IOC Report
SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im HTTPDebuggerUI.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /f /im HTTPDebuggerSvc.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
malicious
C:\Windows\System32\taskkill.exe
taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c cls
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc stop HTTPDebuggerPro
C:\Windows\System32\sc.exe
sc stop HTTPDebuggerPro
C:\Windows\System32\sc.exe
sc stop HTTPDebuggerProSdk
C:\Windows\System32\sc.exe
sc stop HTTPDebuggerPro
C:\Windows\System32\sc.exe
sc stop HTTPDebuggerProSdk
C:\Windows\System32\sc.exe
sc stop HTTPDebuggerPro
C:\Windows\System32\sc.exe
sc stop HTTPDebuggerProSdk
There are 46 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://keyauth.win/api/1.1/pace
unknown
http://185.101.104.92/as.exe
unknown
https://keyauth.cc/panel/bronkz/valorantplus/
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://curl.haxx.se/docs/http-cookies.html#
unknown
https://keyauth.win/api/1.1/ce
unknown
https://keyauth.win/api/1.1/
104.26.0.5
http://185.101.104.92/as.exeC:
unknown

Domains

Name
IP
Malicious
keyauth.win
104.26.0.5

IPs

IP
Domain
Country
Malicious
104.26.0.5
keyauth.win
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
7919C7E000
stack
page read and write
18E50388000
heap
page read and write
62584FE000
stack
page read and write
CF5567F000
stack
page read and write
18E503BE000
heap
page read and write
7FF6CE570000
unkown
page readonly
CF5577E000
stack
page read and write
1F4368B0000
heap
page read and write
27158349000
heap
page read and write
1D66ADF0000
heap
page read and write
18E503A1000
heap
page read and write
B47DEFE000
stack
page read and write
1F71E8F0000
heap
page read and write
B47DBAE000
stack
page read and write
271582B0000
heap
page read and write
2C9778C0000
heap
page read and write
18E51D25000
heap
page read and write
AFB197E000
stack
page read and write
8D4B9E000
stack
page read and write
18E50350000
heap
page read and write
1F4368E0000
heap
page read and write
2C9779F0000
heap
page read and write
18E502D0000
heap
page read and write
271582D0000
heap
page read and write
62583FF000
stack
page read and write
1D66B0C0000
heap
page read and write
1D66AE30000
heap
page read and write
53A711D000
stack
page read and write
2038A720000
heap
page read and write
1F71EAD9000
heap
page read and write
6257FFF000
stack
page read and write
7FF6CE556000
unkown
page readonly
18E502A0000
heap
page read and write
18E503A0000
heap
page read and write
21C8CF98000
heap
page read and write
7FF6CE4F0000
unkown
page readonly
18E502F0000
remote allocation
page read and write
1F71EA35000
heap
page read and write
18E503A4000
heap
page read and write
18E501C0000
heap
page read and write
2C977BC0000
heap
page read and write
E8567F000
stack
page read and write
1D66B0C5000
heap
page read and write
2C9779A0000
heap
page read and write
1D66B000000
heap
page read and write
2C9779F8000
heap
page read and write
1F436CD0000
heap
page read and write
1F71E9D0000
heap
page read and write
AFB187E000
stack
page read and write
18E503B9000
heap
page read and write
1F436980000
heap
page read and write
53A747E000
stack
page read and write
62581FE000
stack
page read and write
18E5037B000
heap
page read and write
18E50356000
heap
page read and write
1F71EA30000
heap
page read and write
21C8CE00000
heap
page read and write
18E5035C000
heap
page read and write
6257EFC000
stack
page read and write
7919BFE000
unkown
page readonly
27158280000
heap
page read and write
18E503BE000
heap
page read and write
E8547D000
stack
page read and write
7FF6CE556000
unkown
page readonly
1F71EAD0000
heap
page read and write
21C8D150000
heap
page read and write
7919B7F000
stack
page read and write
AFB156C000
stack
page read and write
18E51D20000
heap
page read and write
2038A758000
heap
page read and write
62582FE000
stack
page read and write
2038A710000
heap
page read and write
2C9779FF000
heap
page read and write
8D4A9C000
stack
page read and write
18E503A9000
heap
page read and write
7FF6CE570000
unkown
page readonly
1F436CD5000
heap
page read and write
18E502F0000
remote allocation
page read and write
21C8CEE0000
heap
page read and write
2038A750000
heap
page read and write
21C8CF00000
heap
page read and write
18E503BE000
heap
page read and write
2038AA45000
heap
page read and write
8D4EFF000
stack
page read and write
1F4368C0000
heap
page read and write
7919A7D000
stack
page read and write
21C8CF90000
heap
page read and write
18E5038D000
heap
page read and write
1D66AE39000
heap
page read and write
271582D5000
heap
page read and write
7FF6CE4F0000
unkown
page readonly
B47DAAD000
stack
page read and write
1F71E9F0000
heap
page read and write
2C977BC5000
heap
page read and write
18E502F0000
remote allocation
page read and write
7FF6CE4F1000
unkown
page execute read
2C9779C0000
heap
page read and write
2038A920000
heap
page read and write
1D66AE00000
heap
page read and write
18E503B9000
heap
page read and write
CF5536C000
stack
page read and write
E8557E000
stack
page read and write
2038AA40000
heap
page read and write
21C8D155000
heap
page read and write
7FF6CE4F1000
unkown
page execute read
27158290000
heap
page read and write
7FF6CE56F000
unkown
page read and write
27158340000
heap
page read and write
1F436988000
heap
page read and write
7FF6CE56F000
unkown
page write copy
There are 100 hidden memdumps, click here to show them.