IOC Report
SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.17207

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\miylwnpd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsaF211.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\qaodb6jx48te
data
dropped
C:\Users\user\AppData\Local\Temp\zehirtbl
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe"
malicious
C:\Users\user\AppData\Local\Temp\miylwnpd.exe
C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
malicious
C:\Users\user\AppData\Local\Temp\miylwnpd.exe
C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
malicious

URLs

Name
IP
Malicious
www.beamaster.info/p0ip/
malicious
http://nsis.sf.net/NSIS_ErrorError
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2CB0000
direct allocation
page read and write
malicious
270E27C000
stack
page read and write
1836E228000
heap
page read and write
24505D10000
heap
page read and write
1C140613000
heap
page read and write
98E000
stack
page read and write
1836E254000
heap
page read and write
2A08E2B7000
heap
page read and write
15F5D7B000
stack
page read and write
1836E268000
heap
page read and write
2E0000
unkown
page readonly
2EE000
unkown
page readonly
197CBA63000
heap
page read and write
1FE740FA000
heap
page read and write
1FE6E867000
heap
page read and write
1FE6F1F3000
trusted library allocation
page read and write
A00000
heap
page read and write
1FE7401D000
heap
page read and write
2A08F202000
heap
page read and write
2A08E313000
heap
page read and write
CF1DF7B000
stack
page read and write
15555670000
heap
page read and write
1C140708000
heap
page read and write
2F3000
unkown
page write copy
754A277000
stack
page read and write
1FE6E8AC000
heap
page read and write
2B5F000
stack
page read and write
6756E7E000
stack
page read and write
8D84EFF000
stack
page read and write
2F3000
unkown
page write copy
C3F000
stack
page read and write
24505E89000
heap
page read and write
22218865000
heap
page read and write
197CBA48000
heap
page read and write
15555700000
heap
page read and write
15555653000
heap
page read and write
2A08ED1A000
heap
page read and write
15555713000
heap
page read and write
1FE74280000
remote allocation
page read and write
2A08ED87000
heap
page read and write
28717B90000
trusted library allocation
page read and write
1C140664000
heap
page read and write
1C140702000
heap
page read and write
2EE000
unkown
page readonly
28717B60000
heap
page read and write
2570000
heap
page read and write
E34B5F7000
stack
page read and write
1FE740D7000
heap
page read and write
1C14063C000
heap
page read and write
2C5F000
stack
page read and write
1FE740A8000
heap
page read and write
2A08ED9B000
heap
page read and write
119A000
heap
page read and write
2A08ED9B000
heap
page read and write
28717C4D000
heap
page read and write
28717C90000
heap
page read and write
1FE74240000
trusted library allocation
page read and write
270EBFE000
stack
page read and write
1FE6E8BA000
heap
page read and write
197CB810000
heap
page read and write
24505EE7000
heap
page read and write
24505E00000
heap
page read and write
2DE0000
heap
page read and write
2A08F202000
heap
page read and write
1FE6F318000
heap
page read and write
15555613000
heap
page read and write
15555702000
heap
page read and write
7549EFE000
stack
page read and write
2A08ED9B000
heap
page read and write
8D847F7000
stack
page read and write
1FE6E865000
heap
page read and write
2A08ED98000
heap
page read and write
2A08EDCD000
heap
page read and write
1FE740EF000
heap
page read and write
2A08E270000
heap
page read and write
222188AB000
heap
page read and write
A40000
heap
page read and write
28717D00000
heap
page read and write
E34B7FF000
stack
page read and write
2A08ED64000
heap
page read and write
28717C57000
heap
page read and write
2A08ED87000
heap
page read and write
754A37F000
stack
page read and write
222188C6000
heap
page read and write
2A08ED6D000
heap
page read and write
24505E44000
heap
page read and write
E34AF0C000
stack
page read and write
1FE6E926000
heap
page read and write
1C140700000
heap
page read and write
CF1E3FB000
stack
page read and write
28717C58000
heap
page read and write
1FE73F50000
trusted library allocation
page read and write
28717C54000
heap
page read and write
2A08F202000
heap
page read and write
222188E1000
heap
page read and write
1FE6F215000
heap
page read and write
DE960FE000
stack
page read and write
1FE6E710000
heap
page read and write
2A08EDAC000
heap
page read and write
9CE000
stack
page read and write
786000
unkown
page read and write
15F5A7B000
stack
page read and write
1836E302000
heap
page read and write
DE964F8000
stack
page read and write
222188E0000
heap
page read and write
22218810000
heap
page read and write
2A08ED67000
heap
page read and write
6756EFE000
stack
page read and write
408000
unkown
page readonly
E34B4FB000
stack
page read and write
270E5FF000
stack
page read and write
9B000
stack
page read and write
222188C5000
heap
page read and write
2A08EDAC000
heap
page read and write
24505EE0000
heap
page read and write
2A08E2EB000
heap
page read and write
7549B9B000
stack
page read and write
2F7000
unkown
page readonly
1FE73F40000
trusted library allocation
page read and write
150D000
stack
page read and write
270E6FF000
stack
page read and write
24505E71000
heap
page read and write
2A08E256000
heap
page read and write
CF1E6FC000
stack
page read and write
1317AFE000
stack
page read and write
2A08F202000
heap
page read and write
290000
remote allocation
page read and write
2A08E251000
heap
page read and write
1FE73D90000
trusted library allocation
page read and write
1C140689000
heap
page read and write
DE95E7B000
stack
page read and write
222188B6000
heap
page read and write
2A08F221000
heap
page read and write
1C14067E000
heap
page read and write
2A08ED86000
heap
page read and write
28717C00000
heap
page read and write
2A08ED66000
heap
page read and write
222188DD000
heap
page read and write
2A08ED69000
heap
page read and write
2A08ED25000
heap
page read and write
2A08E24E000
heap
page read and write
19A000
stack
page read and write
1555567A000
heap
page read and write
BAC000
stack
page read and write
7549E7D000
stack
page read and write
2A08E0E0000
heap
page read and write
8D84CFF000
stack
page read and write
2A08ED8C000
heap
page read and write
DE961F7000
stack
page read and write
1C1403B0000
heap
page read and write
1C140658000
heap
page read and write
1190000
heap
page read and write
1FE73F44000
trusted library allocation
page read and write
24506912000
heap
page read and write
2A08F202000
heap
page read and write
7B9000
unkown
page readonly
2A08EDAC000
heap
page read and write
24506900000
heap
page read and write
15555490000
heap
page read and write
1FE6FA10000
trusted library section
page readonly
2A08ED68000
heap
page read and write
197CBA00000
heap
page read and write
2A08E23C000
heap
page read and write
2F3000
unkown
page write copy
2A08E2C3000
heap
page read and write
24505ECC000
heap
page read and write
2A08E2AD000
heap
page read and write
1FE6E902000
heap
page read and write
197CB7A0000
heap
page read and write
400000
unkown
page readonly
28717B00000
heap
page read and write
2610000
heap
page read and write
8D84C7F000
stack
page read and write
1FE6E813000
heap
page read and write
2A08EDD0000
heap
page read and write
2A08E302000
heap
page read and write
222186E0000
heap
page read and write
131747C000
stack
page read and write
2A08ED98000
heap
page read and write
8D8438C000
stack
page read and write
197CBA84000
heap
page read and write
28717D13000
heap
page read and write
2A08ED98000
heap
page read and write
197CB9E0000
remote allocation
page read and write
28717C7C000
heap
page read and write
1FE6F9E0000
trusted library section
page readonly
2A08ED66000
heap
page read and write
1FE6F359000
heap
page read and write
1FE73E10000
trusted library allocation
page read and write
2A08E1F0000
remote allocation
page read and write
2A08EDAC000
heap
page read and write
8D84FFA000
stack
page read and write
CF1E0FE000
stack
page read and write
DE9667F000
unkown
page read and write
8D850FD000
stack
page read and write
788000
unkown
page read and write
1836E26A000
heap
page read and write
2EE000
unkown
page readonly
290000
remote allocation
page read and write
754A17B000
stack
page read and write
DE965F9000
stack
page read and write
1C140684000
heap
page read and write
1FE6FD80000
trusted library allocation
page read and write
2A08EDA9000
heap
page read and write
CF1DB5B000
stack
page read and write
2EE000
unkown
page readonly
197CBA5F000
heap
page read and write
270E7FF000
stack
page read and write
2A08F219000
heap
page read and write
12CE000
stack
page read and write
1FE6F200000
heap
page read and write
2A08EDBD000
heap
page read and write
2A08ED6C000
heap
page read and write
2A08E2B4000
heap
page read and write
2F7000
unkown
page readonly
24505F13000
heap
page read and write
2E0000
unkown
page readonly
1FE6F9F0000
trusted library section
page readonly
28717C3C000
heap
page read and write
2A08E249000
heap
page read and write
222188E8000
heap
page read and write
28717C48000
heap
page read and write
400000
unkown
page readonly
270E9FC000
stack
page read and write
197CBA48000
heap
page read and write
1FE6E824000
heap
page read and write
197CB910000
trusted library allocation
page read and write
222188B1000
heap
page read and write
1FE6E89D000
heap
page read and write
1FE6E780000
heap
page read and write
24505D20000
heap
page read and write
2A08ED54000
heap
page read and write
E34B27E000
stack
page read and write
1836E300000
heap
page read and write
8D849FA000
stack
page read and write
1040000
heap
page read and write
222188CE000
heap
page read and write
2A08ED68000
heap
page read and write
7549FFC000
stack
page read and write
1FE6E8FC000
heap
page read and write
1FE74250000
trusted library allocation
page read and write
1170000
direct allocation
page execute and read and write
197CB9E0000
remote allocation
page read and write
197CB930000
trusted library allocation
page read and write
82E000
stack
page read and write
7B9000
unkown
page readonly
15555DA0000
trusted library allocation
page read and write
DE9677E000
stack
page read and write
E34B37B000
stack
page read and write
1C14065A000
heap
page read and write
222188C3000
heap
page read and write
6756C7A000
stack
page read and write
22218830000
heap
page read and write
2A08EDB2000
heap
page read and write
1FE73D80000
trusted library allocation
page read and write
197CBB18000
heap
page read and write
28717C29000
heap
page read and write
140E000
stack
page read and write
2A08F203000
heap
page read and write
2E1000
unkown
page execute read
15F5B7D000
stack
page read and write
1FE74280000
remote allocation
page read and write
2A08ED9B000
heap
page read and write
28718602000
trusted library allocation
page read and write
2EE000
unkown
page readonly
15F5AFE000
stack
page read and write
A7C000
heap
page read and write
1C140E02000
trusted library allocation
page read and write
E34B3FF000
stack
page read and write
754A47F000
stack
page read and write
2A08E0F0000
heap
page read and write
1FE74280000
remote allocation
page read and write
197CBB13000
heap
page read and write
6756CFE000
stack
page read and write
40A000
unkown
page read and write
2A08ED76000
heap
page read and write
2A08E150000
heap
page read and write
2E0000
unkown
page readonly
1FE74070000
trusted library allocation
page read and write
CF1E4FF000
stack
page read and write
28717C27000
heap
page read and write
2A08ED66000
heap
page read and write
197CB9E0000
remote allocation
page read and write
2A08ED6C000
heap
page read and write
7B3000
unkown
page read and write
2A08E253000
heap
page read and write
2A08E2EE000
heap
page read and write
1836EC02000
trusted library allocation
page read and write
2A08F202000
heap
page read and write
24505E29000
heap
page read and write
2F7000
unkown
page readonly
2A08E254000
heap
page read and write
2F3000
unkown
page write copy
2A08ED8B000
heap
page read and write
1FE7402B000
heap
page read and write
197CBA58000
heap
page read and write
1060000
heap
page read and write
1C140629000
heap
page read and write
401000
unkown
page execute read
2A08E250000
heap
page read and write
A60000
heap
page read and write
1FE6F300000
heap
page read and write
1FE6F9C0000
trusted library section
page readonly
1FE6F1F0000
trusted library allocation
page read and write
2A08F203000
heap
page read and write
24505E66000
heap
page read and write
1FE6E89B000
heap
page read and write
13178FE000
stack
page read and write
1FE740DE000
heap
page read and write
222188CE000
heap
page read and write
2A08ED9B000
heap
page read and write
2A08ED67000
heap
page read and write
2A08ED1C000
heap
page read and write
DE962F7000
stack
page read and write
28717D02000
heap
page read and write
197CB9A0000
trusted library allocation
page read and write
2F7000
unkown
page readonly
2A08EDD9000
heap
page read and write
2E1000
unkown
page execute read
CF1E1FE000
stack
page read and write
1FE74000000
heap
page read and write
197CBA57000
heap
page read and write
197CB7B0000
heap
page read and write
15555629000
heap
page read and write
2A08ED87000
heap
page read and write
24505E68000
heap
page read and write
2A08E2ED000
heap
page read and write
6756D7E000
stack
page read and write
2A08F202000
heap
page read and write
CF1E5FE000
stack
page read and write
15555687000
heap
page read and write
290000
remote allocation
page read and write
2A08ED66000
heap
page read and write
1FE6E83D000
heap
page read and write
2A08E213000
heap
page read and write
A7C000
heap
page read and write
222188DD000
heap
page read and write
2A08ED98000
heap
page read and write
CF1E37D000
stack
page read and write
1FE6E85D000
heap
page read and write
1FE73F20000
trusted library allocation
page read and write
1836E1E0000
heap
page read and write
28717C70000
heap
page read and write
2E1000
unkown
page execute read
2F7000
unkown
page readonly
222188DD000
heap
page read and write
1C14065F000
heap
page read and write
2A08E24D000
heap
page read and write
2E0000
unkown
page readonly
1FE73F50000
trusted library allocation
page read and write
30000
heap
page read and write
28717C4F000
heap
page read and write
2A08E2C9000
heap
page read and write
197CD402000
trusted library allocation
page read and write
2A5F000
stack
page read and write
2EE000
unkown
page readonly
2A08ED87000
heap
page read and write
24505D80000
heap
page read and write
197CBA82000
heap
page read and write
6756DF9000
stack
page read and write
2A08E308000
heap
page read and write
2A08ED87000
heap
page read and write
15555E02000
trusted library allocation
page read and write
1836E313000
heap
page read and write
1FE6F359000
heap
page read and write
2A08ED9B000
heap
page read and write
2A08EDB2000
heap
page read and write
1FE73F2E000
trusted library allocation
page read and write
2A08ED6A000
heap
page read and write
1C140713000
heap
page read and write
1FE740AD000
heap
page read and write
1836EA80000
trusted library allocation
page read and write
270EAFE000
stack
page read and write
2A08E286000
heap
page read and write
24505EC5000
heap
page read and write
D3F000
stack
page read and write
2F3000
unkown
page read and write
2A08F202000
heap
page read and write
2F7000
unkown
page readonly
1FE6F401000
trusted library allocation
page read and write
1FE73F64000
trusted library allocation
page read and write
2A08F200000
heap
page read and write
DE963FF000
stack
page read and write
1FE74062000
heap
page read and write
A7C000
heap
page read and write
2A08E280000
heap
page read and write
1FE740FC000
heap
page read and write
2A08ED00000
heap
page read and write
8D848FA000
stack
page read and write
2A08ED98000
heap
page read and write
1FE6F8E0000
trusted library allocation
page read and write
1FE73F60000
trusted library allocation
page read and write
197CBA13000
heap
page read and write
40C000
unkown
page read and write
830000
trusted library allocation
page read and write
1C140652000
heap
page read and write
1836E180000
heap
page read and write
1FE7405E000
heap
page read and write
EFC000
stack
page read and write
1FE73FF0000
trusted library allocation
page read and write
13179FF000
stack
page read and write
197CBA02000
heap
page read and write
A5D000
heap
page read and write
1FE6F202000
heap
page read and write
1555564D000
heap
page read and write
1836E202000
heap
page read and write
7A6000
unkown
page read and write
102E000
stack
page read and write
2A08ED87000
heap
page read and write
1FE6F9D0000
trusted library section
page readonly
15F5E77000
stack
page read and write
2F3000
unkown
page write copy
222188C7000
heap
page read and write
251E000
stack
page read and write
15555600000
heap
page read and write
1FE74260000
trusted library allocation
page read and write
2E0000
unkown
page readonly
E34B6FF000
stack
page read and write
24505DB0000
trusted library allocation
page read and write
2E1000
unkown
page execute read
2E1000
unkown
page execute read
754A07E000
stack
page read and write
197CBA2A000
heap
page read and write
1FE74230000
trusted library allocation
page read and write
256E000
stack
page read and write
6756F78000
stack
page read and write
2A08ED7F000
heap
page read and write
2A08EDC2000
heap
page read and write
1FE73F28000
trusted library allocation
page read and write
222188E7000
heap
page read and write
2A08E229000
heap
page read and write
2A08E2E5000
heap
page read and write
2A08EDAC000
heap
page read and write
8D852FE000
stack
page read and write
8D84DFF000
stack
page read and write
1FE6E88F000
heap
page read and write
197CBB00000
heap
page read and write
2F7000
unkown
page readonly
197CBA58000
heap
page read and write
1FE740C1000
heap
page read and write
40A000
unkown
page write copy
2A08ED4F000
heap
page read and write
870000
heap
page read and write
1FE6E913000
heap
page read and write
1FE6E800000
heap
page read and write
2A08ED87000
heap
page read and write
2A08E247000
heap
page read and write
408000
unkown
page readonly
24505F02000
heap
page read and write
222188B6000
heap
page read and write
1FE6F318000
heap
page read and write
2E0000
unkown
page readonly
2A08E2FC000
heap
page read and write
15555708000
heap
page read and write
DE95EFE000
stack
page read and write
1FE6F313000
heap
page read and write
2A08ED66000
heap
page read and write
222188A0000
heap
page read and write
15F5F7E000
stack
page read and write
1FE6FA00000
trusted library section
page readonly
2E1000
unkown
page execute read
1FE6E7C0000
trusted library section
page read and write
8D84D7F000
stack
page read and write
2A08F202000
heap
page read and write
197CBB02000
heap
page read and write
1C140600000
heap
page read and write
1FE73F20000
trusted library allocation
page read and write
E34AF8F000
stack
page read and write
2A08E180000
trusted library allocation
page read and write
1FE74098000
heap
page read and write
1555563C000
heap
page read and write
1FE73E00000
trusted library allocation
page read and write
1FE6E862000
heap
page read and write
28717AF0000
heap
page read and write
1836E200000
heap
page read and write
116E000
stack
page read and write
28717C47000
heap
page read and write
8D84E7F000
stack
page read and write
1FE6F302000
heap
page read and write
28717C13000
heap
page read and write
DE95F7E000
stack
page read and write
1C14065C000
heap
page read and write
197CBA3D000
heap
page read and write
13CE000
stack
page read and write
1FE73F41000
trusted library allocation
page read and write
2A08ED87000
heap
page read and write
1836E23C000
heap
page read and write
8D84AFF000
stack
page read and write
24506802000
heap
page read and write
2A08EDAC000
heap
page read and write
2A08EDAD000
heap
page read and write
15555500000
heap
page read and write
A78000
heap
page read and write
1FE6E852000
heap
page read and write
197CBA47000
heap
page read and write
1C140410000
heap
page read and write
1FE6E889000
heap
page read and write
1836E170000
heap
page read and write
2E0000
unkown
page readonly
2F3000
unkown
page write copy
2A08E24A000
heap
page read and write
A48000
heap
page read and write
2A08E248000
heap
page read and write
2A08E1F0000
remote allocation
page read and write
15F607F000
stack
page read and write
1FE74047000
heap
page read and write
1FE6FD61000
trusted library allocation
page read and write
CF1E27C000
stack
page read and write
2A08E1F0000
remote allocation
page read and write
2A08E24B000
heap
page read and write
A78000
heap
page read and write
1C1403A0000
heap
page read and write
8D8467E000
stack
page read and write
1FE6E720000
heap
page read and write
1FE7403A000
heap
page read and write
2EE000
unkown
page readonly
270E8FC000
stack
page read and write
1FE6E7B0000
trusted library allocation
page read and write
2A08E200000
heap
page read and write
2A08E316000
heap
page read and write
401000
unkown
page execute read
1FE6E829000
heap
page read and write
28717C4B000
heap
page read and write
2A08EC02000
heap
page read and write
24505E13000
heap
page read and write
24505EBB000
heap
page read and write
2A08ED66000
heap
page read and write
2A08ED87000
heap
page read and write
1C140510000
trusted library allocation
page read and write
77C000
unkown
page read and write
13177FB000
stack
page read and write
28717C52000
heap
page read and write
197CBA89000
heap
page read and write
28717C86000
heap
page read and write
2E1000
unkown
page execute read
BF0000
trusted library allocation
page read and write
155554A0000
heap
page read and write
222188CE000
heap
page read and write
1FE740FC000
heap
page read and write
1FE74013000
heap
page read and write
8D84BFB000
stack
page read and write
1FE74080000
trusted library allocation
page read and write
2A08EDAC000
heap
page read and write
22218860000
heap
page read and write
1836E27B000
heap
page read and write
2A08ED75000
heap
page read and write
CF1E7FE000
stack
page read and write
28717D08000
heap
page read and write
B40000
heap
page read and write
782000
unkown
page read and write
197CB960000
trusted library allocation
page read and write
15F5C7B000
stack
page read and write
1836E213000
heap
page read and write
There are 543 hidden memdumps, click here to show them.