IOC Report
SecuriteInfo.com.Trojan.Inject5.10240.30655.18394.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Inject5.10240.30655.18394.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_b92fa3286418a257638aa7d482edfd8a2355b3e4_46392f91_2648e0d9-60b4-4514-be5b-eb7779eaa269\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5FAF.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Oct 11 10:45:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5FFE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER602E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.10240.30655.18394.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.10240.30655.18394.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 304

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199724331900%
unknown
malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
trustterwowqm.shop
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com/profiles/76561199724331900e
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://player.vimeo.com
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.akamai.steamstatic.com/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://s.ytimg.com;
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Gu9gs5hf
unknown
https://steamcommunity.com/Fn
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=M7aU
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://steamcommunity.com/re
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
trustterwowqm.shop
unknown
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
s-part-0015.t-0009.t-msedge.net
13.107.246.43
time.windows.com
unknown
There are 2 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
ProgramId
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
FileId
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
LowerCaseLongPath
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
LongPathHash
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
Name
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
OriginalFileName
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
Publisher
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
Version
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
BinFileVersion
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
BinaryType
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
ProductName
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
ProductVersion
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
LinkDate
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
BinProductVersion
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
AppxPackageFullName
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
AppxPackageRelativeId
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
Size
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
Language
\REGISTRY\A\{3a31e501-34e8-5760-97b0-30aa88ad1e77}\Root\InventoryApplicationFile\securiteinfo.com|be96deefbe797124
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B3E000
unkown
page read and write
malicious
1652000
heap
page read and write
370E000
stack
page read and write
102F000
stack
page read and write
1618000
heap
page read and write
9DC000
stack
page read and write
119E000
stack
page read and write
B33000
unkown
page readonly
B10000
unkown
page readonly
B3E000
unkown
page write copy
2FED000
stack
page read and write
45F000
remote allocation
page execute and read and write
B96000
unkown
page execute and read and write
F0E000
stack
page read and write
FAC000
stack
page read and write
166A000
heap
page read and write
1430000
heap
page read and write
BC0000
heap
page read and write
106E000
heap
page read and write
1686000
heap
page read and write
129F000
stack
page read and write
B11000
unkown
page execute read
B97000
unkown
page read and write
15FE000
stack
page read and write
B99000
unkown
page readonly
1678000
heap
page read and write
155F000
stack
page read and write
1310000
heap
page read and write
305E000
stack
page read and write
1A0E000
stack
page read and write
318D000
stack
page read and write
380F000
stack
page read and write
1455000
heap
page read and write
12FC000
stack
page read and write
3080000
heap
page read and write
16AA000
heap
page read and write
1638000
heap
page read and write
1670000
heap
page read and write
1450000
heap
page read and write
ADC000
stack
page read and write
B33000
unkown
page readonly
400000
remote allocation
page execute and read and write
106A000
heap
page read and write
328E000
stack
page read and write
162C000
heap
page read and write
F20000
heap
page read and write
B10000
unkown
page readonly
B99000
unkown
page readonly
1060000
heap
page read and write
36CD000
stack
page read and write
142E000
stack
page read and write
15A0000
heap
page read and write
B11000
unkown
page execute read
BD0000
heap
page read and write
163D000
heap
page read and write
159E000
stack
page read and write
1673000
heap
page read and write
1610000
heap
page read and write
There are 48 hidden memdumps, click here to show them.