IOC Report
SCAN Swift 054545676700000000000000001.exe

loading gif

Files

File Path
Type
Category
Malicious
SCAN Swift 054545676700000000000000001.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Bllebrs.bar
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Pressekonferencens.maa
data
dropped
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libLerc.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsk14B9.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\system-shutdown.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
SVG Scalable Vector Graphics image
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin
103.211.219.10
malicious
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.binH
unknown
http://127.0.0.1:HTTP/1.1
unknown
https://us1.api.ws-hp.com/clienttelemetry
unknown
http://DynDns.comDynDNS
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
unknown
https://pie-us1.api.ws-hp.com/clienttelemetry
unknown
http://MBStZn.com
unknown
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.binG
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
unknown
https://api.ipify.org%H
unknown
https://support.google.com/chrome/?p=plugin_flash
unknown
https://api.ipify.org%GETMozilla/5.0
unknown
https://stage-us1.api.ws-hp.com/clienttelemetry
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
donaldtrumpverse.com
103.211.219.10
malicious

IPs

IP
Domain
Country
Malicious
103.211.219.10
donaldtrumpverse.com
Seychelles
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\HAAND\Benfisken85
detaljeprojektets
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENE
INTERPELLATION
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valeward72\esc
Transfixation98
HKEY_CURRENT_USER\SOFTWARE\DOMMERASPIRANTER\ETHERIIDAE
internalising

Memdumps

Base Address
Regiontype
Protect
Malicious
1DBEE000
trusted library allocation
page read and write
malicious
2A80000
direct allocation
page execute and read and write
malicious
1DB21000
trusted library allocation
page read and write
malicious
1400000
remote allocation
page execute and read and write
malicious
1555000
trusted library allocation
page read and write
1C951000
heap
page read and write
1D902000
trusted library allocation
page execute and read and write
1400000
remote allocation
page execute and read and write
1DA15A30000
heap
page read and write
1D78A000
stack
page read and write
5B8000
heap
page read and write
1530000
heap
page read and write
1D912000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1C951000
heap
page read and write
46C000
unkown
page readonly
1C951000
heap
page read and write
19CA86C0000
heap
page read and write
11C0000
remote allocation
page read and write
1C951000
heap
page read and write
1720000
trusted library allocation
page read and write
1FDC0000
trusted library allocation
page read and write
157B000
trusted library allocation
page read and write
1DA1657C000
heap
page read and write
1740000
trusted library allocation
page read and write
1C951000
heap
page read and write
1570000
trusted library allocation
page read and write
19CA886D000
heap
page read and write
1A30000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1940000
trusted library allocation
page read and write
1555000
trusted library allocation
page read and write
19CA885D000
heap
page read and write
1C951000
heap
page read and write
1930000
trusted library allocation
page read and write
19CA8760000
unclassified section
page readonly
1552000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1DA1650E000
heap
page read and write
19CA9202000
trusted library allocation
page read and write
440000
unkown
page read and write
1720000
trusted library allocation
page read and write
1DACE000
stack
page read and write
1720000
trusted library allocation
page read and write
1C951000
heap
page read and write
1DA15B00000
heap
page read and write
1940000
trusted library allocation
page execute and read and write
1C951000
heap
page read and write
1550000
trusted library allocation
page read and write
1D900000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
5D3000
heap
page read and write
1DA15A00000
heap
page read and write
1DA15A6B000
heap
page read and write
1970000
trusted library allocation
page read and write
1D8C0000
trusted library allocation
page read and write
1A60000
trusted library allocation
page read and write
1DA16537000
heap
page read and write
19CA8860000
heap
page read and write
5CA000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
1DA1652C000
heap
page read and write
1550000
trusted library allocation
page read and write
1D980000
heap
page execute and read and write
1C951000
heap
page read and write
431000
unkown
page read and write
1DA16570000
heap
page read and write
1C951000
heap
page read and write
1720000
trusted library allocation
page read and write
1C951000
heap
page read and write
19CA886B000
heap
page read and write
1920000
trusted library allocation
page read and write
1C951000
heap
page read and write
1730000
trusted library allocation
page execute and read and write
19CA8802000
heap
page read and write
19CA8834000
heap
page read and write
1030000
heap
page read and write
11C0000
remote allocation
page read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
588000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1FE7D000
stack
page read and write
1550000
trusted library allocation
page read and write
1555000
trusted library allocation
page read and write
2041E000
stack
page read and write
1DA15A99000
heap
page read and write
1720000
trusted library allocation
page read and write
1DA1652C000
heap
page read and write
1555000
trusted library allocation
page read and write
1DA16500000
heap
page read and write
2C10000
heap
page read and write
1910000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1FE90000
trusted library allocation
page read and write
1555000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
1C951000
heap
page read and write
1849000
heap
page read and write
1897000
heap
page read and write
1C951000
heap
page read and write
1550000
trusted library allocation
page read and write
1DA1657C000
heap
page read and write
1841000
heap
page read and write
1D8FA000
trusted library allocation
page execute and read and write
1720000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
580000
remote allocation
page read and write
BA5000
heap
page read and write
1C951000
heap
page read and write
2B81000
trusted library allocation
page read and write
1863000
heap
page read and write
1950000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
18A0000
trusted library allocation
page read and write
1D90A000
trusted library allocation
page execute and read and write
1D410000
heap
page read and write
1555000
trusted library allocation
page read and write
1DA15AB5000
heap
page read and write
1DA15AAA000
heap
page read and write
6F426000
unkown
page readonly
40D000
unkown
page read and write
1C951000
heap
page read and write
1FDFC000
stack
page read and write
193E000
stack
page read and write
1550000
trusted library allocation
page read and write
408000
unkown
page readonly
1720000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
1C951000
heap
page read and write
1DA1656D000
heap
page read and write
77EE27E000
stack
page read and write
1570000
trusted library allocation
page read and write
5E6000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1729000
trusted library allocation
page read and write
1DA1653B000
heap
page read and write
1552000
trusted library allocation
page read and write
1DA16540000
heap
page read and write
1C950000
heap
page read and write
1C951000
heap
page read and write
1573000
trusted library allocation
page read and write
1C951000
heap
page read and write
19CA8840000
heap
page read and write
1C951000
heap
page read and write
19F0000
trusted library allocation
page read and write
1C951000
heap
page read and write
1722000
trusted library allocation
page read and write
1DA1656B000
heap
page read and write
1C951000
heap
page read and write
1DA1652F000
heap
page read and write
1720000
trusted library allocation
page read and write
1DA15AA5000
heap
page read and write
17AB000
heap
page read and write
1DA1650F000
heap
page read and write
1C951000
heap
page read and write
1812000
heap
page read and write
5D5000
heap
page read and write
1C951000
heap
page read and write
2474000
heap
page read and write
1560000
trusted library allocation
page read and write
11C0000
remote allocation
page read and write
5ECF1CB000
stack
page read and write
46A000
unkown
page read and write
1D30E000
stack
page read and write
7F400000
trusted library allocation
page execute and read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
1555000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
1C951000
heap
page read and write
1DAE0000
trusted library allocation
page read and write
1DA16529000
heap
page read and write
1930000
trusted library allocation
page read and write
46C000
unkown
page readonly
1D8E2000
trusted library allocation
page execute and read and write
1555000
trusted library allocation
page read and write
1831000
heap
page read and write
1DA16574000
heap
page read and write
1180000
trusted library allocation
page execute and read and write
1C951000
heap
page read and write
1150000
trusted library allocation
page execute and read and write
1726000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
19CA8813000
heap
page read and write
2051D000
stack
page read and write
1D910000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
B0E000
stack
page read and write
1DA15A2A000
heap
page read and write
1DA16513000
heap
page read and write
1920000
trusted library allocation
page read and write
1C951000
heap
page read and write
1900000
trusted library allocation
page read and write
2055E000
stack
page read and write
10D0000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
19CA8848000
heap
page read and write
1D90C000
trusted library allocation
page execute and read and write
1C951000
heap
page read and write
408000
unkown
page readonly
19CA885B000
heap
page read and write
505000
heap
page read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
77EDB9B000
stack
page read and write
1C951000
heap
page read and write
1560000
trusted library allocation
page read and write
1DA1655B000
heap
page read and write
1DA15AB0000
heap
page read and write
19CA8800000
heap
page read and write
1550000
trusted library allocation
page read and write
1D8DA000
trusted library allocation
page execute and read and write
1C951000
heap
page read and write
1740000
trusted library section
page read and write
1C951000
heap
page read and write
1DA16415000
heap
page read and write
401000
unkown
page execute read
30000
heap
page read and write
1DA16574000
heap
page read and write
1C951000
heap
page read and write
1DA15A80000
heap
page read and write
1C951000
heap
page read and write
1DA15A9F000
heap
page read and write
15B4000
heap
page read and write
201CD000
stack
page read and write
1550000
trusted library allocation
page read and write
180D000
heap
page read and write
1720000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
194C000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
1DA15AB8000
heap
page read and write
1720000
trusted library allocation
page read and write
1A40000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1DA15A40000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1CD80000
heap
page read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1DA15AA7000
heap
page read and write
1DA15A83000
heap
page read and write
42C000
unkown
page read and write
1550000
trusted library allocation
page read and write
1A36000
trusted library allocation
page read and write
1C951000
heap
page read and write
1EB21000
trusted library allocation
page read and write
19CA887D000
heap
page read and write
1DA15B13000
heap
page read and write
1740000
trusted library allocation
page read and write
1DA15B02000
heap
page read and write
188B000
heap
page read and write
1C951000
heap
page read and write
46E0000
trusted library allocation
page read and write
400000
unkown
page readonly
1D886000
stack
page read and write
5B0000
heap
page read and write
11D0000
unclassified section
page readonly
1C951000
heap
page read and write
1730000
trusted library allocation
page read and write
1DA16270000
trusted library allocation
page read and write
6F420000
unkown
page readonly
11C0000
remote allocation
page read and write
1C951000
heap
page read and write
1DA15AB0000
heap
page read and write
244F000
stack
page read and write
5ECF7FC000
stack
page read and write
1720000
trusted library allocation
page read and write
1DA15A7E000
heap
page read and write
1170000
trusted library allocation
page execute and read and write
1DA15A13000
heap
page read and write
1555000
trusted library allocation
page read and write
1DA15A8F000
heap
page read and write
1D40F000
stack
page read and write
1C951000
heap
page read and write
B10000
heap
page read and write
40A000
unkown
page write copy
203CF000
stack
page read and write
1C951000
heap
page read and write
1DA15AB5000
heap
page read and write
11C0000
remote allocation
page read and write
1960000
trusted library allocation
page read and write
84E000
stack
page read and write
1720000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
580000
heap
page read and write
1DBE8000
trusted library allocation
page read and write
1C951000
heap
page read and write
1DAF0000
trusted library allocation
page execute and read and write
1750000
trusted library allocation
page read and write
1C951000
heap
page read and write
ACF000
stack
page read and write
1C951000
heap
page read and write
400000
unkown
page readonly
1730000
trusted library allocation
page read and write
580000
remote allocation
page read and write
40A000
unkown
page read and write
950000
trusted library allocation
page read and write
19CA8826000
heap
page read and write
1D8F6000
trusted library allocation
page execute and read and write
1900000
trusted library allocation
page read and write
1D8F2000
trusted library allocation
page read and write
400000
remote allocation
page read and write
19CA8867000
heap
page read and write
1C951000
heap
page read and write
1FE80000
heap
page read and write
1740000
trusted library allocation
page read and write
19CA8770000
heap
page read and write
1720000
trusted library allocation
page read and write
1EBA0000
trusted library allocation
page read and write
1D917000
trusted library allocation
page execute and read and write
19CA8869000
heap
page read and write
1DA16576000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
19CA8844000
heap
page read and write
1570000
trusted library allocation
page read and write
580000
remote allocation
page read and write
1C951000
heap
page read and write
1570000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1DA16402000
heap
page read and write
1C951000
heap
page read and write
1EB47000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1A30000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1555000
trusted library allocation
page read and write
1C951000
heap
page read and write
1DA1652D000
heap
page read and write
19A000
stack
page read and write
1570000
trusted library allocation
page read and write
1DA159A0000
unclassified section
page readonly
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1720000
trusted library allocation
page read and write
1C951000
heap
page read and write
4719000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
2470000
heap
page read and write
1DA16570000
heap
page read and write
1C951000
heap
page read and write
1FCBE000
stack
page read and write
1C951000
heap
page read and write
5ECF6FE000
stack
page read and write
5ECF679000
stack
page read and write
1DA1657C000
heap
page read and write
1CD86000
heap
page read and write
1DA16502000
heap
page read and write
1C951000
heap
page read and write
1DCED000
trusted library allocation
page read and write
1C951000
heap
page read and write
19CA883C000
heap
page read and write
1DA15A92000
heap
page read and write
1750000
trusted library allocation
page read and write
1C951000
heap
page read and write
15B0000
heap
page read and write
1EBD9000
trusted library allocation
page read and write
1D20E000
unkown
page read and write
1DA16400000
heap
page read and write
BA0000
heap
page read and write
336C000
stack
page read and write
B20000
heap
page read and write
1DB10000
heap
page read and write
1552000
trusted library allocation
page read and write
54E000
stack
page read and write
1DA15A7B000
heap
page read and write
1D8D2000
trusted library allocation
page execute and read and write
3270000
trusted library allocation
page read and write
1D8F0000
trusted library allocation
page read and write
1DA159B0000
heap
page read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
1727000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
5BC000
heap
page read and write
5D0000
heap
page read and write
1550000
trusted library allocation
page read and write
1D10B000
stack
page read and write
1DA1652C000
heap
page read and write
1510000
unclassified section
page readonly
1DA16576000
heap
page read and write
1DA15AA5000
heap
page read and write
1760000
trusted library allocation
page read and write
6F424000
unkown
page readonly
1910000
trusted library allocation
page read and write
1C951000
heap
page read and write
6F421000
unkown
page execute read
1850000
heap
page read and write
19CA886D000
heap
page read and write
1C951000
heap
page read and write
19CA8902000
heap
page read and write
1D960000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1980000
trusted library allocation
page read and write
19CA8864000
heap
page read and write
400000
remote allocation
page read and write
1DA15A8F000
heap
page read and write
500000
heap
page read and write
1DA16510000
heap
page read and write
400000
remote allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1DA158F0000
heap
page read and write
1C951000
heap
page read and write
1DA16529000
heap
page read and write
1A50000
trusted library allocation
page read and write
1DA16541000
heap
page read and write
1555000
trusted library allocation
page read and write
1DA15A7C000
heap
page read and write
2065E000
stack
page read and write
1720000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
27FE000
stack
page read and write
1DA16532000
heap
page read and write
1C951000
heap
page read and write
1FDC2000
trusted library allocation
page read and write
19CA8851000
heap
page read and write
1555000
trusted library allocation
page read and write
1DC5F000
trusted library allocation
page read and write
77EE17F000
stack
page read and write
1990000
trusted library allocation
page read and write
346D000
stack
page read and write
94F000
stack
page read and write
1550000
trusted library allocation
page read and write
1DC59000
trusted library allocation
page read and write
5ECF9FF000
stack
page read and write
1560000
trusted library allocation
page read and write
1C951000
heap
page read and write
17E6000
heap
page read and write
19CA8862000
heap
page read and write
1C951000
heap
page read and write
1D95E000
stack
page read and write
1550000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
1C951000
heap
page read and write
1572000
trusted library allocation
page read and write
1DA1652C000
heap
page read and write
4DE000
stack
page read and write
1C951000
heap
page read and write
1550000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
1C951000
heap
page read and write
1D91B000
trusted library allocation
page execute and read and write
1550000
trusted library allocation
page read and write
77EE37A000
stack
page read and write
1C951000
heap
page read and write
1570000
trusted library allocation
page read and write
1555000
trusted library allocation
page read and write
1540000
trusted library allocation
page execute and read and write
19A0000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
19CA8720000
heap
page read and write
17A0000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1DCF1000
trusted library allocation
page read and write
1DA1652A000
heap
page read and write
9CE000
stack
page read and write
1720000
trusted library allocation
page read and write
1DA16556000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
19CA87C0000
trusted library allocation
page read and write
1C951000
heap
page read and write
1C951000
heap
page read and write
401000
unkown
page execute read
1CB4E000
stack
page read and write
1C951000
heap
page read and write
19CA882A000
heap
page read and write
98000
stack
page read and write
28FF000
stack
page read and write
1DA8F000
stack
page read and write
1DA15A51000
heap
page read and write
1740000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
1804000
heap
page read and write
1722000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
5C2000
heap
page read and write
1DA15960000
heap
page read and write
2A40000
trusted library allocation
page read and write
There are 499 hidden memdumps, click here to show them.