IOC Report
SecuriteInfo.com.Trojan.PWS.RedLineNET.9.27772.28937.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.PWS.RedLineNET.9.27772.28937.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\CAFIJKFHIJ.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqln[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\Soft123[1].exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AKECBFBAEBKJJJJKFCGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKEBFHIJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CFIIIJJKJKFHIDGDBAKJEBKEGC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EHCBAAAFHJDHJJKEBGHIECAKJK
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\IDHDGDHJEGHIDGDHCGCB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IEHCBAFI
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JDHJKKFB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JKKFIIEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\CAFIJKFHIJ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199673019888[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (2969), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.RedLineNET.9.27772.28937.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.RedLineNET.9.27772.28937.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\ProgramData\CAFIJKFHIJ.exe
"C:\ProgramData\CAFIJKFHIJ.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\CAFIJKFHIJ.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & del "C:\ProgramData\*.dll"" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 5

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199673019888
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://65.109.242.73T
unknown
http://5.42.65.32/TOKYO.php
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://65.109.242.73BGDAKKg
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/profiles/76561199673019888g
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://github.com/tmds/Tmds.DBus/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://65.109.242.73/vcruntime140.dllfH
unknown
https://65.109.242.73/mozglue.dll
65.109.242.73
https://centrosmissextensions.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
http://fontawesome.iohttp://fontawesome.io/license/
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
unknown
https://65.109.242.73t/form-data;
unknown
http://schemas.fontawesome.io/icons/
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://65.109.242.73/
65.109.242.73
https://www.sqlite.org/lang_corefunc.html
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=1_BxDGVvfXwv&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Kg_v7CMM
unknown
https://65.109.242.73/sqln.dll
65.109.242.73
https://65.109.242.73/freebl3.dll
65.109.242.73
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=BMF068jICwP9&
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://65.109.242.73/msvcp140.dll
65.109.242.73
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://steamcommunity.com/profiles/76561199673019888/badges
unknown
https://www.ecosia.org/newtab/
unknown
https://65.109.242.73/vcruntime140.dll
65.109.242.73
https://65.109.242.73/x5
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
http://fontawesome.iohttp://fontawesome.io/license/Copyright
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://65.109.242.73/msvcp140.dllKD
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://urn.to/r/sds_see
unknown
https://urn.to/r/sds_see=isolation
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://5.42.65.32/EOK.php
unknown
https://github.com/tmds/Tmds.DBus/issues/15.
unknown
https://github.com/autofac/Autofac
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=6q6r
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/irfailAt
unknown
https://65.109.242.73DBGC
unknown
https://help.steampowered.com/en/
unknown
https://65.109.242.730d7bece6afnt-Disposition:
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
http://5.42.65.32/CHECK.php
unknown
https://system.data.sqlite.org/X
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=wC7D7_Fi9JOs&l=e
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
http://5.42.65.32/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://65.109.242.73/nss3.dll
65.109.242.73
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://185.209.162.40/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=96N66CvLHly8&a
unknown
https://steamcommunity.com/workshop/
unknown
https://t.me/irfail
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://www.sqlite.org/copyright.html.
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/tmds/Tmds.DBus
unknown
https://65.109.242.73DAKK
unknown
https://www.sqlite.org/lang_aggfunc.html
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.76.43.59
centrosmissextensions.com
162.19.138.79

IPs

IP
Domain
Country
Malicious
65.109.242.73
unknown
United States
162.19.138.79
centrosmissextensions.com
United States
23.76.43.59
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1654000
heap
page read and write
malicious
4451000
trusted library allocation
page read and write
malicious
F7B000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
D02000
unkown
page readonly
malicious
329C000
stack
page read and write
1C36F000
direct allocation
page readonly
7FFD9BD70000
trusted library allocation
page read and write
8DF000
stack
page read and write
4FD000
stack
page read and write
D00000
unkown
page readonly
ED7E000
stack
page read and write
1AC000
stack
page read and write
1B45000
heap
page read and write
17AE000
heap
page read and write
FC0000
heap
page read and write
1C3AD000
direct allocation
page readonly
1931000
heap
page read and write
32D0000
heap
page read and write
1793000
heap
page read and write
1C67B000
stack
page read and write
444E000
stack
page read and write
3487000
heap
page read and write
161FA000
heap
page read and write
112BD000
stack
page read and write
514000
remote allocation
page execute and read and write
138BE000
stack
page read and write
160D5000
heap
page read and write
15FA0000
heap
page read and write
1C36D000
direct allocation
page execute read
6C87E000
unkown
page read and write
ED2F000
stack
page read and write
F7B000
unkown
page write copy
1C745000
heap
page read and write
1120000
heap
page read and write
15DFF000
stack
page read and write
1C161000
direct allocation
page execute read
161B000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
E18000
unkown
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
F60000
unkown
page readonly
1DD1B000
stack
page read and write
12EB000
stack
page read and write
610000
heap
page read and write
F61000
unkown
page execute read
6EA000
heap
page read and write
140E000
stack
page read and write
1B40000
heap
page read and write
FAE000
unkown
page execute and read and write
14B0000
heap
page read and write
1C160000
direct allocation
page execute and read and write
434000
remote allocation
page execute and read and write
17EC000
stack
page read and write
15B0000
heap
page read and write
492D000
trusted library allocation
page read and write
1933000
heap
page read and write
25354000
heap
page read and write
FAF000
unkown
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FF4BB4F0000
trusted library allocation
page execute and read and write
6CA6F000
unkown
page write copy
7FFD9BDB0000
trusted library allocation
page read and write
F60000
unkown
page readonly
15BA000
heap
page read and write
16341000
heap
page read and write
162B000
heap
page read and write
1925000
heap
page read and write
3480000
heap
page read and write
63F000
remote allocation
page execute and read and write
15F6C000
stack
page read and write
4D7E000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page read and write
3310000
heap
page read and write
15FE000
heap
page read and write
3C9A000
heap
page read and write
1C168000
direct allocation
page execute read
7FFD9BDA0000
trusted library allocation
page read and write
51A000
remote allocation
page execute and read and write
15E10000
heap
page read and write
EC2E000
stack
page read and write
1E91E000
stack
page read and write
511000
remote allocation
page execute and read and write
2537B000
heap
page read and write
1C73C000
stack
page read and write
1ED7F000
stack
page read and write
1D51A000
stack
page read and write
1C743000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
1635F000
heap
page read and write
18A5000
heap
page read and write
1921000
heap
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
14457000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1C3AF000
direct allocation
page readonly
18C0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page execute and read and write
1C480000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
459A000
trusted library allocation
page read and write
6EE000
heap
page read and write
1E51E000
stack
page read and write
24DED000
stack
page read and write
3470000
heap
page read and write
19E0000
heap
page read and write
4F30000
heap
page read and write
6C882000
unkown
page readonly
6C7F0000
unkown
page readonly
25348000
heap
page read and write
1D911000
stack
page read and write
14451000
trusted library allocation
page read and write
17F0000
heap
page read and write
1927000
heap
page read and write
4040000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
25356000
heap
page read and write
7FFD9BDB9000
trusted library allocation
page read and write
1470000
heap
page read and write
E17000
unkown
page readonly
D00000
unkown
page execute and read and write
4DBF000
stack
page read and write
6E0000
heap
page read and write
12ED000
stack
page read and write
558000
remote allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
1C63E000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
FB0000
unkown
page readonly
6CA2F000
unkown
page readonly
492B000
trusted library allocation
page read and write
1C378000
direct allocation
page readonly
12F8000
stack
page read and write
6CA70000
unkown
page read and write
1820000
heap
page read and write
18A0000
heap
page read and write
5F0000
heap
page read and write
1840000
heap
page read and write
FD0000
heap
page read and write
12F3000
stack
page read and write
6C890000
unkown
page readonly
18F6000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
153E000
stack
page read and write
19D5000
heap
page read and write
195F000
heap
page read and write
160A0000
heap
page read and write
274F000
stack
page read and write
1E11E000
stack
page read and write
16201000
heap
page read and write
16406000
heap
page read and write
12FC000
stack
page read and write
510000
heap
page read and write
6C86D000
unkown
page readonly
F74000
unkown
page readonly
7FFD9BA4C000
trusted library allocation
page execute and read and write
5F1000
remote allocation
page execute and read and write
6C7F1000
unkown
page execute read
1F4E000
stack
page read and write
E09000
unkown
page readonly
65E000
stack
page read and write
7FFD9B9BB000
trusted library allocation
page execute and read and write
112FE000
stack
page read and write
1C3AA000
direct allocation
page readonly
1383F000
stack
page read and write
157D000
stack
page read and write
1CBCC000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
15E6C000
stack
page read and write
77EE000
stack
page read and write
A16F000
stack
page read and write
3C90000
heap
page read and write
18F0000
heap
page read and write
2538B000
heap
page read and write
F74000
unkown
page readonly
FB0000
unkown
page readonly
D02000
unkown
page execute and read and write
4927000
trusted library allocation
page read and write
25340000
heap
page read and write
18FC000
heap
page read and write
9D2F000
stack
page read and write
12EF000
stack
page read and write
C6AC000
stack
page read and write
F61000
unkown
page execute read
19EA000
heap
page read and write
14B5000
heap
page read and write
1ED1B000
stack
page read and write
69E000
stack
page read and write
1C740000
heap
page read and write
1C3A2000
direct allocation
page read and write
1800000
heap
page read and write
191D000
heap
page read and write
24F8C000
stack
page read and write
144F3000
trusted library allocation
page read and write
1890000
trusted library allocation
page read and write
195D000
heap
page read and write
346F000
stack
page read and write
F5C000
stack
page read and write
16408000
heap
page read and write
EBED000
stack
page read and write
144EE000
trusted library allocation
page read and write
1923000
heap
page read and write
1D110000
heap
page execute and read and write
325C000
stack
page read and write
1F11E000
stack
page read and write
2540000
heap
page read and write
1AA0000
heap
page execute and read and write
9DF000
stack
page read and write
6C891000
unkown
page execute read
1CFF0000
heap
page read and write
3EFF000
heap
page read and write
14FE000
stack
page read and write
6CA6E000
unkown
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
144E000
stack
page read and write
342E000
stack
page read and write
167F000
heap
page read and write
6CA75000
unkown
page readonly
25377000
heap
page read and write
234E000
stack
page read and write
1C2C6000
direct allocation
page execute read
There are 213 hidden memdumps, click here to show them.