IOC Report
SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_cd747641856f9a2967ad14e23498f88a3b0c989_9a399071_2b80367a-b9a8-4c78-9d2c-1ef668460b7e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9A8.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Apr 25 17:24:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA07.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA75.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.TR.ATRAPS.Gen.28277.5978.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 232

URLs

Name
IP
Malicious
http://www.clamav.net
unknown
http://upx.sf.net
unknown
http://www.indyproject.org/
unknown
http://InetURL:/1.0
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
ProgramId
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
FileId
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
LowerCaseLongPath
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
LongPathHash
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
Name
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
OriginalFileName
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
Publisher
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
Version
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
BinFileVersion
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
BinaryType
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
ProductName
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
ProductVersion
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
LinkDate
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
BinProductVersion
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
AppxPackageFullName
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
AppxPackageRelativeId
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
Size
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
Language
\REGISTRY\A\{c1a92f91-4e4a-bc45-8c92-aedf7cad6a4b}\Root\InventoryApplicationFile\securiteinfo.com|4380fa50982edfc6
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
69D000
unkown
page readonly
9EE000
heap
page read and write
699000
unkown
page readonly
9E0000
heap
page read and write
400000
unkown
page readonly
698000
unkown
page write copy
69D000
unkown
page readonly
681000
unkown
page read and write
1F0000
heap
page read and write
9EA000
heap
page read and write
6BD000
unkown
page readonly
6BD000
unkown
page readonly
401000
unkown
page execute read
698000
unkown
page write copy
69B000
unkown
page readonly
401000
unkown
page execute read
699000
unkown
page readonly
681000
unkown
page write copy
7D0000
heap
page read and write
6AD000
unkown
page readonly
9D000
stack
page read and write
69B000
unkown
page readonly
682000
unkown
page write copy
19D000
stack
page read and write
400000
unkown
page readonly
8E0000
heap
page read and write
6AD000
unkown
page readonly
There are 17 hidden memdumps, click here to show them.