Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.AIDetect.malware1.23460.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_435bf9987f6a7ee95ec1aabecf98fbf5b0b7b2_82810a17_131cfb8a\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1C9.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Dec 23 04:10:37 2021, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE8FD.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREBBD.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.23460.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.23460.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetect.malware1.23460.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 672
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
||
http://www.n4pkg6fy8o.gaDVarFileInfo$
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.4.135.27
|
unknown
|
Greece
|
||
85.10.248.28
|
unknown
|
Germany
|
||
80.211.3.13
|
unknown
|
Italy
|
||
144.91.122.102
|
unknown
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProgramId
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
FileId
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LongPathHash
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Name
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Publisher
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Version
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinFileVersion
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinaryType
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductName
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductVersion
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LinkDate
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinProductVersion
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Size
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Language
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsPeFile
|
||
\REGISTRY\A\{efc38983-124d-a95f-ab63-8751671d6b56}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6EC31000
|
unkown image
|
page execute read
|
||
6EC31000
|
unkown image
|
page execute read
|
||
6EC31000
|
unkown image
|
page execute read
|
||
6EC31000
|
unkown image
|
page execute read
|
||
574E97B000
|
unkown
|
page read and write
|
||
BBB000
|
unkown
|
page read and write
|
||
B7A000
|
unkown
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
200B000
|
unkown image
|
page readonly
|
||
1E17000
|
unkown image
|
page readonly
|
||
212F2987000
|
unkown
|
page read and write
|
||
4E90000
|
unkown
|
page read and write
|
||
212F204A000
|
unkown
|
page read and write
|
||
977000
|
unkown
|
page read and write
|
||
FC000
|
unkown
|
page read and write
|
||
7FF504454000
|
unkown image
|
page readonly
|
||
7FF5A9B4F000
|
unkown image
|
page readonly
|
||
977000
|
unkown
|
page read and write
|
||
1ADE4629000
|
unkown
|
page read and write
|
||
19A84A20000
|
unkown image
|
page readonly
|
||
7FF5A9B77000
|
unkown image
|
page readonly
|
||
4A7B000
|
unkown
|
page read and write
|
||
212F2987000
|
unkown
|
page read and write
|
||
7FF5A9B63000
|
unkown image
|
page readonly
|
||
1ADE4652000
|
unkown
|
page read and write
|
||
7FF511CA2000
|
unkown image
|
page readonly
|
||
4B3D000
|
unkown
|
page read and write
|
||
7F242000
|
unkown image
|
page readonly
|
||
7FF500E09000
|
unkown image
|
page readonly
|
||
977000
|
unkown
|
page read and write
|
||
97E000
|
unkown
|
page read and write
|
||
19A84E00000
|
unkown image
|
page readonly
|
||
1267000
|
unkown image
|
page readonly
|
||
212F20B3000
|
unkown
|
page read and write
|
||
977000
|
unkown
|
page read and write
|
||
4970000
|
unkown
|
page read and write
|
||
977000
|
unkown
|
page read and write
|