IOC Report
SC_TR11670000.exe

loading gif

Files

File Path
Type
Category
Malicious
SC_TR11670000.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\Krugerite.Fri
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Kontos.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsu27C9.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Brandmurens\Antirevolutionist\Nitrosobacterium\Eliksirens\dotnet.api
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Brandmurens\Antirevolutionist\Nitrosobacterium\Eliksirens\ebook-reader.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Brandmurens\Antirevolutionist\Nitrosobacterium\Eliksirens\emblem-photos-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Brandmurens\Antirevolutionist\Nitrosobacterium\Eliksirens\font-select-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Brandmurens\Antirevolutionist\Nitrosobacterium\Eliksirens\network-wired-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Brandmurens\Antirevolutionist\Nitrosobacterium\Eliksirens\pan-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Fadernes\Amphiaster213\printer-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\AEGISIIIRadeonHelper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\Cementblander.Pfe
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\LogoCanary.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\avatar-default-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\be.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Lejningerne\changes-allow-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Preconstituent\Uforsonligere\Informationssystemernes\pt-br.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SC_TR11670000.exe
C:\Users\user\Desktop\SC_TR11670000.exe
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Shabbyish\Retablerings
Aphetism

Memdumps

Base Address
Regiontype
Protect
Malicious
32D0000
direct allocation
page execute and read and write
malicious
32DF000
heap
page read and write
malicious
3DCA000
direct allocation
page execute and read and write
malicious
530000
heap
page read and write
32D0000
trusted library allocation
page read and write
2849000
heap
page read and write
72EC0000
unkown
page readonly
9010000
trusted library allocation
page read and write
30000
heap
page read and write
32D0000
trusted library allocation
page read and write
2220000
heap
page read and write
407000
unkown
page readonly
2840000
trusted library allocation
page read and write
284B000
heap
page read and write
20A0000
heap
page read and write
57E000
heap
page read and write
32DF000
heap
page read and write
83CA000
direct allocation
page execute and read and write
4E5000
heap
page read and write
567000
heap
page read and write
65CA000
direct allocation
page execute and read and write
32D0000
trusted library allocation
page read and write
21C0000
heap
page read and write
2844000
heap
page read and write
429000
unkown
page read and write
43F000
unkown
page readonly
409000
unkown
page write copy
401000
unkown
page execute read
33CA000
direct allocation
page execute and read and write
32DF000
heap
page read and write
47CA000
direct allocation
page execute and read and write
43A000
unkown
page readonly
436000
unkown
page readonly
400000
unkown
page readonly
283F000
stack
page read and write
5BCA000
direct allocation
page execute and read and write
2845000
heap
page read and write
490000
heap
page read and write
43F000
unkown
page readonly
72EC3000
unkown
page readonly
284D000
heap
page read and write
409000
unkown
page read and write
43A000
unkown
page readonly
72EC1000
unkown
page execute read
51CA000
direct allocation
page execute and read and write
433000
unkown
page read and write
32D0000
trusted library allocation
page read and write
424000
unkown
page read and write
401000
unkown
page execute read
407000
unkown
page readonly
213E000
stack
page read and write
19A000
stack
page read and write
2250000
heap
page read and write
2256000
heap
page read and write
97000
stack
page read and write
235F000
stack
page read and write
23F4000
heap
page read and write
537000
heap
page read and write
8DCA000
direct allocation
page execute and read and write
2840000
heap
page read and write
571000
heap
page read and write
400000
unkown
page readonly
32DF000
heap
page read and write
2210000
heap
page read and write
6FCA000
direct allocation
page execute and read and write
2848000
heap
page read and write
2841000
heap
page read and write
72EC5000
unkown
page readonly
79CA000
direct allocation
page execute and read and write
9010000
trusted library allocation
page read and write
436000
unkown
page readonly
421000
unkown
page read and write
20FE000
stack
page read and write
4E0000
heap
page read and write
2840000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
23F0000
heap
page read and write
There are 67 hidden memdumps, click here to show them.