IOC Report
SecuriteInfo.com.Application.Generic.3623086.1464.24272.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Application.Generic.3623086.1464.24272.dll",#1

URLs

Name
IP
Malicious
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterMediumOpen
unknown
https://curl.se/docs/http-cookies.html
unknown
https://github.com/Prax-Client/Releases/raw/main/killsound.wavCreated
unknown
https://www.jetbrains.comhttps://www.jetbrains.comThis
unknown
https://api.playhive.com/v0/game/all/GetHiveStats:
unknown
https://github.com/Prax-Client/Releases/raw/main/banner
unknown
https://rsms.me/This
unknown
http://fontello.com
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterLightOpen
unknown
https://cdn.discordapp.com/attachments/1157861980611297410/1163279643168747570/F6_T6MXXoAAH6os.jpg?e
unknown
https://curl.se/docs/alt-svc.html
unknown
https://api.github.com/repos/Prax-Client/Releases/releases/latest
unknown
https://github.com/Prax-Client/Releases/raw/main/killsound.wav
unknown
https://github.com/rsms/inter)InterBold3.019;RSMS;Inter-BoldInter
unknown
https://api.playhive.com/v0/game/all/
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterExtraLightOpen
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterThinOpen
unknown
https://curl.se/docs/hsts.html
unknown
https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
unknown
https://Mozilla/5.0Failed
unknown
https://yiffing.zone/sounds/click.wav
unknown
https://github.com/JetBrains/JetBrainsMono)JetBrains
unknown
http://fontello.comCopyright
unknown
https://yiffing.zone/sounds/click.wavhttps://yiffing.zone/sounds/notify_off.wavhttps://yiffing.zone/
unknown
https://github.com/Prax-Client/Releases/raw/main/fardreverb.wav
unknown
https://github.com/rsms/inter)Inter
unknown
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLInterSemiBoldOpen
unknown
https://peoplehub-public.xboxlive.com/people/gt(
unknown
https://github.com/Prax-Client/Releases/raw/main/bannerstart_screenhud_screentextures/ui/titletextur
unknown
https://peoplehub-public.xboxlive.com/people/gt(Rtn:
unknown
https://yiffing.zone/sounds/notify_off.wav
unknown
https://scripts.sil.org/OFLhttps://scripts.sil.org/OFL
unknown
https://yiffing.zone/sounds/notify_on.wav
unknown
There are 24 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFBA982B000
unkown
page read and write
7FFBA9823000
unkown
page readonly
1C442900000
heap
page read and write
7FFBA9BA8000
unkown
page execute and read and write
1B6B6680000
heap
page read and write
1B6B6570000
heap
page read and write
1C440BB0000
direct allocation
page read and write
7FFBA9464000
unkown
page read and write
1B6B4920000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
1C440D90000
direct allocation
page read and write
694E35B000
stack
page read and write
1C440B40000
heap
page read and write
7FFBA982B000
unkown
page read and write
1C440BD9000
heap
page read and write
1B6B4920000
direct allocation
page read and write
1C440BC0000
heap
page read and write
7FFBA9B09000
unkown
page execute and read and write
1B6B4938000
heap
page read and write
1B6B48B0000
heap
page read and write
1B6B4910000
heap
page readonly
49DD5FF000
stack
page read and write
1C440BF7000
heap
page read and write
7FFBA982D000
unkown
page readonly
1B6B657F000
heap
page read and write
7FFBA982E000
unkown
page execute and read and write
1B6B4920000
direct allocation
page read and write
1B6B4920000
direct allocation
page read and write
1C440C00000
heap
page read and write
1B6B4920000
direct allocation
page read and write
1B6B4920000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
7FFBA9BA8000
unkown
page execute and read and write
7FFBA9808000
unkown
page readonly
49DD2FB000
stack
page read and write
1C440E10000
heap
page read and write
1C440BB0000
direct allocation
page read and write
1C440BFC000
heap
page read and write
1C440BB0000
direct allocation
page read and write
1B6B4953000
heap
page read and write
694E6FE000
stack
page read and write
1B6B4920000
direct allocation
page read and write
1B6B6570000
direct allocation
page read and write
1C440DF0000
heap
page read and write
1B6B4920000
direct allocation
page read and write
7FFBA9B79000
unkown
page execute and read and write
7FFBA9808000
unkown
page readonly
7FFBA982E000
unkown
page execute and read and write
1C442900000
direct allocation
page read and write
1B6B4930000
heap
page read and write
1C440DF5000
heap
page read and write
1C440B80000
heap
page read and write
1B6B4963000
heap
page read and write
1B6B495E000
heap
page read and write
1C440E15000
heap
page read and write
1B6B4C10000
heap
page read and write
1C44290F000
heap
page read and write
7FFBA93E4000
unkown
page readonly
1B6B4920000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
7FFBA982D000
unkown
page readonly
1C440BCD000
heap
page read and write
7FFBA93E4000
unkown
page readonly
7FFBA9120000
unkown
page readonly
1C440BB0000
direct allocation
page read and write
1C440C67000
heap
page read and write
1B6B49BD000
heap
page read and write
7FFBA9121000
unkown
page execute read
1B6B47B0000
heap
page read and write
1C440BB0000
direct allocation
page read and write
7FFBA9121000
unkown
page execute read
1C440BFE000
heap
page read and write
1C440BB0000
direct allocation
page read and write
1B6B6570000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
49DD6FE000
stack
page read and write
1B6B4920000
direct allocation
page read and write
1B6B49CA000
heap
page read and write
1C440D90000
direct allocation
page read and write
7FFBA9E3C000
unkown
page execute read
1B6B4920000
direct allocation
page read and write
7FFBA9464000
unkown
page read and write
7FFBA9B09000
unkown
page execute and read and write
7FFBA9120000
unkown
page readonly
7FFBA9B79000
unkown
page execute and read and write
1C442900000
direct allocation
page read and write
7FFBA9E3C000
unkown
page execute read
1B6B4920000
direct allocation
page read and write
1B6B4BC0000
direct allocation
page read and write
1B6B4C15000
heap
page read and write
1B6B4920000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
1C440BB0000
direct allocation
page read and write
1B6B4890000
heap
page read and write
7FFBA9823000
unkown
page readonly
1C440B50000
heap
page read and write
1B6B6570000
direct allocation
page read and write
1B6B4920000
direct allocation
page read and write
1B6B6685000
heap
page read and write
1C440BC9000
heap
page read and write
There are 92 hidden memdumps, click here to show them.