Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
HfJLn9erXb.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Kontos.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nspE6C8.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\Profetiske.Byg
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\Sankekort.Sch209
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Hjtideligholdelser\Liechtensteiner\Systemopstninger\pan-start-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Hjtideligholdelser\Liechtensteiner\Systemopstninger\printer-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Idolatrous\Kaes\pt-br.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Ravingly\Magnetoplasmadynamics\godsvognen\avatar-default-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\be.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\changes-allow-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\dotnet.api
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\ebook-reader.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\emblem-photos-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\font-select-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\network-wired-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Unrivalled\Nonexhaustively\Snaffle\Stealthful\LogoCanary.png
|
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\HfJLn9erXb.exe
|
C:\Users\user\Desktop\HfJLn9erXb.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Shabbyish\Retablerings
|
Aphetism
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3AEC000
|
direct allocation
|
page execute and read and write
|
||
421000
|
unkown
|
page read and write
|
||
E2D812B000
|
stack
|
page read and write
|
||
1ECEB602000
|
trusted library allocation
|
page read and write
|
||
1ECEAE63000
|
heap
|
page read and write
|
||
1C48E560000
|
heap
|
page read and write
|
||
1A829C28000
|
heap
|
page read and write
|
||
43A000
|
unkown
|
page readonly
|
||
2AED9E00000
|
heap
|
page read and write
|
||
1ECEAE57000
|
heap
|
page read and write
|
||
22AEE4E2000
|
heap
|
page read and write
|
||
72FB3000
|
unkown
|
page readonly
|
||
1EE4E8A0000
|
trusted library allocation
|
page read and write
|
||
1ECEAE3D000
|
heap
|
page read and write
|
||
1EE4DA10000
|
heap
|
page read and write
|
||
1C48E550000
|
heap
|
page read and write
|
||
44EC000
|
direct allocation
|
page execute and read and write
|
||
1A829D13000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
1ECEAE62000
|
heap
|
page read and write
|
||
1ECEAE6A000
|
heap
|
page read and write
|
||
1C48E602000
|
heap
|
page read and write
|
||
1EE4DC90000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
2AEDA480000
|
remote allocation
|
page read and write
|
||
22AEEB12000
|
heap
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
25907F000
|
stack
|
page read and write
|
||
22AEE48A000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
186F7FE0000
|
trusted library allocation
|
page read and write
|
||
2314000
|
heap
|
page read and write
|
||
22AEEA02000
|
heap
|
page read and write
|
||
2DFC27E000
|
stack
|
page read and write
|
||
1C48EE02000
|
trusted library allocation
|
page read and write
|
||
27B297E000
|
stack
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
258E7C000
|
stack
|
page read and write
|
||
2AEDA480000
|
remote allocation
|
page read and write
|
||
2DFBF7B000
|
stack
|
page read and write
|
||
E2D8579000
|
stack
|
page read and write
|
||
20A0000
|
heap
|
page read and write
|
||
258C7F000
|
stack
|
page read and write
|
||
186F809A000
|
heap
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
18E9A65B000
|
heap
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
186F8000000
|
heap
|
page read and write
|
||
186F809A000
|
heap
|
page read and write
|
||
22AEE400000
|
heap
|
page read and write
|
||
2CDA4FD000
|
stack
|
page read and write
|
||
258A7E000
|
stack
|
page read and write
|
||
1ECEAE4E000
|
heap
|
page read and write
|
||
1EE4DA68000
|
heap
|
page read and write
|
||
18E9A4C0000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
2DFBC7C000
|
stack
|
page read and write
|
||
1EE4D8D0000
|
heap
|
page read and write
|
||
1ECEAE59000
|
heap
|
page read and write
|
||
1C48E5C0000
|
heap
|
page read and write
|
||
1ECEAE84000
|
heap
|
page read and write
|
||
2588FC000
|
stack
|
page read and write
|
||
1ECEAE61000
|
heap
|
page read and write
|
||
186F80E9000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
C745EFD000
|
stack
|
page read and write
|
||
22AEE190000
|
heap
|
page read and write
|
||
E2D86FF000
|
stack
|
page read and write
|
||
2CDA3FF000
|
stack
|
page read and write
|
||
186F9C40000
|
trusted library allocation
|
page read and write
|
||
1ECEAE7B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27B2D7F000
|
stack
|
page read and write
|
||
B2A8DFE000
|
stack
|
page read and write
|
||
27B28FB000
|
stack
|
page read and write
|
||
1ECEAE42000
|
heap
|
page read and write
|
||
1ECEAE64000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
697000
|
heap
|
page read and write
|
||
1ECEAE65000
|
heap
|
page read and write
|
||
1EE4DACC000
|
heap
|
page read and write
|
||
B2A8CFB000
|
stack
|
page read and write
|
||
186F8058000
|
heap
|
page read and write
|
||
186F99D0000
|
remote allocation
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
1ECEAE74000
|
heap
|
page read and write
|
||
1ECEAE45000
|
heap
|
page read and write
|
||
25849C000
|
stack
|
page read and write
|
||
18E9A613000
|
heap
|
page read and write
|
||
1EE4DAAE000
|
heap
|
page read and write
|
||
22AEE429000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1A829D00000
|
heap
|
page read and write
|
||
1C48E653000
|
heap
|
page read and write
|
||
2CDA97E000
|
stack
|
page read and write
|
||
B2A917E000
|
stack
|
page read and write
|
||
1C48E63C000
|
heap
|
page read and write
|
||
1ECEABE0000
|
heap
|
page read and write
|
||
1EE4E830000
|
heap
|
page readonly
|
||
1ECEAF02000
|
heap
|
page read and write
|
||
22AEE4C9000
|
heap
|
page read and write
|
||
1EE4E840000
|
trusted library allocation
|
page read and write
|
||
1C48E62C000
|
heap
|
page read and write
|
||
22AEE423000
|
heap
|
page read and write
|
||
1C48E658000
|
heap
|
page read and write
|
||
1ECEAE5C000
|
heap
|
page read and write
|
||
27B27FE000
|
stack
|
page read and write
|
||
1ECEAE7E000
|
heap
|
page read and write
|
||
22AEE200000
|
heap
|
page read and write
|
||
22AF000
|
stack
|
page read and write
|
||
41E767D000
|
stack
|
page read and write
|
||
43A000
|
unkown
|
page readonly
|
||
1A829C7B000
|
heap
|
page read and write
|
||
22AEE502000
|
heap
|
page read and write
|
||
1ECEAE24000
|
heap
|
page read and write
|
||
72FB5000
|
unkown
|
page readonly
|
||
186F99A0000
|
trusted library allocation
|
page read and write
|
||
2AED9E58000
|
heap
|
page read and write
|
||
22AEE513000
|
heap
|
page read and write
|
||
1ECEAE58000
|
heap
|
page read and write
|
||
1ECEAE68000
|
heap
|
page read and write
|
||
2CDA2FB000
|
stack
|
page read and write
|
||
186F99D0000
|
remote allocation
|
page read and write
|
||
27B267F000
|
stack
|
page read and write
|
||
27B2A7A000
|
stack
|
page read and write
|
||
18E9A702000
|
heap
|
page read and write
|
||
1C48E649000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
1C48E5F0000
|
trusted library allocation
|
page read and write
|
||
22AEE43E000
|
heap
|
page read and write
|
||
186F7EE0000
|
heap
|
page read and write
|
||
1A829A20000
|
heap
|
page read and write
|
||
186F8013000
|
heap
|
page read and write
|
||
C745B7E000
|
stack
|
page read and write
|
||
2AED9E3D000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
1EE4DC95000
|
heap
|
page read and write
|
||
1A829BF0000
|
trusted library allocation
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
22AEEB00000
|
heap
|
page read and write
|
||
1A829C00000
|
heap
|
page read and write
|
||
C74587B000
|
stack
|
page read and write
|
||
1A82A202000
|
trusted library allocation
|
page read and write
|
||
186F9A02000
|
trusted library allocation
|
page read and write
|
||
186F80CB000
|
heap
|
page read and write
|
||
2AED9E23000
|
heap
|
page read and write
|
||
1C48E643000
|
heap
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
1EE4E850000
|
trusted library allocation
|
page read and write
|
||
2CDA07F000
|
stack
|
page read and write
|
||
1EE4DA60000
|
heap
|
page read and write
|
||
2CDA0FC000
|
stack
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
1ECEAE44000
|
heap
|
page read and write
|
||
E2D84FC000
|
stack
|
page read and write
|
||
186F803D000
|
heap
|
page read and write
|
||
2AED9DF0000
|
trusted library allocation
|
page read and write
|
||
1EE4E820000
|
trusted library allocation
|
page read and write
|
||
1EE4DCA0000
|
trusted library allocation
|
page read and write
|
||
18E9AC80000
|
trusted library allocation
|
page read and write
|
||
18E9A640000
|
heap
|
page read and write
|
||
2DFC17F000
|
stack
|
page read and write
|
||
317F000
|
heap
|
page read and write
|
||
1EE4DAAD000
|
heap
|
page read and write
|
||
1EE4DACA000
|
heap
|
page read and write
|
||
186F802A000
|
heap
|
page read and write
|
||
C745DFE000
|
stack
|
page read and write
|
||
18E9A600000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
1ECEAE46000
|
heap
|
page read and write
|
||
B2A8D7E000
|
stack
|
page read and write
|
||
1C48E66E000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
1A829C5A000
|
heap
|
page read and write
|
||
2CDA57B000
|
stack
|
page read and write
|
||
2CDA67D000
|
stack
|
page read and write
|
||
1EE4DA30000
|
heap
|
page read and write
|
||
1A829C13000
|
heap
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
18E9AE02000
|
trusted library allocation
|
page read and write
|
||
18E9A602000
|
heap
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
186F8089000
|
heap
|
page read and write
|
||
2AED9C90000
|
heap
|
page read and write
|
||
2AED9CF0000
|
heap
|
page read and write
|
||
2AEDA480000
|
remote allocation
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
1F60000
|
heap
|
page read and write
|
||
1ECEAE5A000
|
heap
|
page read and write
|
||
27B22CB000
|
stack
|
page read and write
|
||
41E787F000
|
stack
|
page read and write
|
||
186F9C00000
|
trusted library allocation
|
page read and write
|
||
1ECEAE6B000
|
heap
|
page read and write
|
||
2AED9E02000
|
heap
|
page read and write
|
||
1A829C40000
|
heap
|
page read and write
|
||
1EE4D8E0000
|
trusted library allocation
|
page read and write
|
||
2762000
|
heap
|
page read and write
|
||
1EE4DAAD000
|
heap
|
page read and write
|
||
424000
|
unkown
|
page read and write
|
||
1ECEAE6D000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1C48E600000
|
heap
|
page read and write
|
||
1EE4DC80000
|
trusted library allocation
|
page read and write
|
||
258D7C000
|
stack
|
page read and write
|
||
41E737E000
|
stack
|
page read and write
|
||
1ECEAE7A000
|
heap
|
page read and write
|
||
C74607E000
|
stack
|
page read and write
|
||
22AEE1A0000
|
heap
|
page read and write
|
||
1C48E613000
|
heap
|
page read and write
|
||
2AED9C80000
|
heap
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
1C48E64E000
|
heap
|
page read and write
|
||
433000
|
unkown
|
page read and write
|
||
1ECEAE29000
|
heap
|
page read and write
|
||
41E727B000
|
stack
|
page read and write
|
||
1ECEAC50000
|
heap
|
page read and write
|
||
18E9A657000
|
heap
|
page read and write
|
||
22AEE4CC000
|
heap
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
1ECEAE00000
|
heap
|
page read and write
|
||
1EE4E5E0000
|
trusted library allocation
|
page read and write
|
||
1ECEABF0000
|
heap
|
page read and write
|
||
1EE4DC70000
|
trusted library allocation
|
page read and write
|
||
2AEDA602000
|
trusted library allocation
|
page read and write
|
||
2CDA77E000
|
stack
|
page read and write
|
||
E2D8679000
|
stack
|
page read and write
|
||
3990000
|
direct allocation
|
page execute and read and write
|
||
1A829C02000
|
heap
|
page read and write
|
||
186F7E70000
|
heap
|
page read and write
|
||
2CD9CEB000
|
stack
|
page read and write
|
||
1C48E629000
|
heap
|
page read and write
|
||
22AEE3D0000
|
trusted library allocation
|
page read and write
|
||
1ECEAE13000
|
heap
|
page read and write
|
||
1ECEAE60000
|
heap
|
page read and write
|
||
1EE4DAC6000
|
heap
|
page read and write
|
||
41E7A7F000
|
stack
|
page read and write
|
||
1ECEAE75000
|
heap
|
page read and write
|
||
18E9A713000
|
heap
|
page read and write
|
||
1ECEAE77000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
1EE4DAA6000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
18E9A63D000
|
heap
|
page read and write
|
||
22AEEB3A000
|
heap
|
page read and write
|
||
2CDA87C000
|
stack
|
page read and write
|
||
22AEE4BB000
|
heap
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
186F99D0000
|
remote allocation
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
258B7F000
|
stack
|
page read and write
|
||
186F80F1000
|
heap
|
page read and write
|
||
1A829D02000
|
heap
|
page read and write
|
||
72FB0000
|
unkown
|
page readonly
|
||
B2A947E000
|
stack
|
page read and write
|
||
18E9A629000
|
heap
|
page read and write
|
||
1ECEAE32000
|
heap
|
page read and write
|
||
41E777F000
|
stack
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
1EE4DC99000
|
heap
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
22AEE413000
|
heap
|
page read and write
|
||
18E9A520000
|
heap
|
page read and write
|
||
186F8100000
|
heap
|
page read and write
|
||
B2A937F000
|
stack
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
1ECEAE5F000
|
heap
|
page read and write
|
||
186F8102000
|
heap
|
page read and write
|
||
E2D85FE000
|
stack
|
page read and write
|
||
1C48E643000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1ECEAE3B000
|
heap
|
page read and write
|
||
1A8299C0000
|
heap
|
page read and write
|
||
41E7B7E000
|
stack
|
page read and write
|
||
1ECEAE41000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
1C48E700000
|
heap
|
page read and write
|
||
18E9A4B0000
|
heap
|
page read and write
|
||
72FB1000
|
unkown
|
page execute read
|
||
1C48ED40000
|
trusted library allocation
|
page read and write
|
||
208E000
|
stack
|
page read and write
|
||
1EE4DAD0000
|
heap
|
page read and write
|
||
1EE4DAAB000
|
heap
|
page read and write
|
||
1ECEAD50000
|
trusted library allocation
|
page read and write
|
||
C745AFC000
|
stack
|
page read and write
|
||
186F808A000
|
heap
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
1C48E713000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page readonly
|
||
690000
|
heap
|
page read and write
|
||
1A8299B0000
|
heap
|
page read and write
|
||
275F000
|
stack
|
page read and write
|
||
18E9A677000
|
heap
|
page read and write
|
||
27B2B7F000
|
stack
|
page read and write
|
||
186F8113000
|
heap
|
page read and write
|
||
43F000
|
unkown
|
page readonly
|
||
1ECEAE40000
|
heap
|
page read and write
|
||
41E747D000
|
stack
|
page read and write
|
||
1ECEAE79000
|
heap
|
page read and write
|
||
2AED9E13000
|
heap
|
page read and write
|
||
20A6000
|
heap
|
page read and write
|
||
186F7E80000
|
heap
|
page read and write
|
||
1FAE000
|
stack
|
page read and write
|
||
1EE4DA70000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
2AED9E29000
|
heap
|
page read and write
|
||
1ECEAE47000
|
heap
|
page read and write
|
||
C745D7D000
|
stack
|
page read and write
|
||
186F808A000
|
heap
|
page read and write
|
||
22AEE468000
|
heap
|
page read and write
|
||
27B2E7B000
|
stack
|
page read and write
|
||
186F8129000
|
heap
|
page read and write
|
||
41E707B000
|
stack
|
page read and write
|
||
B2A927E000
|
stack
|
page read and write
|
||
2DFC07B000
|
stack
|
page read and write
|
||
186F8048000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
1EE4E5D0000
|
trusted library allocation
|
page read and write
|
||
2767000
|
heap
|
page read and write
|
||
41E797F000
|
stack
|
page read and write
|
||
22AEE46D000
|
heap
|
page read and write
|
||
2AED9F02000
|
heap
|
page read and write
|
||
1C48E702000
|
heap
|
page read and write
|
There are 314 hidden memdumps, click here to show them.