IOC Report
SecuriteInfo.com.Heur.7529.3828.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Heur.7529.3828.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\000\PrivaZer.default.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\000\PrivaZer.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\000\data.ini
Generic INItialization configuration [section_version]
dropped
C:\Users\user\AppData\Local\Temp\000\json.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\000\leveldb-viewer.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\000\new_version_4.0.092.txt
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\000\song.mp3
Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 256 kbps, 48 kHz, Stereo
dropped
C:\Users\user\AppData\Local\Temp\000\sqlite3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Desktop\PrivaZer.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Heur.7529.3828.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Heur.7529.3828.exe"
malicious

URLs

Name
IP
Malicious
https://www.privazer.com/my_latest_donation.php?email=
unknown
http://www.privazer.com/
unknown
https://gcc.gnu.org/bugs/):
unknown
https://privazer.com/new_version_4.0.092.txttxt7
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://www.privazer.com0
unknown
https://www.privazer.com/language_alert.php
unknown
https://privazer.com/latest_donations.php
unknown
https://www.privazer.com/download-pro.phpopenhttps://www.privazer.com/version-difference.phpS
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://www.privazer.com/order-privazer.htm
unknown
http://crl.sectigo.com/COMODOTimeStampingCA_2.crl0r
unknown
https://www.privazer.com/pay-EUR-GBP.php
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://privazer.com/new_version_4.0.092.txt
94.23.156.117
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://www.privazer.com/download-pro.php
unknown
https://www.privazer.com/changelog.php
unknown
https://www.privazer.com/pay-EUR-GBP.php?donors=1&left=
unknown
https://www.privazer.com/support.phpopenU
unknown
http://www.privazer.com
unknown
https://www.privazer.com/support.phpopen
unknown
https://sectigo.com/CPS0B
unknown
https://www.privazer.com/new_version_4.0.092.txt
94.23.156.117
https://sectigo.com/CPS0D
unknown
https://www.privazer.com/pay-EUR-GBP.phpopenJRUN_A_CLEANUP_AT_PC_STARTUP_NOTIFY_ME
unknown
https://www.privazer.com/latest_donations.php
unknown
https://www.privazer.com:443/new_version_4.0.092.txt
unknown
http://crt.sectigo.com/COMODOTimeStampingCA_2.crt0#
unknown
http://www.sqlite.org/copyright.html.
unknown
https://privazer.com/bug-madexcept.php
unknown
http://privazer.com/downloadupdate.php?changelog
unknown
https://www.privazer.com/pay-EUR-GBP.phpopen
unknown
https://sectigo.com/CPS0
unknown
https://www.privazer.com/pay-EUR-GBP.phpopenSVW
unknown
https://www.privazer.com/language_alert.phpopen
unknown
https://www.privazer.com/pay-EUR-GBP.phpopenS
unknown
https://www.privazer.com/pay-EUR-GBP.phpopenU
unknown
https://www.privazer.com/G
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://www.privazer.com/version-difference.php
unknown
https://www.privazer.com/pay-EUR-GBP.php?donors=1&support=1
unknown
https://www.privazer.com/PrivaZer.exe
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://www.privazer.com/PrivaZer_Pro.exe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
https://www.privazer.com/support.php
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://www.privazer.com/changelog.phpopenU
unknown
https://www.privazer.comhttps://www.privazer.com/download-pro.phpopenhttps://www.privazer.com/versio
unknown
https://www.privazer.com/download-pro.phpopenhttps://www.privazer.com/version-difference.php3
unknown
https://privazer.com/latest_donations.phpmsctls_progress32
unknown
https://www.privazer.com/order-privazer.htmopen
unknown
https://www.privazer.com/exit_unicode.php?country=
unknown
https://www.privazer.com
unknown
https://www.privazer.com/pay-EUR-GBP.php?donors=1&support=1https://www.privazer.com/pay-EUR-GBP.phpS
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
privazer.com
94.23.156.117
www.privazer.com
unknown

IPs

IP
Domain
Country
Malicious
94.23.156.117
privazer.com
France

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WSearch
Reactivate
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\FileSystem
LongPathsEnabled

Memdumps

Base Address
Regiontype
Protect
Malicious
8862000
heap
page read and write
5F37000
direct allocation
page read and write
88F6000
heap
page read and write
8CD0000
heap
page read and write
8CD6000
heap
page read and write
876D000
heap
page read and write
99AF000
heap
page read and write
9BA7000
heap
page read and write
8BB4000
heap
page read and write
2144000
heap
page read and write
1D67000
unkown
page readonly
22E4000
heap
page read and write
3D70000
heap
page read and write
9C1C000
heap
page read and write
1BD2000
unkown
page readonly
8868000
heap
page read and write
9C2E000
heap
page read and write
A4C000
unkown
page read and write
88A8000
heap
page read and write
9914000
heap
page read and write
2275000
heap
page read and write
5FAC000
direct allocation
page read and write
A83000
unkown
page read and write
5FC1000
direct allocation
page read and write
9B8E000
heap
page read and write
9BBD000
heap
page read and write
1FDF000
unkown
page readonly
88FD000
heap
page read and write
8CCE000
heap
page read and write
1FDA000
unkown
page readonly
3E71000
heap
page read and write
8BB6000
heap
page read and write
3E71000
heap
page read and write
2144000
heap
page read and write
9BAE000
heap
page read and write
5F4E000
direct allocation
page read and write
180C000
unkown
page readonly
6E0E000
heap
page read and write
21F0000
heap
page read and write
8810000
heap
page read and write
A53000
unkown
page read and write
1C5D000
unkown
page readonly
8C58000
heap
page read and write
491000
unkown
page execute read
1A6B000
unkown
page readonly
1064000
unkown
page readonly
1D33000
unkown
page readonly
8C5C000
heap
page read and write
1F67000
unkown
page readonly
5E52000
unkown
page readonly
8BCC000
heap
page read and write
1DDC000
unkown
page readonly
1FE8000
unkown
page readonly
8BBA000
heap
page read and write
8C2A000
heap
page read and write
1B88000
unkown
page readonly
8BBE000
heap
page read and write
1DA2000
unkown
page readonly
8911000
heap
page read and write
2220000
heap
page read and write
2144000
heap
page read and write
87E4000
heap
page read and write
6E12000
heap
page read and write
5FA4000
direct allocation
page read and write
8BA6000
heap
page read and write
3E71000
heap
page read and write
6E65000
heap
page read and write
8CA0000
heap
page read and write
3E71000
heap
page read and write
1D35000
unkown
page readonly
990C000
heap
page read and write
2140000
heap
page read and write
9A71000
heap
page read and write
411000
unkown
page execute read
5F9D000
direct allocation
page read and write
8C3E000
heap
page read and write
6E67000
heap
page read and write
8788000
heap
page read and write
9B9F000
heap
page read and write
5BEF000
stack
page read and write
19CD000
unkown
page readonly
1FE4000
unkown
page readonly
40AF000
stack
page read and write
9C33000
heap
page read and write
9BC1000
heap
page read and write
6DF1000
heap
page read and write
8C4C000
heap
page read and write
A4A000
unkown
page read and write
8C2E000
heap
page read and write
5F8F000
direct allocation
page read and write
3E71000
heap
page read and write
9910000
heap
page read and write
8B5D000
heap
page read and write
8A31000
heap
page read and write
1FC7000
unkown
page readonly
991F000
heap
page read and write
8CDC000
heap
page read and write
8BD8000
heap
page read and write
9C15000
heap
page read and write
5FC8000
direct allocation
page read and write
878C000
heap
page read and write
18B8000
unkown
page readonly
5F5C000
direct allocation
page read and write
1AC1000
unkown
page readonly
8C82000
heap
page read and write
993E000
heap
page read and write
3E71000
heap
page read and write
8C64000
heap
page read and write
2269000
heap
page read and write
8C78000
heap
page read and write
2144000
heap
page read and write
8915000
heap
page read and write
582E000
stack
page read and write
9BC3000
heap
page read and write
5F80000
direct allocation
page read and write
88C0000
heap
page read and write
1CE3000
unkown
page readonly
1A7C000
unkown
page readonly
8C10000
heap
page read and write
1F64000
unkown
page readonly
1F6E000
unkown
page readonly
8A87000
heap
page read and write
5F88000
direct allocation
page read and write
22C0000
heap
page read and write
8C46000
heap
page read and write
8812000
heap
page read and write
190B000
unkown
page readonly
22EB000
heap
page read and write
8763000
heap
page read and write
2144000
heap
page read and write
8BD4000
heap
page read and write
8C38000
heap
page read and write
A360000
direct allocation
page execute and read and write
875B000
heap
page read and write
8CA4000
heap
page read and write
223F000
heap
page read and write
A510000
trusted library allocation
page read and write
8BE8000
heap
page read and write
5BF1000
unkown
page execute read
9B8C000
heap
page read and write
9936000
heap
page read and write
3CB0000
direct allocation
page execute and read and write
9B9C000
heap
page read and write
8786000
heap
page read and write
82000
stack
page read and write
97A0000
direct allocation
page execute and read and write
22B2000
heap
page read and write
8C40000
heap
page read and write
8BD0000
heap
page read and write
8CA8000
heap
page read and write
9260000
trusted library allocation
page read and write
8BCE000
heap
page read and write
1F9D000
unkown
page readonly
22DE000
heap
page read and write
8C5A000
heap
page read and write
3CA0000
heap
page read and write
876F000
heap
page read and write
9BA1000
heap
page read and write
98C0000
heap
page read and write
A56000
unkown
page read and write
5E4F000
unkown
page write copy
9BCF000
heap
page read and write
891A000
heap
page read and write
5E41000
unkown
page read and write
3E71000
heap
page read and write
6E33000
heap
page read and write
9BA9000
heap
page read and write
2144000
heap
page read and write
8C32000
heap
page read and write
880E000
heap
page read and write
2270000
heap
page read and write
8730000
heap
page read and write
8BB8000
heap
page read and write
1FF6000
unkown
page readonly
87C8000
heap
page read and write
592D000
stack
page read and write
A4B0000
direct allocation
page execute and read and write
8C12000
heap
page read and write
875F000
heap
page read and write
1D54000
unkown
page readonly
B460000
trusted library allocation
page read and write
A86000
unkown
page write copy
5FD0000
direct allocation
page execute and read and write
9C30000
heap
page read and write
6DDB000
heap
page read and write
3E71000
heap
page read and write
5E42000
unkown
page write copy
8CD4000
heap
page read and write
72F0000
remote allocation
page read and write
8CB0000
heap
page read and write
9600000
direct allocation
page execute and read and write
8BE4000
heap
page read and write
98FD000
heap
page read and write
747E000
stack
page read and write
88EC000
heap
page read and write
999E000
heap
page read and write
6DA9000
heap
page read and write
8761000
heap
page read and write
A0B0000
direct allocation
page execute and read and write
2110000
direct allocation
page execute and read and write
8BA8000
heap
page read and write
56EE000
stack
page read and write
884A000
heap
page read and write
88A6000
heap
page read and write
3E71000
heap
page read and write
5F6B000
direct allocation
page read and write
8765000
heap
page read and write
1D69000
unkown
page readonly
87AA000
heap
page read and write
6D96000
heap
page read and write
87F0000
heap
page read and write
8C0E000
heap
page read and write
875D000
heap
page read and write
8CBA000
heap
page read and write
2270000
heap
page read and write
1F99000
unkown
page readonly
3E82000
heap
page read and write
890D000
heap
page read and write
952E000
stack
page read and write
88E2000
heap
page read and write
9942000
heap
page read and write
19FB000
unkown
page readonly
8C3C000
heap
page read and write
9B9A000
heap
page read and write
1DF8000
unkown
page readonly
671000
unkown
page execute read
8CAA000
heap
page read and write
7A6000
unkown
page execute read
1FF2000
unkown
page readonly
495000
unkown
page execute read
5E4B000
unkown
page read and write
8CBE000
heap
page read and write
1805000
unkown
page readonly
8C7A000
heap
page read and write
A3E0000
direct allocation
page execute and read and write
48C000
unkown
page execute read
19F4000
unkown
page readonly
8CC4000
heap
page read and write
8C36000
heap
page read and write
8901000
heap
page read and write
8BDC000
heap
page read and write
9934000
heap
page read and write
9C0D000
heap
page read and write
8CD8000
heap
page read and write
A3F000
unkown
page write copy
226E000
heap
page read and write
878E000
heap
page read and write
229B000
heap
page read and write
87C2000
heap
page read and write
8BC2000
heap
page read and write
98F7000
heap
page read and write
22E8000
heap
page read and write
475000
unkown
page execute read
9C1A000
heap
page read and write
8790000
heap
page read and write
9903000
heap
page read and write
22C4000
heap
page read and write
6E38000
heap
page read and write
886A000
heap
page read and write
A43000
unkown
page read and write
9B8A000
heap
page read and write
1F85000
unkown
page readonly
8CAC000
heap
page read and write
8C7C000
heap
page read and write
5F55000
direct allocation
page read and write
8822000
heap
page read and write
9906000
heap
page read and write
8866000
heap
page read and write
42C000
unkown
page execute read
6DAB000
heap
page read and write
9B86000
heap
page read and write
6DE6000
heap
page read and write
2284000
heap
page read and write
6B50000
heap
page read and write
3E70000
heap
page read and write
8C28000
heap
page read and write
1A7A000
unkown
page readonly
9ADD000
heap
page read and write
88F2000
heap
page read and write
3E71000
heap
page read and write
883C000
heap
page read and write
1A8A000
unkown
page readonly
8909000
heap
page read and write
98B3000
heap
page read and write
9938000
heap
page read and write
3E71000
heap
page read and write
8C76000
heap
page read and write
3E73000
heap
page read and write
2253000
heap
page read and write
A1FF000
stack
page read and write
6B56000
heap
page read and write
8CB8000
heap
page read and write
8C4A000
heap
page read and write
126F000
unkown
page readonly
2144000
heap
page read and write
8C34000
heap
page read and write
22C4000
heap
page read and write
990E000
heap
page read and write
3E71000
heap
page read and write
884C000
heap
page read and write
87D0000
heap
page read and write
9B50000
heap
page read and write
5AEE000
stack
page read and write
400000
unkown
page readonly
2144000
heap
page read and write
3E71000
heap
page read and write
477000
unkown
page execute read
9989000
heap
page read and write
1866000
unkown
page readonly
22D1000
heap
page read and write
22BF000
heap
page read and write
19C6000
unkown
page readonly
992B000
heap
page read and write
8C48000
heap
page read and write
1B40000
unkown
page readonly
6D9F000
heap
page read and write
87D2000
heap
page read and write
2144000
heap
page read and write
1802000
unkown
page readonly
3D33000
heap
page read and write
8BA4000
heap
page read and write
8BC4000
heap
page read and write
8C30000
heap
page read and write
5E43000
unkown
page read and write
1F8F000
unkown
page readonly
1D88000
unkown
page readonly
8B61000
heap
page read and write
2144000
heap
page read and write
1A8C000
unkown
page readonly
9922000
heap
page read and write
8CDE000
heap
page read and write
5FBA000
direct allocation
page read and write
878A000
heap
page read and write
88C2000
heap
page read and write
3D60000
heap
page read and write
1DDA000
unkown
page readonly
3E71000
heap
page read and write
8C7E000
heap
page read and write
9A49000
heap
page read and write
8CDA000
heap
page read and write
195D000
unkown
page readonly
9912000
heap
page read and write
21F8000
heap
page read and write
1AE1000
unkown
page readonly
406000
unkown
page execute and read and write
44A000
unkown
page execute read
8BA0000
heap
page read and write
9B52000
heap
page read and write
A8F000
unkown
page readonly
6E32000
heap
page read and write
88DA000
heap
page read and write
1903000
unkown
page readonly
1CC7000
unkown
page readonly
1F60000
unkown
page readonly
8838000
heap
page read and write
993A000
heap
page read and write
8CA6000
heap
page read and write
22CB000
heap
page read and write
1B8D000
unkown
page readonly
9925000
heap
page read and write
2274000
heap
page read and write
3FAC000
stack
page read and write
8767000
heap
page read and write
6E02000
heap
page read and write
8F20000
heap
page read and write
8C60000
heap
page read and write
1D1D000
unkown
page readonly
88B6000
heap
page read and write
9B7F000
heap
page read and write
9C3D000
heap
page read and write
22C0000
heap
page read and write
5BF0000
unkown
page readonly
2144000
heap
page read and write
3D10000
heap
page read and write
22D6000
heap
page read and write
1F6A000
unkown
page readonly
8CE0000
heap
page read and write
403000
unkown
page execute read
401000
unkown
page execute read
198000
stack
page read and write
5FB3000
direct allocation
page read and write
22BE000
heap
page read and write
72F0000
remote allocation
page read and write
1D0B000
unkown
page readonly
6D90000
heap
page read and write
88E4000
heap
page read and write
A3F000
unkown
page read and write
22BB000
heap
page read and write
6D91000
heap
page read and write
993C000
heap
page read and write
9BA3000
heap
page read and write
8BEC000
heap
page read and write
88F4000
heap
page read and write
9B96000
heap
page read and write
8CB6000
heap
page read and write
1C72000
unkown
page readonly
9946000
heap
page read and write
227A000
heap
page read and write
9A27000
heap
page read and write
89F0000
direct allocation
page execute and read and write
2145000
heap
page read and write
1C16000
unkown
page readonly
5F3E000
direct allocation
page read and write
8C0C000
heap
page read and write
9909000
heap
page read and write
9260000
trusted library allocation
page read and write
8BC0000
heap
page read and write
5F96000
direct allocation
page read and write
8918000
heap
page read and write
22A5000
heap
page read and write
9BDF000
heap
page read and write
4C5000
unkown
page execute read
8BB2000
heap
page read and write
87E2000
heap
page read and write
9944000
heap
page read and write
11C8000
unkown
page readonly
3E71000
heap
page read and write
8750000
heap
page read and write
12BB000
unkown
page readonly
3E71000
heap
page read and write
1271000
unkown
page readonly
8C86000
heap
page read and write
8C68000
heap
page read and write
1D6B000
unkown
page readonly
2241000
heap
page read and write
8C4E000
heap
page read and write
1F71000
unkown
page readonly
69D0000
direct allocation
page execute and read and write
98AC000
heap
page read and write
8CBC000
heap
page read and write
8DC6000
heap
page read and write
72F0000
remote allocation
page read and write
9BB8000
heap
page read and write
88A4000
heap
page read and write
2144000
heap
page read and write
5F79000
direct allocation
page read and write
3D76000
heap
page read and write
8C84000
heap
page read and write
19BC000
unkown
page readonly
995D000
heap
page read and write
8C24000
heap
page read and write
8A44000
heap
page read and write
2275000
heap
page read and write
98C9000
heap
page read and write
8C88000
heap
page read and write
9C27000
heap
page read and write
9928000
heap
page read and write
B30E000
stack
page read and write
8BF4000
heap
page read and write
3E71000
heap
page read and write
1DC0000
unkown
page readonly
8A20000
heap
page read and write
8CD2000
heap
page read and write
9BBB000
heap
page read and write
1840000
unkown
page readonly
2150000
heap
page read and write
9948000
heap
page read and write
88E0000
heap
page read and write
8F50000
heap
page read and write
3E71000
heap
page read and write
8C26000
heap
page read and write
1FFA000
unkown
page readonly
57EE000
stack
page read and write
8C2C000
heap
page read and write
98F0000
heap
page read and write
880C000
heap
page read and write
8BF0000
heap
page read and write
400000
unkown
page readonly
8769000
heap
page read and write
9CD000
unkown
page execute read
3E71000
heap
page read and write
87CA000
heap
page read and write
4B6000
unkown
page execute read
9B79000
heap
page read and write
8BBC000
heap
page read and write
9870000
heap
page read and write
6DA3000
heap
page read and write
8C80000
heap
page read and write
8C3A000
heap
page read and write
8CAE000
heap
page read and write
9840000
direct allocation
page execute and read and write
40B000
unkown
page execute and read and write
3E71000
heap
page read and write
9260000
trusted library allocation
page read and write
9AC6000
heap
page read and write
8CA2000
heap
page read and write
8C8E000
heap
page read and write
3D30000
heap
page read and write
8BE6000
heap
page read and write
9AC0000
heap
page read and write
2020000
heap
page read and write
5E51000
unkown
page read and write
There are 482 hidden memdumps, click here to show them.