IOCReport

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\XdwuEt.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\XdwuEt.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe'
malicious
C:\Windows\System32\schtasks.exe
'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XdwuEt' /XML 'C:\Users\user\AppData\Local\Temp\tmpCBF8.tmp'
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.MulDrop16.9965.2278.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
clean

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
clean
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
unknown
clean

Memdumps

Base Address
Regiontype
Protect
Malicious
2E28000
unkown
page read and write
malicious
2DD1000
unkown
page read and write
malicious
12DE1000
unkown
page read and write
malicious
7FFAEE0A0000
unkown
page read and write
clean
F6B000
heap default
page read and write
clean
137E000
unkown
page read and write
clean
2C40000
unkown
page read and write
clean
7FFAEDF83000
unkown
page execute and read and write
clean
2CB0000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
1BC30000
unkown
page read and write
clean
1B8C9000
heap private
page read and write
clean
F9B000
heap default
page read and write
clean
2C20000
unkown
page read and write
clean
1BAD0000
unkown
page read and write
clean
2C40000
unkown
page readonly
clean
F30000
unkown image
page readonly
clean
6E0000
unkown image
page readonly
clean
1130000
unkown
page readonly
clean
902000
unkown image
page readonly
clean
982000
unkown image
page readonly
clean
1B790000
unkown
page read and write
clean
2C00000
unkown
page read and write
clean
2B30000
unkown
page read and write
clean
2C90000
unkown
page read and write
clean
1BBB0000
unkown
page read and write
clean
1C4A0000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
2B40000
unkown
page read and write
clean
1BD10000
unkown
page read and write
clean
7FFAEE030000
unkown
page read and write
clean
2C30000
unkown
page read and write
clean
1BD40000
unkown
page read and write
clean
1BD00000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
101D000
heap default
page read and write
clean
1BA9E000
unkown
page read and write
clean
1BA94000
unkown
page read and write
clean
1C4F0000
unkown
page read and write
clean
1BD30000
unkown
page read and write
clean
2C60000
unkown
page read and write
clean
7FF48E5D0000
unkown
page execute and read and write
clean
F32000
unkown image
page readonly
clean
1B8D0000
unkown
page read and write
clean
12DD8000
unkown
page read and write
clean
E00000
unkown
page readonly
clean
1BCE0000
unkown
page read and write
clean
2DCE000
unkown
page read and write
clean
1C4C0000
unkown
page read and write
clean
1C470000
unkown
page read and write
clean
2C80000
heap private
page read and write
clean
F10000
unkown
page read and write
clean
2C30000
unkown
page read and write
clean
1B34C000
unkown
page read and write
clean
1BBB0000
unkown
page read and write
clean
2C70000
unkown
page read and write
clean
1B8C0000
heap private
page read and write
clean
7FFAEE0AB000
unkown
page read and write
clean
1BC90000
unkown
page read and write
clean
1BCA0000
unkown
page read and write
clean
2C04000
unkown
page read and write
clean
2C70000
unkown
page read and write
clean
1C45B000
unkown
page read and write
clean
1BD20000
unkown
page read and write
clean
1C2B0000
unkown
page readonly
clean
1C4D0000
unkown
page read and write
clean
BE0000
unkown
page readonly
clean
F39000
heap default
page read and write
clean
1BBCB000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
2BB0000
unkown
page read and write
clean
1012000
unkown
page read and write
clean
1BC10000
unkown
page read and write
clean
12DD1000
unkown
page read and write
clean
2C90000
unkown
page read and write
clean
1B350000
unkown
page readonly
clean
1C2AE000
unkown
page read and write
clean
7FFAEDF93000
unkown
page read and write
clean
170000
unkown image
page readonly
clean
900000
unkown image
page readonly
clean
2C20000
unkown
page read and write
clean
1BCF0000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
1C470000
unkown
page read and write
clean
172000
unkown image
page readonly
clean
1BCB0000
unkown
page read and write
clean
2C10000
unkown
page read and write
clean
2B20000
unkown
page readonly
clean
170000
unkown image
page readonly
clean
1BC40000
unkown
page read and write
clean
1B750000
heap private
page read and write
clean
1B8C3000
heap private
page read and write
clean
E92000
unkown image
page readonly
clean
F71000
heap default
page read and write
clean
980000
unkown image
page readonly
clean
2C10000
unkown
page read and write
clean
E90000
unkown image
page readonly
clean
2C30000
unkown
page read and write
clean
2C00000
unkown
page read and write
clean
BA0000
unkown
page read and write
clean
A25000
heap private
page read and write
clean
F00000
unkown
page read and write
clean
A20000
heap private
page read and write
clean
1150000
unkown
page read and write
clean
2C30000
unkown
page read and write
clean
2CA0000
unkown
page read and write
clean
7FFAEDFA0000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
1011000
heap default
page read and write
clean
2C40000
unkown
page read and write
clean
170000
unkown image
page readonly
clean
1BC80000
unkown
page read and write
clean
1175000
heap private
page read and write
clean
112E000
unkown
page read and write
clean
1BFAF000
unkown
page read and write
clean
12DDD000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
2C50000
unkown
page read and write
clean
1BD50000
unkown
page read and write
clean
2C60000
unkown
page read and write
clean
980000
unkown image
page readonly
clean
1AE00000
unkown
page read and write
clean
1BC19000
unkown
page read and write
clean
E90000
unkown image
page readonly
clean
2C01000
unkown
page read and write
clean
7FFAEE036000
unkown
page read and write
clean
902000
unkown image
page readonly
clean
1C480000
unkown
page read and write
clean
7FFAEE0B0000
unkown
page execute and read and write
clean
7FFAEDF84000
unkown
page read and write
clean
7FFAEE130000
unkown
page read and write
clean
1B7B0000
heap private
page execute and read and write
clean
7FFAEDF8D000
unkown
page execute and read and write
clean
1170000
heap private
page read and write
clean
7FFAEDFAD000
unkown
page execute and read and write
clean
2C40000
unkown
page read and write
clean
7FFAEE03C000
unkown
page execute and read and write
clean
1BC70000
unkown
page read and write
clean
1BD60000
unkown
page read and write
clean
1B8BC000
unkown
page read and write
clean
1BC60000
unkown
page read and write
clean
E92000
unkown image
page readonly
clean
F30000
heap default
page read and write
clean
2C20000
unkown
page read and write
clean
2C50000
unkown
page read and write
clean
2C83000
heap private
page read and write
clean
1BC50000
unkown
page read and write
clean
7FFAEE040000
unkown
page execute and read and write
clean
1BBC0000
unkown
page read and write
clean
2B50000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
1B760000
unkown
page readonly
clean
B45000
unkown
page read and write
clean
1B8D1000
unkown
page read and write
clean
127E000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
E90000
unkown image
page readonly
clean
1C500000
unkown
page read and write
clean
F30000
unkown image
page readonly
clean
6E0000
unkown image
page readonly
clean
F6E000
heap default
page read and write
clean
2C20000
unkown
page read and write
clean
6E0000
unkown image
page readonly
clean
1140000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
2C60000
unkown
page readonly
clean
1BBF0000
unkown
page read and write
clean
2B30000
unkown
page readonly
clean
1C0AF000
unkown
page read and write
clean
1C4E0000
unkown
page read and write
clean
1C4B0000
unkown
page read and write
clean
1BC20000
unkown
page read and write
clean
1C490000
unkown
page read and write
clean
100E000
unkown
page read and write
clean
F32000
unkown image
page readonly
clean
1BCD0000
unkown
page read and write
clean
B80000
unkown
page read and write
clean
1BBD0000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
F30000
unkown image
page readonly
clean
2C20000
unkown
page read and write
clean
1BC00000
unkown
page read and write
clean
900000
unkown image
page readonly
clean
1B780000
unkown
page read and write
clean
1B760000
unkown
page read and write
clean
172000
unkown image
page readonly
clean
2C00000
unkown
page read and write
clean
2B30000
unkown
page read and write
clean
1B770000
unkown
page read and write
clean
1BCC0000
unkown
page read and write
clean
1B9D0000
unkown
page read and write
clean
6E2000
unkown image
page readonly
clean
2C30000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
EE0000
unkown
page read and write
clean
2C30000
unkown
page read and write
clean
2BC0000
heap private
page read and write
clean
900000
unkown image
page readonly
clean
1B690000
unkown
page readonly
clean
F4B000
heap default
page read and write
clean
7FFAEE066000
unkown
page execute and read and write
clean
7FFAEDF9D000
unkown
page execute and read and write
clean
2C20000
unkown
page read and write
clean
980000
unkown image
page readonly
clean
7FFAEDFDC000
unkown
page execute and read and write
clean
2C50000
unkown
page readonly
clean
7FFAEE140000
unkown
page read and write
clean
1C56F000
unkown
page read and write
clean
6E2000
unkown image
page readonly
clean
7FFAEDF90000
unkown
page read and write
clean
2CC0000
heap private
page execute and read and write
clean
1C1AE000
unkown
page read and write
clean
2C40000
unkown
page read and write
clean
1380000
unkown
page readonly
clean
1BEAE000
unkown
page read and write
clean
7FFAEE0A5000
unkown
page read and write
clean
2C20000
unkown
page read and write
clean
1BB40000
unkown
page read and write
clean
982000
unkown image
page readonly
clean
1B7A0000
unkown
page read and write
clean
F14000
unkown
page read and write
clean
2C30000
unkown
page read and write
clean
BC0000
unkown
page read and write
clean
1BBE0000
unkown
page read and write
clean
There are 216 hidden memdumps, click here to show them.