IOC Report
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.6225

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\DiFxAPI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Forbudenes2.MON
data
dropped
C:\Users\user\AppData\Local\Temp\MEMORABLENESS.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\Standardiserede7.sma
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\document-open-recent-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsl5F49.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\portaudio_x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-release.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
"C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe"
malicious

URLs

Name
IP
Malicious
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://www.vmware.com/0
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://subca.ocsp-certum.com05
unknown
http://www.symauth.com/rpa00
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://www.vmware.com/0/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.symauth.com/cps0(
unknown
http://www.certum.pl/CPS0
unknown
There are 5 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ABSCISSAS\Unpauperised
Hjlpeskrmen
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Moringaceous\Forladegevrer193
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Celioncus\POLEYNE
Expand String Value
HKEY_CURRENT_USER\Software\dbenavnet\rehearhearing
Duping181
HKEY_CURRENT_USER\Software\Unvamped92\Universitetsdirektrernes60
Idyls
HKEY_CURRENT_USER\Software\Counterbrace57\monaxon
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Kollapsen117\Margygr
dorsicolumn

Memdumps

Base Address
Regiontype
Protect
Malicious
30B0000
direct allocation
page execute and read and write
malicious
64C73FE000
stack
page read and write
1E07E878000
heap
page read and write
20C3F613000
heap
page read and write
20C44B00000
trusted library allocation
page read and write
20C3F691000
heap
page read and write
20C44E4B000
heap
page read and write
249559B0000
remote allocation
page read and write
1E2F3E65000
heap
page read and write
20C44BE0000
trusted library allocation
page read and write
468A17F000
stack
page read and write
24955402000
heap
page read and write
1E07E842000
heap
page read and write
1E07E87B000
heap
page read and write
4278CFF000
stack
page read and write
16AA4C13000
heap
page read and write
1E07E86C000
heap
page read and write
1D265BF0000
heap
page read and write
20C44AF1000
trusted library allocation
page read and write
468A07D000
stack
page read and write
1D265C00000
heap
page read and write
24955440000
heap
page read and write
1C057C80000
heap
page read and write
1D265E26000
heap
page read and write
A10000
heap
page read and write
1E2F3E13000
heap
page read and write
20BFAC6C000
heap
page read and write
1E07E85F000
heap
page read and write
1D265F13000
heap
page read and write
20BFAC5B000
heap
page read and write
401000
unkown
page execute read
1D266602000
trusted library allocation
page read and write
20BFAB70000
heap
page read and write
16AA4A60000
heap
page read and write
16AA4C49000
heap
page read and write
16AA4C77000
heap
page read and write
64C6EFE000
stack
page read and write
23B4000
heap
page read and write
20C44EF5000
heap
page read and write
24955400000
heap
page read and write
427867C000
stack
page read and write
1D265E66000
heap
page read and write
1C057E77000
heap
page read and write
20C44F02000
heap
page read and write
1B086920000
heap
page read and write
20C44ADE000
trusted library allocation
page read and write
4278BFC000
stack
page read and write
20C3FF58000
heap
page read and write
1B086A29000
heap
page read and write
1C057E8C000
heap
page read and write
1E07E832000
heap
page read and write
20BFAC64000
heap
page read and write
20C449C0000
trusted library allocation
page read and write
16AA4C4F000
heap
page read and write
64C71FE000
stack
page read and write
7CA000
heap
page read and write
20C3F63F000
heap
page read and write
B5D9B7C000
stack
page read and write
B7C0EFE000
stack
page read and write
B5DA17E000
stack
page read and write
20C44B10000
trusted library allocation
page read and write
5FEF35E000
stack
page read and write
1C057E76000
heap
page read and write
1E2F3D80000
heap
page read and write
72E64000
unkown
page readonly
D1A8AEB000
stack
page read and write
1D265E5A000
heap
page read and write
20C40600000
trusted library section
page readonly
4278AF7000
stack
page read and write
B5DA27E000
stack
page read and write
4689D7B000
stack
page read and write
16AA4D13000
heap
page read and write
20BFAC27000
heap
page read and write
3020000
trusted library allocation
page read and write
1C057E3C000
heap
page read and write
1E07E861000
heap
page read and write
16AA4C4C000
heap
page read and write
1C057E82000
heap
page read and write
36EA000
stack
page read and write
20C40640000
trusted library section
page readonly
20C44AD8000
trusted library allocation
page read and write
1E07E829000
heap
page read and write
5FEF9FF000
stack
page read and write
2401BFE000
stack
page read and write
1C057E00000
heap
page read and write
D1A8EFF000
stack
page read and write
7BC000
heap
page read and write
1E07E846000
heap
page read and write
468948B000
stack
page read and write
1E07E86E000
heap
page read and write
2495545C000
heap
page read and write
4D55C7B000
stack
page read and write
20C44EF1000
heap
page read and write
1C057C10000
heap
page read and write
1C057E66000
heap
page read and write
1E2F3EC9000
heap
page read and write
16AA4C00000
heap
page read and write
16AA4C29000
heap
page read and write
1C057E60000
heap
page read and write
20C44AF4000
trusted library allocation
page read and write
462000
unkown
page readonly
1E07E6D0000
heap
page read and write
1E07E849000
heap
page read and write
76E000
stack
page read and write
24018FF000
stack
page read and write
20C3F679000
heap
page read and write
1E07E843000
heap
page read and write
1B086B13000
heap
page read and write
20C3FDD0000
trusted library allocation
page read and write
16AA4C82000
heap
page read and write
20C44C30000
remote allocation
page read and write
20C44E55000
heap
page read and write
D1A91FE000
stack
page read and write
1E07E83E000
heap
page read and write
B7C0BFE000
stack
page read and write
24955502000
heap
page read and write
16AA4C3C000
heap
page read and write
20C44C30000
remote allocation
page read and write
5A0000
trusted library allocation
page read and write
1D265C60000
heap
page read and write
2400E7B000
stack
page read and write
4D562FF000
stack
page read and write
20C44E1E000
heap
page read and write
1C057E5B000
heap
page read and write
20C3F570000
trusted library allocation
page read and write
20C44E11000
heap
page read and write
1B086A60000
heap
page read and write
D1A8FFB000
stack
page read and write
1E2F3D10000
heap
page read and write
1E07E740000
heap
page read and write
1D265D60000
trusted library allocation
page read and write
427877E000
stack
page read and write
20C44BF0000
trusted library allocation
page read and write
20C3F68B000
heap
page read and write
1D265F02000
heap
page read and write
42789FB000
stack
page read and write
24955413000
heap
page read and write
1B086A76000
heap
page read and write
20C3F600000
heap
page read and write
427000
unkown
page read and write
1E07E85D000
heap
page read and write
1B086A5C000
heap
page read and write
1B086A76000
heap
page read and write
24013FE000
stack
page read and write
1E2F3F13000
heap
page read and write
20C3FF00000
heap
page read and write
1E2F4602000
heap
page read and write
B5D9F7E000
stack
page read and write
20C40620000
trusted library section
page readonly
20C44AF0000
trusted library allocation
page read and write
20C3FF18000
heap
page read and write
2401077000
stack
page read and write
1E2F3D20000
heap
page read and write
1D265E71000
heap
page read and write
B5D9A7A000
stack
page read and write
B7C0AFE000
stack
page read and write
1C057F13000
heap
page read and write
4D55CFE000
stack
page read and write
1E2F3F02000
heap
page read and write
1E07E82F000
heap
page read and write
AF0000
heap
page read and write
20C3F69C000
heap
page read and write
20C44EAB000
heap
page read and write
24016FE000
stack
page read and write
5FEF7FB000
stack
page read and write
B7C10FD000
stack
page read and write
20C3F69E000
heap
page read and write
20C44E3E000
heap
page read and write
1C058602000
trusted library allocation
page read and write
20C3F674000
heap
page read and write
20BFB330000
trusted library allocation
page read and write
1E07E84C000
heap
page read and write
20C40610000
trusted library section
page readonly
B7C0FFD000
stack
page read and write
20BFAB60000
heap
page read and write
20C44BA0000
trusted library allocation
page read and write
1E07E6E0000
heap
page read and write
20C3F713000
heap
page read and write
4689B7F000
stack
page read and write
401000
unkown
page execute read
20C44E62000
heap
page read and write
1E2F3ECC000
heap
page read and write
5FEFAFF000
stack
page read and write
46898FB000
stack
page read and write
5F0000
heap
page read and write
249559B0000
remote allocation
page read and write
16AA4BD0000
trusted library allocation
page read and write
1E07E83B000
heap
page read and write
4D55D7E000
stack
page read and write
20C3F629000
heap
page read and write
20C44C20000
trusted library allocation
page read and write
40A000
unkown
page read and write
1B0868B0000
heap
page read and write
280D000
trusted library allocation
page read and write
1C057D80000
trusted library allocation
page read and write
24955A02000
trusted library allocation
page read and write
20C44E9E000
heap
page read and write
20C3F677000
heap
page read and write
20C40001000
trusted library allocation
page read and write
16AA4C78000
heap
page read and write
1C057F02000
heap
page read and write
3030000
trusted library allocation
page read and write
20BFAC72000
heap
page read and write
1B086A00000
heap
page read and write
20C3FDC0000
trusted library allocation
page read and write
20C3F470000
heap
page read and write
16AA4A70000
heap
page read and write
1E2F3E29000
heap
page read and write
B5DA07E000
stack
page read and write
1C057F08000
heap
page read and write
20C3F580000
trusted library section
page read and write
1D265E02000
heap
page read and write
1E2F4739000
heap
page read and write
20C44F00000
heap
page read and write
4689CFE000
stack
page read and write
B5DA37E000
stack
page read and write
40A000
unkown
page write copy
20C44C00000
trusted library allocation
page read and write
20C44E2B000
heap
page read and write
1E2F4700000
heap
page read and write
20C3F400000
heap
page read and write
1C057E29000
heap
page read and write
1B087202000
trusted library allocation
page read and write
A0E000
stack
page read and write
239F000
stack
page read and write
B7C077B000
stack
page read and write
1E2F3E88000
heap
page read and write
1D265E3E000
heap
page read and write
5FEF3DE000
stack
page read and write
20C44AD0000
trusted library allocation
page read and write
1E07E867000
heap
page read and write
16AA4C52000
heap
page read and write
1E07E800000
heap
page read and write
D1A90FF000
stack
page read and write
1E07E860000
heap
page read and write
20C44EE0000
heap
page read and write
4D560F7000
stack
page read and write
1B0868C0000
heap
page read and write
B5D9E7D000
stack
page read and write
4689F7E000
stack
page read and write
1E2F3E6E000
heap
page read and write
1B086A55000
heap
page read and write
20C40630000
trusted library section
page readonly
20BFAC87000
heap
page read and write
20C44EA0000
heap
page read and write
20C405F0000
trusted library section
page readonly
20C3FDC3000
trusted library allocation
page read and write
20C3FF18000
heap
page read and write
1E2F3EBB000
heap
page read and write
24012F9000
stack
page read and write
B5D9C7E000
stack
page read and write
72E60000
unkown
page readonly
24955220000
heap
page read and write
408000
unkown
page readonly
20BFAC3D000
heap
page read and write
20C44E00000
heap
page read and write
20BFAD13000
heap
page read and write
16AA5402000
trusted library allocation
page read and write
1B086A66000
heap
page read and write
B7C0D7E000
stack
page read and write
20C3FDE0000
trusted library allocation
page read and write
4689A7F000
stack
page read and write
1C057E13000
heap
page read and write
249553F0000
trusted library allocation
page read and write
20C3FF02000
heap
page read and write
16AA4D00000
heap
page read and write
1B086A13000
heap
page read and write
20C44C30000
trusted library allocation
page read and write
1E07E87C000
heap
page read and write
64C70FF000
stack
page read and write
16AA4AD0000
heap
page read and write
20BFAC00000
heap
page read and write
240187F000
stack
page read and write
1B086B02000
heap
page read and write
20C3FF59000
heap
page read and write
4D55EFF000
stack
page read and write
1E2F3E67000
heap
page read and write
20C3F68D000
heap
page read and write
7C3000
heap
page read and write
30000
heap
page read and write
24955429000
heap
page read and write
1C057C20000
heap
page read and write
20BFB402000
trusted library allocation
page read and write
42786FE000
stack
page read and write
24017FE000
stack
page read and write
1C057E76000
heap
page read and write
42788FE000
stack
page read and write
79C000
heap
page read and write
20BFABD0000
heap
page read and write
770000
heap
page read and write
1E2F3DB0000
trusted library allocation
page read and write
1E07F002000
trusted library allocation
page read and write
16AA4D02000
heap
page read and write
460000
unkown
page read and write
20C3F657000
heap
page read and write
20C3FF13000
heap
page read and write
4D55FFB000
stack
page read and write
1B086A8A000
heap
page read and write
20C44EF7000
heap
page read and write
1E07E862000
heap
page read and write
16AA4C55000
heap
page read and write
1E2F3E00000
heap
page read and write
20BFAC13000
heap
page read and write
24011FB000
stack
page read and write
240167F000
stack
page read and write
5FEF8F7000
stack
page read and write
20C3F702000
heap
page read and write
408000
unkown
page readonly
20C44C30000
remote allocation
page read and write
72E61000
unkown
page execute read
20C3F6FB000
heap
page read and write
1B087080000
trusted library allocation
page read and write
7B8000
heap
page read and write
24015FB000
stack
page read and write
778000
heap
page read and write
20C3F410000
heap
page read and write
5FEF2DC000
stack
page read and write
20BFAC02000
heap
page read and write
99000
stack
page read and write
20C44E16000
heap
page read and write
23B0000
heap
page read and write
1B086A8C000
heap
page read and write
B5D987C000
stack
page read and write
20C44B00000
trusted library allocation
page read and write
1E07E82E000
heap
page read and write
1E2F3E83000
heap
page read and write
1B086A64000
heap
page read and write
400000
unkown
page readonly
249559B0000
remote allocation
page read and write
20C3F66F000
heap
page read and write
1B086A3C000
heap
page read and write
7A2000
heap
page read and write
1E2F4713000
heap
page read and write
1E2F3E42000
heap
page read and write
1E07E848000
heap
page read and write
1E07E84A000
heap
page read and write
4689E7D000
stack
page read and write
240177F000
stack
page read and write
4D561FE000
stack
page read and write
1B086B00000
heap
page read and write
1E07E87F000
heap
page read and write
1E07E83C000
heap
page read and write
27FF000
stack
page read and write
1B086B08000
heap
page read and write
1D265F00000
heap
page read and write
16AA4D08000
heap
page read and write
20C3F6AC000
heap
page read and write
20C44F05000
heap
page read and write
20C40990000
trusted library allocation
page read and write
16AA4C71000
heap
page read and write
B5D9D7F000
stack
page read and write
1C057F00000
heap
page read and write
20C40510000
trusted library allocation
page read and write
B7C0C7E000
stack
page read and write
20C40420000
trusted library allocation
page read and write
400000
unkown
page readonly
1B086A90000
heap
page read and write
462000
unkown
page readonly
1D265E00000
heap
page read and write
72E66000
unkown
page readonly
4689BFC000
stack
page read and write
1C057E52000
heap
page read and write
19A000
stack
page read and write
20C44C10000
trusted library allocation
page read and write
1E07E86A000
heap
page read and write
1B086A82000
heap
page read and write
1E07E813000
heap
page read and write
20C3F5E1000
trusted library allocation
page read and write
1B086A78000
heap
page read and write
20C3FE00000
heap
page read and write
1E07E885000
heap
page read and write
B7C0E7D000
stack
page read and write
64C6E7B000
stack
page read and write
1E07E841000
heap
page read and write
24019FC000
stack
page read and write
7B2000
heap
page read and write
35ED000
stack
page read and write
20C3FE02000
heap
page read and write
20C44B14000
trusted library allocation
page read and write
20C3FE15000
heap
page read and write
20BFAC65000
heap
page read and write
1E07E770000
trusted library allocation
page read and write
64C72FE000
stack
page read and write
1E07E902000
heap
page read and write
249551C0000
heap
page read and write
16AA4C48000
heap
page read and write
1E07E845000
heap
page read and write
64C6F7E000
stack
page read and write
20BFAD02000
heap
page read and write
1E07E847000
heap
page read and write
24014FD000
stack
page read and write
1D265E13000
heap
page read and write
435000
unkown
page read and write
20C44AD0000
trusted library allocation
page read and write
249551B0000
heap
page read and write
There are 385 hidden memdumps, click here to show them.