IOC Report
SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.26603

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Adventure_12.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\Lydabsorberende2.Eks
data
dropped
C:\Users\user\AppData\Local\Temp\Pilkedes4.AFM
data
dropped
C:\Users\user\AppData\Local\Temp\System.IO.UnmanagedMemoryStream.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\applications-utilities-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\camera-photo-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsyEAEC.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\resume-vm-default.bat
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\wab32res.dll.mui
HTML document, ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe"
malicious

URLs

Name
IP
Malicious
http://2.56.57.22/MY%20AIRTEL%20TELEGRAM%20STUB_iHQdRhQNdR56.bin
malicious
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://subca.ocsp-certum.com05
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.certum.pl/CPS0
unknown
https://github.com/dotnet/runtime
unknown
There are 3 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Architectonica49\Ukraine93
Expand String Value

Memdumps

Base Address
Regiontype
Protect
Malicious
3140000
direct allocation
page execute and read and write
malicious
23E50C50000
heap
page read and write
255F116D000
heap
page read and write
1D4A6458000
heap
page read and write
255F11A8000
heap
page read and write
255F117B000
heap
page read and write
255F0647000
heap
page read and write
255F0656000
heap
page read and write
1EBC7E4C000
heap
page read and write
1EBC7E13000
heap
page read and write
255F1185000
heap
page read and write
255F0654000
heap
page read and write
1D4A6428000
heap
page read and write
22910DA0000
trusted library allocation
page read and write
1A0D39B0000
heap
page read and write
1D4A62F0000
heap
page read and write
401000
unkown
page execute read
255F1185000
heap
page read and write
B9875EA000
stack
page read and write
451000
unkown
page read and write
22910648000
heap
page read and write
255F1162000
heap
page read and write
22910702000
heap
page read and write
1A0D3BC0000
heap
page read and write
72494000
unkown
page readonly
255F118D000
heap
page read and write
255F1621000
heap
page read and write
20D30C93000
heap
page read and write
255F06A9000
heap
page read and write
20D362F7000
heap
page read and write
7B6887D000
stack
page read and write
22910613000
heap
page read and write
926D9FE000
stack
page read and write
206D9EC6000
heap
page read and write
255F0648000
heap
page read and write
255F063C000
heap
page read and write
255F1163000
heap
page read and write
3640000
trusted library allocation
page read and write
20D31701000
trusted library allocation
page read and write
255F118B000
heap
page read and write
255F064D000
heap
page read and write
206D9DF0000
heap
page read and write
1A0D3AF0000
heap
page read and write
255F1162000
heap
page read and write
255F064C000
heap
page read and write
7B68AF8000
stack
page read and write
1EBC7F13000
heap
page read and write
255F1180000
heap
page read and write
255F116A000
heap
page read and write
255F111C000
heap
page read and write
255F118D000
heap
page read and write
255F1185000
heap
page read and write
255F117D000
heap
page read and write
255F161A000
heap
page read and write
3766F2B000
stack
page read and write
376727D000
stack
page read and write
255F1198000
heap
page read and write
368B27F000
stack
page read and write
206D9EDE000
heap
page read and write
20D30C13000
heap
page read and write
2291064E000
heap
page read and write
7C6E7FB000
stack
page read and write
255F1002000
heap
page read and write
73A000
heap
page read and write
206D9EE3000
heap
page read and write
22910651000
heap
page read and write
1A0D4800000
trusted library allocation
page read and write
926D8FF000
stack
page read and write
206D9EB6000
heap
page read and write
255F116C000
heap
page read and write
23E50C7F000
heap
page read and write
255F1621000
heap
page read and write
183B3413000
heap
page read and write
255F11AD000
heap
page read and write
3650000
trusted library allocation
page read and write
206D9EB7000
heap
page read and write
206D9EC7000
heap
page read and write
255F115C000
heap
page read and write
20D361C0000
trusted library allocation
page read and write
20D3623D000
heap
page read and write
255F11AF000
heap
page read and write
20D31402000
heap
page read and write
6E0000
heap
page read and write
206D9DF5000
heap
page read and write
183B3513000
heap
page read and write
23E50C4C000
heap
page read and write
1A0D4AC0000
trusted library allocation
page read and write
183B3448000
heap
page read and write
255F117D000
heap
page read and write
255F116A000
heap
page read and write
7C6E8FB000
stack
page read and write
255F117D000
heap
page read and write
72496000
unkown
page readonly
7B685AE000
stack
page read and write
183B3453000
heap
page read and write
72490000
unkown
page readonly
206D9ED0000
heap
page read and write
6902EF9000
stack
page read and write
453000
unkown
page readonly
255F118C000
heap
page read and write
183B343C000
heap
page read and write
926D57B000
stack
page read and write
2291068C000
heap
page read and write
255F0653000
heap
page read and write
1EBC7E76000
heap
page read and write
B9878FF000
stack
page read and write
255F11A9000
heap
page read and write
255F1185000
heap
page read and write
23E50B50000
heap
page read and write
206D9EE5000
heap
page read and write
20D361C0000
trusted library allocation
page read and write
20D31559000
heap
page read and write
20D31D80000
trusted library section
page readonly
255F161A000
heap
page read and write
690299C000
stack
page read and write
926D47E000
stack
page read and write
20D365E0000
trusted library allocation
page read and write
368A87B000
stack
page read and write
23E50D08000
heap
page read and write
20D36120000
trusted library allocation
page read and write
2862000
trusted library allocation
page read and write
255F117D000
heap
page read and write
255F118F000
heap
page read and write
23E50C52000
heap
page read and write
728000
heap
page read and write
368AD7E000
stack
page read and write
1D4A6513000
heap
page read and write
368B0FF000
stack
page read and write
408000
unkown
page readonly
23DF000
stack
page read and write
255F11B9000
heap
page read and write
59FE7FD000
stack
page read and write
22910700000
heap
page read and write
B987AFC000
stack
page read and write
400000
unkown
page readonly
255F06E9000
heap
page read and write
20D30C74000
heap
page read and write
C0E000
stack
page read and write
1D4A6502000
heap
page read and write
20D362F9000
heap
page read and write
22910676000
heap
page read and write
255F1602000
heap
page read and write
738000
heap
page read and write
B98787F000
stack
page read and write
1D4A6470000
heap
page read and write
255F1185000
heap
page read and write
183B31F0000
heap
page read and write
183B3350000
trusted library allocation
page read and write
23E51602000
trusted library allocation
page read and write
183B3502000
heap
page read and write
255F1170000
heap
page read and write
183B3C02000
trusted library allocation
page read and write
255F1196000
heap
page read and write
926D1EE000
stack
page read and write
23E50AE0000
heap
page read and write
435000
unkown
page read and write
1A0D3C07000
heap
page read and write
206D9EC2000
heap
page read and write
20D3622C000
heap
page read and write
206D9EC1000
heap
page read and write
255F04D0000
heap
page read and write
926D7F7000
stack
page read and write
20D36521000
trusted library allocation
page read and write
183B3429000
heap
page read and write
255F11B1000
heap
page read and write
1A0D3C21000
heap
page read and write
255F11B2000
heap
page read and write
37674FB000
stack
page read and write
59FE8F9000
stack
page read and write
20D313C0000
trusted library section
page read and write
255F06F8000
heap
page read and write
23E50AF0000
heap
page read and write
20D36110000
trusted library allocation
page read and write
724000
heap
page read and write
3766FAE000
stack
page read and write
20D36200000
heap
page read and write
23E50C13000
heap
page read and write
368AF7E000
stack
page read and write
255F116A000
heap
page read and write
206D9E00000
heap
page read and write
255F119E000
heap
page read and write
1EBC8602000
trusted library allocation
page read and write
6E024FE000
stack
page read and write
255F06C1000
heap
page read and write
255F114D000
heap
page read and write
1D4A643E000
heap
page read and write
255F0650000
heap
page read and write
20D36190000
trusted library allocation
page read and write
22910629000
heap
page read and write
1A0D3B90000
trusted library allocation
page read and write
22D0000
heap
page read and write
368AC7A000
stack
page read and write
255F11A7000
heap
page read and write
20D361E0000
trusted library allocation
page read and write
C10000
heap
page read and write
23E50C29000
heap
page read and write
255F04E0000
heap
page read and write
23E50C6F000
heap
page read and write
229104A0000
heap
page read and write
1A0D39C0000
trusted library allocation
page read and write
255F1164000
heap
page read and write
1A0D3B40000
heap
page read and write
22910E02000
trusted library allocation
page read and write
368B1FB000
stack
page read and write
710000
heap
page read and write
20D30C8A000
heap
page read and write
255F116B000
heap
page read and write
59FE5F7000
stack
page read and write
255F119E000
heap
page read and write
2410000
heap
page read and write
1A0D3B49000
heap
page read and write
6E021FB000
stack
page read and write
255F11BA000
heap
page read and write
183B3400000
heap
page read and write
368AE7B000
stack
page read and write
183B3481000
heap
page read and write
20D36213000
heap
page read and write
380E000
stack
page read and write
255F1186000
heap
page read and write
59FE6FE000
stack
page read and write
255F116A000
heap
page read and write
20D362E0000
heap
page read and write
255F06A2000
heap
page read and write
20D30C8D000
heap
page read and write
255F117D000
heap
page read and write
20D362FB000
heap
page read and write
206D9ED0000
heap
page read and write
255F11B1000
heap
page read and write
1A0D4A60000
trusted library allocation
page read and write
570000
trusted library allocation
page read and write
23E50C47000
heap
page read and write
1D4A6390000
trusted library allocation
page read and write
37675F7000
stack
page read and write
255F118E000
heap
page read and write
7B68EF7000
stack
page read and write
255F0658000
heap
page read and write
20D36610000
remote allocation
page read and write
20D30AB0000
heap
page read and write
453000
unkown
page readonly
255F116A000
heap
page read and write
20D362FC000
heap
page read and write
20D30C00000
heap
page read and write
255F116A000
heap
page read and write
20D30C9F000
heap
page read and write
255F118B000
heap
page read and write
255F0600000
heap
page read and write
23E50C4D000
heap
page read and write
368B07F000
stack
page read and write
B987979000
stack
page read and write
20D313B0000
trusted library allocation
page read and write
20D361B0000
trusted library allocation
page read and write
255F1190000
heap
page read and write
22910647000
heap
page read and write
255F1187000
heap
page read and write
6E0207F000
stack
page read and write
255F119C000
heap
page read and write
206D9EA0000
heap
page read and write
71F000
heap
page read and write
20D36300000
heap
page read and write
255F1600000
heap
page read and write
255F1100000
heap
page read and write
20D31D40000
trusted library section
page readonly
20D36261000
heap
page read and write
255F0713000
heap
page read and write
255F118B000
heap
page read and write
22910649000
heap
page read and write
20D30D02000
heap
page read and write
20D30B10000
heap
page read and write
20D36524000
trusted library allocation
page read and write
926D16C000
stack
page read and write
255F1162000
heap
page read and write
59FE4FB000
stack
page read and write
183B346F000
heap
page read and write
1EBC7E4F000
heap
page read and write
1EBC7C30000
heap
page read and write
20D31C60000
trusted library allocation
page read and write
255F064F000
heap
page read and write
1A0D3BB0000
trusted library allocation
page read and write
422000
unkown
page read and write
255F064A000
heap
page read and write
255F1602000
heap
page read and write
1EBC7E00000
heap
page read and write
255F1618000
heap
page read and write
255F06E2000
heap
page read and write
255F1174000
heap
page read and write
255F0649000
heap
page read and write
255F118D000
heap
page read and write
255F118D000
heap
page read and write
22CE000
stack
page read and write
20D32100000
trusted library allocation
page read and write
255F117B000
heap
page read and write
255F1618000
heap
page read and write
255F0629000
heap
page read and write
255F11D5000
heap
page read and write
20D30C8F000
heap
page read and write
22910490000
heap
page read and write
72491000
unkown
page execute read
183B3508000
heap
page read and write
59FDF8B000
stack
page read and write
20D31D90000
trusted library section
page readonly
255F11BA000
heap
page read and write
7C6E9FE000
stack
page read and write
1A0D3C0F000
heap
page read and write
255F1181000
heap
page read and write
427000
unkown
page read and write
255F0570000
trusted library allocation
page read and write
368B57E000
stack
page read and write
20D31518000
heap
page read and write
255F066F000
heap
page read and write
1D4A6E02000
trusted library allocation
page read and write
255F11AD000
heap
page read and write
20D362A1000
heap
page read and write
23E50C3C000
heap
page read and write
1D4A6402000
heap
page read and write
255F1153000
heap
page read and write
1D4A6413000
heap
page read and write
183B3250000
heap
page read and write
7B6852B000
stack
page read and write
1A0D4A70000
trusted library allocation
page read and write
183B31E0000
heap
page read and write
20D31518000
heap
page read and write
20D361A0000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
20D31558000
heap
page read and write
1EBC7E8F000
heap
page read and write
5D0000
heap
page read and write
20D30D13000
heap
page read and write
30000
heap
page read and write
23E50C4B000
heap
page read and write
6902DF9000
stack
page read and write
206D9EB2000
heap
page read and write
23E50D02000
heap
page read and write
255F1151000
heap
page read and write
255F1164000
heap
page read and write
37677FF000
stack
page read and write
7C6E6FB000
stack
page read and write
183B3450000
heap
page read and write
23E50C4F000
heap
page read and write
20D31513000
heap
page read and write
926D5FF000
stack
page read and write
183B344D000
heap
page read and write
22910713000
heap
page read and write
255F1602000
heap
page read and write
6902E7E000
stack
page read and write
255F11DC000
heap
page read and write
1EBC7C20000
heap
page read and write
20D36610000
remote allocation
page read and write
255F05E0000
remote allocation
page read and write
1D4A6300000
heap
page read and write
7B68F7F000
unkown
page read and write
B987A7E000
stack
page read and write
20D365F0000
trusted library allocation
page read and write
285F000
stack
page read and write
1A0D3B45000
heap
page read and write
255F1196000
heap
page read and write
255F1187000
heap
page read and write
23E50D00000
heap
page read and write
183B3449000
heap
page read and write
23E50C46000
heap
page read and write
255F118B000
heap
page read and write
206D9EC8000
heap
page read and write
368AB7A000
stack
page read and write
255F06B0000
heap
page read and write
20D362F1000
heap
page read and write
206D9EC4000
heap
page read and write
22D4000
heap
page read and write
59FE3FB000
stack
page read and write
255F0659000
heap
page read and write
255F1602000
heap
page read and write
1A0D3BC8000
heap
page read and write
370D000
stack
page read and write
20D36255000
heap
page read and write
20D361F4000
trusted library allocation
page read and write
255F118B000
heap
page read and write
1A0D3BA0000
trusted library allocation
page read and write
37676FE000
stack
page read and write
7B68DF8000
stack
page read and write
20D36500000
trusted library allocation
page read and write
23E50D13000
heap
page read and write
1A0D4A50000
heap
page readonly
1EBC7F08000
heap
page read and write
1EBC7F00000
heap
page read and write
1EBC7F02000
heap
page read and write
183B3475000
heap
page read and write
255F11B0000
heap
page read and write
20D36580000
trusted library allocation
page read and write
20D361F0000
trusted library allocation
page read and write
22910708000
heap
page read and write
20D31502000
heap
page read and write
255F068A000
heap
page read and write
2291063C000
heap
page read and write
255F118E000
heap
page read and write
1EBC7E81000
heap
page read and write
400000
unkown
page readonly
22910681000
heap
page read and write
1A0D3B10000
heap
page read and write
255F116A000
heap
page read and write
20D3624A000
heap
page read and write
7B689FF000
stack
page read and write
255F1162000
heap
page read and write
20D365D0000
trusted library allocation
page read and write
2291064A000
heap
page read and write
255F118B000
heap
page read and write
1EBC7E6A000
heap
page read and write
206D9ED0000
heap
page read and write
6902D79000
stack
page read and write
255F1602000
heap
page read and write
23E50B80000
trusted library allocation
page read and write
20D30D26000
heap
page read and write
255F1185000
heap
page read and write
206D9DC0000
heap
page read and write
B9879F9000
stack
page read and write
255F1123000
heap
page read and write
255F0613000
heap
page read and write
20D31415000
heap
page read and write
20D30C3D000
heap
page read and write
255F05E0000
remote allocation
page read and write
255F118B000
heap
page read and write
7B68BF7000
stack
page read and write
59FE27F000
stack
page read and write
206D9C90000
heap
page read and write
23E50C00000
heap
page read and write
20D31D70000
trusted library section
page readonly
6E01DCC000
stack
page read and write
255F118D000
heap
page read and write
255F0651000
heap
page read and write
255F0708000
heap
page read and write
368AA78000
stack
page read and write
59FE2FF000
stack
page read and write
376737C000
stack
page read and write
1EBC7D90000
trusted library allocation
page read and write
23E50C02000
heap
page read and write
20D31D60000
trusted library section
page readonly
1EBC7E29000
heap
page read and write
20D361E0000
trusted library allocation
page read and write
1EBC7C90000
heap
page read and write
2291064C000
heap
page read and write
6E023F7000
stack
page read and write
1D4A6360000
heap
page read and write
20D30C57000
heap
page read and write
6E022FB000
stack
page read and write
20D3621E000
heap
page read and write
2291064F000
heap
page read and write
255F06C7000
heap
page read and write
40A000
unkown
page read and write
20D362AD000
heap
page read and write
255F111A000
heap
page read and write
20D30CAF000
heap
page read and write
99000
stack
page read and write
183B3500000
heap
page read and write
22910662000
heap
page read and write
255F0540000
heap
page read and write
20D31500000
heap
page read and write
255F1162000
heap
page read and write
20D3650E000
trusted library allocation
page read and write
255F11CF000
heap
page read and write
926D6FB000
stack
page read and write
1A0D3CC0000
trusted library allocation
page read and write
20D361B0000
trusted library allocation
page read and write
20D30C78000
heap
page read and write
1D4A6467000
heap
page read and write
1A0D3BD0000
heap
page read and write
255F0702000
heap
page read and write
255F0716000
heap
page read and write
20D36302000
heap
page read and write
255F116A000
heap
page read and write
255F1191000
heap
page read and write
40A000
unkown
page write copy
7B68CFF000
stack
page read and write
401000
unkown
page execute read
255F117D000
heap
page read and write
20D30AA0000
heap
page read and write
6E020FF000
stack
page read and write
20D3629E000
heap
page read and write
408000
unkown
page readonly
1A0D3C0F000
heap
page read and write
20D32103000
trusted library allocation
page read and write
183B3446000
heap
page read and write
6E026FF000
stack
page read and write
1EBC7E3C000
heap
page read and write
20D32110000
trusted library allocation
page read and write
6E8000
heap
page read and write
20D36508000
trusted library allocation
page read and write
1EBC7E65000
heap
page read and write
20D31D50000
trusted library section
page readonly
20D30C55000
heap
page read and write
22910500000
heap
page read and write
20D30CFC000
heap
page read and write
255F119C000
heap
page read and write
255F117D000
heap
page read and write
20D320E1000
trusted library allocation
page read and write
19A000
stack
page read and write
22910600000
heap
page read and write
255F05E0000
remote allocation
page read and write
20D36302000
heap
page read and write
368AEFE000
stack
page read and write
20D30C29000
heap
page read and write
20D36610000
remote allocation
page read and write
1D4A6500000
heap
page read and write
255F06B3000
heap
page read and write
7C6E1CB000
stack
page read and write
255F1602000
heap
page read and write
C16000
heap
page read and write
20D30C6E000
heap
page read and write
1A0D4A40000
trusted library allocation
page read and write
6E025FD000
stack
page read and write
368B37C000
stack
page read and write
206D9EAB000
heap
page read and write
23E50C89000
heap
page read and write
1A0D3C0F000
heap
page read and write
37673FF000
stack
page read and write
20D31400000
heap
page read and write
255F11AF000
heap
page read and write
255F11B9000
heap
page read and write
20D365C0000
trusted library allocation
page read and write
368AFFE000
stack
page read and write
206D9EE0000
heap
page read and write
1D4A6400000
heap
page read and write
There are 508 hidden memdumps, click here to show them.