IOC Report
DHLINV000156.exe

loading gif

Files

File Path
Type
Category
Malicious
DHLINV000156.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\internuptial\Smertelig\Registrer\System.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Glitteringly\pinckneya\Administrerbarest\Fyringssedlens\Discouple.Lab
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Glitteringly\pinckneya\Administrerbarest\Fyringssedlens\Hny.Com
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Glitteringly\pinckneya\Administrerbarest\Fyringssedlens\SolutionExplorerCLI.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Styringsmidlernes\Pinkfishes109\Supersensitizations172\Smaskforvirrede\libpkcs11-helper-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Styringsmidlernes\Pinkfishes109\Supersensitizations172\Smaskforvirrede\maintenanceservice2.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Styringsmidlernes\Pinkfishes109\Supersensitizations172\Smaskforvirrede\percentile.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Supergallantness\afstres\Archives\Sadelmagernaalenes\System.Security.Cryptography.X509Certificates.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\internuptial\Smertelig\Registrer\libdatrie-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsf4536.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DHLINV000156.exe
C:\Users\user\Desktop\DHLINV000156.exe
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://aka.ms/dotnet-warnings/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
https://mozilla.org0
unknown
http://ocsp.thawte.com0
unknown
http://www.nero.com
unknown
https://github.com/dotnet/runtime
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\anarkisterne\Thanages
Festival

Memdumps

Base Address
Regiontype
Protect
Malicious
4BAA000
direct allocation
page execute and read and write
malicious
12A7D3B0000
heap
page read and write
2001F030000
heap
page read and write
2AD55600000
heap
page read and write
49F0000
direct allocation
page execute and read and write
50C000
heap
page read and write
100BFF000
stack
page read and write
E9424FE000
stack
page read and write
363D17E000
stack
page read and write
363D5FE000
stack
page read and write
99000
stack
page read and write
363CE7C000
stack
page read and write
2AD55602000
heap
page read and write
236E4E20000
trusted library allocation
page read and write
1E312629000
heap
page read and write
1B8B7B000
stack
page read and write
409000
unkown
page read and write
1E312D60000
remote allocation
page read and write
503000
heap
page read and write
1411BE29000
heap
page read and write
217C0857000
heap
page read and write
571000
heap
page read and write
2AD5566B000
heap
page read and write
1E312D60000
remote allocation
page read and write
316437D000
stack
page read and write
363D27C000
stack
page read and write
2AD55702000
heap
page read and write
23528030000
heap
page read and write
12A7D513000
heap
page read and write
D3DAA79000
stack
page read and write
12A7D46A000
heap
page read and write
2001F23A000
heap
page read and write
4F8000
heap
page read and write
2001F302000
heap
page read and write
316427E000
stack
page read and write
2AD5563A000
heap
page read and write
27C6000
heap
page read and write
217C0800000
heap
page read and write
1411C602000
heap
page read and write
217C0813000
heap
page read and write
4EC000
heap
page read and write
235277B9000
heap
page read and write
1344DC29000
heap
page read and write
1411BE85000
heap
page read and write
3140000
heap
page read and write
D3DA50B000
stack
page read and write
1344DB60000
trusted library allocation
page read and write
236E4465000
heap
page read and write
2AD55674000
heap
page read and write
431000
unkown
page read and write
1B867C000
stack
page read and write
23528000000
heap
page read and write
27CF000
heap
page read and write
409000
unkown
page write copy
2AD55664000
heap
page read and write
217C0872000
heap
page read and write
23527613000
heap
page read and write
1411BF02000
heap
page read and write
211788C000
stack
page read and write
2117DFE000
stack
page read and write
1006FD000
stack
page read and write
517000
heap
page read and write
1411BE13000
heap
page read and write
50C000
heap
page read and write
516000
heap
page read and write
D3DAB79000
stack
page read and write
E941F8E000
stack
page read and write
2001F23C000
heap
page read and write
235275F0000
trusted library allocation
page read and write
433000
unkown
page read and write
E941F0C000
stack
page read and write
236E4460000
heap
page read and write
2AD5563D000
heap
page read and write
1411BEE0000
heap
page read and write
2AD55613000
heap
page read and write
519000
heap
page read and write
2AD55663000
heap
page read and write
12A7D400000
heap
page read and write
519000
heap
page read and write
519000
heap
page read and write
27C9000
heap
page read and write
236E4420000
heap
page readonly
E94227E000
stack
page read and write
50C000
heap
page read and write
4EC000
heap
page read and write
19A000
stack
page read and write
439000
unkown
page readonly
557000
heap
page read and write
503000
heap
page read and write
12A7D479000
heap
page read and write
CF1227C000
stack
page read and write
236E40A0000
trusted library allocation
page read and write
2001F249000
heap
page read and write
217C0918000
heap
page read and write
363D67F000
stack
page read and write
4EC000
heap
page read and write
1344DD02000
heap
page read and write
4C0000
heap
page read and write
2352763C000
heap
page read and write
E9425FE000
stack
page read and write
1411C700000
heap
page read and write
557000
heap
page read and write
1411C712000
heap
page read and write
429000
unkown
page read and write
1E312E02000
trusted library allocation
page read and write
2352766F000
heap
page read and write
23527F22000
heap
page read and write
236E4440000
trusted library allocation
page read and write
217C0857000
heap
page read and write
23527691000
heap
page read and write
316417D000
stack
page read and write
1344DC41000
heap
page read and write
1411BEBD000
heap
page read and write
236E42A8000
heap
page read and write
2AD55660000
heap
page read and write
23527F54000
heap
page read and write
2001F040000
heap
page read and write
73EF3000
unkown
page readonly
23527F22000
heap
page read and write
E21FF7C000
stack
page read and write
650000
heap
page read and write
2001F200000
heap
page read and write
CF11F7E000
stack
page read and write
503000
heap
page read and write
12A7D428000
heap
page read and write
503000
heap
page read and write
1411BDD0000
trusted library allocation
page read and write
503000
heap
page read and write
217C05C0000
heap
page read and write
363D4FA000
stack
page read and write
217C0913000
heap
page read and write
100DFF000
stack
page read and write
12A7D500000
heap
page read and write
4FF000
heap
page read and write
316407B000
stack
page read and write
236E41D0000
heap
page read and write
23527480000
heap
page read and write
2AD5564D000
heap
page read and write
2AD55661000
heap
page read and write
571000
heap
page read and write
439000
unkown
page readonly
5FAA000
direct allocation
page execute and read and write
1411BC60000
heap
page read and write
519000
heap
page read and write
2AD5567C000
heap
page read and write
4FF000
heap
page read and write
407000
unkown
page readonly
E9426FE000
stack
page read and write
27C1000
heap
page read and write
1344DC02000
heap
page read and write
200E000
stack
page read and write
217C21E0000
remote allocation
page read and write
4EC000
heap
page read and write
23527666000
heap
page read and write
22F0000
heap
page read and write
22AF000
stack
page read and write
2001F213000
heap
page read and write
1E312D60000
remote allocation
page read and write
1E3125D0000
heap
page read and write
2AD55460000
heap
page read and write
E9423FE000
stack
page read and write
2001F240000
heap
page read and write
4F8000
heap
page read and write
1411BF13000
heap
page read and write
2AD5565E000
heap
page read and write
1344DC78000
heap
page read and write
1344DB30000
heap
page read and write
1344DC00000
heap
page read and write
27CC000
heap
page read and write
2AD55679000
heap
page read and write
4FF000
heap
page read and write
23527643000
heap
page read and write
4F8000
heap
page read and write
30000
heap
page read and write
1411BEE5000
heap
page read and write
236E4090000
heap
page read and write
2117FFD000
stack
page read and write
2001F254000
heap
page read and write
2AD55678000
heap
page read and write
211817D000
stack
page read and write
371B000
stack
page read and write
4FF000
heap
page read and write
1E312570000
heap
page read and write
27BF000
stack
page read and write
2300000
heap
page read and write
D3DA979000
stack
page read and write
23527713000
heap
page read and write
217C0780000
trusted library allocation
page read and write
4EC000
heap
page read and write
2001F090000
heap
page read and write
236E42EF000
heap
page read and write
2AD55671000
heap
page read and write
2117D7C000
stack
page read and write
1E312613000
heap
page read and write
1E31263D000
heap
page read and write
217C0846000
heap
page read and write
50C000
heap
page read and write
50C000
heap
page read and write
2AD55669000
heap
page read and write
1411BECA000
heap
page read and write
1E312633000
heap
page read and write
1B8C7F000
stack
page read and write
4FF000
heap
page read and write
2AD55659000
heap
page read and write
217C05D0000
heap
page read and write
CF1217F000
stack
page read and write
2060000
heap
page read and write
400000
unkown
page readonly
1411BE6E000
heap
page read and write
2AD55641000
heap
page read and write
1E312702000
heap
page read and write
3163BFC000
stack
page read and write
217C0902000
heap
page read and write
1B897B000
stack
page read and write
1004FB000
stack
page read and write
4F8000
heap
page read and write
23527600000
heap
page read and write
27C6000
heap
page read and write
4FF000
heap
page read and write
234D000
stack
page read and write
503000
heap
page read and write
23527F6F000
heap
page read and write
100EFF000
stack
page read and write
236E42A0000
heap
page read and write
2001F202000
heap
page read and write
23527F02000
heap
page read and write
E21FE79000
stack
page read and write
235277E5000
heap
page read and write
2352765B000
heap
page read and write
27CE000
heap
page read and write
217C0900000
heap
page read and write
2AD55689000
heap
page read and write
3163E7F000
stack
page read and write
363D6FE000
stack
page read and write
316379B000
stack
page read and write
23528013000
heap
page read and write
56A000
heap
page read and write
23527FBC000
heap
page read and write
1344DAC0000
heap
page read and write
2AD55629000
heap
page read and write
2AD55646000
heap
page read and write
655000
heap
page read and write
12A7D502000
heap
page read and write
236E5060000
trusted library allocation
page read and write
2AD55662000
heap
page read and write
4EC000
heap
page read and write
2370000
heap
page read and write
23527C70000
trusted library allocation
page read and write
236E4469000
heap
page read and write
519000
heap
page read and write
236E4470000
trusted library allocation
page read and write
27C4000
heap
page read and write
12A7D413000
heap
page read and write
23528027000
heap
page read and write
1344DD13000
heap
page read and write
56B000
heap
page read and write
12A7DC02000
trusted library allocation
page read and write
D3DA9FE000
stack
page read and write
12A7D402000
heap
page read and write
73EF5000
unkown
page readonly
236E4260000
trusted library allocation
page read and write
235274F0000
heap
page read and write
1411BE43000
heap
page read and write
4FF000
heap
page read and write
23527651000
heap
page read and write
1411BEB9000
heap
page read and write
1411BE00000
heap
page read and write
217C21E0000
remote allocation
page read and write
12A7D475000
heap
page read and write
4F8000
heap
page read and write
4FF000
heap
page read and write
4C7000
heap
page read and write
23527F90000
heap
page read and write
3163D7E000
stack
page read and write
1344DC5C000
heap
page read and write
CF11DFD000
stack
page read and write
10007B000
stack
page read and write
23527490000
heap
page read and write
503000
heap
page read and write
519000
heap
page read and write
2AD5565C000
heap
page read and write
4F8000
heap
page read and write
27C5000
heap
page read and write
236E41F0000
heap
page read and write
4FF000
heap
page read and write
1005FF000
stack
page read and write
21A0000
heap
page read and write
100AFF000
stack
page read and write
3130000
heap
page read and write
2001F21F000
heap
page read and write
50C000
heap
page read and write
217C0856000
heap
page read and write
421000
unkown
page read and write
2AD55642000
heap
page read and write
12A7D3E0000
trusted library allocation
page read and write
CF1237C000
stack
page read and write
425000
unkown
page read and write
236E42EF000
heap
page read and write
2001FA02000
trusted library allocation
page read and write
73EF0000
unkown
page readonly
E21FD7F000
stack
page read and write
236E4307000
heap
page read and write
22EE000
stack
page read and write
27C4000
heap
page read and write
217C0630000
heap
page read and write
4F8000
heap
page read and write
23527E02000
heap
page read and write
2AD5565F000
heap
page read and write
4F8000
heap
page read and write
236E4280000
trusted library allocation
page read and write
27C1000
heap
page read and write
363D3FE000
stack
page read and write
561000
heap
page read and write
503000
heap
page read and write
E22007F000
stack
page read and write
4EC000
heap
page read and write
400000
unkown
page readonly
236E4270000
trusted library allocation
page read and write
4A0000
heap
page read and write
4F8000
heap
page read and write
1344DAD0000
heap
page read and write
2AD55645000
heap
page read and write
4EC000
heap
page read and write
1009FD000
stack
page read and write
D3DA8FD000
stack
page read and write
2AD55673000
heap
page read and write
23527671000
heap
page read and write
217C0840000
heap
page read and write
23527F00000
heap
page read and write
217C21E0000
remote allocation
page read and write
217C0861000
heap
page read and write
2001F229000
heap
page read and write
519000
heap
page read and write
4F8000
heap
page read and write
503000
heap
page read and write
316447E000
stack
page read and write
217C0847000
heap
page read and write
50C000
heap
page read and write
363D2F9000
stack
page read and write
1411BC70000
heap
page read and write
217C2202000
trusted library allocation
page read and write
2AD55640000
heap
page read and write
2352778E000
heap
page read and write
2AD55644000
heap
page read and write
12A7D350000
heap
page read and write
E21F92C000
stack
page read and write
503000
heap
page read and write
2AD55682000
heap
page read and write
2001F246000
heap
page read and write
23527629000
heap
page read and write
519000
heap
page read and write
217C0730000
trusted library allocation
page read and write
1344E402000
trusted library allocation
page read and write
50C000
heap
page read and write
23527655000
heap
page read and write
3163FFC000
stack
page read and write
73EF1000
unkown
page execute read
2374000
heap
page read and write
2352762C000
heap
page read and write
503000
heap
page read and write
217C082A000
heap
page read and write
1B8A7F000
stack
page read and write
23527690000
heap
page read and write
1008FE000
stack
page read and write
401000
unkown
page execute read
2AD55672000
heap
page read and write
217C0888000
heap
page read and write
21182FE000
stack
page read and write
2AD55450000
heap
page read and write
2AD55647000
heap
page read and write
1E31265C000
heap
page read and write
3163EFC000
stack
page read and write
236E42EF000
heap
page read and write
23527643000
heap
page read and write
100CFF000
stack
page read and write
217C07C0000
trusted library allocation
page read and write
12A7D340000
heap
page read and write
363D07A000
stack
page read and write
4F8000
heap
page read and write
236E4410000
trusted library allocation
page read and write
2AD55631000
heap
page read and write
2AD55657000
heap
page read and write
23527683000
heap
page read and write
2AD554C0000
heap
page read and write
2AD555C0000
trusted library allocation
page read and write
519000
heap
page read and write
4EC000
heap
page read and write
CF1207F000
stack
page read and write
436000
unkown
page readonly
1E312600000
heap
page read and write
1344DC13000
heap
page read and write
2001F22E000
heap
page read and write
21A6000
heap
page read and write
55AA000
direct allocation
page execute and read and write
1411BCD0000
heap
page read and write
CF1257E000
stack
page read and write
2352768B000
heap
page read and write
1411BEC3000
heap
page read and write
50C000
heap
page read and write
1344DC72000
heap
page read and write
2001F190000
trusted library allocation
page read and write
2AD55658000
heap
page read and write
401000
unkown
page execute read
537000
heap
page read and write
519000
heap
page read and write
2AD55677000
heap
page read and write
4FF000
heap
page read and write
2AD55E02000
trusted library allocation
page read and write
23527FB0000
heap
page read and write
2AD5565A000
heap
page read and write
217C0750000
trusted library allocation
page read and write
50C000
heap
page read and write
1E312560000
heap
page read and write
236E4312000
heap
page read and write
4FF000
heap
page read and write
407000
unkown
page readonly
1E312D30000
trusted library allocation
page read and write
1411C73B000
heap
page read and write
23527F43000
heap
page read and write
217C0847000
heap
page read and write
4EC000
heap
page read and write
12A7D458000
heap
page read and write
236E42B0000
heap
page read and write
23528023000
heap
page read and write
50C000
heap
page read and write
1E312602000
heap
page read and write
236E4430000
trusted library allocation
page read and write
1344DC68000
heap
page read and write
23527685000
heap
page read and write
211807E000
stack
page read and write
23528002000
heap
page read and write
12A7D43C000
heap
page read and write
436000
unkown
page readonly
217C0802000
heap
page read and write
23527FC8000
heap
page read and write
620000
heap
page read and write
2AD5567B000
heap
page read and write
CF119CC000
stack
page read and write
23527653000
heap
page read and write
There are 429 hidden memdumps, click here to show them.