IOC Report
SecuriteInfo.com.PUA.MSIL.Exceldna.15523.25242.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.PUA.MSIL.Exceldna.15523.25242.exe
"C:\Users\user\Desktop\SecuriteInfo.com.PUA.MSIL.Exceldna.15523.25242.exe"

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://www.slyce.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://sectigo.com/CPS0
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://www.fontbureau.com/designers?
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
http://sawebservice.red-gate.com/
unknown
http://www.smartassembly.com/webservices/Reporting/UploadReport2
unknown
https://www.formuladesk.com/email-signup/
unknown
http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.smartassembly.com/webservices/Reporting/
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.goodfont.co.kr
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
unknown
http://ocsp.sectigo.com0%
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.formuladesk.com/update/index.html?version=%Security
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://www.formuladesk.com/logevent.html
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/
unknown
There are 33 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1311000
heap
page read and write
12FA000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
3278000
trusted library allocation
page read and write
1BD3E000
heap
page read and write
133D000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
2F00000
heap
page execute and read and write
7FFD9B920000
trusted library allocation
page execute and read and write
32A0000
trusted library allocation
page read and write
32B8000
trusted library allocation
page read and write
1243000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7D0000
unkown
page readonly
130E1000
trusted library allocation
page read and write
1273000
heap
page execute and read and write
1BD05000
heap
page read and write
1BD2A000
heap
page read and write
7D2000
unkown
page readonly
1CE32000
trusted library allocation
page read and write
10F4000
stack
page read and write
13B4000
heap
page read and write
32DB000
trusted library allocation
page read and write
DB0000
heap
page read and write
3271000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
3245000
trusted library allocation
page read and write
32E3000
trusted library allocation
page read and write
7FF44AE10000
trusted library allocation
page execute and read and write
1343000
heap
page read and write
32FB000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
12F3000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
2EF3000
heap
page read and write
32FE000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1D210000
heap
page read and write
1210000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
16E5000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
32BD000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
1D5CE000
stack
page read and write
32F7000
trusted library allocation
page read and write
1313000
heap
page read and write
1BD76000
heap
page read and write
330F000
trusted library allocation
page read and write
12D0000
heap
page read and write
2EA0000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
1290000
heap
page read and write
322F000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
D16000
unkown
page readonly
DA0000
heap
page read and write
1BB40000
heap
page read and write
130F1000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
2FD0000
heap
page read and write
1D6CE000
stack
page read and write
1D23F000
heap
page read and write
13B2000
heap
page read and write
3300000
trusted library allocation
page read and write
7FFD9B762000
trusted library allocation
page read and write
32F9000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
1295000
heap
page read and write
32E8000
trusted library allocation
page read and write
2E90000
trusted library section
page readonly
32C8000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BD10000
heap
page read and write
1D7CE000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1BD00000
heap
page read and write
1270000
heap
page execute and read and write
30DE000
stack
page read and write
130E8000
trusted library allocation
page read and write
130E000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1EB50000
heap
page read and write
1BC4C000
stack
page read and write
1BB10000
heap
page execute and read and write
DD0000
heap
page read and write
1B66D000
stack
page read and write
13AE000
heap
page read and write
7FFD9B931000
trusted library allocation
page read and write
12B0000
heap
page read and write
11D0000
heap
page read and write
32EA000
trusted library allocation
page read and write
12FD000
heap
page read and write
16E0000
heap
page read and write
3296000
trusted library allocation
page read and write
1BD3A000
heap
page read and write
30E1000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
1EB62000
heap
page read and write
32A7000
trusted library allocation
page read and write
32D9000
trusted library allocation
page read and write
328E000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
14CF000
stack
page read and write
32A4000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
12DC000
heap
page read and write
7D0000
unkown
page readonly
32DE000
trusted library allocation
page read and write
1BD20000
heap
page read and write
2EF0000
heap
page read and write
1CE10000
trusted library allocation
page read and write
1EC50000
trusted library allocation
page read and write
There are 119 hidden memdumps, click here to show them.