Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut4191.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut41F0.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\conged
|
ASCII text, with very long lines (29748), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\prophetesses
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.AutoIt.1377.13566.17753.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
172.67.74.152
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://www.micrmscorlib.resources09-04-02.crt0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://mail.gruporequena.com
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.gruporequena.com
|
198.59.144.129
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
198.59.144.129
|
mail.gruporequena.com
|
United States
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
392000
|
system
|
page execute and read and write
|
||
26A5000
|
trusted library allocation
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
20A0000
|
direct allocation
|
page read and write
|
||
3FB9000
|
direct allocation
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
23C2000
|
trusted library allocation
|
page read and write
|
||
5E9F000
|
stack
|
page read and write
|
||
12F3000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
4C6C000
|
stack
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
406E000
|
direct allocation
|
page read and write
|
||
4AED000
|
trusted library allocation
|
page read and write
|
||
3FF9000
|
direct allocation
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
12DA000
|
heap
|
page read and write
|
||
5FAF000
|
stack
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
3FB9000
|
direct allocation
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
35A000
|
stack
|
page read and write
|
||
13B2000
|
heap
|
page read and write
|
||
7FAB0000
|
trusted library allocation
|
page execute and read and write
|
||
A91000
|
heap
|
page read and write
|
||
6680000
|
heap
|
page read and write
|
||
4ADE000
|
trusted library allocation
|
page read and write
|
||
3FFD000
|
direct allocation
|
page read and write
|
||
2666000
|
trusted library allocation
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page execute and read and write
|
||
369C000
|
trusted library allocation
|
page read and write
|
||
63D0000
|
trusted library allocation
|
page execute and read and write
|
||
9C8000
|
heap
|
page read and write
|
||
2631000
|
trusted library allocation
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
808000
|
unkown
|
page readonly
|
||
13C2000
|
heap
|
page read and write
|
||
23DB000
|
trusted library allocation
|
page execute and read and write
|
||
12A0000
|
heap
|
page read and write
|
||
3FBD000
|
direct allocation
|
page read and write
|
||
2503000
|
heap
|
page read and write
|
||
23D7000
|
trusted library allocation
|
page execute and read and write
|
||
5ED7000
|
trusted library allocation
|
page read and write
|
||
23CA000
|
trusted library allocation
|
page execute and read and write
|
||
3E13000
|
direct allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
26BE000
|
trusted library allocation
|
page read and write
|
||
3E13000
|
direct allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
23A4000
|
trusted library allocation
|
page read and write
|
||
4ACE000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
trusted library allocation
|
page read and write
|
||
A5F000
|
heap
|
page read and write
|
||
58D8000
|
heap
|
page read and write
|
||
3E90000
|
direct allocation
|
page read and write
|
||
58D6000
|
heap
|
page read and write
|
||
5D5D000
|
stack
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
803000
|
unkown
|
page write copy
|
||
3FFD000
|
direct allocation
|
page read and write
|
||
3FF9000
|
direct allocation
|
page read and write
|
||
B8A000
|
stack
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
58AC000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
4CC0000
|
heap
|
page execute and read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
13B2000
|
heap
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
4AE1000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
595E000
|
heap
|
page read and write
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
402E000
|
direct allocation
|
page read and write
|
||
11FC000
|
stack
|
page read and write
|
||
12F1000
|
heap
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page execute and read and write
|
||
1312000
|
heap
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
267D000
|
trusted library allocation
|
page read and write
|
||
3631000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
1B6E000
|
stack
|
page read and write
|
||
5D9E000
|
stack
|
page read and write
|
||
23C6000
|
trusted library allocation
|
page execute and read and write
|
||
1270000
|
heap
|
page read and write
|
||
402E000
|
direct allocation
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
3D30000
|
direct allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
6380000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
406E000
|
direct allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
406E000
|
direct allocation
|
page read and write
|
||
3FBD000
|
direct allocation
|
page read and write
|
||
5959000
|
heap
|
page read and write
|
||
7F5000
|
unkown
|
page readonly
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
12F1000
|
heap
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
3FB9000
|
direct allocation
|
page read and write
|
||
2110000
|
heap
|
page read and write
|
||
9FA000
|
heap
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
26C6000
|
trusted library allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
6377000
|
trusted library allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
58A8000
|
heap
|
page read and write
|
||
7CF000
|
unkown
|
page readonly
|
||
4ACB000
|
trusted library allocation
|
page read and write
|
||
7FF000
|
unkown
|
page write copy
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
5C1F000
|
stack
|
page read and write
|
||
7CF000
|
unkown
|
page readonly
|
||
12D2000
|
heap
|
page read and write
|
||
1FF0000
|
direct allocation
|
page execute and read and write
|
||
13C2000
|
heap
|
page read and write
|
||
13B2000
|
heap
|
page read and write
|
||
23D5000
|
trusted library allocation
|
page execute and read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
23AD000
|
trusted library allocation
|
page execute and read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
1FD0000
|
heap
|
page read and write
|
||
3E13000
|
direct allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
23BD000
|
trusted library allocation
|
page execute and read and write
|
||
5F1D000
|
stack
|
page read and write
|
||
3FBD000
|
direct allocation
|
page read and write
|
||
1FAF000
|
stack
|
page read and write
|
||
3E53000
|
direct allocation
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
466C000
|
stack
|
page read and write
|
||
2010000
|
heap
|
page read and write
|
||
3E53000
|
direct allocation
|
page read and write
|
||
3FFD000
|
direct allocation
|
page read and write
|
||
2014000
|
heap
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page execute and read and write
|
||
23D2000
|
trusted library allocation
|
page read and write
|
||
402E000
|
direct allocation
|
page read and write
|
||
3FBD000
|
direct allocation
|
page read and write
|
||
12D3000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
6390000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
596C000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
4AE6000
|
trusted library allocation
|
page read and write
|
||
3FF9000
|
direct allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
6F8000
|
stack
|
page read and write
|
||
5913000
|
heap
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
4AD2000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
741000
|
unkown
|
page execute read
|
||
266F000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
3E13000
|
direct allocation
|
page read and write
|
||
3E90000
|
direct allocation
|
page read and write
|
||
402E000
|
direct allocation
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
58A0000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
23A3000
|
trusted library allocation
|
page execute and read and write
|
||
63C0000
|
heap
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
5942000
|
heap
|
page read and write
|
||
12F1000
|
heap
|
page read and write
|
||
7FF000
|
unkown
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
4AC6000
|
trusted library allocation
|
page read and write
|
||
12F3000
|
heap
|
page read and write
|
||
2448000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
heap
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5ECD000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
808000
|
unkown
|
page readonly
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
243E000
|
stack
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
3E90000
|
direct allocation
|
page read and write
|
||
5B1D000
|
stack
|
page read and write
|
||
7F5000
|
unkown
|
page readonly
|
||
390000
|
system
|
page execute and read and write
|
||
6370000
|
trusted library allocation
|
page read and write
|
||
13C2000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
3FB9000
|
direct allocation
|
page read and write
|
||
4ADA000
|
trusted library allocation
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
3E90000
|
direct allocation
|
page read and write
|
||
1BAD000
|
stack
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
741000
|
unkown
|
page execute read
|
||
846000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
5EA8000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
heap
|
page execute and read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
4AF2000
|
trusted library allocation
|
page read and write
|
||
4DCC000
|
stack
|
page read and write
|
||
13C2000
|
heap
|
page read and write
|
||
3E53000
|
direct allocation
|
page read and write
|
There are 229 hidden memdumps, click here to show them.