IOC Report
SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\AEBKECFCFBGCAAKEGIJD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEBKECFCFBGCAAKEGIJDAKKFCG
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\AKKFHDAK
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\AKKFHDAKECFHIDHJDAAAEBKJEC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGHJJDGHCBGDHIECBGID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CGCFBFBGHDGDAKECAKJEHCGDAA
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DBKKKEHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\FCBAEHCA
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIDAFHDH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199673019888[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (2969), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqln[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CoinminerX-gen.23583.11262.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://37.27.87.155/mozglue.dlln
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199673019888
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://37.27.87.155GHCBG
unknown
https://37.27.87.155/sqln.dll#
unknown
https://37.27.87.155/sqln.dll
37.27.87.155
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
unknown
https://37.27.87.155/MgrI
unknown
https://37.27.87.155/mozglue.dllz
unknown
https://37.27.87.155/ramData
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://37.27.87.155/freebl3.dllV
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://37.27.87.155/softokn3.dll
37.27.87.155
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=1_BxDGVvfXwv&am
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Kg_v7CMM
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jU8h8CqVh6FY&l=e
unknown
https://steamcommunity.com/profiles/76561199673019888H
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://37.27.87.155/nss3.dll
37.27.87.155
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://37.27.87.155/vcruntime140.dll
37.27.87.155
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=BMF068jICwP9&
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://steamcommunity.com/profiles/76561199673019888/badges
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://37.27.87.155/msvcp140.dll
37.27.87.155
https://37.27.87.155/
37.27.87.155
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://37.27.87.155AKKFH
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://37.27.87.155/9
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/irfailAt
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://37.27.87.155/1;W
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://37.27.87.155/freebl3.dll
37.27.87.155
https://37.27.87.155/1
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://37.27.87.155/nd-point:
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://37.27.87.155/27.87.155/nss3.dll
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/G
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=96N66CvLHly8&a
unknown
https://steamcommunity.com/workshop/
unknown
https://t.me/irfail
unknown
https://37.27.87.155/B
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://www.sqlite.org/copyright.html.
unknown
https://37.27.87.155/D
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://37.27.87.155/freebl3.dll(
unknown
https://37.27.87.155/r
unknown
https://37.27.87.155/ets
unknown
https://github.com/mgravell/protobuf-net
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.76.43.59
fp2e7a.wpc.phicdn.net
192.229.211.108
windowsupdatebg.s.llnwi.net
69.164.42.0

IPs

IP
Domain
Country
Malicious
37.27.87.155
unknown
Iran (ISLAMIC Republic Of)
23.76.43.59
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
30D1000
trusted library allocation
page read and write
malicious
338D000
trusted library allocation
page read and write
malicious
4853000
trusted library allocation
page read and write
malicious
5960000
trusted library section
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
43CE000
trusted library allocation
page read and write
malicious
4381000
trusted library allocation
page read and write
malicious
414D000
trusted library allocation
page read and write
malicious
5D30000
trusted library section
page read and write
malicious
D7C000
stack
page read and write
1348000
heap
page read and write
6CB42000
unkown
page readonly
34D2000
trusted library allocation
page read and write
DCD000
unkown
page readonly
1166000
stack
page read and write
57D0000
trusted library allocation
page read and write
34EE000
trusted library allocation
page read and write
5A6E000
stack
page read and write
1997F000
direct allocation
page readonly
563F000
trusted library allocation
page read and write
6CAB1000
unkown
page execute read
133FB000
stack
page read and write
137C7000
heap
page read and write
514000
remote allocation
page execute and read and write
6CD2E000
unkown
page read and write
34B1000
trusted library allocation
page read and write
5EEE000
stack
page read and write
5DB0000
trusted library allocation
page execute and read and write
18D0000
trusted library allocation
page execute and read and write
5730000
trusted library allocation
page read and write
16FE000
stack
page read and write
15B2000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
E71E000
stack
page read and write
15C0000
trusted library allocation
page read and write
12D6000
heap
page read and write
34C4000
trusted library allocation
page read and write
157E000
stack
page read and write
6CB3E000
unkown
page read and write
3070000
heap
page read and write
3502000
trusted library allocation
page read and write
E00000
heap
page read and write
2F50000
trusted library allocation
page read and write
E67000
heap
page read and write
5C34000
heap
page read and write
B02000
unkown
page readonly
1593000
trusted library allocation
page execute and read and write
6CAB0000
unkown
page readonly
5632000
trusted library allocation
page read and write
34C8000
trusted library allocation
page read and write
18E0000
heap
page read and write
136B000
heap
page read and write
3515000
trusted library allocation
page read and write
9BDD000
stack
page read and write
34CC000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
511000
remote allocation
page execute and read and write
19BE0000
heap
page read and write
15AD000
trusted library allocation
page execute and read and write
56E5000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
12D0000
heap
page read and write
5EF0000
trusted library section
page read and write
5760000
trusted library allocation
page read and write
106C000
stack
page read and write
40D1000
trusted library allocation
page read and write
434000
remote allocation
page execute and read and write
11D0000
heap
page read and write
FFD000
heap
page read and write
137CE000
heap
page read and write
34E7000
trusted library allocation
page read and write
E28000
heap
page read and write
133A0000
heap
page read and write
56F6000
trusted library allocation
page read and write
135C0000
heap
page read and write
19BEA000
heap
page read and write
3504000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
5750000
heap
page execute and read and write
583E000
stack
page read and write
5C7E000
heap
page read and write
6CCEF000
unkown
page readonly
10E4E000
stack
page read and write
5DE0000
trusted library allocation
page execute and read and write
D6F000
stack
page read and write
DF0000
heap
page read and write
5660000
trusted library allocation
page read and write
5C4C000
heap
page read and write
595E000
stack
page read and write
E05000
heap
page read and write
D6B000
stack
page read and write
5840000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
E83000
heap
page read and write
34E1000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
131E000
stack
page read and write
59EE000
stack
page read and write
558000
remote allocation
page execute and read and write
15B0000
trusted library allocation
page read and write
6CD30000
unkown
page read and write
4209000
trusted library allocation
page read and write
2F60000
heap
page execute and read and write
E54000
heap
page read and write
33B5000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
5C72000
heap
page read and write
6CB50000
unkown
page readonly
1999F000
heap
page read and write
EE1000
heap
page read and write
C11D000
stack
page read and write
135B0000
heap
page read and write
10A2000
heap
page read and write
5720000
trusted library allocation
page read and write
F5D000
heap
page read and write
572A000
trusted library allocation
page read and write
1997D000
direct allocation
page readonly
101E000
heap
page read and write
34CE000
trusted library allocation
page read and write
13BA000
heap
page read and write
19C65000
heap
page read and write
19738000
direct allocation
page execute read
5DC0000
trusted library allocation
page execute and read and write
56CE000
trusted library allocation
page read and write
C7C000
stack
page read and write
15BA000
trusted library allocation
page execute and read and write
63F000
remote allocation
page execute and read and write
56F0000
trusted library allocation
page read and write
34B7000
trusted library allocation
page read and write
139D3000
heap
page read and write
6CD2F000
unkown
page write copy
6CD35000
unkown
page readonly
5650000
trusted library allocation
page read and write
1338F000
stack
page read and write
57F0000
trusted library allocation
page execute and read and write
34B5000
trusted library allocation
page read and write
56AE000
stack
page read and write
34E3000
trusted library allocation
page read and write
15C7000
trusted library allocation
page execute and read and write
15E0000
trusted library allocation
page read and write
15F0000
heap
page read and write
57B0000
trusted library allocation
page read and write
19896000
direct allocation
page execute read
5A70000
heap
page read and write
103E000
heap
page read and write
1590000
trusted library allocation
page read and write
E69C000
stack
page read and write
153E000
stack
page read and write
19C51000
heap
page read and write
D73000
stack
page read and write
E20000
heap
page read and write
34E9000
trusted library allocation
page read and write
E86D000
stack
page read and write
34EB000
trusted library allocation
page read and write
50D8000
trusted library allocation
page read and write
18CE000
stack
page read and write
1432000
heap
page read and write
C15D000
stack
page read and write
5700000
trusted library allocation
page read and write
5F1000
remote allocation
page execute and read and write
3090000
trusted library allocation
page execute and read and write
51A000
remote allocation
page execute and read and write
526E000
stack
page read and write
577E000
trusted library allocation
page read and write
19731000
direct allocation
page execute read
34FE000
trusted library allocation
page read and write
19972000
direct allocation
page read and write
5A7A000
heap
page read and write
1997A000
direct allocation
page readonly
2F3E000
stack
page read and write
1021000
heap
page read and write
56B6000
trusted library allocation
page read and write
12B0000
heap
page read and write
5F50000
trusted library section
page read and write
6030000
trusted library allocation
page execute and read and write
9B9F000
stack
page read and write
19948000
direct allocation
page readonly
40E1000
trusted library allocation
page read and write
D78000
stack
page read and write
1392C000
heap
page read and write
2F40000
trusted library allocation
page read and write
139D5000
heap
page read and write
57E0000
trusted library allocation
page read and write
5A10000
heap
page read and write
57C0000
trusted library allocation
page read and write
1340000
heap
page read and write
F0D000
heap
page read and write
15CB000
trusted library allocation
page execute and read and write
1594000
trusted library allocation
page read and write
346E000
stack
page read and write
5FA0000
trusted library allocation
page read and write
6CB2D000
unkown
page readonly
10DAE000
stack
page read and write
30C0000
heap
page read and write
306E000
stack
page read and write
D6D000
stack
page read and write
5770000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
137A000
heap
page read and write
1390E000
heap
page read and write
5850000
trusted library allocation
page execute and read and write
5C7B000
heap
page read and write
134FD000
stack
page read and write
5710000
trusted library allocation
page execute and read and write
34CA000
trusted library allocation
page read and write
1993D000
direct allocation
page execute read
1436000
heap
page read and write
3500000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
19C55000
heap
page read and write
19730000
direct allocation
page execute and read and write
F71000
heap
page read and write
DE0000
heap
page read and write
59AE000
stack
page read and write
15B6000
trusted library allocation
page execute and read and write
1580000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
159D000
trusted library allocation
page execute and read and write
1993F000
direct allocation
page readonly
15A0000
trusted library allocation
page read and write
40D9000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page read and write
975E000
stack
page read and write
15C2000
trusted library allocation
page read and write
19BE5000
heap
page read and write
34FA000
trusted library allocation
page read and write
6CB51000
unkown
page execute read
135F000
heap
page read and write
B00000
unkown
page readonly
E81F000
stack
page read and write
F7A000
heap
page read and write
34FC000
trusted library allocation
page read and write
E9E000
heap
page read and write
There are 223 hidden memdumps, click here to show them.