
|
page read and write
|
||
17AE6361000
|
trusted library allocation
|
page read and write
|
||
17AE4790000
|
heap
|
page read and write
|
||
17AE4A60000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
17AE486C000
|
heap
|
page read and write
|
||
17AE48D4000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
17AE48A0000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
17AE4866000
|
heap
|
page read and write
|
||
17AF6363000
|
trusted library allocation
|
page read and write
|
||
17AE4690000
|
heap
|
page read and write
|
||
17AE487F000
|
heap
|
page read and write
|
||
17AE4860000
|
heap
|
page read and write
|
||
17AF6365000
|
trusted library allocation
|
page read and write
|
||
17AE4883000
|
heap
|
page read and write
|
||
17AE4820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
17AE4530000
|
unkown
|
page readonly
|
||
2634FE000
|
stack
|
page read and write
|
||
2637FC000
|
stack
|
page read and write
|
||
17AE4BB0000
|
heap
|
page read and write
|
||
17AE47B0000
|
heap
|
page read and write
|
||
17AE4532000
|
unkown
|
page readonly
|
||
17AE488A000
|
heap
|
page read and write
|
||
7FFD9B915000
|
trusted library allocation
|
page read and write
|
||
17AF6361000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
17AE48CE000
|
heap
|
page read and write
|
||
7FF4D4710000
|
trusted library allocation
|
page execute and read and write
|
||
17AE4A30000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
2632F6000
|
stack
|
page read and write
|
||
17AE4530000
|
unkown
|
page readonly
|
||
2633FF000
|
stack
|
page read and write
|
||
17AE4800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
17AE4B70000
|
heap
|
page execute and read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
17AE4770000
|
heap
|
page read and write
|
||
17AE48A2000
|
heap
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page read and write
|
||
17AE4604000
|
unkown
|
page readonly
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
2636FE000
|
stack
|
page read and write
|
||
2635FF000
|
stack
|
page read and write
|
There are 41 hidden memdumps, click here to show them.