IOC Report
SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cspmtibh.w1g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghqruusq.dbt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wwyyloqs.uxv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xq2qdmiu.t02.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:19:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
http://varders.kozow.com:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.6.168
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20a
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
time.windows.com
unknown
malicious
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3479000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
31F1000
trusted library allocation
page read and write
malicious
66DE000
heap
page read and write
4211000
trusted library allocation
page read and write
631000
heap
page read and write
6EB7000
trusted library allocation
page read and write
6D96000
trusted library allocation
page read and write
3388000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
1DC000
unkown
page readonly
34FF000
trusted library allocation
page read and write
1680000
heap
page read and write
444F000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
67D0000
heap
page read and write
4970000
trusted library allocation
page read and write
13E0000
heap
page read and write
568D000
stack
page read and write
458F000
trusted library allocation
page read and write
7FE6000
trusted library allocation
page read and write
460C000
stack
page read and write
1420000
heap
page read and write
3587000
trusted library allocation
page read and write
329A000
trusted library allocation
page read and write
3094000
trusted library allocation
page read and write
70281000
unkown
page execute read
34F9000
trusted library allocation
page read and write
91F000
stack
page read and write
4E8E000
stack
page read and write
30B0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
49D5000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
5000000
trusted library allocation
page read and write
41FF000
trusted library allocation
page read and write
3071000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
1683000
heap
page read and write
BE4E000
stack
page read and write
337D000
trusted library allocation
page read and write
3268000
trusted library allocation
page read and write
68D0000
heap
page read and write
447B000
trusted library allocation
page read and write
633000
heap
page read and write
3383000
trusted library allocation
page read and write
BC4E000
stack
page read and write
1410000
trusted library allocation
page read and write
1330000
heap
page read and write
49C0000
trusted library allocation
page read and write
329E000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
5940000
heap
page execute and read and write
4A50000
trusted library allocation
page read and write
4204000
trusted library allocation
page read and write
5620000
heap
page read and write
4336000
trusted library allocation
page read and write
34F1000
trusted library allocation
page read and write
42EA000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
6AB000
heap
page read and write
4A70000
trusted library allocation
page execute and read and write
63E000
heap
page read and write
304C000
stack
page read and write
4974000
trusted library allocation
page read and write
246F000
stack
page read and write
B9C000
stack
page read and write
952E000
stack
page read and write
C57E000
stack
page read and write
4507000
trusted library allocation
page read and write
AA4000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
4AEB000
stack
page read and write
1412000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
34F4000
trusted library allocation
page read and write
A6F000
stack
page read and write
1690000
trusted library allocation
page execute and read and write
46A000
stack
page read and write
49B0000
trusted library allocation
page read and write
4A40000
heap
page read and write
3062000
trusted library allocation
page read and write
45CD000
trusted library allocation
page read and write
34FD000
trusted library allocation
page read and write
6A0E000
stack
page read and write
32B2000
trusted library allocation
page read and write
5770000
heap
page read and write
AC6000
trusted library allocation
page execute and read and write
4C60000
heap
page execute and read and write
34A0000
trusted library allocation
page read and write
4D80000
heap
page read and write
6BCE000
stack
page read and write
451D000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
14E1000
heap
page read and write
3534000
trusted library allocation
page read and write
1457000
heap
page read and write
6F10000
heap
page read and write
AAD000
trusted library allocation
page execute and read and write
4AF0000
trusted library section
page readonly
4A60000
heap
page read and write
3503000
trusted library allocation
page read and write
BB0000
trusted library allocation
page read and write
324F000
trusted library allocation
page read and write
4478000
trusted library allocation
page read and write
ADB000
trusted library allocation
page execute and read and write
167E000
stack
page read and write
44A8000
trusted library allocation
page read and write
6C0E000
stack
page read and write
3379000
trusted library allocation
page read and write
5605000
heap
page read and write
4F60000
trusted library allocation
page read and write
AD2000
trusted library allocation
page read and write
B5E000
stack
page read and write
BC8E000
stack
page read and write
44F1000
trusted library allocation
page read and write
3264000
trusted library allocation
page read and write
626000
heap
page read and write
1187000
stack
page read and write
52EE000
stack
page read and write
32D8000
trusted library allocation
page read and write
4F50000
trusted library section
page read and write
4C40000
trusted library allocation
page execute and read and write
6DD0000
trusted library allocation
page execute and read and write
4316000
trusted library allocation
page read and write
4B00000
heap
page read and write
33AF000
trusted library allocation
page read and write
449B000
trusted library allocation
page read and write
5E0000
heap
page read and write
70280000
unkown
page readonly
2FF0000
trusted library allocation
page read and write
B00000
trusted library allocation
page execute and read and write
45D0000
trusted library allocation
page read and write
4996000
trusted library allocation
page read and write
5F0000
heap
page read and write
1350000
heap
page read and write
6DB0000
trusted library allocation
page execute and read and write
AA3000
trusted library allocation
page execute and read and write
30E0000
heap
page execute and read and write
13D3000
trusted library allocation
page execute and read and write
337B000
trusted library allocation
page read and write
6A4D000
stack
page read and write
347F000
trusted library allocation
page read and write
1417000
trusted library allocation
page execute and read and write
93A0000
trusted library section
page read and write
13D4000
trusted library allocation
page read and write
1449000
heap
page read and write
307D000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
6D9A000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
ABD000
trusted library allocation
page execute and read and write
5BD0000
trusted library allocation
page read and write
457A000
trusted library allocation
page read and write
AD7000
trusted library allocation
page execute and read and write
34A6000
trusted library allocation
page read and write
44FE000
trusted library allocation
page read and write
11F0000
heap
page read and write
425C000
trusted library allocation
page read and write
6877000
heap
page read and write
C1FE000
stack
page read and write
13DD000
trusted library allocation
page execute and read and write
6E80000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
5B8E000
stack
page read and write
24C2000
trusted library allocation
page read and write
AC2000
trusted library allocation
page read and write
44B2000
trusted library allocation
page read and write
43A9000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
BC7000
heap
page read and write
690E000
stack
page read and write
BC0000
heap
page read and write
44AD000
trusted library allocation
page read and write
49A2000
trusted library allocation
page read and write
4F75000
heap
page read and write
347B000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
1455000
heap
page read and write
434C000
trusted library allocation
page read and write
63A000
heap
page read and write
43BE000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
AB0000
trusted library allocation
page read and write
31EF000
stack
page read and write
5D0000
heap
page read and write
306A000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
7029D000
unkown
page read and write
6A8E000
stack
page read and write
BA0000
heap
page read and write
7EE80000
trusted library allocation
page execute and read and write
C1BF000
stack
page read and write
13F0000
trusted library allocation
page read and write
33A7000
trusted library allocation
page read and write
B10000
heap
page execute and read and write
358A000
trusted library allocation
page read and write
499D000
trusted library allocation
page read and write
130000
unkown
page readonly
43FF000
trusted library allocation
page read and write
6E20000
trusted library allocation
page execute and read and write
420B000
trusted library allocation
page read and write
C47E000
stack
page read and write
3050000
trusted library allocation
page read and write
1356000
heap
page read and write
4F4E000
stack
page read and write
1428000
heap
page read and write
AA0000
trusted library allocation
page read and write
24CD000
trusted library allocation
page read and write
2471000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
498E000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
4A63000
heap
page read and write
358C000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
35B8000
trusted library allocation
page read and write
4991000
trusted library allocation
page read and write
55D0000
heap
page read and write
1630000
trusted library allocation
page read and write
70296000
unkown
page readonly
4C50000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
33FA000
trusted library allocation
page read and write
161E000
stack
page read and write
C33E000
stack
page read and write
49D0000
trusted library allocation
page read and write
681D000
heap
page read and write
45A2000
trusted library allocation
page read and write
567000
stack
page read and write
6C8E000
stack
page read and write
AF0000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
3090000
trusted library allocation
page read and write
1310000
heap
page read and write
3375000
trusted library allocation
page read and write
1406000
trusted library allocation
page execute and read and write
13D0000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
13FD000
trusted library allocation
page execute and read and write
151A000
heap
page read and write
7FB2000
trusted library allocation
page read and write
C43E000
stack
page read and write
613000
heap
page read and write
16A0000
heap
page read and write
A90000
trusted library allocation
page read and write
AB3000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
500F000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
C6BC000
stack
page read and write
3463000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
C2FE000
stack
page read and write
141B000
trusted library allocation
page execute and read and write
5005000
trusted library allocation
page read and write
BF4E000
stack
page read and write
95E000
stack
page read and write
325A000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
449F000
trusted library allocation
page read and write
72E000
stack
page read and write
7029F000
unkown
page readonly
5FE000
heap
page read and write
43FB000
trusted library allocation
page read and write
68D6000
heap
page read and write
3458000
trusted library allocation
page read and write
32A2000
trusted library allocation
page read and write
ACA000
trusted library allocation
page execute and read and write
132000
unkown
page readonly
3292000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
746000
heap
page read and write
3476000
trusted library allocation
page read and write
6D94000
trusted library allocation
page read and write
66D000
heap
page read and write
66D0000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
305E000
trusted library allocation
page read and write
4A52000
trusted library allocation
page read and write
55E0000
heap
page read and write
44A4000
trusted library allocation
page read and write
1402000
trusted library allocation
page read and write
6DAD000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
C0BE000
stack
page read and write
4FFE000
stack
page read and write
3076000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
68CF000
stack
page read and write
3296000
trusted library allocation
page read and write
3000000
heap
page read and write
7FE0000
trusted library allocation
page read and write
C5BB000
stack
page read and write
42C2000
trusted library allocation
page read and write
497B000
trusted library allocation
page read and write
1089000
stack
page read and write
140A000
trusted library allocation
page execute and read and write
1415000
trusted library allocation
page execute and read and write
4219000
trusted library allocation
page read and write
4503000
trusted library allocation
page read and write
6D8F000
stack
page read and write
6C4E000
stack
page read and write
326D000
trusted library allocation
page read and write
4C30000
heap
page read and write
44AA000
trusted library allocation
page read and write
68F8000
heap
page read and write
6ACE000
stack
page read and write
4950000
heap
page read and write
610000
heap
page read and write
43D1000
trusted library allocation
page read and write
960000
heap
page read and write
34B3000
trusted library allocation
page read and write
5FB000
heap
page read and write
44EC000
trusted library allocation
page read and write
4430000
trusted library allocation
page read and write
44F7000
trusted library allocation
page read and write
4F70000
heap
page read and write
740000
heap
page read and write
130E000
stack
page read and write
30A0000
trusted library allocation
page read and write
73C0000
heap
page read and write
306E000
trusted library allocation
page read and write
There are 330 hidden memdumps, click here to show them.