IOC Report
SecuriteInfo.com.Trojan.GenericKD.74343100.23730.20084.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.GenericKD.74343100.23730.20084.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\SecuriteInfo.com.Trojan.GenericKD.74343100.23730.20084.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343100.23730.20084.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343100.23730.20084.exe"

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://sectigo.com/CPS0
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
Blob

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD33D1F000
trusted library allocation
page execute and read and write
1773000
heap
page read and write
7FFD33D02000
trusted library allocation
page execute and read and write
17A6000
heap
page read and write
C54000
unkown
page readonly
7FFD33E40000
trusted library allocation
page execute and read and write
1430000
heap
page read and write
1C4BE000
stack
page read and write
167E000
stack
page read and write
7FFD33DBA000
trusted library allocation
page execute and read and write
7FFD33DF2000
trusted library allocation
page execute and read and write
1BEC0000
heap
page read and write
1710000
heap
page read and write
1C1BE000
stack
page read and write
1339B000
trusted library allocation
page read and write
7FFD33CF2000
trusted library allocation
page execute and read and write
7FFD33D0A000
trusted library allocation
page execute and read and write
C50000
unkown
page readonly
1130000
heap
page read and write
C50000
unkown
page readonly
13391000
trusted library allocation
page read and write
13D5000
trusted library allocation
page read and write
C52000
unkown
page readonly
7FFD33DB2000
trusted library allocation
page execute and read and write
122A000
heap
page read and write
13F0000
trusted library allocation
page read and write
1BDB0000
heap
page read and write
11CD000
heap
page read and write
13D0000
trusted library allocation
page read and write
7FF4B2800000
trusted library allocation
page execute and read and write
13398000
trusted library allocation
page read and write
D96000
stack
page read and write
304E000
stack
page read and write
7FF4B27F0000
trusted library allocation
page execute and read and write
138E000
stack
page read and write
1470000
heap
page read and write
3391000
trusted library allocation
page read and write
1BD6E000
stack
page read and write
13F4000
trusted library allocation
page read and write
1435000
heap
page read and write
1BFC0000
heap
page read and write
16D0000
heap
page execute and read and write
7FFD33DCA000
trusted library allocation
page execute and read and write
7FFD33D54000
trusted library allocation
page execute and read and write
10D0000
heap
page read and write
11C2000
heap
page read and write
7FFD33D23000
trusted library allocation
page execute and read and write
7FFD33DC0000
trusted library allocation
page read and write
17A3000
heap
page read and write
10F0000
heap
page read and write
1190000
heap
page read and write
7FFD33DCD000
trusted library allocation
page execute and read and write
1110000
heap
page read and write
1770000
heap
page read and write
13395000
trusted library allocation
page read and write
1BEBE000
stack
page read and write
7FFD33D05000
trusted library allocation
page execute and read and write
143C000
heap
page read and write
1E20E000
stack
page read and write
1D910000
trusted library allocation
page read and write
1E30E000
stack
page read and write
1C3BE000
stack
page read and write
17A0000
heap
page read and write
1228000
heap
page read and write
119C000
heap
page read and write
13DA000
trusted library allocation
page read and write
DE0000
heap
page read and write
128B000
heap
page read and write
7FFD33E32000
trusted library allocation
page read and write
157E000
stack
page read and write
1BC6C000
stack
page read and write
13DD000
trusted library allocation
page read and write
1475000
heap
page read and write
1C2BE000
stack
page read and write
20000
trusted library allocation
page read and write
1BF20000
heap
page read and write
11BF000
heap
page read and write
There are 67 hidden memdumps, click here to show them.