IOC Report
SecuriteInfo.com.Trojan.Msil.22568.30131.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Msil.22568.30131.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1talphwc.cwk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hfik5dhw.yrr.psm1
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Msil.22568.30131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://support.auditionsante.app/download/script/SHOP/Scripts.zip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://support.auditionsante.ap
unknown
https://support.auditionsante.app/download/script/SHOP/Scr
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1B2E0000
heap
page execute and read and write
CB0000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
2870000
heap
page execute and read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
A8E000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1AE0D000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
12881000
trusted library allocation
page read and write
1288F000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
A20000
heap
page read and write
7C4000
stack
page read and write
1BA3F000
stack
page read and write
A10000
heap
page read and write
2D71000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
128F3000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
DCE000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
A2C000
heap
page read and write
1B330000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FF4C1C10000
trusted library allocation
page execute and read and write
28F6000
trusted library allocation
page read and write
1BB3B000
stack
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
BF0000
heap
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1C4C7000
stack
page read and write
2ABF000
trusted library allocation
page read and write
680000
unkown
page readonly
7FFD9B977000
trusted library allocation
page read and write
286F000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1B540000
heap
page read and write
2BB9000
trusted library allocation
page read and write
1B56E000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1B5C1000
heap
page read and write
1B324000
heap
page execute and read and write
1B24F000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1B320000
heap
page execute and read and write
7FFD9B980000
trusted library allocation
page execute and read and write
7FFD9B970000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
CC0000
heap
page read and write
CB3000
trusted library allocation
page read and write
FC5000
heap
page read and write
F10000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
A4A000
heap
page read and write
680000
unkown
page readonly
AF9000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
A8C000
heap
page read and write
7FFD9B7A2000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B949000
trusted library allocation
page read and write
CC5000
heap
page read and write
1AC0C000
heap
page read and write
1B460000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
C30000
heap
page read and write
7FFD9B946000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
1B5E7000
heap
page read and write
1B59B000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B7A8000
trusted library allocation
page read and write
7FFD9B938000
trusted library allocation
page read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
1B93E000
stack
page read and write
1A8B0000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
1B83E000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
C10000
heap
page read and write
A62000
heap
page read and write
A60000
heap
page read and write
682000
unkown
page readonly
FC0000
heap
page read and write
There are 97 hidden memdumps, click here to show them.