IOC Report
SecuriteInfo.com.generic.ml.22865.12721

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.generic.ml.22865.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ArtDeco_green_6.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\MpCommu.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\OLIGOCARPOUS.SNO
data
dropped
C:\Users\user\AppData\Local\Temp\SourceCodePro-Black.otf
OpenType font data
dropped
C:\Users\user\AppData\Local\Temp\analysekapitlet.ini
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\applications-system.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\lang-1034.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libfreetype-6.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libpcre-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\lilas.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\microphone-hardware-disabled-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\multimedia-player-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\network-server.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsh9F2D.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\task-past-due.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe
"C:\Users\user\Desktop\SecuriteInfo.com.generic.ml.22865.exe"
malicious

URLs

Name
IP
Malicious
http://www.fides-kenya.com/yem/wam.bin
malicious
http://www.avast.com0/
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://scripts.sil.org/OFLSource
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordDigest
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\spndingsfejlen
INTWISTING
HKEY_LOCAL_MACHINE\SOFTWARE\Klarings\DIALEKTEN
Ratifikationsdokumenternes159
HKEY_CURRENT_USER\Software\Knscellens122\tabulr
Expand String Value
HKEY_CURRENT_USER\Software\Struldbruggism\Redbook227
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\Klinken\Supervision
faststtende

Memdumps

Base Address
Regiontype
Protect
Malicious
3200000
direct allocation
page execute and read and write
malicious
14CA4790000
trusted library allocation
page read and write
22EF4700000
heap
page read and write
45946FE000
stack
page read and write
2879D829000
heap
page read and write
24476029000
heap
page read and write
24476E02000
heap
page read and write
17F27413000
heap
page read and write
22EF4628000
heap
page read and write
287A32B0000
trusted library allocation
page read and write
4E63D79000
stack
page read and write
2879D902000
heap
page read and write
287A3051000
heap
page read and write
24476998000
heap
page read and write
14CA3904000
heap
page read and write
2879D8B2000
heap
page read and write
24475FF0000
remote allocation
page read and write
2879D8A5000
heap
page read and write
22C4000
heap
page read and write
3130000
trusted library allocation
page read and write
24476900000
heap
page read and write
22EF4613000
heap
page read and write
24476913000
heap
page read and write
2447699A000
heap
page read and write
2879E200000
heap
page read and write
400000
unkown
page readonly
225F000
stack
page read and write
1D073E02000
trusted library allocation
page read and write
161EDD45000
heap
page read and write
287A2FC0000
trusted library allocation
page read and write
1D073502000
heap
page read and write
408000
unkown
page readonly
24476996000
heap
page read and write
75022F7000
stack
page read and write
75020FE000
stack
page read and write
1D073449000
heap
page read and write
244760B0000
heap
page read and write
22EF4602000
heap
page read and write
24476981000
heap
page read and write
52337D000
stack
page read and write
287A3260000
trusted library allocation
page read and write
244769BD000
heap
page read and write
ABB69FB000
stack
page read and write
990000
heap
page read and write
14CA3850000
trusted library allocation
page read and write
2879E300000
heap
page read and write
2879D88E000
heap
page read and write
244769BE000
heap
page read and write
287A2DF0000
trusted library allocation
page read and write
14CA38A8000
heap
page read and write
24476013000
heap
page read and write
ABB6B7E000
stack
page read and write
244769AB000
heap
page read and write
24476E00000
heap
page read and write
17F2747F000
heap
page read and write
ABB67FB000
stack
page read and write
2447693D000
heap
page read and write
14CA37C0000
heap
page read and write
2A14A013000
heap
page read and write
287A32F0000
remote allocation
page read and write
287A3085000
heap
page read and write
287A32D0000
trusted library allocation
page read and write
17F27BC0000
trusted library allocation
page read and write
161EE055000
heap
page read and write
2879D873000
heap
page read and write
2879D913000
heap
page read and write
287A3104000
heap
page read and write
4E639CA000
stack
page read and write
400000
unkown
page readonly
2447699D000
heap
page read and write
2879D800000
heap
page read and write
161EDD2E000
heap
page read and write
2879E359000
heap
page read and write
24475E20000
heap
page read and write
161EDD23000
heap
page read and write
2447608A000
heap
page read and write
1D073500000
heap
page read and write
24476E02000
heap
page read and write
2A14A04D000
heap
page read and write
17F27400000
heap
page read and write
99000
stack
page read and write
161EDCB0000
heap
page read and write
24476996000
heap
page read and write
2A14A04F000
heap
page read and write
17F2745C000
heap
page read and write
287A3000000
heap
page read and write
2879D813000
heap
page read and write
14CA38FC000
heap
page read and write
22EF4E02000
trusted library allocation
page read and write
24476911000
heap
page read and write
2879E313000
heap
page read and write
244760EC000
heap
page read and write
2A14A068000
heap
page read and write
435000
unkown
page read and write
2A149FE0000
trusted library allocation
page read and write
639000
heap
page read and write
22EF4663000
heap
page read and write
45948FF000
stack
page read and write
732D0000
unkown
page readonly
1D073360000
heap
page read and write
287A3100000
heap
page read and write
14CA3B50000
heap
page readonly
22EF4702000
heap
page read and write
287A2E80000
trusted library allocation
page read and write
1D07347B000
heap
page read and write
920000
heap
page read and write
2879D898000
heap
page read and write
427000
unkown
page read and write
244760DA000
heap
page read and write
244769CF000
heap
page read and write
2447696E000
heap
page read and write
287A30E3000
heap
page read and write
D2FAEFF000
stack
page read and write
628000
heap
page read and write
22EF4420000
heap
page read and write
463000
unkown
page readonly
161EDD16000
heap
page read and write
161EDD3E000
heap
page read and write
287A3022000
heap
page read and write
4E63EFC000
stack
page read and write
14CA3B79000
heap
page read and write
22EF466F000
heap
page read and write
4594AF7000
stack
page read and write
24476116000
heap
page read and write
732D6000
unkown
page readonly
1D073450000
heap
page read and write
287A3063000
heap
page read and write
633000
heap
page read and write
287A30F0000
trusted library allocation
page read and write
522A9B000
stack
page read and write
1D073413000
heap
page read and write
287A2F90000
trusted library allocation
page read and write
2A14A047000
heap
page read and write
2447698F000
heap
page read and write
244760C5000
heap
page read and write
75025F8000
stack
page read and write
22EF4713000
heap
page read and write
2879E940000
trusted library allocation
page read and write
459487B000
stack
page read and write
2879E1A0000
trusted library section
page read and write
2879EA70000
trusted library section
page readonly
19A000
stack
page read and write
14CA3690000
trusted library allocation
page read and write
1D07344D000
heap
page read and write
2A14A108000
heap
page read and write
161EDD17000
heap
page read and write
2A14A04C000
heap
page read and write
17F27513000
heap
page read and write
ABB6FFA000
stack
page read and write
1D073370000
heap
page read and write
24476102000
heap
page read and write
2A14A000000
heap
page read and write
24476E02000
heap
page read and write
D2FADFE000
stack
page read and write
2A14A102000
heap
page read and write
97E000
stack
page read and write
2A14A029000
heap
page read and write
14CA38A0000
heap
page read and write
D2FA6BB000
stack
page read and write
2A14A113000
heap
page read and write
287A3083000
heap
page read and write
2A149FB0000
heap
page read and write
14CA38E9000
heap
page read and write
14CA37E0000
heap
page read and write
22EF4640000
heap
page read and write
1D073513000
heap
page read and write
17F27460000
heap
page read and write
24476051000
heap
page read and write
1D0733D0000
heap
page read and write
244769A8000
heap
page read and write
161EDD31000
heap
page read and write
287A30FC000
heap
page read and write
2447604B000
heap
page read and write
750267E000
unkown
page read and write
2879D86E000
heap
page read and write
274F000
stack
page read and write
30000
heap
page read and write
2879D900000
heap
page read and write
161EDC30000
heap
page read and write
2A14A04B000
heap
page read and write
287A2F98000
trusted library allocation
page read and write
2879D7F0000
heap
page read and write
2879D877000
heap
page read and write
1D073429000
heap
page read and write
24476047000
heap
page read and write
24476056000
heap
page read and write
14CA4530000
trusted library allocation
page read and write
523177000
stack
page read and write
24476113000
heap
page read and write
4E0000
heap
page read and write
161EDD31000
heap
page read and write
461EDF9000
stack
page read and write
24476996000
heap
page read and write
1D073508000
heap
page read and write
244769CF000
heap
page read and write
161EDD25000
heap
page read and write
2879D925000
heap
page read and write
40A000
unkown
page write copy
161EDD3E000
heap
page read and write
4594BFE000
stack
page read and write
5E0000
heap
page read and write
2447694D000
heap
page read and write
812787B000
stack
page read and write
17F2748E000
heap
page read and write
2879D780000
heap
page read and write
14CA3B75000
heap
page read and write
287A302E000
heap
page read and write
287A30DE000
heap
page read and write
4E63CFF000
stack
page read and write
ABB6EFF000
stack
page read and write
2447605A000
heap
page read and write
ABB6BFF000
stack
page read and write
14CA3904000
heap
page read and write
7501EFE000
stack
page read and write
2879D83D000
heap
page read and write
61F000
heap
page read and write
2879E401000
trusted library allocation
page read and write
9B6000
heap
page read and write
17F27502000
heap
page read and write
2447606A000
heap
page read and write
24476E03000
heap
page read and write
24476049000
heap
page read and write
287A32A0000
trusted library allocation
page read and write
161EE050000
heap
page read and write
287A2FB0000
trusted library allocation
page read and write
287A2FD4000
trusted library allocation
page read and write
287A32C0000
trusted library allocation
page read and write
24475E80000
heap
page read and write
750207C000
stack
page read and write
1D073470000
heap
page read and write
161EDD00000
heap
page read and write
1D073C70000
trusted library allocation
page read and write
287A3106000
heap
page read and write
812797E000
stack
page read and write
24475FF0000
remote allocation
page read and write
461EC79000
stack
page read and write
732D4000
unkown
page readonly
161EDD2E000
heap
page read and write
161EDC90000
heap
page read and write
24476054000
heap
page read and write
1D073486000
heap
page read and write
2A149F40000
heap
page read and write
7501F7E000
stack
page read and write
522B9E000
stack
page read and write
244769AB000
heap
page read and write
287A30F0000
heap
page read and write
624000
heap
page read and write
287A3057000
heap
page read and write
24476048000
heap
page read and write
24476108000
heap
page read and write
17F272C0000
heap
page read and write
D2FAAFC000
stack
page read and write
14CA3890000
trusted library allocation
page read and write
2447699E000
heap
page read and write
287A2FB1000
trusted library allocation
page read and write
401000
unkown
page execute read
812777F000
stack
page read and write
411000
unkown
page read and write
287A32F0000
remote allocation
page read and write
17F27C02000
trusted library allocation
page read and write
2750000
heap
page read and write
2447605B000
heap
page read and write
14CA38F1000
heap
page read and write
2879E359000
heap
page read and write
244769B7000
heap
page read and write
2879EDF0000
trusted library allocation
page read and write
459467B000
stack
page read and write
461ED7E000
stack
page read and write
2879D891000
heap
page read and write
14CA3860000
trusted library allocation
page read and write
264E000
stack
page read and write
2A14AA02000
trusted library allocation
page read and write
2879E318000
heap
page read and write
52307B000
stack
page read and write
24476970000
heap
page read and write
244760F3000
heap
page read and write
2A14A100000
heap
page read and write
244769B9000
heap
page read and write
2879EA30000
trusted library section
page readonly
287A2F9E000
trusted library allocation
page read and write
17F27320000
heap
page read and write
ABB66FA000
stack
page read and write
24476802000
heap
page read and write
4594CFF000
stack
page read and write
244760A9000
heap
page read and write
732D1000
unkown
page execute read
287A2FC0000
trusted library allocation
page read and write
D2FA73F000
stack
page read and write
812710C000
stack
page read and write
2447603C000
heap
page read and write
370D000
stack
page read and write
ABB6C7F000
stack
page read and write
1D073453000
heap
page read and write
287A2E70000
trusted library allocation
page read and write
D2FA7BF000
stack
page read and write
1D073400000
heap
page read and write
24476E02000
heap
page read and write
161EDD3E000
heap
page read and write
14CA3B80000
trusted library allocation
page read and write
ABB6D7E000
stack
page read and write
2A14A088000
heap
page read and write
161EDD0B000
heap
page read and write
17F2745E000
heap
page read and write
522F7F000
stack
page read and write
22EF4600000
heap
page read and write
422000
unkown
page read and write
17F27500000
heap
page read and write
14CA3910000
heap
page read and write
2879D790000
heap
page read and write
17F2748B000
heap
page read and write
287A2F90000
trusted library allocation
page read and write
ABB71FF000
stack
page read and write
2447698C000
heap
page read and write
2447604C000
heap
page read and write
24475F80000
trusted library allocation
page read and write
287A30A1000
heap
page read and write
22EF4658000
heap
page read and write
17F272B0000
heap
page read and write
2447604D000
heap
page read and write
24475E10000
heap
page read and write
4E63C7F000
stack
page read and write
2879EDE0000
trusted library allocation
page read and write
244769A2000
heap
page read and write
2447698C000
heap
page read and write
287A2FB4000
trusted library allocation
page read and write
285C000
trusted library allocation
page read and write
2447604F000
heap
page read and write
461ECFF000
stack
page read and write
287A3106000
heap
page read and write
14CA3870000
trusted library allocation
page read and write
2879EA50000
trusted library section
page readonly
161EDD27000
heap
page read and write
2A149F50000
heap
page read and write
287A30E0000
trusted library allocation
page read and write
463000
unkown
page readonly
17F27425000
heap
page read and write
1D07343C000
heap
page read and write
812767B000
stack
page read and write
287A30FE000
heap
page read and write
2879EDC1000
trusted library allocation
page read and write
14CA38F1000
heap
page read and write
14CA38C4000
heap
page read and write
2A14A03C000
heap
page read and write
ABB68FF000
stack
page read and write
161EDD28000
heap
page read and write
40A000
unkown
page read and write
2879EA20000
trusted library section
page readonly
2A14A08E000
heap
page read and write
14CA38FD000
heap
page read and write
287A3102000
heap
page read and write
17F2745A000
heap
page read and write
24476996000
heap
page read and write
2A14A046000
heap
page read and write
461E8AB000
stack
page read and write
161EDD31000
heap
page read and write
2879EDE3000
trusted library allocation
page read and write
244760E1000
heap
page read and write
75024F8000
stack
page read and write
14CA3B60000
trusted library allocation
page read and write
287A32F0000
remote allocation
page read and write
52327F000
stack
page read and write
244760B3000
heap
page read and write
60F000
heap
page read and write
22EF4480000
heap
page read and write
2879E090000
trusted library allocation
page read and write
22EF4410000
heap
page read and write
287A30A4000
heap
page read and write
24476085000
heap
page read and write
D2FABFB000
stack
page read and write
7501E7B000
stack
page read and write
14CA390B000
heap
page read and write
287A2E00000
trusted library allocation
page read and write
14CA3680000
heap
page read and write
244769B7000
heap
page read and write
14CA4740000
trusted library allocation
page read and write
4E5000
heap
page read and write
2A14A065000
heap
page read and write
161EDD42000
heap
page read and write
24476E20000
heap
page read and write
2879E318000
heap
page read and write
1D073448000
heap
page read and write
2879EA60000
trusted library section
page readonly
5E8000
heap
page read and write
244760A2000
heap
page read and write
D2FACF7000
stack
page read and write
287A30F4000
heap
page read and write
24476987000
heap
page read and write
4E63DF8000
stack
page read and write
2879E215000
heap
page read and write
161EDD12000
heap
page read and write
75021F7000
stack
page read and write
17F27508000
heap
page read and write
2A14A07D000
heap
page read and write
161EDD47000
heap
page read and write
2A1C000
trusted library allocation
page read and write
17F27458000
heap
page read and write
17F2743C000
heap
page read and write
ABB6CFF000
stack
page read and write
2879E302000
heap
page read and write
287A30EE000
heap
page read and write
14CA38F1000
heap
page read and write
4E63E7E000
stack
page read and write
24476996000
heap
page read and write
459477E000
stack
page read and write
3140000
trusted library allocation
page read and write
244769BD000
heap
page read and write
522B1E000
stack
page read and write
161EDD43000
heap
page read and write
ABB61EC000
stack
page read and write
24476E02000
heap
page read and write
1D073421000
heap
page read and write
17F27402000
heap
page read and write
24476000000
heap
page read and write
287A3044000
heap
page read and write
4C0000
trusted library allocation
page read and write
401000
unkown
page execute read
22C0000
heap
page read and write
14CA3B70000
heap
page read and write
14CA3910000
heap
page read and write
17F27454000
heap
page read and write
2879D858000
heap
page read and write
24475FF0000
remote allocation
page read and write
161EDD2E000
heap
page read and write
ABB6E79000
stack
page read and write
ABB6AFB000
stack
page read and write
3150000
trusted library allocation
page read and write
522EFB000
stack
page read and write
75023FF000
stack
page read and write
244760C0000
heap
page read and write
2447698F000
heap
page read and write
287A3095000
heap
page read and write
45949FB000
stack
page read and write
287A2FD0000
trusted library allocation
page read and write
ABB65F7000
stack
page read and write
2879EA40000
trusted library section
page readonly
22EF4580000
trusted library allocation
page read and write
2879D893000
heap
page read and write
17F27429000
heap
page read and write
9B0000
heap
page read and write
287A30FC000
heap
page read and write
2879E202000
heap
page read and write
380A000
stack
page read and write
408000
unkown
page readonly
There are 433 hidden memdumps, click here to show them.