IOC Report
SecuriteInfo.com.Trojan.PWS.Steam.37210.2413.24955.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.PWS.Steam.37210.2413.24955.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.PWS.Steam.37210.2413.24955.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Steam.37210.2413.24955.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.PWS.Steam.37210.2413.24955.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
pushjellysingeywus.shop
malicious
bordersoarmanusjuw.shop
malicious
suitcaseacanehalk.shop
malicious
entitlementappwo.shop
malicious
economicscreateojsu.shop
malicious
https://bordersoarmanusjuw.shop/api
172.67.189.66
malicious
mealplayerpreceodsju.shop
malicious
absentconvicsjawun.shop
malicious
wifeplasterbakewis.shop
malicious
https://bordersoarmanusjuw.shop/J
unknown
https://bordersoarmanusjuw.shop/
unknown
https://bordersoarmanusjuw.shop/apist
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bordersoarmanusjuw.shop
172.67.189.66
malicious

IPs

IP
Domain
Country
Malicious
172.67.189.66
bordersoarmanusjuw.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
CC0000
heap
page read and write
320F000
stack
page read and write
D14000
trusted library allocation
page read and write
2773000
trusted library allocation
page read and write
CBF000
stack
page read and write
490E000
stack
page read and write
11B7000
heap
page read and write
11C2000
heap
page read and write
D24000
trusted library allocation
page read and write
3E0000
unkown
page readonly
D4B000
trusted library allocation
page execute and read and write
36AF000
stack
page read and write
AEE000
heap
page read and write
430000
unkown
page readonly
2A8F000
stack
page read and write
FBE000
stack
page read and write
F75000
heap
page read and write
1194000
heap
page read and write
1191000
heap
page read and write
830000
heap
page read and write
F50000
heap
page read and write
E50000
heap
page execute and read and write
35AE000
stack
page read and write
1126000
heap
page read and write
3775000
trusted library allocation
page read and write
DB0000
heap
page read and write
840000
heap
page read and write
4CC000
stack
page read and write
338D000
trusted library allocation
page read and write
FFE000
stack
page read and write
B08000
heap
page read and write
E3E000
stack
page read and write
BD9000
stack
page read and write
1141000
heap
page read and write
10F0000
heap
page read and write
310E000
stack
page read and write
2D8D000
stack
page read and write
44A000
remote allocation
page execute and read and write
11C7000
heap
page read and write
F20000
heap
page read and write
10FA000
heap
page read and write
F70000
heap
page read and write
36B0000
heap
page read and write
EC0000
heap
page read and write
8D0000
heap
page read and write
3771000
trusted library allocation
page read and write
11DB000
heap
page read and write
324D000
stack
page read and write
2772000
trusted library allocation
page execute and read and write
ACE000
heap
page read and write
D13000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
5CB000
stack
page read and write
109E000
stack
page read and write
11CB000
heap
page read and write
E40000
heap
page read and write
D20000
trusted library allocation
page read and write
1050000
heap
page read and write
11BF000
heap
page read and write
276E000
stack
page read and write
8D6000
heap
page read and write
3450000
heap
page read and write
11CE000
heap
page read and write
ACA000
heap
page read and write
2C8E000
stack
page read and write
D60000
heap
page read and write
103E000
stack
page read and write
DFE000
stack
page read and write
11D2000
heap
page read and write
ADB000
stack
page read and write
33AD000
trusted library allocation
page read and write
2771000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
3350000
trusted library allocation
page read and write
AAF000
stack
page read and write
88D000
stack
page read and write
2785000
trusted library allocation
page read and write
334E000
stack
page read and write
2B8D000
stack
page read and write
D80000
trusted library allocation
page execute and read and write
1130000
heap
page read and write
3E2000
unkown
page readonly
D90000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
11B0000
heap
page read and write
AF6000
heap
page read and write
D00000
trusted library allocation
page read and write
8CD000
stack
page read and write
There are 79 hidden memdumps, click here to show them.