IOC Report
SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
C:\Users\user\AppData\Local\Temp\4ddigdllfixer_4ddig\4ddigdllfixer_4ddig_20240424042756790.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Program.Unwanted.5531.23089.22779.exe"

URLs

Name
IP
Malicious
http://dl.tenorshare.net/AnyDataRecovery_any_x64.exe
unknown
http://dl.tenorshare.net/AnyDataRecovery_net_x64.exe
unknown
https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exe;
unknown
http://download.wondershare.com/cbs_down/drfone_recover_full3366.exe
unknown
https://analytics.afirstsoft.cn/collect
unknown
https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exey
unknown
https://integrated.tenorshare.com/api/v1/ticket/feedback
unknown
http://curl.haxx.se/docs/http-cookies.html#
unknown
http://crl.mic
unknown
https://download.tenorshh
unknown
https://download.any-data-recovery.com/downloads/extra/AnyDataRecovery_any_x64.exe
unknown
https://download.tenorshare.com/downad
unknown
https://www.tenorshare.com/downloads/service/softwarelog.txt
unknown
https://download.tenorshare.com/down
unknown
https://product-alert.afirstsoft.cn/api/exception/sendpid=%d&type=2&exception_code=Hash_Check_Fail_C
unknown
https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exexD
unknown
https://update.tenorshare.cn/download/checkCross?cross_end_id=%s
unknown
http://www.openssl.org/support/faq.html
unknown
http://curl.haxx.se/docs/http-cookies.html
unknown
https://download.tenorshare.com/downloads/extra/4ddigdllfixer_4ddig.exe
unknown
https://www.tenorshare.com/downloads/service/softwarelog.txtnQ
unknown
https://integrated.tenorshare.com/api/v1/ticket/feedback&subject=&version=&log_id=&content=&useremai
unknown
https://www.tenorshare.com/
unknown
https://download.tenorshare.net/downloads/extra/AnyDataRecovery_net_x64.exe
unknown
https://update.tenorshare.com/queryDownloader?LanguageId=1033&SoftWareID=%d&SiteID=1%s
unknown
https://update.tenorshare.com/download/checkCross?cross_end_id=%s
unknown
https://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s
unknown
https://analytics-test.afirstsoft.cn/collector
unknown
https://product-alert.afirstsoft.cn/api/exception/send
unknown
http://www.tenorshare.com/downloads/service/softwarelog.txt
unknown
http://www.tenorshare.com/downloads/service/softwarelog.txthttp://ip-api.com/csvsuccess/QueryTools?L
unknown
http://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s&package_type=2h
unknown
https://analytics-test.afirstsoft.cn/collectorurl:mac
unknown
https://check.mobie.appcloudd$L
unknown
https://download.tenorshare.com/downloads/extra/AnyDataRecovery_ts_x64.exe
unknown
http://update.tenorshare.cn/download/checkCross?cross_end_id=%s
unknown
http://ip-api.com/csv
208.95.112.1
https://check.mobie.app
unknown
http://dl.tenorshare.net/AnyDataRecovery_ts_x64.exe
unknown
http://update.tenorshare.com/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s
unknown
https://update.tenorshare.cn/queryDownloader?LanguageId=%d&SoftWareID=%d&SiteID=%d%s
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
www.tenorshare.com
unknown
update.tenorshare.com
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Tenorshare\Downloader2.5.0
GA_PC
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
guid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
user_id

Memdumps

Base Address
Regiontype
Protect
Malicious
5DCC000
heap
page read and write
574A000
heap
page read and write
A32000
heap
page read and write
A4F000
heap
page read and write
5D55000
heap
page read and write
4C6D000
heap
page read and write
EF9000
heap
page read and write
A4F000
heap
page read and write
5DBB000
heap
page read and write
A7B000
heap
page read and write
2625000
heap
page read and write
AAB000
heap
page read and write
A48000
heap
page read and write
2621000
heap
page read and write
5BA0000
heap
page read and write
2601000
heap
page read and write
A67000
heap
page read and write
4BEF000
stack
page read and write
3501000
heap
page read and write
A6D000
heap
page read and write
5E26000
heap
page read and write
2634000
heap
page read and write
384F000
stack
page read and write
A3C000
heap
page read and write
94E000
stack
page read and write
A0E000
heap
page read and write
7C6000
unkown
page write copy
400000
unkown
page readonly
A54000
heap
page read and write
262F000
heap
page read and write
AEE000
heap
page read and write
400000
unkown
page readonly
A44000
heap
page read and write
2682000
heap
page read and write
2677000
heap
page read and write
6D1000
unkown
page execute and read and write
A68000
heap
page read and write
AFE000
heap
page read and write
A81000
heap
page read and write
A71000
heap
page read and write
5DCB000
heap
page read and write
98E000
stack
page read and write
A6C000
heap
page read and write
4C01000
heap
page read and write
A3E000
heap
page read and write
A44000
heap
page read and write
2B3E000
stack
page read and write
AAC000
heap
page read and write
A8A000
heap
page read and write
4BF6000
heap
page read and write
5D6B000
heap
page read and write
A00000
heap
page read and write
5570000
heap
page read and write
5DC3000
heap
page read and write
A79000
heap
page read and write
A85000
heap
page read and write
5AB0000
heap
page read and write
5DB5000
heap
page read and write
4C4F000
heap
page read and write
A72000
heap
page read and write
5CA0000
heap
page read and write
A81000
heap
page read and write
5A2E000
stack
page read and write
4CAF000
heap
page read and write
5E26000
heap
page read and write
34EC000
heap
page read and write
2682000
heap
page read and write
364E000
heap
page read and write
4F70000
remote allocation
page read and write
4F70000
remote allocation
page read and write
800000
heap
page read and write
2622000
heap
page read and write
A3F000
heap
page read and write
5DCB000
heap
page read and write
A68000
heap
page read and write
267B000
heap
page read and write
25F0000
heap
page read and write
25EE000
stack
page read and write
26EF000
heap
page read and write
35B2000
heap
page read and write
AFC000
heap
page read and write
2645000
heap
page read and write
5DB8000
heap
page read and write
AF5000
heap
page read and write
5DD4000
heap
page read and write
A54000
heap
page read and write
5DE2000
heap
page read and write
2632000
heap
page read and write
A3D000
heap
page read and write
A53000
heap
page read and write
A79000
heap
page read and write
A88000
heap
page read and write
59B9000
heap
page read and write
2681000
heap
page read and write
59F0000
trusted library allocation
page read and write
A40000
heap
page read and write
5DD8000
heap
page read and write
59F0000
remote allocation
page read and write
A8C000
heap
page read and write
4C25000
heap
page read and write
A67000
heap
page read and write
3651000
heap
page read and write
A67000
heap
page read and write
4C3A000
heap
page read and write
A72000
heap
page read and write
3578000
heap
page read and write
5DD4000
heap
page read and write
2620000
heap
page read and write
34CB000
heap
page read and write
4C3A000
heap
page read and write
9D0000
heap
page read and write
A51000
heap
page read and write
267B000
heap
page read and write
A84000
heap
page read and write
A87000
heap
page read and write
50EC000
stack
page read and write
A4F000
heap
page read and write
2665000
heap
page read and write
A3C000
heap
page read and write
A3C000
heap
page read and write
35BB000
heap
page read and write
A54000
heap
page read and write
5CD2000
heap
page read and write
5D55000
heap
page read and write
374E000
stack
page read and write
5DC3000
heap
page read and write
3595000
heap
page read and write
A81000
heap
page read and write
589E000
stack
page read and write
5DC3000
heap
page read and write
5DDF000
heap
page read and write
A53000
heap
page read and write
5E0F000
heap
page read and write
A51000
heap
page read and write
3742000
heap
page read and write
A79000
heap
page read and write
5DD4000
heap
page read and write
4CC0000
heap
page read and write
5DCB000
heap
page read and write
6BE000
unkown
page execute and read and write
A54000
heap
page read and write
2632000
heap
page read and write
AFD000
heap
page read and write
A41000
heap
page read and write
5E26000
heap
page read and write
AF7000
heap
page read and write
4CA7000
heap
page read and write
2691000
heap
page read and write
2632000
heap
page read and write
5CCE000
heap
page read and write
830000
heap
page read and write
5DE2000
heap
page read and write
2666000
heap
page read and write
401000
unkown
page execute and read and write
AAC000
heap
page read and write
3557000
heap
page read and write
96000
stack
page read and write
836000
heap
page read and write
A71000
heap
page read and write
26A9000
heap
page read and write
A53000
heap
page read and write
349A000
heap
page read and write
A47000
heap
page read and write
5AA0000
heap
page read and write
5DA4000
heap
page read and write
A72000
heap
page read and write
264B000
heap
page read and write
5E0F000
heap
page read and write
350A000
heap
page read and write
A49000
heap
page read and write
AF9000
heap
page read and write
AFC000
heap
page read and write
2681000
heap
page read and write
388E000
stack
page read and write
5DD8000
heap
page read and write
5DD8000
heap
page read and write
4C69000
heap
page read and write
A48000
heap
page read and write
A79000
heap
page read and write
5E0F000
heap
page read and write
3505000
heap
page read and write
A82000
heap
page read and write
5DE2000
heap
page read and write
A51000
heap
page read and write
A67000
heap
page read and write
51DD000
stack
page read and write
A82000
heap
page read and write
2622000
heap
page read and write
5E0F000
heap
page read and write
5DE2000
heap
page read and write
51ED000
stack
page read and write
5DDF000
heap
page read and write
4CBC000
heap
page read and write
5DB9000
heap
page read and write
599F000
stack
page read and write
AFE000
heap
page read and write
A98000
heap
page read and write
35B8000
heap
page read and write
EF5000
heap
page read and write
A3C000
heap
page read and write
AF0000
heap
page read and write
2691000
heap
page read and write
A7E000
heap
page read and write
59BD000
heap
page read and write
A6C000
heap
page read and write
A40000
heap
page read and write
5DDF000
heap
page read and write
A44000
heap
page read and write
A89000
heap
page read and write
A72000
heap
page read and write
5DD4000
heap
page read and write
26A9000
heap
page read and write
A44000
heap
page read and write
A4F000
heap
page read and write
2681000
heap
page read and write
2691000
heap
page read and write
2633000
heap
page read and write
50AF000
stack
page read and write
603000
unkown
page execute and write copy
A4F000
heap
page read and write
5DE2000
heap
page read and write
5CCB000
heap
page read and write
267F000
heap
page read and write
4FAE000
stack
page read and write
4C42000
heap
page read and write
5DDF000
heap
page read and write
AAB000
heap
page read and write
A89000
heap
page read and write
ED0000
heap
page read and write
EF0000
heap
page read and write
3508000
heap
page read and write
7F0000
heap
page read and write
4CB7000
heap
page read and write
A49000
heap
page read and write
4C42000
heap
page read and write
629F000
unkown
page read and write
3409000
heap
page read and write
AF5000
heap
page read and write
AFD000
heap
page read and write
A6F000
heap
page read and write
A49000
heap
page read and write
4BF1000
heap
page read and write
262E000
heap
page read and write
A72000
heap
page read and write
195000
stack
page read and write
26AE000
heap
page read and write
2B80000
heap
page read and write
A7A000
heap
page read and write
5DC3000
heap
page read and write
A7E000
heap
page read and write
2600000
heap
page read and write
4CD7000
heap
page read and write
A79000
heap
page read and write
370F000
unkown
page read and write
6D3000
unkown
page execute and read and write
A6B000
heap
page read and write
5DD4000
heap
page read and write
5E26000
heap
page read and write
7C6000
unkown
page read and write
5E0F000
heap
page read and write
5DD8000
heap
page read and write
A7E000
heap
page read and write
3664000
heap
page read and write
2633000
heap
page read and write
A0A000
heap
page read and write
AF1000
heap
page read and write
5DD8000
heap
page read and write
5D55000
heap
page read and write
A79000
heap
page read and write
5DDF000
heap
page read and write
AAC000
heap
page read and write
A6F000
heap
page read and write
4BF0000
heap
page read and write
AFD000
heap
page read and write
2621000
heap
page read and write
CFF000
stack
page read and write
A7C000
heap
page read and write
2645000
heap
page read and write
5D7E000
heap
page read and write
2B90000
trusted library allocation
page read and write
A6A000
heap
page read and write
A36000
heap
page read and write
7C5000
unkown
page execute and write copy
A87000
heap
page read and write
4C9B000
heap
page read and write
A40000
heap
page read and write
A6F000
heap
page read and write
26D4000
heap
page read and write
A55000
heap
page read and write
362B000
heap
page read and write
AFD000
heap
page read and write
4CB9000
heap
page read and write
4C20000
heap
page read and write
5CD2000
heap
page read and write
5DCB000
heap
page read and write
A6C000
heap
page read and write
ECC000
stack
page read and write
2677000
heap
page read and write
4D09000
heap
page read and write
A45000
heap
page read and write
5D84000
heap
page read and write
BFF000
stack
page read and write
5E26000
heap
page read and write
7B5000
unkown
page execute and read and write
There are 294 hidden memdumps, click here to show them.