IOC Report
SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_ec24384a58645712a8216dd34a3884cb9132512_265dce86_e1f415c1-83d4-44dc-a094-cc48ee5b9763\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAC8.tmp.dmp
Mini DuMP crash report, 14 streams, Wed May 22 23:31:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB46.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDB95.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 488

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
ProgramId
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
FileId
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
LowerCaseLongPath
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
LongPathHash
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
Name
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
OriginalFileName
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
Publisher
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
Version
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
BinFileVersion
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
BinaryType
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
ProductName
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
ProductVersion
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
LinkDate
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
BinProductVersion
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
AppxPackageFullName
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
AppxPackageRelativeId
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
Size
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
Language
\REGISTRY\A\{199c06cd-5e44-0df9-10a8-8d0b07cf26c4}\Root\InventoryApplicationFile\securiteinfo.com|83b2c15b524d76ef
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5AE000
stack
page read and write
5B0000
heap
page read and write
455000
unkown
page read and write
400000
unkown
page readonly
74F000
stack
page read and write
401000
unkown
page execute read
444000
unkown
page readonly
640000
heap
page read and write
7B0000
heap
page read and write
400000
unkown
page readonly
455000
unkown
page write copy
444000
unkown
page readonly
9AF000
stack
page read and write
401000
unkown
page execute read
490000
heap
page read and write
5FE000
stack
page read and write
9C000
stack
page read and write
45A000
unkown
page readonly
21C0000
heap
page read and write
45A000
unkown
page readonly
22C0000
heap
page read and write
7B8000
heap
page read and write
19D000
stack
page read and write
There are 13 hidden memdumps, click here to show them.