IOC Report
SecuriteInfo.com.W32.Trojan.SW.gen.Eldorado.19987.15855.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.Trojan.SW.gen.Eldorado.19987.15855.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.Trojan.SW.gen.Eldorado.19987.15855.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1wco4vy5.omd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtvw3g1f.4rr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryfqyz2j.vz3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wxmv10ti.b1j.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.SW.gen.Eldorado.19987.15855.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.SW.gen.Eldorado.19987.15855.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.SW.gen.Eldorado.19987.15855.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name8
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 16 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
1840000
direct allocation
page read and write
malicious
1470000
heap
page read and write
17DE000
stack
page read and write
5F50000
trusted library allocation
page execute and read and write
7E70000
trusted library allocation
page execute and read and write
43A9000
trusted library allocation
page read and write
1950000
trusted library allocation
page read and write
5F30000
trusted library allocation
page execute and read and write
1588000
heap
page read and write
5EEC000
trusted library allocation
page read and write
15A6000
heap
page read and write
15A4000
heap
page read and write
15F1000
heap
page read and write
1480000
heap
page read and write
7532000
trusted library allocation
page read and write
7CD1000
heap
page read and write
7D50000
trusted library section
page read and write
5CF0000
heap
page read and write
ADDD000
stack
page read and write
7E10000
trusted library allocation
page read and write
1987000
trusted library allocation
page execute and read and write
1A37000
heap
page read and write
1976000
trusted library allocation
page execute and read and write
A9DF000
stack
page read and write
179E000
stack
page read and write
7FD0000
trusted library section
page read and write
1ADE000
direct allocation
page execute and read and write
13C0000
heap
page read and write
1560000
heap
page read and write
5F20000
trusted library allocation
page read and write
195D000
trusted library allocation
page execute and read and write
14E0000
heap
page read and write
43C9000
trusted library allocation
page read and write
FEC000
stack
page read and write
5880000
trusted library allocation
page read and write
7ECE000
stack
page read and write
17F0000
heap
page read and write
B15C000
stack
page read and write
14E7000
heap
page read and write
5824000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
1972000
trusted library allocation
page read and write
AC5F000
stack
page read and write
129E000
stack
page read and write
16DF000
stack
page read and write
5820000
trusted library allocation
page read and write
59F0000
heap
page read and write
196D000
trusted library allocation
page execute and read and write
5DE0000
heap
page read and write
197A000
trusted library allocation
page execute and read and write
AA1D000
stack
page read and write
192E000
stack
page read and write
7E00000
trusted library section
page read and write
1A69000
direct allocation
page execute and read and write
AC9E000
stack
page read and write
43A1000
trusted library allocation
page read and write
7AB0000
heap
page read and write
1953000
trusted library allocation
page execute and read and write
12A0000
heap
page read and write
1BF1000
direct allocation
page execute and read and write
336E000
stack
page read and write
58B0000
heap
page read and write
7CBC000
heap
page read and write
5BD0000
heap
page read and write
7A20000
trusted library allocation
page execute and read and write
19F0000
trusted library allocation
page execute and read and write
5A4B000
stack
page read and write
1460000
heap
page read and write
5BC0000
trusted library allocation
page read and write
33FC000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
1250000
heap
page read and write
54DC000
stack
page read and write
1980000
trusted library allocation
page read and write
59E0000
trusted library section
page readonly
12E0000
heap
page read and write
1940000
trusted library allocation
page read and write
7C50000
heap
page read and write
5846000
trusted library allocation
page read and write
7C97000
heap
page read and write
584D000
trusted library allocation
page read and write
5B70000
heap
page read and write
A89E000
stack
page read and write
1595000
heap
page read and write
19EE000
stack
page read and write
5CFC000
heap
page read and write
5EE0000
trusted library allocation
page read and write
1960000
trusted library allocation
page read and write
3380000
trusted library allocation
page read and write
930E000
stack
page read and write
5841000
trusted library allocation
page read and write
A75E000
stack
page read and write
5CDE000
stack
page read and write
331E000
stack
page read and write
198B000
trusted library allocation
page execute and read and write
3390000
heap
page read and write
32DE000
stack
page read and write
19A0000
trusted library allocation
page read and write
B29E000
stack
page read and write
1645000
heap
page read and write
7FCE000
stack
page read and write
5BB0000
heap
page read and write
1C0D000
direct allocation
page execute and read and write
7CA5000
heap
page read and write
AB1D000
stack
page read and write
7AA1000
trusted library allocation
page read and write
1A20000
trusted library allocation
page read and write
457E000
trusted library allocation
page read and write
5D2D000
heap
page read and write
106A000
unkown
page readonly
1940000
direct allocation
page execute and read and write
11F6000
stack
page read and write
1A6D000
direct allocation
page execute and read and write
7DF0000
trusted library allocation
page read and write
58A0000
heap
page read and write
1A00000
heap
page execute and read and write
1C06000
direct allocation
page execute and read and write
A8DE000
stack
page read and write
AEDE000
stack
page read and write
3326000
trusted library allocation
page read and write
A79E000
stack
page read and write
9077000
trusted library allocation
page read and write
1954000
trusted library allocation
page read and write
1A10000
trusted library allocation
page read and write
1730000
heap
page read and write
59B0000
trusted library allocation
page read and write
5BD5000
heap
page read and write
53DB000
stack
page read and write
171E000
stack
page read and write
B19D000
stack
page read and write
7CB1000
heap
page read and write
1486000
heap
page read and write
AB5D000
stack
page read and write
1982000
trusted library allocation
page read and write
7F4A0000
trusted library allocation
page execute and read and write
5B90000
trusted library allocation
page execute and read and write
1970000
trusted library allocation
page read and write
AD9E000
stack
page read and write
183F000
stack
page read and write
58A3000
heap
page read and write
156E000
heap
page read and write
1C88000
direct allocation
page execute and read and write
B2B0000
trusted library allocation
page read and write
440D000
trusted library allocation
page read and write
B05B000
stack
page read and write
1A30000
heap
page read and write
1820000
heap
page read and write
3320000
trusted library allocation
page read and write
10FA000
stack
page read and write
33A1000
trusted library allocation
page read and write
5A00000
heap
page execute and read and write
169D000
stack
page read and write
5852000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
5CE0000
heap
page read and write
34A1000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
EED000
stack
page read and write
FB0000
unkown
page readonly
582B000
trusted library allocation
page read and write
7A10000
trusted library section
page read and write
7510000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
FB2000
unkown
page readonly
There are 156 hidden memdumps, click here to show them.