IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe.log
CSV text
modified
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.740.29920.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
17AE4894000
heap
page read and write
17AE6361000
trusted library allocation
page read and write
17AE4790000
heap
page read and write
17AE4A60000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
17AE486C000
heap
page read and write
17AE48D4000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
17AE48A0000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
17AE4866000
heap
page read and write
17AF6363000
trusted library allocation
page read and write
17AE4690000
heap
page read and write
17AE487F000
heap
page read and write
17AE4860000
heap
page read and write
17AF6365000
trusted library allocation
page read and write
17AE4883000
heap
page read and write
17AE4820000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
17AE4530000
unkown
page readonly
2634FE000
stack
page read and write
2637FC000
stack
page read and write
17AE4BB0000
heap
page read and write
17AE47B0000
heap
page read and write
17AE4532000
unkown
page readonly
17AE488A000
heap
page read and write
7FFD9B915000
trusted library allocation
page read and write
17AF6361000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
17AE48CE000
heap
page read and write
7FF4D4710000
trusted library allocation
page execute and read and write
17AE4A30000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
2632F6000
stack
page read and write
17AE4530000
unkown
page readonly
2633FF000
stack
page read and write
17AE4800000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
17AE4B70000
heap
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
17AE4770000
heap
page read and write
17AE48A2000
heap
page read and write
7FFD9B91D000
trusted library allocation
page read and write
17AE4604000
unkown
page readonly
7FFD9B7CC000
trusted library allocation
page execute and read and write
2636FE000
stack
page read and write
2635FF000
stack
page read and write
There are 41 hidden memdumps, click here to show them.