IOC Report
SecuriteInfo.com.Win32.Malware-gen.15404.5900.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.Malware-gen.15404.5900.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rp12w0ia.lfd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vj2n3ywu.bsj.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.15404.5900.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.15404.5900.exe"
malicious

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://jeanoliveiragomes.github.io
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 17 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9BAC0000
trusted library allocation
page read and write
1B6CD000
heap
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B977000
trusted library allocation
page read and write
1CED4000
heap
page read and write
2C8D000
trusted library allocation
page read and write
7FFD9B949000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
1B676000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
C18000
heap
page read and write
1B433000
heap
page read and write
1E2E0000
heap
page read and write
1AA80000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
B50000
heap
page read and write
7FFD9BA59000
trusted library allocation
page read and write
1B6A8000
heap
page read and write
1B93E000
stack
page read and write
BDE000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
610000
unkown
page readonly
7FFD9B9B0000
trusted library allocation
page read and write
1B560000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
BA0000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
610000
unkown
page readonly
7FFD9B9F0000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page execute and read and write
3240000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1CED0000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1ADD0000
heap
page read and write
1B572000
heap
page read and write
2910000
heap
page read and write
319A000
trusted library allocation
page read and write
12A66000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
7E0000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
BCA000
heap
page read and write
7FF446040000
trusted library allocation
page execute and read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
7FFD9B7B0000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
7FFD9B7A8000
trusted library allocation
page read and write
763000
stack
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
3177000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
E15000
heap
page read and write
BAC000
heap
page read and write
3212000
trusted library allocation
page read and write
BE3000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
1B66A000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
B63000
trusted library allocation
page read and write
1B5B5000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write