IOC Report
SecuriteInfo.com.Trojan.Inject.11626.30754

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Inject.11626.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\CYKELPARKERINGENS.ini
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\GL-1.0.typelib
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\HERMAPHRODEITY.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ThrottlePlugin.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Waxiness.Sym
data
dropped
C:\Users\user\AppData\Local\Temp\applications-other.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\folder-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsaA34A.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\rt64win7.inf
Windows setup INFormation, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\user-not-tracked-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\video-joined-displays-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
malicious

URLs

Name
IP
Malicious
http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin1
malicious
http://creativecommons.org/ns#DerivativeWorks
unknown
http://creativecommons.org/ns#ShareAlike
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://creativecommons.org/ns#Distribution
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://creativecommons.org/ns#Notice
unknown
http://creativecommons.org/ns#Reproduction
unknown
http://creativecommons.org/ns#Attribution
unknown
http://creativecommons.org/ns#
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\medtag\Erethitic
enregistration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Bastille56\Skrivebordsskuffe50
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\reclothing\Taxifly
NDRAAB

Memdumps

Base Address
Regiontype
Protect
Malicious
3291000
direct allocation
page execute and read and write
malicious
A7A6BFC000
stack
page read and write
16E4AD90000
heap
page read and write
2738B7D1000
trusted library allocation
page read and write
73C000
heap
page read and write
20F89E29000
heap
page read and write
27390800000
trusted library allocation
page read and write
1CBF0033000
heap
page read and write
2738B0A0000
heap
page read and write
27390683000
heap
page read and write
5C304F7000
stack
page read and write
2738B918000
heap
page read and write
99000
stack
page read and write
273908C0000
remote allocation
page read and write
2738B08C000
heap
page read and write
14C2E265000
heap
page read and write
14C2E228000
heap
page read and write
14C2E0B0000
heap
page read and write
1CBF006B000
heap
page read and write
1A1F7300000
heap
page read and write
4B3F000
stack
page read and write
4F0A000
trusted library allocation
page read and write
27390590000
trusted library allocation
page read and write
424AB4E000
stack
page read and write
5D0000
trusted library allocation
page read and write
20F89E3C000
heap
page read and write
5C307FF000
stack
page read and write
1A1F6FD0000
heap
page read and write
1CBF003C000
heap
page read and write
AB0000
trusted library allocation
page read and write
273905A4000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
69FD6FE000
stack
page read and write
26B75866000
heap
page read and write
69FD17E000
stack
page read and write
25D8DD08000
heap
page read and write
734E4000
unkown
page readonly
2738B902000
heap
page read and write
949D0FC000
stack
page read and write
1CBF0590000
trusted library allocation
page read and write
273906DC000
heap
page read and write
2738B074000
heap
page read and write
747000
heap
page read and write
25D8DC4E000
heap
page read and write
90A457E000
stack
page read and write
273908C0000
remote allocation
page read and write
20F89E88000
heap
page read and write
16E4AE02000
heap
page read and write
27621050000
heap
page read and write
AD6000
heap
page read and write
27621200000
trusted library allocation
page read and write
786000
heap
page read and write
1CBF0102000
heap
page read and write
376B000
stack
page read and write
2380000
trusted library allocation
page read and write
273906DC000
heap
page read and write
25D8D9C0000
heap
page read and write
20F89F02000
heap
page read and write
A0BA2EC000
stack
page read and write
14C2E302000
heap
page read and write
4EEC000
trusted library allocation
page read and write
27621E20000
trusted library allocation
page read and write
90A47FF000
stack
page read and write
273905E0000
trusted library allocation
page read and write
20F89F13000
heap
page read and write
69FD2FF000
stack
page read and write
A0BAB7B000
stack
page read and write
27390440000
trusted library allocation
page read and write
26B758CE000
heap
page read and write
27390870000
trusted library allocation
page read and write
1A1F724D000
heap
page read and write
1CBF0076000
heap
page read and write
34F0000
heap
page read and write
A7A64FA000
stack
page read and write
27621170000
trusted library allocation
page read and write
27390890000
trusted library allocation
page read and write
1CBF0065000
heap
page read and write
25D8DC89000
heap
page read and write
14C2E202000
heap
page read and write
1A1F7255000
heap
page read and write
79F000
heap
page read and write
20F89F08000
heap
page read and write
273906E8000
heap
page read and write
14C2EA02000
trusted library allocation
page read and write
1CBF0059000
heap
page read and write
743000
heap
page read and write
2414000
heap
page read and write
79B000
heap
page read and write
1CBF006D000
heap
page read and write
995D87F000
stack
page read and write
6C8000
heap
page read and write
7A4000
heap
page read and write
2738B093000
heap
page read and write
4AFD07E000
stack
page read and write
26B75F32000
heap
page read and write
728000
heap
page read and write
790000
heap
page read and write
2738B7F0000
trusted library allocation
page read and write
728000
heap
page read and write
AD0000
heap
page read and write
27390648000
heap
page read and write
7A4000
heap
page read and write
5C305FF000
stack
page read and write
A7A65FF000
stack
page read and write
26B75868000
heap
page read and write
1A1F7040000
heap
page read and write
426000
unkown
page read and write
1CBEFE30000
heap
page read and write
949D2F9000
stack
page read and write
273905D0000
trusted library allocation
page read and write
273903C0000
trusted library allocation
page read and write
2738B959000
heap
page read and write
A7A62F7000
stack
page read and write
27621E10000
trusted library allocation
page read and write
1E912423000
heap
page read and write
20F89E5E000
heap
page read and write
1CBF0000000
heap
page read and write
6C0000
heap
page read and write
26B7586E000
heap
page read and write
25D8DC8C000
heap
page read and write
4F0A000
trusted library allocation
page read and write
2739063B000
heap
page read and write
2738B058000
heap
page read and write
73C000
heap
page read and write
949D279000
stack
page read and write
276210BE000
heap
page read and write
26B75913000
heap
page read and write
273906B5000
heap
page read and write
14C2E213000
heap
page read and write
4EFA000
trusted library allocation
page read and write
2B2F1FB000
stack
page read and write
2738B0AC000
heap
page read and write
728000
heap
page read and write
273906EA000
heap
page read and write
4B7E000
trusted library allocation
page read and write
2738B660000
trusted library allocation
page read and write
25D8DD00000
heap
page read and write
26B75829000
heap
page read and write
A7A63FA000
stack
page read and write
2738AF00000
heap
page read and write
790000
heap
page read and write
1CBF0080000
heap
page read and write
2738B013000
heap
page read and write
7A6000
heap
page read and write
995D37F000
stack
page read and write
69FD0FE000
stack
page read and write
25D8DC51000
heap
page read and write
424AACC000
stack
page read and write
27620EB0000
trusted library allocation
page read and write
20F89E59000
heap
page read and write
27621058000
heap
page read and write
2738B114000
heap
page read and write
A0BA97F000
stack
page read and write
20F89E78000
heap
page read and write
276211F9000
heap
page read and write
20F89E00000
heap
page read and write
452000
unkown
page readonly
26B755A0000
heap
page read and write
14C2E269000
heap
page read and write
1E912458000
heap
page read and write
1CBF0064000
heap
page read and write
1CBF004F000
heap
page read and write
746000
heap
page read and write
4AFD17F000
stack
page read and write
74B000
heap
page read and write
2738B900000
heap
page read and write
2762109C000
heap
page read and write
5040000
trusted library allocation
page read and write
20F89E83000
heap
page read and write
273905D0000
trusted library allocation
page read and write
1E912A90000
remote allocation
page read and write
2B2EABB000
stack
page read and write
14C2E27A000
heap
page read and write
349E000
stack
page read and write
26B75F00000
heap
page read and write
69FD5FF000
stack
page read and write
424AF7F000
stack
page read and write
2739069C000
heap
page read and write
14C2E255000
heap
page read and write
40A000
unkown
page read and write
20F89E13000
heap
page read and write
16E4AE41000
heap
page read and write
730000
heap
page read and write
1A1F7291000
heap
page read and write
25D8DC02000
heap
page read and write
4AFCE7D000
stack
page read and write
2738B918000
heap
page read and write
1E912402000
heap
page read and write
A6C000
stack
page read and write
26B757D0000
trusted library allocation
page read and write
4EF1000
trusted library allocation
page read and write
2738B7F3000
trusted library allocation
page read and write
26B7583E000
heap
page read and write
2738B095000
heap
page read and write
273909D0000
trusted library allocation
page read and write
726000
heap
page read and write
5940000
trusted library allocation
page read and write
1A1F7308000
heap
page read and write
20F89E78000
heap
page read and write
949CCBB000
stack
page read and write
25D8DA30000
heap
page read and write
424B27F000
stack
page read and write
27621E70000
trusted library allocation
page read and write
424ABCE000
stack
page read and write
1CBF0043000
heap
page read and write
25D8DC7D000
heap
page read and write
4AFCF7F000
stack
page read and write
995D2FE000
stack
page read and write
276210BB000
heap
page read and write
2739065E000
heap
page read and write
27390824000
trusted library allocation
page read and write
1CBF0061000
heap
page read and write
424B07E000
stack
page read and write
A0BAE7C000
stack
page read and write
1E912300000
heap
page read and write
26B75887000
heap
page read and write
5C3007B000
stack
page read and write
995D27C000
stack
page read and write
16E4AD80000
heap
page read and write
949D179000
stack
page read and write
995D77F000
stack
page read and write
435000
unkown
page read and write
20F89E58000
heap
page read and write
1CBF007C000
heap
page read and write
27621BB0000
trusted library allocation
page read and write
4AFCA7E000
stack
page read and write
5842000
trusted library allocation
page read and write
79B000
heap
page read and write
26B758C5000
heap
page read and write
285D000
stack
page read and write
610000
heap
page read and write
27390658000
heap
page read and write
2738B0A9000
heap
page read and write
27621180000
trusted library allocation
page read and write
20F8A602000
trusted library allocation
page read and write
273906AF000
heap
page read and write
2739069A000
heap
page read and write
7A3000
heap
page read and write
1CBF005B000
heap
page read and write
783000
heap
page read and write
40A000
unkown
page write copy
27390570000
trusted library allocation
page read and write
1CBEFDD0000
heap
page read and write
424B17F000
stack
page read and write
1A1F7249000
heap
page read and write
25D8DC00000
heap
page read and write
90A427E000
stack
page read and write
77D000
heap
page read and write
25D8DD13000
heap
page read and write
AA0000
trusted library allocation
page read and write
670000
heap
page read and write
A0BAAFD000
stack
page read and write
273905D0000
trusted library allocation
page read and write
273908A0000
trusted library allocation
page read and write
2762109C000
heap
page read and write
273906A7000
heap
page read and write
27390450000
trusted library allocation
page read and write
20F89E7D000
heap
page read and write
27621E70000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
27390590000
trusted library allocation
page read and write
20F89E8D000
heap
page read and write
2738AE90000
heap
page read and write
1CBF0086000
heap
page read and write
366C000
stack
page read and write
27390808000
trusted library allocation
page read and write
2738B102000
heap
page read and write
A0BAF7F000
stack
page read and write
5C306FC000
stack
page read and write
7A6000
heap
page read and write
27621099000
heap
page read and write
1E912A60000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
69FD3FC000
stack
page read and write
1A1F77A0000
trusted library allocation
page read and write
2738B05A000
heap
page read and write
1E91243D000
heap
page read and write
26B758BD000
heap
page read and write
276211F5000
heap
page read and write
73C000
heap
page read and write
742000
heap
page read and write
16E4B550000
trusted library allocation
page read and write
1E912502000
heap
page read and write
20F89E54000
heap
page read and write
400000
unkown
page readonly
1A1F7287000
heap
page read and write
1CBF007D000
heap
page read and write
2739060D000
heap
page read and write
1A1F7802000
trusted library allocation
page read and write
276211E0000
trusted library allocation
page read and write
743000
heap
page read and write
25D8DD02000
heap
page read and write
4AFCD7D000
stack
page read and write
A7A5F5F000
stack
page read and write
16E4ADF0000
heap
page read and write
26B75813000
heap
page read and write
20F89C10000
heap
page read and write
408000
unkown
page readonly
2738AEA0000
heap
page read and write
2738BF40000
trusted library allocation
page read and write
27620EA0000
heap
page read and write
20F89E5A000
heap
page read and write
30000
heap
page read and write
273906E2000
heap
page read and write
6FB000
heap
page read and write
4AFC97B000
stack
page read and write
14C2E040000
heap
page read and write
276210C5000
heap
page read and write
4B71000
trusted library allocation
page read and write
2739061D000
heap
page read and write
1CBF0066000
heap
page read and write
276210C5000
heap
page read and write
16E4AE3E000
heap
page read and write
5C302FF000
stack
page read and write
27390880000
trusted library allocation
page read and write
25D8DC13000
heap
page read and write
77C000
heap
page read and write
701000
heap
page read and write
1CBF003E000
heap
page read and write
734E1000
unkown
page execute read
25D8DC7E000
heap
page read and write
77C000
heap
page read and write
16E4B602000
trusted library allocation
page read and write
27390702000
heap
page read and write
783000
heap
page read and write
1CBF0025000
heap
page read and write
995D57B000
stack
page read and write
276210C7000
heap
page read and write
1A1F7313000
heap
page read and write
25D8DC2C000
heap
page read and write
20F89E5B000
heap
page read and write
1E912290000
heap
page read and write
27390821000
trusted library allocation
page read and write
25D8DC3C000
heap
page read and write
27390560000
trusted library allocation
page read and write
20F89C80000
heap
page read and write
1CBF0069000
heap
page read and write
79B000
heap
page read and write
781000
heap
page read and write
4B80000
trusted library allocation
page read and write
20F89F00000
heap
page read and write
401000
unkown
page execute read
1CBF005A000
heap
page read and write
2738B802000
heap
page read and write
72F000
heap
page read and write
26B75E02000
heap
page read and write
1CBF0063000
heap
page read and write
1CBF0058000
heap
page read and write
748000
heap
page read and write
2B2EFFB000
stack
page read and write
16E4AE13000
heap
page read and write
2738B815000
heap
page read and write
1E912429000
heap
page read and write
16E4AE29000
heap
page read and write
615000
heap
page read and write
750000
heap
page read and write
995D677000
stack
page read and write
90A3D8B000
stack
page read and write
79B000
heap
page read and write
79B000
heap
page read and write
14C2E050000
heap
page read and write
19A000
stack
page read and write
25D8DC71000
heap
page read and write
16E4AE00000
heap
page read and write
1CBF0042000
heap
page read and write
1A1F727C000
heap
page read and write
783000
heap
page read and write
27621E00000
heap
page readonly
20F89E61000
heap
page read and write
2738B0A0000
heap
page read and write
5C303FB000
stack
page read and write
27621180000
trusted library allocation
page read and write
1E912A90000
remote allocation
page read and write
26B75800000
heap
page read and write
273906B6000
heap
page read and write
A0BAD7E000
stack
page read and write
2738B079000
heap
page read and write
2738B06F000
heap
page read and write
90A467D000
stack
page read and write
1A1F726B000
heap
page read and write
5F0000
heap
page read and write
237F000
stack
page read and write
790000
heap
page read and write
90A44FE000
stack
page read and write
949D1FE000
stack
page read and write
1CBF0077000
heap
page read and write
1CBF005D000
heap
page read and write
25D8D9D0000
heap
page read and write
14C2E23C000
heap
page read and write
25D8DC50000
heap
page read and write
1CBF0013000
heap
page read and write
730000
heap
page read and write
5950000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
1E912413000
heap
page read and write
A7A5EDB000
stack
page read and write
25D8E190000
trusted library allocation
page read and write
25D8DC4C000
heap
page read and write
90A42FC000
stack
page read and write
26B758E1000
heap
page read and write
7A6000
heap
page read and write
4F0C000
trusted library allocation
page read and write
2738C3C0000
trusted library allocation
page read and write
2739080E000
trusted library allocation
page read and write
27621DF0000
trusted library allocation
page read and write
1E912C02000
trusted library allocation
page read and write
4AFC51B000
stack
page read and write
4F12000
trusted library allocation
page read and write
2762109E000
heap
page read and write
452000
unkown
page readonly
1CBF006F000
heap
page read and write
A7A66FB000
stack
page read and write
34B0000
heap
page read and write
2762109C000
heap
page read and write
27390600000
heap
page read and write
739000
heap
page read and write
A0BAC7C000
stack
page read and write
1CBEFDC0000
heap
page read and write
1A1F7200000
heap
page read and write
16E4AF02000
heap
page read and write
705000
heap
page read and write
27390570000
trusted library allocation
page read and write
69FD4F7000
stack
page read and write
273908C0000
remote allocation
page read and write
276210BB000
heap
page read and write
5C3017E000
stack
page read and write
273905A0000
trusted library allocation
page read and write
400000
unkown
page readonly
1E9122A0000
heap
page read and write
276210C7000
heap
page read and write
74B000
heap
page read and write
747000
heap
page read and write
779000
heap
page read and write
A0BA6FE000
stack
page read and write
1A1F7229000
heap
page read and write
2B2F0FB000
stack
page read and write
1A1F728B000
heap
page read and write
16E4AE65000
heap
page read and write
27620FE0000
heap
page read and write
A0BA9FC000
stack
page read and write
2738B904000
heap
page read and write
1CBF0045000
heap
page read and write
1CBF0079000
heap
page read and write
73C000
heap
page read and write
1A1F723C000
heap
page read and write
2738B102000
heap
page read and write
2738B029000
heap
page read and write
27390560000
trusted library allocation
page read and write
4AFD27F000
stack
page read and write
1E912400000
heap
page read and write
74B000
heap
page read and write
1CBF0041000
heap
page read and write
2B2F2FE000
stack
page read and write
273909B0000
trusted library allocation
page read and write
2738B000000
heap
page read and write
4EFA000
trusted library allocation
page read and write
4EF1000
trusted library allocation
page read and write
79B000
heap
page read and write
7A4000
heap
page read and write
1CBF0060000
heap
page read and write
16E4AF13000
heap
page read and write
14C2E313000
heap
page read and write
73C000
heap
page read and write
2738B03E000
heap
page read and write
1A1F6FE0000
heap
page read and write
14C2E1B0000
trusted library allocation
page read and write
408000
unkown
page readonly
20F89E5D000
heap
page read and write
276210C5000
heap
page read and write
16E4AE5B000
heap
page read and write
1A1F7213000
heap
page read and write
20F89D80000
trusted library allocation
page read and write
2739065B000
heap
page read and write
276211F0000
heap
page read and write
14C2E300000
heap
page read and write
20F89C20000
heap
page read and write
2738B0FD000
heap
page read and write
2738B0FD000
heap
page read and write
26B75600000
heap
page read and write
2869000
trusted library allocation
page read and write
26B75590000
heap
page read and write
7A6000
heap
page read and write
25D8E202000
trusted library allocation
page read and write
5C3027B000
stack
page read and write
5C300FE000
stack
page read and write
4B70000
trusted library allocation
page read and write
A0BA8FC000
stack
page read and write
1E912A90000
remote allocation
page read and write
1CBF0602000
trusted library allocation
page read and write
1CBF0046000
heap
page read and write
A7A6DFF000
stack
page read and write
273906FD000
heap
page read and write
73C000
heap
page read and write
594E000
trusted library allocation
page read and write
25D8DC29000
heap
page read and write
A7A6AFB000
stack
page read and write
1A1F724F000
heap
page read and write
9FE000
stack
page read and write
276210C5000
heap
page read and write
16E4AE75000
heap
page read and write
16E4AE71000
heap
page read and write
273903D0000
trusted library allocation
page read and write
20F89E02000
heap
page read and write
4EE0000
trusted library allocation
page read and write
69FD07B000
stack
page read and write
73A000
heap
page read and write
2738B107000
heap
page read and write
20F89E5F000
heap
page read and write
730000
heap
page read and write
4AFD37F000
stack
page read and write
401000
unkown
page execute read
1A1F7302000
heap
page read and write
1CBF0062000
heap
page read and write
2410000
heap
page read and write
734E0000
unkown
page readonly
713000
heap
page read and write
4B80000
trusted library allocation
page read and write
4EED000
trusted library allocation
page read and write
2738B800000
heap
page read and write
7A4000
heap
page read and write
14C2E200000
heap
page read and write
27621000000
heap
page read and write
4AFCB7D000
stack
page read and write
2738B913000
heap
page read and write
1CBF0029000
heap
page read and write
734E6000
unkown
page readonly
7A4000
heap
page read and write
1CBF0048000
heap
page read and write
273906FF000
heap
page read and write
2739062B000
heap
page read and write
2738B08E000
heap
page read and write
1A1F727D000
heap
page read and write
26B75902000
heap
page read and write
2738B958000
heap
page read and write
25D8DC53000
heap
page read and write
1CBF0047000
heap
page read and write
20F89E49000
heap
page read and write
782000
heap
page read and write
There are 529 hidden memdumps, click here to show them.