IOC Report
SecuriteInfo.com.Trojan.Crypt.5471.19448.dll

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Crypt.5471.19448.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_ff2a6cde3ad0365e87a252aae3cac6b63a262b56_952b8cde_93526e2d-e6b7-4d4f-950c-09fa198e3341\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_84b1e2084b6f0d45f94c59d1da3b96769b12e9_7522e4b5_dd134390-38fb-4c6f-9112-b6dec1c8b46e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER398E.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Apr 25 03:25:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39DC.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 03:25:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3A4A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AD8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AF6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3B26.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.5471.19448.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.5471.19448.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Crypt.5471.19448.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 252
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7004 -s 556

URLs

Name
IP
Malicious
http://www.clamav.net
unknown
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{e7ba07bb-b71a-8712-eae6-bbfd38e1a2e2}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E9C000
stack
page read and write
6714000
heap
page read and write
C3D000
heap
page read and write
35F4000
heap
page read and write
35DC000
heap
page read and write
529F000
stack
page read and write
35F6000
heap
page read and write
3320000
heap
page read and write
35DA000
heap
page read and write
35D1000
heap
page read and write
330F000
stack
page read and write
E1F000
stack
page read and write
AFE000
stack
page read and write
35D6000
heap
page read and write
525E000
stack
page read and write
35E1000
heap
page read and write
A70000
heap
page read and write
BA0000
heap
page read and write
F00000
heap
page read and write
35CC000
heap
page read and write
5FC000
stack
page read and write
F1F000
stack
page read and write
33E0000
heap
page read and write
ABE000
stack
page read and write
E59000
stack
page read and write
C2B000
heap
page read and write
3330000
heap
page read and write
35DA000
heap
page read and write
F30000
heap
page read and write
6720000
trusted library allocation
page read and write
33DE000
stack
page read and write
35D5000
heap
page read and write
F9E000
stack
page read and write
F3A000
heap
page read and write
35DA000
heap
page read and write
35DF000
heap
page read and write
960000
heap
page read and write
35B0000
heap
page read and write
35BA000
heap
page read and write
339E000
stack
page read and write
8FD000
stack
page read and write
F10000
heap
page read and write
F37000
heap
page read and write
C2F000
heap
page read and write
C20000
heap
page read and write
35DF000
heap
page read and write
35E0000
heap
page read and write
6710000
heap
page read and write
35FE000
heap
page read and write
35E0000
heap
page read and write
35D1000
heap
page read and write
35DF000
heap
page read and write
There are 42 hidden memdumps, click here to show them.