IOC Report
SecuriteInfo.com.Win32.TrojanX-gen.18137.22438.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.TrojanX-gen.18137.22438.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_5ebb57bd92d22f78fe98373a7ac393ea4d1fd2_e15faf63_4c96da8a-481f-4c37-9b32-0f3fff7b9979\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1262.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Mar 29 13:23:52 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14A5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14C5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.18137.22438.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.18137.22438.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 992
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://89.238.170.230:80
malicious
http://89.238.170.230/
89.238.170.230
malicious
http://upx.sf.net
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://89.238.170.230/m
unknown
https://mozilla.org0
unknown
http://89.238.170.230/w
unknown
http://www.sqlite.org/copyright.html.
unknown

IPs

IP
Domain
Country
Malicious
89.238.170.230
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
ProgramId
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
FileId
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
LowerCaseLongPath
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
LongPathHash
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
Name
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
OriginalFileName
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
Publisher
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
Version
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
BinFileVersion
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
BinaryType
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
ProductName
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
ProductVersion
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
LinkDate
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
BinProductVersion
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
AppxPackageFullName
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
AppxPackageRelativeId
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
Size
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
Language
\REGISTRY\A\{2ad23d17-12eb-678a-dd98-30ad4b6444da}\Root\InventoryApplicationFile\securiteinfo.com|e0947cfefea10c17
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
31E6000
trusted library allocation
page read and write
malicious
1586000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1663000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
2F9B000
trusted library allocation
page execute and read and write
17BF000
stack
page read and write
3A8F000
stack
page read and write
1455000
heap
page read and write
1670000
heap
page read and write
31DF000
stack
page read and write
3070000
heap
page execute and read and write
15B2000
heap
page read and write
1410000
heap
page read and write
5B9E000
stack
page read and write
2F90000
trusted library allocation
page read and write
349D000
stack
page read and write
153A000
heap
page read and write
141A000
heap
page read and write
1561000
heap
page read and write
143C000
heap
page read and write
30D0000
heap
page read and write
31E1000
trusted library allocation
page read and write
154E000
stack
page read and write
3040000
trusted library allocation
page execute and read and write
3264000
trusted library allocation
page read and write
1497000
heap
page read and write
14FC000
stack
page read and write
12FA000
stack
page read and write
1664000
trusted library allocation
page read and write
1420000
heap
page read and write
F7C000
stack
page read and write
17C0000
trusted library allocation
page read and write
13D0000
heap
page read and write
5A5F000
stack
page read and write
15AD000
heap
page read and write
141E000
heap
page read and write
359E000
stack
page read and write
FE0000
heap
page read and write
384E000
stack
page read and write
163E000
stack
page read and write
1484000
heap
page read and write
16B0000
heap
page read and write
537E000
stack
page read and write
17D0000
heap
page read and write
398E000
stack
page read and write
EC2000
unkown
page readonly
1445000
heap
page read and write
303D000
stack
page read and write
164F000
stack
page read and write
14A0000
heap
page read and write
12FB000
stack
page read and write
16BE000
stack
page read and write
1452000
heap
page read and write
591E000
stack
page read and write
394F000
stack
page read and write
158E000
heap
page read and write
1593000
heap
page read and write
31E5000
trusted library allocation
page execute and read and write
1650000
trusted library allocation
page read and write
FE0000
heap
page read and write
2FFE000
stack
page read and write
1450000
heap
page read and write
57FE000
stack
page read and write
150A000
heap
page read and write
FD0000
heap
page read and write
5A9E000
stack
page read and write
36EE000
stack
page read and write
3060000
trusted library allocation
page read and write
37EF000
stack
page read and write
2FB0000
trusted library allocation
page read and write
41E1000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
1500000
heap
page read and write
F6B000
stack
page read and write
595E000
stack
page read and write
EC0000
unkown
page readonly
5810000
heap
page execute and read and write
166D000
trusted library allocation
page execute and read and write
2F97000
trusted library allocation
page execute and read and write
157F000
heap
page read and write
There are 71 hidden memdumps, click here to show them.