IOC Report
SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\desktop.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe"
malicious

URLs

Name
IP
Malicious
http://ssp.7654.com/ct/m?mixData=
unknown
http://report.thorzip.muxin.fun/eH
unknown
http://hotnews.dftoutiao.com/
unknown
http://report.thorzip.muxin.fun/lszip/bubble_info?code=jWLGHnD6CYifDIjqc6sGs/Bbp6bCfV8bglNO
unknown
http://news.7654.com/mini_new3/jsb/
unknown
http://pv.sohu.com/cityjson?ie=utf-8
unknown
http://www.symauth.com/rpa00
unknown
http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=kuaiyatitle&platform=pc&newstype=now
unknown
http://api.map.baidu.com/telematics/v3/weather?location=%s&output=json&ak=spmMww7Eoqcmf3FXbnLyDUwLU
unknown
http://files.news.baidu.com/mini_new3/jjj/MiniLogo.PNG
unknown
http://hotnews.dftoutiao.com/hotwordsnews/getnews?qid=%s&platform=pc&newstype=%s
unknown
http://report.thorzip.muxin.fun/tart
unknown
http://weather.shzhanmeng.com/api/weather/%sU
unknown
http://api.map.baidu.com/telematics/v3/weather?location=%s&output=json&ak=spmMww7Eoqcmf3FXbnLyDUwL
unknown
http://www.symauth.com/cps0(
unknown
http://report.thorzip.muxin.fun/
unknown
http://ssp.7654.com/ct?mixData=
unknown
http://ssp.7654.com/ct?mixData=les
unknown
http://news.baidu.com/mini_new3/jjj/
unknown
http://report.thorzip.muxin.fun/crosoft
unknown
http://iplocation.7654.com/v1
unknown
http://weather.shzhanmeng.com/api/weather/%s
unknown
http://bsalsa.com/
unknown
http://report.thorzip.muxin.fun/lszip/bubble_info?code=jwlghnd6cyifdijqc6sgs/bbp6bcfv8bglno
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
report.thorzip.muxin.fun
unknown
hotnews.dftoutiao.com
unknown
files.news.baidu.com
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION
SecuriteInfo.com.Win32.Adware-gen.13861.28606.exe
HKEY_CURRENT_USER\SOFTWARE\MiniNewsInfo
CLS_ID
HKEY_CURRENT_USER\SOFTWARE\LiveUpdate360
632

Memdumps

Base Address
Regiontype
Protect
Malicious
305C000
direct allocation
page read and write
2A4B000
stack
page read and write
23C3000
direct allocation
page read and write
4BB000
unkown
page write copy
604000
heap
page read and write
2190000
heap
page read and write
605000
heap
page read and write
604000
heap
page read and write
74E000
stack
page read and write
672000
heap
page read and write
2CCF000
stack
page read and write
604000
heap
page read and write
7FD40000
direct allocation
page read and write
65B000
heap
page read and write
604000
heap
page read and write
604000
heap
page read and write
2367000
direct allocation
page read and write
22E8000
direct allocation
page read and write
4CC000
unkown
page readonly
604000
heap
page read and write
23B4000
direct allocation
page read and write
237B000
direct allocation
page read and write
610000
heap
page read and write
604000
heap
page read and write
4C6000
unkown
page read and write
19B000
stack
page read and write
604000
heap
page read and write
604000
heap
page read and write
22BB000
direct allocation
page read and write
2304000
direct allocation
page read and write
520000
heap
page read and write
2375000
direct allocation
page read and write
604000
heap
page read and write
98F000
stack
page read and write
990000
heap
page read and write
604000
heap
page read and write
22FA000
direct allocation
page read and write
686000
heap
page read and write
21A0000
direct allocation
page execute and read and write
604000
heap
page read and write
294E000
stack
page read and write
2BCE000
stack
page read and write
3065000
direct allocation
page read and write
604000
heap
page read and write
604000
heap
page read and write
22D9000
direct allocation
page read and write
604000
heap
page read and write
604000
heap
page read and write
2290000
heap
page read and write
4C0000
unkown
page read and write
22CB000
direct allocation
page read and write
22A0000
direct allocation
page read and write
232A000
direct allocation
page read and write
2398000
direct allocation
page read and write
604000
heap
page read and write
307C000
direct allocation
page read and write
618000
heap
page read and write
604000
heap
page read and write
225C000
stack
page read and write
22B4000
direct allocation
page read and write
2382000
direct allocation
page read and write
68C000
heap
page read and write
604000
heap
page read and write
290D000
stack
page read and write
604000
heap
page read and write
23AD000
direct allocation
page read and write
239F000
direct allocation
page read and write
604000
heap
page read and write
2E0F000
stack
page read and write
604000
heap
page read and write
604000
heap
page read and write
604000
heap
page read and write
600000
heap
page read and write
23A6000
direct allocation
page read and write
4C4000
unkown
page read and write
22F2000
direct allocation
page read and write
604000
heap
page read and write
2E41000
heap
page read and write
2D0E000
stack
page read and write
230B000
direct allocation
page read and write
604000
heap
page read and write
2213000
heap
page read and write
30C0000
trusted library allocation
page read and write
604000
heap
page read and write
401000
unkown
page execute read
88E000
stack
page read and write
604000
heap
page read and write
2A8E000
stack
page read and write
2E40000
heap
page read and write
604000
heap
page read and write
2390000
direct allocation
page read and write
231B000
direct allocation
page read and write
658000
heap
page read and write
2210000
heap
page read and write
2389000
direct allocation
page read and write
400000
unkown
page readonly
604000
heap
page read and write
604000
heap
page read and write
84F000
stack
page read and write
23D1000
direct allocation
page read and write
236E000
direct allocation
page read and write
4C6000
unkown
page write copy
23D8000
direct allocation
page read and write
30E0000
heap
page read and write
23CA000
direct allocation
page read and write
23BC000
direct allocation
page read and write
604000
heap
page read and write
4BB000
unkown
page read and write
604000
heap
page read and write
9B000
stack
page read and write
2B8F000
stack
page read and write
604000
heap
page read and write
604000
heap
page read and write
2322000
direct allocation
page read and write
There are 104 hidden memdumps, click here to show them.