IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.26437.13829.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.26437.13829.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\cabal.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\down[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\errorPageStrings[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\ErrorPageTemplate[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\bullet[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\background_gradient[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\httpErrorPagesScripts[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\http_404_webOC[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info_48[1]
PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\resources.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\main.dat
data
dropped
C:\Users\user\Desktop\mainEX.dat
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26437.13829.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26437.13829.exe"
malicious

URLs

Name
IP
Malicious
http://foo/bar/classes/webbrowseroverlaywf/webbrowseroverlay.baml
unknown
http://217.15.164.94
unknown
http://fontfabrik.comQ
unknown
http://217.15.164.94/update/
unknown
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
unknown
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
unknown
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024%2006:26:57
217.15.164.94
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024
unknown
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024%2006:26:57Sl.R
unknown
http://217.15.164.94/update/client/cabal.exe
unknown
http://217.15.164.94/update//resources.xml
217.15.164.94
http://schemas.xmlsoap.org/wsdl/
unknown
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
unknown
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
unknown
http://ww.micro
unknown
http://217.15.168
unknown
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024%2006:26:57652bf5c30805da9
unknown
http://foo/bar/classes/webbrowseroverlaywf/webbrowseroverlay.bamld
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://217.15.164.94/update/client/cabal.exeP
unknown
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.phpt=01/11/2024
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
shadowman.dnse.hu
185.6.188.137
s4.gtsystems.hu
unknown

IPs

IP
Domain
Country
Malicious
217.15.164.94
unknown
European Union

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
63E0000
trusted library allocation
page read and write
7F78E000
trusted library allocation
page readonly
E9C1000
trusted library allocation
page read and write
DC70000
heap
page read and write
D990000
trusted library allocation
page read and write
7F806000
trusted library allocation
page execute read
6F40000
trusted library allocation
page read and write
666B000
heap
page read and write
7F786000
trusted library allocation
page readonly
1910000
trusted library allocation
page read and write
36D4000
trusted library allocation
page read and write
D694000
trusted library allocation
page read and write
193B000
trusted library allocation
page execute and read and write
1513000
heap
page read and write
EA7B000
trusted library allocation
page read and write
A26E000
stack
page read and write
D68A000
trusted library allocation
page read and write
EBF5000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
1904000
trusted library allocation
page read and write
D520000
heap
page read and write
7F781000
trusted library allocation
page execute read
7F80E000
trusted library allocation
page execute read
35E7000
trusted library allocation
page read and write
D9B0000
trusted library allocation
page read and write
6ED2000
heap
page read and write
192A000
trusted library allocation
page execute and read and write
D34E000
stack
page read and write
6F1A000
heap
page read and write
11BF000
stack
page read and write
667F000
heap
page read and write
6ED0000
heap
page read and write
1518000
heap
page read and write
7F80A000
trusted library allocation
page execute read
D628000
trusted library allocation
page read and write
7F773000
trusted library allocation
page execute read
1932000
trusted library allocation
page read and write
6C1E000
stack
page read and write
7F807000
trusted library allocation
page readonly
5BDC000
stack
page read and write
6EE2000
heap
page read and write
605E000
stack
page read and write
1530000
heap
page read and write
6650000
heap
page read and write
EA74000
trusted library allocation
page read and write
EC30000
trusted library allocation
page execute
DA10000
trusted library allocation
page read and write
6EE6000
heap
page read and write
7F795000
trusted library allocation
page execute read
D1CE000
stack
page read and write
3100000
trusted library allocation
page read and write
DC20000
heap
page read and write
5AC5000
heap
page read and write
D280000
heap
page read and write
66A0000
heap
page read and write
EC5C000
trusted library allocation
page read and write
DC7D000
heap
page read and write
6EAB000
heap
page read and write
6D30000
heap
page read and write
58F4000
heap
page execute and read and write
7F80C000
trusted library allocation
page execute read
7F784000
trusted library allocation
page execute read
1532000
heap
page read and write
145E000
heap
page read and write
6D1C000
stack
page read and write
D63A000
trusted library allocation
page read and write
7F804000
trusted library allocation
page execute read
D27E000
stack
page read and write
6F27000
heap
page read and write
D750000
trusted library allocation
page read and write
EBF0000
trusted library allocation
page read and write
1903000
trusted library allocation
page execute and read and write
DCEA000
heap
page read and write
DCDA000
heap
page read and write
7F78D000
trusted library allocation
page execute read
D65E000
trusted library allocation
page read and write
D6BA000
trusted library allocation
page read and write
D287000
heap
page read and write
6DB2000
heap
page read and write
32E0000
heap
page read and write
D283000
heap
page read and write
D7A0000
trusted library allocation
page read and write
6ADC000
stack
page read and write
EC06000
trusted library allocation
page read and write
EE4C000
stack
page read and write
EBFE000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
D730000
heap
page read and write
1935000
trusted library allocation
page execute and read and write
18F0000
trusted library allocation
page read and write
5EBB000
heap
page read and write
D7C0000
trusted library allocation
page read and write
6605000
heap
page read and write
1524000
heap
page read and write
D678000
trusted library allocation
page read and write
154A000
heap
page read and write
5974000
heap
page read and write
17B0000
heap
page read and write
D220000
trusted library allocation
page read and write
6607000
heap
page read and write
6D3D000
heap
page read and write
6E19000
heap
page read and write
5E05000
heap
page read and write
324E000
stack
page read and write
DD93000
heap
page read and write
5970000
heap
page read and write
EF4E000
stack
page read and write
17B7000
heap
page read and write
3567000
trusted library allocation
page read and write
5B55000
heap
page read and write
DC8E000
heap
page read and write
615F000
stack
page read and write
EC59000
trusted library allocation
page read and write
EC10000
trusted library allocation
page read and write
E15F000
stack
page read and write
32C0000
trusted library allocation
page read and write
6609000
heap
page read and write
EC53000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
D980000
trusted library allocation
page read and write
912000
unkown
page readonly
DCD8000
heap
page read and write
DE14000
heap
page read and write
3698000
trusted library allocation
page read and write
D2FE000
stack
page read and write
7210000
trusted library allocation
page read and write
DCE3000
heap
page read and write
314E000
stack
page read and write
6440000
trusted library allocation
page read and write
DC91000
heap
page read and write
548E000
stack
page read and write
D684000
trusted library allocation
page read and write
1958000
heap
page read and write
D7B0000
trusted library allocation
page read and write
D688000
trusted library allocation
page read and write
DD74000
heap
page read and write
668E000
heap
page read and write
D9F0000
trusted library allocation
page read and write
EA84000
trusted library allocation
page read and write
58F0000
heap
page execute and read and write
7F801000
trusted library allocation
page readonly
6EE0000
heap
page read and write
EDFE000
stack
page read and write
D52F000
heap
page read and write
DE31000
heap
page read and write
36E4000
trusted library allocation
page read and write
619E000
stack
page read and write
D7F0000
trusted library allocation
page read and write
D686000
trusted library allocation
page read and write
7F793000
trusted library allocation
page execute read
EC72000
trusted library allocation
page read and write
A483000
trusted library allocation
page read and write
D67C000
trusted library allocation
page read and write
1919000
trusted library allocation
page read and write
7F800000
trusted library allocation
page execute read
7F78B000
trusted library allocation
page execute read
8490000
trusted library allocation
page read and write
66F0000
heap
page read and write
5CE0000
heap
page read and write
5EA3000
heap
page read and write
7220000
trusted library allocation
page read and write
6685000
heap
page read and write
4321000
trusted library allocation
page read and write
EA6F000
stack
page read and write
DC6D000
heap
page read and write
D69D000
trusted library allocation
page read and write
ECFE000
stack
page read and write
1920000
trusted library allocation
page read and write
7F79B000
trusted library allocation
page execute read
8602000
trusted library allocation
page read and write
D673000
trusted library allocation
page read and write
D680000
trusted library allocation
page read and write
D9C0000
trusted library allocation
page read and write
D760000
trusted library allocation
page read and write
5B94000
heap
page read and write
EBCE000
stack
page read and write
151C000
heap
page read and write
1440000
heap
page read and write
D950000
trusted library allocation
page read and write
7F775000
trusted library allocation
page execute read
6D68000
heap
page read and write
5AF0000
heap
page read and write
EA1E000
stack
page read and write
5B52000
heap
page read and write
52F0000
trusted library allocation
page read and write
DDAD000
heap
page read and write
6F21000
heap
page read and write
7F80B000
trusted library allocation
page readonly
DD43000
heap
page read and write
DD64000
heap
page read and write
DC1E000
stack
page read and write
6687000
heap
page read and write
643D000
stack
page read and write
6EB0000
heap
page read and write
339E000
trusted library allocation
page read and write
D93E000
stack
page read and write
D230000
trusted library allocation
page read and write
6D91000
heap
page read and write
D630000
trusted library allocation
page read and write
5B00000
heap
page read and write
5A80000
trusted library allocation
page read and write
5AB3000
heap
page read and write
C8D0000
trusted library allocation
page read and write
6F06000
heap
page read and write
65B5000
heap
page read and write
7039000
heap
page read and write
5B9C000
heap
page read and write
D524000
heap
page read and write
7F772000
trusted library allocation
page readonly
E770000
heap
page read and write
DDA2000
heap
page read and write
661C000
heap
page read and write
DA00000
trusted library allocation
page read and write
6BDD000
stack
page read and write
3463000
trusted library allocation
page read and write
DCE6000
heap
page read and write
D9A0000
trusted library allocation
page read and write
7F774000
trusted library allocation
page readonly
1493000
heap
page read and write
6636000
heap
page read and write
6F75000
heap
page read and write
7008000
heap
page read and write
6EF9000
heap
page read and write
A2E0000
heap
page execute and read and write
42F1000
trusted library allocation
page read and write
EC5E000
trusted library allocation
page read and write
DC62000
heap
page read and write
328C000
stack
page read and write
65DE000
heap
page read and write
6E0A000
heap
page read and write
1486000
heap
page read and write
D6B2000
trusted library allocation
page read and write
E76E000
stack
page read and write
32F1000
trusted library allocation
page read and write
662C000
heap
page read and write
D650000
trusted library allocation
page read and write
DCFC000
heap
page read and write
5D63000
heap
page read and write
D648000
trusted library allocation
page read and write
10C7000
stack
page read and write
7180000
trusted library allocation
page read and write
1522000
heap
page read and write
629E000
stack
page read and write
7F79D000
trusted library allocation
page execute read
F04D000
trusted library allocation
page read and write
D800000
trusted library allocation
page read and write
7F77A000
trusted library allocation
page execute read
1450000
heap
page read and write
D6C0000
trusted library allocation
page read and write
1926000
trusted library allocation
page execute and read and write
7F799000
trusted library allocation
page execute read
D770000
trusted library allocation
page read and write
5B8C000
heap
page read and write
6EB2000
heap
page read and write
32C3000
trusted library allocation
page read and write
7F797000
trusted library allocation
page execute read
52F8000
trusted library allocation
page read and write
E9D0000
trusted library allocation
page read and write
D6AB000
trusted library allocation
page read and write
7F777000
trusted library allocation
page execute read
7F771000
trusted library allocation
page execute read
DCC5000
heap
page read and write
D790000
trusted library allocation
page read and write
7F79F000
trusted library allocation
page execute read
6616000
heap
page read and write
6FFE000
heap
page read and write
7F787000
trusted library allocation
page execute read
EC08000
trusted library allocation
page read and write
D940000
trusted library allocation
page read and write
6D46000
heap
page read and write
EACE000
stack
page read and write
D6A0000
trusted library allocation
page read and write
DD38000
heap
page read and write
DCCD000
heap
page read and write
32A0000
trusted library allocation
page read and write
DD41000
heap
page read and write
EC57000
trusted library allocation
page read and write
5DC9000
heap
page read and write
191D000
trusted library allocation
page execute and read and write
DCDD000
heap
page read and write
6611000
heap
page read and write
85E4000
trusted library allocation
page read and write
DD36000
heap
page read and write
65F9000
heap
page read and write
3290000
trusted library allocation
page execute and read and write
707D000
stack
page read and write
6DEA000
heap
page read and write
6450000
trusted library allocation
page read and write
DD84000
heap
page read and write
5AB1000
heap
page read and write
5980000
heap
page read and write
5EC0000
heap
page read and write
15D0000
heap
page read and write
D720000
heap
page read and write
D6A6000
trusted library allocation
page read and write
DE36000
heap
page read and write
35CE000
trusted library allocation
page read and write
D632000
trusted library allocation
page read and write
6FBC000
heap
page read and write
5B89000
heap
page read and write
DCD6000
heap
page read and write
7F7A0000
trusted library allocation
page execute and read and write
D670000
trusted library allocation
page read and write
DE22000
heap
page read and write
7F78C000
trusted library allocation
page readonly
910000
unkown
page readonly
7F789000
trusted library allocation
page execute read
65B2000
heap
page read and write
7F78F000
trusted library allocation
page execute read
7F802000
trusted library allocation
page execute read
D6B8000
trusted library allocation
page read and write
D68C000
trusted library allocation
page read and write
EC03000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
65B9000
heap
page read and write
E05C000
stack
page read and write
190D000
trusted library allocation
page execute and read and write
E8BB000
stack
page read and write
1930000
trusted library allocation
page read and write
1937000
trusted library allocation
page execute and read and write
35CA000
trusted library allocation
page read and write
5EB7000
heap
page read and write
D526000
heap
page read and write
5A90000
heap
page read and write
6EB6000
heap
page read and write
1900000
trusted library allocation
page read and write
DCE8000
heap
page read and write
E87E000
stack
page read and write
58E0000
heap
page read and write
D9D0000
trusted library allocation
page read and write
1950000
heap
page read and write
D638000
trusted library allocation
page read and write
7F791000
trusted library allocation
page execute read
1032000
unkown
page readonly
D62C000
trusted library allocation
page read and write
D660000
trusted library allocation
page read and write
D6C8000
trusted library allocation
page read and write
D740000
trusted library allocation
page read and write
DCD4000
heap
page read and write
6D85000
heap
page read and write
D210000
trusted library allocation
page read and write
D780000
trusted library allocation
page read and write
5D95000
heap
page read and write
36D6000
trusted library allocation
page read and write
6627000
heap
page read and write
7F803000
trusted library allocation
page readonly
D7E0000
trusted library allocation
page read and write
EC61000
trusted library allocation
page read and write
1430000
heap
page read and write
65E1000
heap
page read and write
6E17000
heap
page read and write
5CD8000
stack
page read and write
5E8C000
heap
page read and write
D9E0000
trusted library allocation
page read and write
EA76000
trusted library allocation
page read and write
7F808000
trusted library allocation
page execute read
7F776000
trusted library allocation
page readonly
6E5D000
heap
page read and write
6F2E000
heap
page read and write
36E6000
trusted library allocation
page read and write
E9BE000
stack
page read and write
6EB4000
heap
page read and write
DCF3000
heap
page read and write
1922000
trusted library allocation
page read and write
6F1E000
heap
page read and write
32B0000
heap
page execute and read and write
5EB5000
heap
page read and write
65A0000
heap
page read and write
DC68000
heap
page read and write
32C9000
trusted library allocation
page read and write
DD0B000
heap
page read and write
E9C4000
trusted library allocation
page read and write
4361000
trusted library allocation
page read and write
D970000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
717C000
stack
page read and write
6ED6000
heap
page read and write
D67E000
trusted library allocation
page read and write
DD53000
heap
page read and write
D63C000
trusted library allocation
page read and write
D7D0000
trusted library allocation
page read and write
E9D6000
trusted library allocation
page read and write
D658000
trusted library allocation
page read and write
D960000
trusted library allocation
page read and write
7F78A000
trusted library allocation
page readonly
There are 375 hidden memdumps, click here to show them.