Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_1b82bec763645d16ab9c0b439f8b0a42b432fae_974fe18f_a875a024-b057-4196-baf7-1056fcad35d7\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER81D3.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Oct 8 01:24:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8232.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8262.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader47.43340.27469.30352.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 272
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
licendfilteo.site
|
|||
studennotediw.stor
|
|||
https://sergei-esenin.com/3f
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
spirittunek.stor
|
|||
bathdoomgaz.stor
|
|||
trustterwowqm.shop
|
|||
dissapoiznw.stor
|
|||
eaglepawnoy.stor
|
|||
https://sergei-esenin.com/api
|
172.67.206.204
|
||
https://sergei-esenin.com/apiSK
|
unknown
|
||
clearancek.site
|
|||
mobbipenju.stor
|
|||
https://steamcommunity.com/profiles/765611997243319006
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PA
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
|
unknown
|
||
https://studennotediw.store/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=engli
|
unknown
|
||
https://steamcommunity.com/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=qu55UpguGheU&l=e
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
sergei-esenin.com
|
172.67.206.204
|
||
trustterwowqm.shop
|
unknown
|
||
eaglepawnoy.store
|
unknown
|
||
bathdoomgaz.store
|
unknown
|
||
spirittunek.store
|
unknown
|
||
licendfilteo.site
|
unknown
|
||
studennotediw.store
|
unknown
|
||
mobbipenju.store
|
unknown
|
||
clearancek.site
|
unknown
|
||
206.23.85.13.in-addr.arpa
|
unknown
|
||
dissapoiznw.store
|
unknown
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
There are 3 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.102.49.254
|
steamcommunity.com
|
United States
|
||
172.67.206.204
|
sergei-esenin.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
ProgramId
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
FileId
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
LongPathHash
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
Name
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
OriginalFileName
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
Publisher
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
Version
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
BinFileVersion
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
BinaryType
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
ProductName
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
ProductVersion
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
LinkDate
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
BinProductVersion
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
AppxPackageFullName
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
Size
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
Language
|
||
\REGISTRY\A\{b5433180-d78d-739d-3766-f42a5e812110}\Root\InventoryApplicationFile\securiteinfo.com|89ee0a73dbafee66
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
1376000
|
heap
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
1361000
|
heap
|
page read and write
|
||
132C000
|
heap
|
page read and write
|
||
36CD000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
144E000
|
stack
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
E5D000
|
unkown
|
page read and write
|
||
EB5000
|
unkown
|
page execute and read and write
|
||
137E000
|
heap
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
133D000
|
heap
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
E31000
|
unkown
|
page execute read
|
||
135F000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
30ED000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
C5D000
|
stack
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
308D000
|
stack
|
page read and write
|
||
E53000
|
unkown
|
page readonly
|
||
2F30000
|
heap
|
page read and write
|
||
178F000
|
stack
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
F8C000
|
stack
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
D5D000
|
stack
|
page read and write
|
||
EB8000
|
unkown
|
page readonly
|
||
DFE000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
125F000
|
stack
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
13CD000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute read
|
||
1318000
|
heap
|
page read and write
|
||
37CD000
|
stack
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
1339000
|
heap
|
page read and write
|
||
EB6000
|
unkown
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
E53000
|
unkown
|
page readonly
|
||
EB8000
|
unkown
|
page readonly
|
||
392F000
|
stack
|
page read and write
|
||
E5D000
|
unkown
|
page write copy
|
||
45F000
|
remote allocation
|
page execute and read and write
|
||
F3E000
|
heap
|
page read and write
|
There are 51 hidden memdumps, click here to show them.