IOC Report
SecuriteInfo.com.Trojan.MSIL.Rozena.9214.20581.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.MSIL.Rozena.9214.20581.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.Rozena.9214.20581.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MSIL.Rozena.9214.20581.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://html4/loose.dtd
unknown
https://github.com/love2d/love-android/releases/download/11.5a/love-11.5-android-embed.apk7love-11.5
unknown
https://github.com/blake502/balatro-apk-maker/releases/download/Additional-Tools-1.0/Balatro-APK-Pat
unknown
https://aka.ms/dotnet/info
unknown
https://aka.ms/dotnet/download%s%sInstall
unknown
https://dl.google.com/android/repository/platform-tools-latest-windows.zip
unknown
https://aka.ms/dotnet-illink/com
unknown
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=249553_4d245f941845490c91360409ecffb3b4%j
unknown
https://aka.ms/dotnet/app-launch-failed
unknown
https://javadl.oracle.com/webapps/download/AutoDL?BundleId=249553_4d245f941845490c91360409ecffb3b4
unknown
https://github.com/patrickfav/uber-apk-signer/releases/download/v1.3.0/uber-apk-signer-1.3.0.jar
unknown
http://.css
unknown
https://aka.ms/dotnet/app-launch-failedRequired:
unknown
https://aka.ms/dotnet-core-applaunch?
unknown
https://aka.ms/dotnet-illink/com)
unknown
https://github.com/dotnet/runtime
unknown
https://github.com/blake502/balatro-apk-maker/releases/download/Additional-Tools-1.0/7za.exe9Extract
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
unknown
https://aka.ms/dotnet-warnings/
unknown
https://www.python.org/ftp/python/3.12.3/python-3.12.3-amd64.exe)python-installer.exe)Installing
unknown
https://github.com/blake502/balatro-apk-maker/releases/download/Additional-Tools-1.0/balatro-base.ip
unknown
https://aka.ms/nativeaot-compatibility
unknown
https://aka.ms/dotnet/sdk-not-found
unknown
https://www.python.org/ftp/python/3.12.3/python-3.12.3-amd64.exe
unknown
https://aka.ms/binaryformatter
unknown
https://aka.ms/GlobalizationInvariantMode
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://.jpg
unknown
https://bitbucket.org/iBotPeaches/apktool/downloads/apktool_2.9.3.jar
unknown
https://aka.ms/dotnet-illink/nativehost
unknown
https://aka.ms/dotnet/download
unknown
There are 21 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A72B480000
heap
page read and write
7FF6D5490000
direct allocation
page execute read
2A72B5CA000
heap
page read and write
7FF7353E0000
unkown
page read and write
7FF6D5564000
direct allocation
page read and write
7FF6D5620000
direct allocation
page read and write
7FF6D561C000
direct allocation
page read and write
2A72B568000
heap
page read and write
7FF6D5550000
direct allocation
page read and write
7FF6D56AC000
direct allocation
page read and write
2E7C2110000
heap
page read and write
7FF6D5518000
direct allocation
page execute read
7FF6D554C000
direct allocation
page read and write
7FF6D5510000
direct allocation
page execute read
7FF6D5530000
direct allocation
page read and write
7FF7353CE000
unkown
page read and write
7FF735425000
unkown
page readonly
2A72B53C000
heap
page read and write
7FF7353E5000
unkown
page read and write
7FF6D5610000
direct allocation
page execute read
7FF7353D8000
unkown
page read and write
7FF6D5674000
direct allocation
page read and write
2A72CE40000
heap
page read and write
7FF6D55F4000
direct allocation
page read and write
7FF6D563C000
direct allocation
page read and write
7FF6D5678000
direct allocation
page execute read
7FF6D5680000
direct allocation
page read and write
2A72B55A000
heap
page read and write
7FF735420000
unkown
page readonly
2A72B581000
heap
page read and write
7FF6D5650000
direct allocation
page read and write
2A72B588000
heap
page read and write
7FF6D55F0000
direct allocation
page execute read
2A72B4F0000
heap
page readonly
2E740FBF000
direct allocation
page read and write
7FF7353E7000
unkown
page readonly
2E7C1D10000
direct allocation
page read and write
7FF7353CC000
unkown
page write copy
7FF6D5630000
direct allocation
page read and write
7FF6D5548000
direct allocation
page execute read
2A72B56C000
heap
page read and write
2A72CF60000
unclassified section
page read and write
CA13574000
stack
page read and write
7FF6D54E3000
direct allocation
page read and write
2A72B515000
heap
page read and write
7FF6D5690000
direct allocation
page read and write
7FF6D54A4000
direct allocation
page read and write
7FF6D5500000
direct allocation
page read and write
7FF6D5544000
direct allocation
page read and write
7FF7353C7000
unkown
page read and write
7FF6D5570000
direct allocation
page execute read
7FF6D5600000
direct allocation
page read and write
CA13CFE000
stack
page read and write
2A72B500000
unclassified section
page read and write
CA139FE000
stack
page read and write
7FF6D551C000
direct allocation
page read and write
2A72B569000
heap
page read and write
2A72B577000
heap
page read and write
2A72B4C0000
direct allocation
page read and write
2A72B4B0000
unclassified section
page read and write
2A72B5F2000
heap
page read and write
7FF6D5524000
direct allocation
page read and write
7FF7353E7000
unkown
page readonly
2A72B607000
heap
page read and write
2A72B530000
heap
page read and write
7FF7353DB000
unkown
page read and write
7FF6D5640000
direct allocation
page execute read
7FF6D55FC000
direct allocation
page read and write
CA13B7E000
stack
page read and write
2A72CF80000
heap
page execute and read and write
2A72CE20000
unkown
page readonly
2A72CF40000
unkown
page readonly
7FF735249000
unkown
page readonly
7FF735420000
unkown
page readonly
2A72B569000
heap
page read and write
7FF6D56A8000
direct allocation
page execute read
7FF734C30000
unkown
page readonly
7FF734C31000
unkown
page execute read
7FF6D56A4000
direct allocation
page read and write
7FF6D56B0000
direct allocation
page read and write
7FF6D54C0000
direct allocation
page read and write
7FF6D56C4000
direct allocation
page read and write
2A72CE30000
heap
page read and write
7FF6D5648000
direct allocation
page execute read
2A72D000000
direct allocation
page read and write
7FF734C31000
unkown
page execute read
7FF6D5520000
direct allocation
page execute read
2A72B460000
heap
page read and write
7FF6D56C0000
direct allocation
page execute read
7FF734C30000
unkown
page readonly
7FF6D5540000
direct allocation
page execute read
7FF6D55F8000
direct allocation
page execute read
2A72B380000
heap
page read and write
7FF6D5560000
direct allocation
page read and write
7FF6D5670000
direct allocation
page execute read
2A72CF38000
heap
page read and write
7FF6D5514000
direct allocation
page read and write
2A72CDF0000
unkown
page readonly
2A72CF2F000
heap
page read and write
2A72B536000
heap
page read and write
2A72B510000
heap
page read and write
2A72F800000
direct allocation
page read and write
7FF7353C7000
unkown
page write copy
2E7C1AC0000
unkown
page readonly
7FF6D552C000
direct allocation
page read and write
2A72B573000
heap
page read and write
7FF6D567C000
direct allocation
page read and write
7FF6D5660000
direct allocation
page read and write
7FF6D54D8000
direct allocation
page read and write
7FF6D5618000
direct allocation
page execute read
7FF6D5528000
direct allocation
page execute read
7FF735425000
unkown
page readonly
7FF735249000
unkown
page readonly
7FF6D56A0000
direct allocation
page execute read
7FF6D5644000
direct allocation
page read and write
7FF6D54C9000
direct allocation
page read and write
7FF6D54B0000
direct allocation
page read and write
2A72CF35000
heap
page read and write
7FF6D564C000
direct allocation
page read and write
7FF6D54F1000
direct allocation
page read and write
7FF6D5614000
direct allocation
page read and write
2A72CDD0000
unkown
page readonly
There are 112 hidden memdumps, click here to show them.