IOC Report
HfJLn9erXb.exe

loading gif

Files

File Path
Type
Category
Malicious
HfJLn9erXb.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Kontos.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nspE6C8.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\Profetiske.Byg
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\Sankekort.Sch209
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Hjtideligholdelser\Liechtensteiner\Systemopstninger\pan-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Hjtideligholdelser\Liechtensteiner\Systemopstninger\printer-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Idolatrous\Kaes\pt-br.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Ravingly\Magnetoplasmadynamics\godsvognen\avatar-default-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\be.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\changes-allow-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\dotnet.api
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\ebook-reader.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\emblem-photos-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\font-select-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\network-wired-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Unrivalled\Nonexhaustively\Snaffle\Stealthful\LogoCanary.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HfJLn9erXb.exe
C:\Users\user\Desktop\HfJLn9erXb.exe
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Shabbyish\Retablerings
Aphetism

Memdumps

Base Address
Regiontype
Protect
Malicious
3AEC000
direct allocation
page execute and read and write
malicious
421000
unkown
page read and write
E2D812B000
stack
page read and write
1ECEB602000
trusted library allocation
page read and write
1ECEAE63000
heap
page read and write
1C48E560000
heap
page read and write
1A829C28000
heap
page read and write
43A000
unkown
page readonly
2AED9E00000
heap
page read and write
1ECEAE57000
heap
page read and write
22AEE4E2000
heap
page read and write
72FB3000
unkown
page readonly
1EE4E8A0000
trusted library allocation
page read and write
1ECEAE3D000
heap
page read and write
1EE4DA10000
heap
page read and write
1C48E550000
heap
page read and write
44EC000
direct allocation
page execute and read and write
1A829D13000
heap
page read and write
2760000
trusted library allocation
page read and write
1ECEAE62000
heap
page read and write
1ECEAE6A000
heap
page read and write
1C48E602000
heap
page read and write
1EE4DC90000
heap
page read and write
436000
unkown
page readonly
2AEDA480000
remote allocation
page read and write
22AEEB12000
heap
page read and write
276A000
heap
page read and write
25907F000
stack
page read and write
22AEE48A000
heap
page read and write
2760000
heap
page read and write
186F7FE0000
trusted library allocation
page read and write
2314000
heap
page read and write
22AEEA02000
heap
page read and write
2DFC27E000
stack
page read and write
1C48EE02000
trusted library allocation
page read and write
27B297E000
stack
page read and write
6C5000
heap
page read and write
258E7C000
stack
page read and write
2AEDA480000
remote allocation
page read and write
2DFBF7B000
stack
page read and write
E2D8579000
stack
page read and write
20A0000
heap
page read and write
258C7F000
stack
page read and write
186F809A000
heap
page read and write
407000
unkown
page readonly
18E9A65B000
heap
page read and write
2767000
heap
page read and write
186F8000000
heap
page read and write
186F809A000
heap
page read and write
22AEE400000
heap
page read and write
2CDA4FD000
stack
page read and write
258A7E000
stack
page read and write
1ECEAE4E000
heap
page read and write
1EE4DA68000
heap
page read and write
18E9A4C0000
heap
page read and write
2760000
trusted library allocation
page read and write
2DFBC7C000
stack
page read and write
1EE4D8D0000
heap
page read and write
1ECEAE59000
heap
page read and write
1C48E5C0000
heap
page read and write
1ECEAE84000
heap
page read and write
2588FC000
stack
page read and write
1ECEAE61000
heap
page read and write
186F80E9000
heap
page read and write
409000
unkown
page write copy
C745EFD000
stack
page read and write
22AEE190000
heap
page read and write
E2D86FF000
stack
page read and write
2CDA3FF000
stack
page read and write
186F9C40000
trusted library allocation
page read and write
1ECEAE7B000
heap
page read and write
400000
unkown
page readonly
27B2D7F000
stack
page read and write
B2A8DFE000
stack
page read and write
27B28FB000
stack
page read and write
1ECEAE42000
heap
page read and write
1ECEAE64000
heap
page read and write
400000
unkown
page readonly
697000
heap
page read and write
1ECEAE65000
heap
page read and write
1EE4DACC000
heap
page read and write
B2A8CFB000
stack
page read and write
186F8058000
heap
page read and write
186F99D0000
remote allocation
page read and write
2760000
trusted library allocation
page read and write
1ECEAE74000
heap
page read and write
1ECEAE45000
heap
page read and write
25849C000
stack
page read and write
18E9A613000
heap
page read and write
1EE4DAAE000
heap
page read and write
22AEE429000
heap
page read and write
401000
unkown
page execute read
1A829D00000
heap
page read and write
1C48E653000
heap
page read and write
2CDA97E000
stack
page read and write
B2A917E000
stack
page read and write
1C48E63C000
heap
page read and write
1ECEABE0000
heap
page read and write
1EE4E830000
heap
page readonly
1ECEAF02000
heap
page read and write
22AEE4C9000
heap
page read and write
1EE4E840000
trusted library allocation
page read and write
1C48E62C000
heap
page read and write
22AEE423000
heap
page read and write
1C48E658000
heap
page read and write
1ECEAE5C000
heap
page read and write
27B27FE000
stack
page read and write
1ECEAE7E000
heap
page read and write
22AEE200000
heap
page read and write
22AF000
stack
page read and write
41E767D000
stack
page read and write
43A000
unkown
page readonly
1A829C7B000
heap
page read and write
22AEE502000
heap
page read and write
1ECEAE24000
heap
page read and write
72FB5000
unkown
page readonly
186F99A0000
trusted library allocation
page read and write
2AED9E58000
heap
page read and write
22AEE513000
heap
page read and write
1ECEAE58000
heap
page read and write
1ECEAE68000
heap
page read and write
2CDA2FB000
stack
page read and write
186F99D0000
remote allocation
page read and write
27B267F000
stack
page read and write
27B2A7A000
stack
page read and write
18E9A702000
heap
page read and write
1C48E649000
heap
page read and write
2760000
heap
page read and write
409000
unkown
page read and write
1C48E5F0000
trusted library allocation
page read and write
22AEE43E000
heap
page read and write
186F7EE0000
heap
page read and write
1A829A20000
heap
page read and write
186F8013000
heap
page read and write
C745B7E000
stack
page read and write
2AED9E3D000
heap
page read and write
30000
heap
page read and write
2760000
trusted library allocation
page read and write
1EE4DC95000
heap
page read and write
1A829BF0000
trusted library allocation
page read and write
2767000
heap
page read and write
22AEEB00000
heap
page read and write
1A829C00000
heap
page read and write
C74587B000
stack
page read and write
1A82A202000
trusted library allocation
page read and write
186F9A02000
trusted library allocation
page read and write
186F80CB000
heap
page read and write
2AED9E23000
heap
page read and write
1C48E643000
heap
page read and write
6DF000
heap
page read and write
1EE4E850000
trusted library allocation
page read and write
2CDA07F000
stack
page read and write
1EE4DA60000
heap
page read and write
2CDA0FC000
stack
page read and write
407000
unkown
page readonly
1ECEAE44000
heap
page read and write
E2D84FC000
stack
page read and write
186F803D000
heap
page read and write
2AED9DF0000
trusted library allocation
page read and write
1EE4E820000
trusted library allocation
page read and write
1EE4DCA0000
trusted library allocation
page read and write
18E9AC80000
trusted library allocation
page read and write
18E9A640000
heap
page read and write
2DFC17F000
stack
page read and write
317F000
heap
page read and write
1EE4DAAD000
heap
page read and write
1EE4DACA000
heap
page read and write
186F802A000
heap
page read and write
C745DFE000
stack
page read and write
18E9A600000
heap
page read and write
560000
heap
page read and write
1ECEAE46000
heap
page read and write
B2A8D7E000
stack
page read and write
1C48E66E000
heap
page read and write
2310000
heap
page read and write
1A829C5A000
heap
page read and write
2CDA57B000
stack
page read and write
2CDA67D000
stack
page read and write
1EE4DA30000
heap
page read and write
1A829C13000
heap
page read and write
6D1000
heap
page read and write
18E9AE02000
trusted library allocation
page read and write
18E9A602000
heap
page read and write
436000
unkown
page readonly
186F8089000
heap
page read and write
2AED9C90000
heap
page read and write
2AED9CF0000
heap
page read and write
2AEDA480000
remote allocation
page read and write
2766000
heap
page read and write
1F60000
heap
page read and write
1ECEAE5A000
heap
page read and write
27B22CB000
stack
page read and write
41E787F000
stack
page read and write
186F9C00000
trusted library allocation
page read and write
1ECEAE6B000
heap
page read and write
2AED9E02000
heap
page read and write
1A829C40000
heap
page read and write
1EE4D8E0000
trusted library allocation
page read and write
2762000
heap
page read and write
1EE4DAAD000
heap
page read and write
424000
unkown
page read and write
1ECEAE6D000
heap
page read and write
19A000
stack
page read and write
1C48E600000
heap
page read and write
1EE4DC80000
trusted library allocation
page read and write
258D7C000
stack
page read and write
41E737E000
stack
page read and write
1ECEAE7A000
heap
page read and write
C74607E000
stack
page read and write
22AEE1A0000
heap
page read and write
1C48E613000
heap
page read and write
2AED9C80000
heap
page read and write
429000
unkown
page read and write
1C48E64E000
heap
page read and write
433000
unkown
page read and write
1ECEAE29000
heap
page read and write
41E727B000
stack
page read and write
1ECEAC50000
heap
page read and write
18E9A657000
heap
page read and write
22AEE4CC000
heap
page read and write
22D0000
heap
page read and write
1ECEAE00000
heap
page read and write
1EE4E5E0000
trusted library allocation
page read and write
1ECEABF0000
heap
page read and write
1EE4DC70000
trusted library allocation
page read and write
2AEDA602000
trusted library allocation
page read and write
2CDA77E000
stack
page read and write
E2D8679000
stack
page read and write
3990000
direct allocation
page execute and read and write
1A829C02000
heap
page read and write
186F7E70000
heap
page read and write
2CD9CEB000
stack
page read and write
1C48E629000
heap
page read and write
22AEE3D0000
trusted library allocation
page read and write
1ECEAE13000
heap
page read and write
1ECEAE60000
heap
page read and write
1EE4DAC6000
heap
page read and write
41E7A7F000
stack
page read and write
1ECEAE75000
heap
page read and write
18E9A713000
heap
page read and write
1ECEAE77000
heap
page read and write
97000
stack
page read and write
1EE4DAA6000
heap
page read and write
2760000
trusted library allocation
page read and write
18E9A63D000
heap
page read and write
22AEEB3A000
heap
page read and write
2CDA87C000
stack
page read and write
22AEE4BB000
heap
page read and write
2765000
heap
page read and write
186F99D0000
remote allocation
page read and write
2769000
heap
page read and write
258B7F000
stack
page read and write
186F80F1000
heap
page read and write
1A829D02000
heap
page read and write
72FB0000
unkown
page readonly
B2A947E000
stack
page read and write
18E9A629000
heap
page read and write
1ECEAE32000
heap
page read and write
41E777F000
stack
page read and write
2760000
trusted library allocation
page read and write
1EE4DC99000
heap
page read and write
3170000
trusted library allocation
page read and write
22AEE413000
heap
page read and write
18E9A520000
heap
page read and write
186F8100000
heap
page read and write
B2A937F000
stack
page read and write
2767000
heap
page read and write
1ECEAE5F000
heap
page read and write
186F8102000
heap
page read and write
E2D85FE000
stack
page read and write
1C48E643000
heap
page read and write
401000
unkown
page execute read
1ECEAE3B000
heap
page read and write
1A8299C0000
heap
page read and write
41E7B7E000
stack
page read and write
1ECEAE41000
heap
page read and write
2760000
trusted library allocation
page read and write
1C48E700000
heap
page read and write
18E9A4B0000
heap
page read and write
72FB1000
unkown
page execute read
1C48ED40000
trusted library allocation
page read and write
208E000
stack
page read and write
1EE4DAD0000
heap
page read and write
1EE4DAAB000
heap
page read and write
1ECEAD50000
trusted library allocation
page read and write
C745AFC000
stack
page read and write
186F808A000
heap
page read and write
3170000
trusted library allocation
page read and write
1C48E713000
heap
page read and write
43F000
unkown
page readonly
690000
heap
page read and write
1A8299B0000
heap
page read and write
275F000
stack
page read and write
18E9A677000
heap
page read and write
27B2B7F000
stack
page read and write
186F8113000
heap
page read and write
43F000
unkown
page readonly
1ECEAE40000
heap
page read and write
41E747D000
stack
page read and write
1ECEAE79000
heap
page read and write
2AED9E13000
heap
page read and write
20A6000
heap
page read and write
186F7E80000
heap
page read and write
1FAE000
stack
page read and write
1EE4DA70000
heap
page read and write
670000
heap
page read and write
2AED9E29000
heap
page read and write
1ECEAE47000
heap
page read and write
C745D7D000
stack
page read and write
186F808A000
heap
page read and write
22AEE468000
heap
page read and write
27B2E7B000
stack
page read and write
186F8129000
heap
page read and write
41E707B000
stack
page read and write
B2A927E000
stack
page read and write
2DFC07B000
stack
page read and write
186F8048000
heap
page read and write
22C0000
heap
page read and write
1EE4E5D0000
trusted library allocation
page read and write
2767000
heap
page read and write
41E797F000
stack
page read and write
22AEE46D000
heap
page read and write
2AED9F02000
heap
page read and write
1C48E702000
heap
page read and write
There are 314 hidden memdumps, click here to show them.