IOC Report
essetup.exe

loading gif

Files

File Path
Type
Category
Malicious
essetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\n1s\nchdata.cab
Microsoft Cabinet archive data, Windows 2000/XP setup, 433993 bytes, 1 file, at 0x2c +A "resource.dat", number 1, 25 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\n1s\nchdata.dat
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\n1s\nchsetup.cab
Microsoft Cabinet archive data, Windows 2000/XP setup, 864221 bytes, 1 file, at 0x2c +A "Scribe.exe", number 1, 71 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\n1s\nchsetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\n2s\nchdata.cab
Microsoft Cabinet archive data, Windows 2000/XP setup, 433993 bytes, 1 file, at 0x2c +A "resource.dat", number 1, 25 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\n2s\nchdata.dat
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\n2s\nchsetup.cab
Microsoft Cabinet archive data, Windows 2000/XP setup, 864221 bytes, 1 file, at 0x2c +A "Scribe.exe", number 1, 71 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\n2s\nchsetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\essetup.exe
"C:\Users\user\Desktop\essetup.exe"
malicious
C:\Users\user\Desktop\essetup.exe
"C:\Users\user\Desktop\essetup.exe"
malicious
C:\Users\user\Desktop\essetup.exe
"C:\Users\user\Desktop\essetup.exe"
malicious
C:\Users\user\Desktop\essetup.exe
"C:\Users\user\Desktop\essetup.exe"
malicious
C:\Users\user\Desktop\essetup.exe
"C:\Users\user\Desktop\essetup.exe"
malicious
C:\Users\user\AppData\Local\Temp\n1s\nchsetup.exe
"C:\Users\user\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\user\Desktop\essetup.exe" -instdata "C:\Users\user\AppData\Local\Temp\n1s\nchdata.dat"
C:\Users\user\AppData\Local\Temp\n2s\nchsetup.exe
"C:\Users\user\AppData\Local\Temp\n2s\nchsetup.exe" -installer "C:\Users\user\Desktop\essetup.exe" -instdata "C:\Users\user\AppData\Local\Temp\n2s\nchdata.dat"
C:\Users\user\AppData\Local\Temp\n2s\nchsetup.exe
"C:\Users\user\AppData\Local\Temp\n2s\nchsetup.exe" -installer "C:\Users\user\Desktop\essetup.exe" -instdata "C:\Users\user\AppData\Local\Temp\n2s\nchdata.dat"

URLs

Name
IP
Malicious
https://www.youtube.com/t/terms).
unknown
http://ffmpeg.orgavutil-52.nch.dllswscale-2.nch.dllswresample-0.nch.dllavcodec-55.nch.dllavformat-55
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
http://cgi.nch.com.au/cgi-bin/regcheck-it.exe?cmd=v&id=%d&magic=%d&magicb=%d
unknown
https://%s/software/it/thanks.html&secsfr=%d&active10s=%dRunsRunsSinceLastInstallMinutesRunSinceLast
unknown
https://www.nch.com.au/support/it/reg.htmlhttps://www.nch.com.au/upgrade/it/index.htmlCodice
unknown
http://www.audiochannel.net/versions/components/%s_it.txt1.00.0Verifica
unknown
https://www.nch.com.au/delegate/it/index.htmlServerIndirizzo:es:
unknown
http://www.audiochannel.net/components/it/notifications/scribe.txtpn
unknown
http://cgi.nch.com.au/cgi-bin/report-it.exetestfolderLaunch
unknown
http://www.nchsoftware.com/prism/it/index.htmlConverti
unknown
https://www.nch.com.au/software/it/bug.html?software=Scribe&version=13.18&lang=it&iid=%s&data=%s&rdf
unknown
https://www.nch.com.au/software/it/thanksforusing.htmlwww.nch.com.auInstallerDomain&usage=%04X%02XNC
unknown
http://www.audiochannel.net/versions/scribe_it.txt
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://www.nch.com.au/it/index.htmlComponente
unknown
https://www.nch.com.au/software/it/bug.html?software=Scribe&version=13.18&lang=it&xi=GUI-%s&iid=%s&d
unknown
http://www.audiochannel.net/software/de/scribesetup_de.exehttps://www.nch.com.au/scribe/de/essetup.e
unknown
https://www.twitter.com/?status=%s%shttp://www.linkedin.com/shareArticle?url=%s&title=NCH
unknown
https://www.nch.com.au/software/it/audio.html
unknown
https://www.nch.com.au/kb/it/10271.htmlEsegui
unknown
https://%sit/index.html?ref=nchiodaboutScarica
unknown
https://www.nch.com.au/upgrade/it/index.html?software=scribe&upgradeid=%d&upgradekey=%shttps://www.n
unknown
http://www.nch.com.au/components/%s.exeDownload
unknown
http://cgi.nch.com.au/cgi-bin/regcheck-it.exe?cmd=v&id=%d&magic=%d&magicb=%dConvalidare
unknown
http://canberra.nchsoftware.com:120/minidumpupload
unknown
http://www.entrust.net/rpa03
unknown
http://www.nch.com.au/components/index.html
unknown
http://www.nch.com.au/switch/it/index.htmlConverti
unknown
http://www.opensource.org/licenses/lgpl-license.php
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
https://www.nch.com.au/hardware/it/pedals.htmlAcquista
unknown
http://canberra.nchsoftware.com:120/minidumpupload%.4dWin%d%d%sUkn0(Msg%dLstCmd%d)GloIni1GuiIni2GuiD
unknown
http://www.nch.com.au/software/win2000/index.html-bootstrap-bseldlg
unknown
https://www.nch.com.au/software/it/bug.html?software=Scribe&version=13.18&lang=it&xi=%s-Win%d%d%s-MA
unknown
https://secure.nch.com.au/cgi-bin/getrefdata.exe?software=Scribe&lang=IT&platform=Win&download=%s&ii
unknown
https://secure.nch.com.au/cgi-bin/register.exe?software=scribeAcquista
unknown
http://www.nch.com.au/software/win98/index.htmlWindows
unknown
https://www.nch.com.au/software/it/rateit.html?software=Scribe&appname=%s&version=13.18&rating=%d&bu
unknown
http://www.audiochannel.net/versions/components/%s_it.txt
unknown
https://www.nchsoftware.com/%s.htmlit/indexhttps://www.nchsoftware.com/it/index.htmlhttps://www.nch.
unknown
https://secure.nch.com.au/cgi-bin/register-it.exe?action=q&id=%u&magica=%u&magicb=%u
unknown
http://www.audiochannel.net/versions/scribe_it.txtinfo=download=Nessuna
unknown
https://secure.nch.com.au/cgi-bin/register-it.exe?software=scribe&version=13.18%s%s%s%s%s%s%s&instby
unknown
http://%s/components/shared/%s.zipSoftware
unknown
https://secure.nch.com.au/cgi-bin/register-it.exe?software=scribeAcquista
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://nch.invisionzone.com/forum/239-italiano/https://www.nch.com.au/suggestions/it/index.html?sof
unknown
https://www.nchsoftware.com/%s/it/index.html?ref=nchsuitehttps://www.nch.com.au/%s/it/index.html?ref
unknown
https://www.entrust.net/rpa0
unknown
There are 41 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
ScribeInstall
HKEY_CURRENT_USER\SOFTWARE\NCH Software\Scribe\Software
SVar
HKEY_CURRENT_USER\SOFTWARE\NCH Software\Scribe\Settings
DefaultFont
HKEY_CURRENT_USER\SOFTWARE\NCH Software\Scribe\Software
SVar

Memdumps

Base Address
Regiontype
Protect
Malicious
1250000
heap
page read and write
2FED000
heap
page read and write
2FEE000
heap
page read and write
2AA7000
heap
page read and write
6BB000
stack
page read and write
1113000
unkown
page read and write
2C65000
heap
page read and write
59A000
stack
page read and write
B31000
unkown
page execute read
357C000
stack
page read and write
FDE000
stack
page read and write
110C000
unkown
page write copy
59E000
stack
page read and write
EAB000
heap
page read and write
2FED000
heap
page read and write
8D0000
heap
page read and write
DC0000
heap
page read and write
B21000
unkown
page execute read
B24000
unkown
page readonly
AEA000
heap
page read and write
31FE000
stack
page read and write
7CB000
stack
page read and write
2C69000
heap
page read and write
156E000
stack
page read and write
2A6F000
heap
page read and write
F61000
unkown
page execute read
B20000
unkown
page readonly
B20000
unkown
page readonly
2A84000
heap
page read and write
30FF000
heap
page read and write
A80000
heap
page read and write
30F7000
heap
page read and write
B20000
unkown
page readonly
2C62000
heap
page read and write
B21000
unkown
page execute read
35BE000
stack
page read and write
E51000
unkown
page execute read
2C66000
heap
page read and write
30F3000
heap
page read and write
1003000
unkown
page read and write
B20000
unkown
page readonly
AE0000
heap
page read and write
AC0000
heap
page read and write
CDC000
unkown
page write copy
1260000
heap
page read and write
B22000
unkown
page readonly
26FF000
heap
page read and write
B24000
unkown
page readonly
109E000
unkown
page readonly
2ADE000
stack
page read and write
CF0000
unkown
page read and write
320C000
stack
page read and write
30FC000
heap
page read and write
A20000
heap
page read and write
31BF000
stack
page read and write
49B000
stack
page read and write
A50000
heap
page read and write
2C69000
heap
page read and write
11A7000
unkown
page readonly
E4C000
stack
page read and write
2B5B000
heap
page read and write
2B50000
heap
page read and write
90B000
heap
page read and write
29EE000
stack
page read and write
2B7D000
heap
page read and write
B30000
unkown
page readonly
2C62000
heap
page read and write
942000
heap
page read and write
B21000
unkown
page execute read
2C63000
heap
page read and write
AB8000
heap
page read and write
11A0000
heap
page read and write
110C000
unkown
page read and write
1120000
unkown
page read and write
E78000
heap
page read and write
D70000
heap
page read and write
2B37000
heap
page read and write
30FD000
heap
page read and write
2B5E000
heap
page read and write
310C000
stack
page read and write
2B6F000
heap
page read and write
D77000
unkown
page readonly
29BC000
stack
page read and write
2745000
heap
page read and write
2EB0000
heap
page read and write
DEE000
stack
page read and write
A30000
heap
page read and write
E70000
heap
page read and write
2A50000
heap
page read and write
11A7000
unkown
page readonly
B22000
unkown
page readonly
30BF000
stack
page read and write
30FB000
heap
page read and write
2C6B000
heap
page read and write
B10000
heap
page read and write
EDC000
heap
page read and write
347B000
stack
page read and write
30F4000
heap
page read and write
E51000
unkown
page execute read
30F3000
heap
page read and write
100E000
unkown
page read and write
2B20000
heap
page read and write
B21000
unkown
page execute read
B21000
unkown
page execute read
30F7000
heap
page read and write
ACF000
stack
page read and write
1010000
unkown
page read and write
A55000
heap
page read and write
B22000
unkown
page readonly
B21000
unkown
page execute read
2C63000
heap
page read and write
C6E000
unkown
page readonly
32FF000
stack
page read and write
B20000
unkown
page readonly
2D8E000
stack
page read and write
FFC000
unkown
page write copy
2AB5000
heap
page read and write
B24000
unkown
page readonly
A6E000
stack
page read and write
1097000
unkown
page readonly
5A0000
heap
page read and write
1268000
heap
page read and write
F60000
unkown
page readonly
2FEE000
heap
page read and write
2FEE000
heap
page read and write
109E000
unkown
page readonly
B20000
unkown
page readonly
800000
heap
page read and write
7BC000
stack
page read and write
F8E000
unkown
page readonly
A79000
stack
page read and write
2B5B000
heap
page read and write
120E000
stack
page read and write
A3D000
stack
page read and write
2B53000
heap
page read and write
DAF000
stack
page read and write
B22000
unkown
page readonly
343F000
stack
page read and write
B21000
unkown
page execute read
F30000
heap
page read and write
2B5E000
heap
page read and write
2C6F000
heap
page read and write
2C6E000
heap
page read and write
B20000
unkown
page readonly
93A000
heap
page read and write
F61000
unkown
page execute read
30F5000
heap
page read and write
343F000
stack
page read and write
A39000
stack
page read and write
E50000
unkown
page readonly
2C68000
heap
page read and write
D18000
heap
page read and write
26BD000
stack
page read and write
1097000
unkown
page readonly
317F000
stack
page read and write
327F000
stack
page read and write
B30000
unkown
page readonly
111E000
unkown
page read and write
B17000
heap
page read and write
B20000
unkown
page readonly
30FE000
heap
page read and write
2C6D000
heap
page read and write
B22000
unkown
page readonly
4CC000
stack
page read and write
D77000
unkown
page readonly
1115000
unkown
page read and write
E50000
unkown
page readonly
2C6C000
heap
page read and write
31FE000
stack
page read and write
118C000
stack
page read and write
DCE000
heap
page read and write
FFC000
unkown
page read and write
B24000
unkown
page readonly
E00000
heap
page read and write
E05000
heap
page read and write
5EE000
stack
page read and write
2C64000
heap
page read and write
CE5000
unkown
page read and write
333E000
stack
page read and write
166E000
stack
page read and write
B21000
unkown
page execute read
CE3000
unkown
page read and write
AE0000
heap
page read and write
2FEB000
heap
page read and write
B24000
unkown
page readonly
550000
heap
page read and write
30F3000
heap
page read and write
B1B000
heap
page read and write
B20000
unkown
page readonly
2E8F000
stack
page read and write
30F2000
heap
page read and write
8F4000
heap
page read and write
B22000
unkown
page readonly
2FEB000
heap
page read and write
C6E000
unkown
page readonly
B20000
unkown
page readonly
2FE3000
heap
page read and write
8D7000
heap
page read and write
B22000
unkown
page readonly
4D8000
stack
page read and write
D6D000
stack
page read and write
1200000
heap
page read and write
124D000
stack
page read and write
36BE000
stack
page read and write
F60000
unkown
page readonly
AB0000
heap
page read and write
2C63000
heap
page read and write
A6C000
stack
page read and write
2B5C000
heap
page read and write
2C62000
heap
page read and write
2C6A000
heap
page read and write
108B000
stack
page read and write
2C67000
heap
page read and write
2737000
heap
page read and write
2C69000
heap
page read and write
E50000
heap
page read and write
30F6000
heap
page read and write
D80000
heap
page read and write
D10000
heap
page read and write
2FE0000
heap
page read and write
B0D000
stack
page read and write
B30000
heap
page read and write
1850000
heap
page read and write
920000
heap
page read and write
11C0000
heap
page read and write
4DC000
stack
page read and write
30F1000
heap
page read and write
D79000
heap
page read and write
ACE000
stack
page read and write
CDC000
unkown
page read and write
D15000
heap
page read and write
30F9000
heap
page read and write
510000
heap
page read and write
AD0000
heap
page read and write
D10000
heap
page read and write
A70000
heap
page read and write
F10000
heap
page read and write
30F3000
heap
page read and write
AF0000
heap
page read and write
D34000
heap
page read and write
AE8000
heap
page read and write
30CF000
stack
page read and write
26E0000
heap
page read and write
D4B000
heap
page read and write
2E90000
heap
page read and write
30FA000
heap
page read and write
1860000
heap
page read and write
11F0000
heap
page read and write
2B5D000
heap
page read and write
30F2000
heap
page read and write
A7C000
stack
page read and write
B21000
unkown
page execute read
30F0000
heap
page read and write
2FCE000
stack
page read and write
2A9E000
stack
page read and write
32FF000
stack
page read and write
A3B000
stack
page read and write
2C67000
heap
page read and write
E93000
heap
page read and write
2D4E000
stack
page read and write
2C60000
heap
page read and write
515000
heap
page read and write
CF0000
heap
page read and write
B24000
unkown
page readonly
D90000
heap
page read and write
493000
stack
page read and write
152F000
stack
page read and write
2A80000
heap
page read and write
CEE000
unkown
page read and write
2C6B000
heap
page read and write
333E000
stack
page read and write
F8E000
unkown
page readonly
30F8000
heap
page read and write
B23000
heap
page read and write
2B5E000
heap
page read and write
30F9000
heap
page read and write
B24000
unkown
page readonly
2C61000
heap
page read and write
2B5E000
heap
page read and write
B24000
unkown
page readonly
31BF000
stack
page read and write
B22000
unkown
page readonly
B22000
unkown
page readonly
30FB000
heap
page read and write
B31000
unkown
page execute read
B22000
unkown
page readonly
1210000
heap
page read and write
337F000
stack
page read and write
CFB000
stack
page read and write
B24000
unkown
page readonly
2ACF000
stack
page read and write
30F9000
heap
page read and write
2A2D000
stack
page read and write
B24000
unkown
page readonly
2C63000
heap
page read and write
EE7000
heap
page read and write
2A90000
heap
page read and write
2C6C000
heap
page read and write
A2C000
stack
page read and write
B21000
unkown
page execute read
10DE000
stack
page read and write
2FEC000
heap
page read and write
AE0000
heap
page read and write
30FC000
heap
page read and write
30F2000
heap
page read and write
There are 295 hidden memdumps, click here to show them.