IOC Report
SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__swprintf_l
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,__vswprintf_l
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.476018.8153.3189.dll,_fprintf_l

URLs

Name
IP
Malicious
https://github.com/googlefonts/mulish)Mulish
unknown
http://scripts.sil.org/OFLMulishMediumWeightItalicRoman
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
fp2e7a.wpc.phicdn.net
192.229.221.95

Memdumps

Base Address
Regiontype
Protect
Malicious
2F10000
heap
page read and write
87C000
stack
page read and write
C7E000
stack
page read and write
2CB9000
heap
page read and write
83C000
stack
page read and write
29F7000
heap
page read and write
2B36000
heap
page read and write
6E9000
heap
page read and write
42AE000
stack
page read and write
6E1000
heap
page read and write
299000
stack
page read and write
29CA000
heap
page read and write
839000
stack
page read and write
29E9000
heap
page read and write
29F7000
heap
page read and write
70D000
heap
page read and write
29F7000
heap
page read and write
2CB0000
heap
page read and write
67D000
stack
page read and write
2CC6000
heap
page read and write
705000
heap
page read and write
6E9000
heap
page read and write
2B36000
heap
page read and write
42EF000
stack
page read and write
2E00000
heap
page read and write
2B37000
heap
page read and write
29B0000
heap
page read and write
A6F000
stack
page read and write
2F16000
heap
page read and write
7C0000
heap
page read and write
93E000
stack
page read and write
8C0000
heap
page read and write
2B3A000
heap
page read and write
5D10000
heap
page read and write
5A50000
trusted library allocation
page read and write
75C000
stack
page read and write
29C0000
heap
page read and write
4670000
heap
page read and write
2B3A000
heap
page read and write
2CBF000
heap
page read and write
940000
heap
page read and write
29F0000
heap
page read and write
960000
heap
page read and write
5C9000
stack
page read and write
85D000
stack
page read and write
8C0000
heap
page read and write
445E000
stack
page read and write
433E000
stack
page read and write
6C0000
heap
page read and write
29DD000
heap
page read and write
29E9000
heap
page read and write
2B3A000
heap
page read and write
81E000
stack
page read and write
29EE000
heap
page read and write
29E5000
heap
page read and write
29B6000
heap
page read and write
4664000
heap
page read and write
3CE000
stack
page read and write
2AF0000
heap
page read and write
63E000
stack
page read and write
6CA000
heap
page read and write
8D0000
heap
page read and write
2CDD000
heap
page read and write
2AAE000
stack
page read and write
A8F000
heap
page read and write
934000
heap
page read and write
5D20000
heap
page read and write
2A0D000
heap
page read and write
7C0000
heap
page read and write
2B00000
heap
page read and write
29E4000
heap
page read and write
2B10000
heap
page read and write
2B10000
heap
page read and write
2CB5000
heap
page read and write
AA0000
heap
page read and write
2C9A000
heap
page read and write
2AFE000
stack
page read and write
45D0000
heap
page read and write
6E0000
heap
page read and write
6F0000
heap
page read and write
2E30000
heap
page read and write
2B3F000
heap
page read and write
6250000
trusted library allocation
page read and write
2B3E000
heap
page read and write
29EB000
heap
page read and write
2DCE000
stack
page read and write
5E20000
heap
page read and write
930000
heap
page read and write
6F6000
heap
page read and write
4660000
heap
page read and write
29EF000
heap
page read and write
2B3A000
heap
page read and write
2C90000
heap
page read and write
2A9E000
stack
page read and write
63D0000
trusted library allocation
page read and write
29E0000
heap
page read and write
65C000
stack