IOC Report
SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
malicious

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://ocsp.sectigo.com0A
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://us2.smtp.mailhostbox.com
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.199.224

IPs

IP
Domain
Country
Malicious
208.91.199.224
us2.smtp.mailhostbox.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2FD1000
trusted library allocation
page read and write
malicious
3F19000
trusted library allocation
page read and write
malicious
5960000
trusted library section
page read and write
malicious
4907000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
301E000
trusted library allocation
page read and write
malicious
2E90000
trusted library allocation
page read and write
551D000
trusted library allocation
page read and write
BF22000
heap
page read and write
5516000
trusted library allocation
page read and write
164B000
trusted library allocation
page execute and read and write
11E1000
heap
page read and write
1303000
trusted library allocation
page read and write
664F000
stack
page read and write
54A2000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
50AC000
stack
page read and write
5710000
heap
page read and write
5ACE000
stack
page read and write
5680000
heap
page execute and read and write
400000
remote allocation
page execute and read and write
1150000
heap
page read and write
3038000
trusted library allocation
page read and write
3026000
trusted library allocation
page read and write
1178000
heap
page read and write
5990000
trusted library section
page read and write
1256000
heap
page read and write
1234000
heap
page read and write
1337000
trusted library allocation
page execute and read and write
1642000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
615E000
stack
page read and write
2F11000
trusted library allocation
page read and write
11FE000
heap
page read and write
11E7000
heap
page read and write
C3C000
unkown
page readonly
5453000
heap
page read and write
1647000
trusted library allocation
page execute and read and write
1690000
trusted library allocation
page read and write
11FC000
heap
page read and write
119A000
heap
page read and write
3FF9000
trusted library allocation
page read and write
65B0000
trusted library allocation
page execute and read and write
2DB0000
trusted library allocation
page read and write
1310000
heap
page read and write
1614000
trusted library allocation
page read and write
1170000
heap
page read and write
BE2E000
stack
page read and write
BDEE000
stack
page read and write
6C4F000
stack
page read and write
1330000
trusted library allocation
page read and write
C2EE000
stack
page read and write
3303000
trusted library allocation
page read and write
550A000
trusted library allocation
page read and write
301C000
trusted library allocation
page read and write
481C000
trusted library allocation
page read and write
32EA000
trusted library allocation
page read and write
5860000
heap
page read and write
1640000
trusted library allocation
page read and write
120C000
heap
page read and write
B92000
unkown
page readonly
2EB0000
heap
page execute and read and write
2EF0000
trusted library allocation
page read and write
575E000
stack
page read and write
C1EE000
stack
page read and write
5AD0000
trusted library allocation
page read and write
85C0000
heap
page read and write
161D000
trusted library allocation
page execute and read and write
4F10000
trusted library section
page read and write
6DD0000
heap
page read and write
70B0000
heap
page read and write
1613000
trusted library allocation
page execute and read and write
550E000
trusted library allocation
page read and write
DDA000
stack
page read and write
5AE0000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
BE30000
trusted library allocation
page execute and read and write
BF02000
heap
page read and write
3FD1000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
2FC0000
heap
page read and write
54C0000
heap
page execute and read and write
2DD0000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
B90000
unkown
page readonly
4FAB000
trusted library allocation
page read and write
1326000
trusted library allocation
page execute and read and write
1645000
trusted library allocation
page execute and read and write
2D90000
trusted library allocation
page execute and read and write
66A7000
trusted library allocation
page read and write
11A8000
heap
page read and write
6DE0000
trusted library allocation
page execute and read and write
12E0000
trusted library allocation
page read and write
2D8C000
stack
page read and write
6A7C000
heap
page read and write
6556000
trusted library allocation
page read and write
1632000
trusted library allocation
page read and write
15AF000
stack
page read and write
C32E000
stack
page read and write
BEF7000
heap
page read and write
5416000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
5A8D000
stack
page read and write
1660000
trusted library allocation
page read and write
CCA000
stack
page read and write
3056000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
54FE000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
65AD000
stack
page read and write
51AE000
stack
page read and write
50AC000
stack
page read and write
86CD000
stack
page read and write
1040000
heap
page read and write
540E000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
126B000
heap
page read and write
1264000
heap
page read and write
11DF000
heap
page read and write
1030000
heap
page read and write
3F11000
trusted library allocation
page read and write
6560000
trusted library allocation
page execute and read and write
6690000
trusted library allocation
page read and write
11C0000
heap
page read and write
619E000
stack
page read and write
12F0000
trusted library allocation
page read and write
594E000
stack
page read and write
684E000
stack
page read and write
6DA0000
trusted library allocation
page read and write
13A0000
heap
page read and write
85AD000
stack
page read and write
11CE000
heap
page read and write
C430000
trusted library allocation
page read and write
5A4E000
stack
page read and write
1600000
trusted library allocation
page read and write
5869000
heap
page read and write
54F0000
trusted library allocation
page read and write
1050000
heap
page read and write
12F3000
trusted library allocation
page execute and read and write
139E000
stack
page read and write
6B4E000
stack
page read and write
1636000
trusted library allocation
page execute and read and write
1201000
heap
page read and write
C0EE000
stack
page read and write
5550000
heap
page read and write
47CE000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
5533000
heap
page read and write
5502000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
82B1000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
BE40000
trusted library allocation
page read and write
5700000
trusted library allocation
page execute and read and write
1610000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
5FFC000
stack
page read and write
6D90000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
12F4000
trusted library allocation
page read and write
54FB000
trusted library allocation
page read and write
133B000
trusted library allocation
page execute and read and write
6A10000
heap
page read and write
1332000
trusted library allocation
page read and write
5522000
trusted library allocation
page read and write
163A000
trusted library allocation
page execute and read and write
6030000
heap
page read and write
11A5000
heap
page read and write
1259000
heap
page read and write
C42E000
stack
page read and write
2DC0000
trusted library allocation
page read and write
585E000
stack
page read and write
132A000
trusted library allocation
page execute and read and write
2DE0000
heap
page read and write
1670000
trusted library allocation
page execute and read and write
6550000
trusted library allocation
page read and write
3045000
trusted library allocation
page read and write
118E000
heap
page read and write
5440000
trusted library allocation
page read and write
1289000
heap
page read and write
629E000
stack
page read and write
4FA0000
trusted library allocation
page read and write
1140000
heap
page read and write
5490000
heap
page read and write
12FD000
trusted library allocation
page execute and read and write
16A0000
heap
page read and write
6A1C000
heap
page read and write
14C0000
heap
page read and write
7F730000
trusted library allocation
page execute and read and write
5A00000
trusted library allocation
page read and write
668E000
stack
page read and write
11AE000
stack
page read and write
54F6000
trusted library allocation
page read and write
304A000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
11FF000
heap
page read and write
DC7000
stack
page read and write
6050000
trusted library allocation
page execute and read and write
1160000
heap
page read and write
7F190000
trusted library allocation
page execute and read and write
1630000
trusted library allocation
page read and write
BEF0000
heap
page read and write
590C000
stack
page read and write
2E8E000
stack
page read and write
2E94000
trusted library allocation
page read and write
162D000
trusted library allocation
page execute and read and write
2EA0000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
2F00000
heap
page execute and read and write
54F0000
trusted library allocation
page read and write
2DCF000
trusted library allocation
page read and write
5530000
heap
page read and write
2EEF000
stack
page read and write
4FD8000
trusted library allocation
page read and write
59DE000
stack
page read and write
541D000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
11F4000
heap
page read and write
5422000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
BE42000
trusted library allocation
page read and write
580C000
stack
page read and write
1320000
trusted library allocation
page read and write
123F000
heap
page read and write
54B0000
trusted library allocation
page execute and read and write
2F5F000
trusted library allocation
page read and write
6A56000
heap
page read and write
130D000
trusted library allocation
page execute and read and write
4039000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
10F8000
stack
page read and write
5450000
heap
page read and write
2FBE000
stack
page read and write
59E0000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
14AF000
stack
page read and write
116E000
stack
page read and write
There are 228 hidden memdumps, click here to show them.