IOC Report
Nutzen_Unterschrift_Planen#2024.com.exe

loading gif

Files

File Path
Type
Category
Malicious
Nutzen_Unterschrift_Planen#2024.com.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B0ZBZFKQ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\BooConf.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv2462.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x8dbb486c, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\nsuC1C1.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\tmc.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ubmgcrsfyvpwitpwpupfvcprqao
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\classrooms\Absented127\traumatically.fra
data
dropped
C:\Users\user\classrooms\Alkoholisters26.txt
ASCII text, with very long lines (377), with no line terminators
dropped
C:\Users\user\classrooms\Bangladeshers.Fag
GTA audio index data (SDT)
dropped
C:\Users\user\classrooms\Predive.Arb
data
dropped
C:\Users\user\classrooms\gutterblood.fri
data
dropped
C:\Users\user\classrooms\inexorable.aut
data
dropped
C:\Users\user\classrooms\milieustyrelses.byg
data
dropped
C:\Users\user\classrooms\vennekredse.som
Matlab v4 mat-file (little endian) , numeric, rows 10092776, columns 0
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe
"C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe"
malicious
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe
"C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe"
malicious
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe /stext "C:\Users\user\AppData\Local\Temp\ubmgcrsfyvpwitpwpupfvcprqao"
malicious
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe /stext "C:\Users\user\AppData\Local\Temp\fdszcjcgmdhbszdagejyggbiyhyoajw"
malicious
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe
C:\Users\user\Desktop\Nutzen_Unterschrift_Planen#2024.com.exe /stext "C:\Users\user\AppData\Local\Temp\pxxsdbnaalzgvfzeppwajtwrhnqxtundeo"
malicious

URLs

Name
IP
Malicious
66.150.198.142
malicious
http://66.150.198.142/lOqpXUmQJccVjyn149.bin
66.150.198.142
malicious
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://www.imvu.comr
unknown
https://www.msn.com/?ocid=iehp
unknown
http://www.imvu.com
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://www.msn.com/de-ch/?ocid=iehp
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://www.ebuddy.com
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
66.150.198.142
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-I617OK
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-I617OK
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-I617OK
time
malicious
HKEY_CURRENT_USER\svejtserfrancenes\bassangerens
metastatical
HKEY_CURRENT_USER\displayledning\Uninstall\Alacrities\boulevardize
whick

Memdumps

Base Address
Regiontype
Protect
Malicious
60D7000
heap
page read and write
malicious
7E80000
direct allocation
page execute and read and write
malicious
60FA000
heap
page read and write
malicious
2421000
heap
page read and write
7E50000
direct allocation
page read and write
610B000
heap
page read and write
B6E000
stack
page read and write
36D99000
heap
page read and write
401000
unkown
page execute read
241D000
heap
page read and write
242C000
heap
page read and write
43A0000
remote allocation
page execute and read and write
594000
heap
page read and write
2429000
heap
page read and write
36921000
heap
page read and write
10003000
unkown
page readonly
594000
heap
page read and write
2431000
heap
page read and write
500000
heap
page read and write
400000
unkown
page readonly
25A0000
remote allocation
page execute and read and write
2BB2000
heap
page read and write
2BB2000
heap
page read and write
2463000
heap
page read and write
2BB2000
heap
page read and write
2B50000
heap
page read and write
2B55000
heap
page read and write
610F000
heap
page read and write
8F7000
heap
page read and write
36920000
heap
page read and write
2400000
heap
page read and write
2F43000
heap
page read and write
2F4F000
heap
page read and write
2B47000
heap
page read and write
7E10000
direct allocation
page read and write
2421000
heap
page read and write
611A000
heap
page read and write
10001000
unkown
page execute read
2B49000
heap
page read and write
401000
unkown
page execute read
2B46000
heap
page read and write
2430000
heap
page read and write
9D000
stack
page read and write
36D5B000
heap
page read and write
2492000
heap
page read and write
505000
heap
page read and write
459000
system
page execute and read and write
2FF2000
heap
page read and write
3669D000
stack
page read and write
612E000
heap
page read and write
3691F000
stack
page read and write
8880000
direct allocation
page execute and read and write
2429000
heap
page read and write
D2E000
stack
page read and write
2B47000
heap
page read and write
611A000
heap
page read and write
2420000
heap
page read and write
400000
unkown
page readonly
243D000
heap
page read and write
2BB2000
heap
page read and write
408000
unkown
page readonly
2F40000
trusted library allocation
page read and write
401000
unkown
page execute read
61E000
stack
page read and write
B50000
heap
page read and write
243D000
heap
page read and write
7E3000
unkown
page readonly
241C000
heap
page read and write
8F1000
heap
page read and write
2B41000
heap
page read and write
97F000
stack
page read and write
9C000
stack
page read and write
594000
heap
page read and write
19C000
stack
page read and write
2BB2000
heap
page read and write
905000
heap
page read and write
2B46000
heap
page read and write
2F47000
heap
page read and write
2424000
heap
page read and write
594000
heap
page read and write
CAF000
stack
page read and write
401000
unkown
page execute read
2BB2000
heap
page read and write
2B50000
heap
page read and write
594000
heap
page read and write
2B58000
heap
page read and write
2BB2000
heap
page read and write
504000
heap
page read and write
2BB2000
heap
page read and write
2494000
heap
page read and write
36D99000
heap
page read and write
2B41000
heap
page read and write
2B55000
heap
page read and write
2BB2000
heap
page read and write
7E3000
unkown
page readonly
85E000
stack
page read and write
2FC0000
direct allocation
page read and write
7A4000
unkown
page read and write
63AE000
stack
page read and write
2424000
heap
page read and write
780000
heap
page read and write
7E3000
unkown
page readonly
36DA9000
heap
page read and write
504000
heap
page read and write
2FD0000
direct allocation
page read and write
1BA0000
remote allocation
page execute and read and write
2BB2000
heap
page read and write
B33000
heap
page read and write
9C000
stack
page read and write
2BB2000
heap
page read and write
408000
unkown
page readonly
2F40000
trusted library allocation
page read and write
243D000
heap
page read and write
2BA7000
heap
page read and write
45C000
system
page execute and read and write
2B41000
heap
page read and write
4FE000
stack
page read and write
2431000
heap
page read and write
18F000
stack
page read and write
2F50000
direct allocation
page read and write
2423000
heap
page read and write
B56000
heap
page read and write
7480000
direct allocation
page execute and read and write
36D4B000
heap
page read and write
37FC000
stack
page read and write
2B74000
heap
page read and write
75D000
heap
page read and write
611A000
heap
page read and write
2F70000
direct allocation
page read and write
504000
heap
page read and write
2430000
heap
page read and write
473000
system
page execute and read and write
2F80000
direct allocation
page read and write
77C000
unkown
page read and write
504000
heap
page read and write
5E0000
heap
page read and write
400000
unkown
page readonly
2435000
heap
page read and write
36921000
heap
page read and write
A90000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
2BB2000
heap
page read and write
243D000
heap
page read and write
36D4C000
heap
page read and write
7E3000
unkown
page readonly
36D1B000
heap
page read and write
7DF000
unkown
page read and write
6090000
heap
page read and write
2438000
heap
page read and write
36DAD000
heap
page read and write
2B58000
heap
page read and write
594000
heap
page read and write
789000
unkown
page read and write
40A000
unkown
page write copy
2B5B000
heap
page read and write
10005000
unkown
page readonly
456000
system
page execute and read and write
242C000
heap
page read and write
36BB1000
heap
page read and write
505000
heap
page read and write
8E2000
heap
page read and write
504000
heap
page read and write
3634F000
stack
page read and write
2BB2000
heap
page read and write
19C000
stack
page read and write
2441000
heap
page read and write
2410000
heap
page read and write
2941000
heap
page read and write
594000
heap
page read and write
6080000
direct allocation
page execute and read and write
504000
heap
page read and write
243D000
heap
page read and write
2430000
heap
page read and write
3659C000
stack
page read and write
2B46000
heap
page read and write
2B50000
heap
page read and write
2B47000
heap
page read and write
550000
heap
page read and write
7AD000
unkown
page read and write
9C000
stack
page read and write
2B58000
heap
page read and write
408000
unkown
page readonly
366DE000
stack
page read and write
64AF000
stack
page read and write
243D000
heap
page read and write
594000
heap
page read and write
504000
heap
page read and write
2F0F000
stack
page read and write
2440000
heap
page read and write
505000
heap
page read and write
594000
heap
page read and write
610B000
heap
page read and write
2431000
heap
page read and write
2435000
heap
page read and write
8CE000
heap
page read and write
408000
unkown
page readonly
38FB000
stack
page read and write
787000
heap
page read and write
610B000
heap
page read and write
B3C000
heap
page read and write
2B46000
heap
page read and write
243E000
heap
page read and write
36CA2000
heap
page read and write
2421000
heap
page read and write
243D000
heap
page read and write
2BB2000
heap
page read and write
243E000
heap
page read and write
7CA000
unkown
page read and write
23F0000
heap
page read and write
2433000
heap
page read and write
401000
unkown
page execute read
40A000
unkown
page read and write
A20000
heap
page read and write
594000
heap
page read and write
400000
unkown
page readonly
242D000
heap
page read and write
CB0000
heap
page read and write
2BB2000
heap
page read and write
2435000
heap
page read and write
57A0000
remote allocation
page execute and read and write
2430000
heap
page read and write
241C000
heap
page read and write
36D99000
heap
page read and write
408000
unkown
page readonly
71E000
stack
page read and write
7EF0000
heap
page read and write
36D99000
heap
page read and write
2F30000
direct allocation
page read and write
36F71000
direct allocation
page execute and read and write
5E8000
heap
page read and write
2842000
heap
page read and write
6070000
heap
page read and write
30000
heap
page read and write
19A000
stack
page read and write
243D000
heap
page read and write
504000
heap
page read and write
616000
heap
page read and write
2BB2000
heap
page read and write
A7F000
stack
page read and write
7EA0000
direct allocation
page read and write
2433000
heap
page read and write
2B46000
heap
page read and write
2B46000
heap
page read and write
2B41000
heap
page read and write
241C000
heap
page read and write
2B50000
heap
page read and write
611A000
heap
page read and write
64F000
heap
page read and write
242D000
heap
page read and write
30000
heap
page read and write
7B3000
unkown
page read and write
7E80000
direct allocation
page read and write
36DA9000
heap
page read and write
594000
heap
page read and write
243D000
heap
page read and write
243D000
heap
page read and write
2940000
heap
page read and write
28C0000
heap
page read and write
36BB0000
heap
page read and write
B3C000
heap
page read and write
36CA3000
heap
page read and write
7E20000
direct allocation
page read and write
2841000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
246A000
heap
page read and write
2FF3000
heap
page read and write
2F40000
trusted library allocation
page read and write
36A12000
heap
page read and write
504000
heap
page read and write
36F40000
unclassified section
page execute and read and write
2BB2000
heap
page read and write
25E0000
heap
page read and write
69D000
stack
page read and write
8D2000
heap
page read and write
2430000
heap
page read and write
6A0000
heap
page read and write
7E3000
unkown
page readonly
505000
heap
page read and write
2435000
heap
page read and write
2840000
heap
page read and write
2493000
heap
page read and write
6270000
heap
page read and write
611F000
heap
page read and write
243E000
heap
page read and write
611A000
heap
page read and write
BAE000
stack
page read and write
2B58000
heap
page read and write
2B41000
heap
page read and write
2B41000
heap
page read and write
36999000
heap
page read and write
2430000
heap
page read and write
36D94000
heap
page read and write
2FD2000
heap
page read and write
2430000
heap
page read and write
4C80000
direct allocation
page execute and read and write
2429000
heap
page read and write
26CE000
stack
page read and write
2BB2000
heap
page read and write
2B55000
heap
page read and write
662E000
stack
page read and write
2BB2000
heap
page read and write
26B1000
heap
page read and write
367DF000
stack
page read and write
594000
heap
page read and write
29FF000
heap
page read and write
2B41000
heap
page read and write
2BB2000
heap
page read and write
2421000
heap
page read and write
2F40000
direct allocation
page read and write
2B41000
heap
page read and write
7A2000
heap
page read and write
81E000
stack
page read and write
7E30000
direct allocation
page read and write
2F41000
heap
page read and write
505000
heap
page read and write
57E000
stack
page read and write
6A80000
direct allocation
page execute and read and write
95E000
stack
page read and write
2FB0000
direct allocation
page read and write
41B000
system
page execute and read and write
36F2C000
unclassified section
page execute and read and write
6113000
heap
page read and write
610B000
heap
page read and write
618000
heap
page read and write
610B000
heap
page read and write
2BB2000
heap
page read and write
30000
heap
page read and write
594000
heap
page read and write
7E70000
direct allocation
page read and write
28D0000
heap
page read and write
242C000
heap
page read and write
2B41000
heap
page read and write
608000
heap
page read and write
2BB2000
heap
page read and write
A1F000
stack
page read and write
243D000
heap
page read and write
2B46000
heap
page read and write
2FA0000
remote allocation
page execute and read and write
36CA3000
heap
page read and write
177000
stack
page read and write
2430000
heap
page read and write
26F5000
heap
page read and write
36360000
heap
page read and write
2B41000
heap
page read and write
2430000
heap
page read and write
19A000
stack
page read and write
2AC0000
heap
page read and write
590000
heap
page read and write
610B000
heap
page read and write
246A000
heap
page read and write
2F10000
trusted library allocation
page read and write
7A1000
heap
page read and write
2F30000
trusted library allocation
page read and write
243D000
heap
page read and write
2B41000
heap
page read and write
2B41000
heap
page read and write
504000
heap
page read and write
2421000
heap
page read and write
19F000
stack
page read and write
2B42000
heap
page read and write
26B1000
heap
page read and write
2BB2000
heap
page read and write
612A000
heap
page read and write
601000
heap
page read and write
3624E000
stack
page read and write
36ED0000
unclassified section
page execute and read and write
7DD000
stack
page read and write
3699A000
heap
page read and write
408000
unkown
page readonly
2F60000
direct allocation
page read and write
36D8B000
heap
page read and write
400000
unkown
page readonly
64EE000
stack
page read and write
2429000
heap
page read and write
30000
heap
page read and write
10000000
unkown
page readonly
782000
unkown
page read and write
193000
stack
page read and write
27FF000
stack
page read and write
40A000
unkown
page write copy
2B5B000
heap
page read and write
36F5B000
unclassified section
page execute and read and write
244E000
heap
page read and write
2B46000
heap
page read and write
753000
heap
page read and write
2B46000
heap
page read and write
750000
heap
page read and write
243D000
heap
page read and write
241F000
heap
page read and write
2B4B000
heap
page read and write
243E000
heap
page read and write
612A000
heap
page read and write
2431000
heap
page read and write
2438000
heap
page read and write
2423000
heap
page read and write
610B000
heap
page read and write
2BB2000
heap
page read and write
2494000
heap
page read and write
244A000
heap
page read and write
36D1B000
heap
page read and write
612E000
heap
page read and write
3681D000
stack
page read and write
2B46000
heap
page read and write
2941000
heap
page read and write
2BB2000
heap
page read and write
7E3000
unkown
page readonly
2B40000
heap
page read and write
79B000
heap
page read and write
2494000
heap
page read and write
5680000
direct allocation
page execute and read and write
594000
heap
page read and write
2430000
heap
page read and write
2B58000
heap
page read and write
7A6000
unkown
page read and write
26F0000
heap
page read and write
59E000
stack
page read and write
612E000
heap
page read and write
611A000
heap
page read and write
36EA9000
unclassified section
page execute and read and write
504000
heap
page read and write
2BB2000
heap
page read and write
2431000
heap
page read and write
36C2A000
heap
page read and write
2278000
heap
page read and write
243D000
heap
page read and write
611A000
heap
page read and write
612A000
heap
page read and write
2B7F000
heap
page read and write
6190000
heap
page read and write
890000
heap
page read and write
400000
system
page execute and read and write
611E000
heap
page read and write
2B48000
heap
page read and write
2431000
heap
page read and write
3700000
heap
page read and write
39A0000
remote allocation
page execute and read and write
243D000
heap
page read and write
408000
unkown
page readonly
2433000
heap
page read and write
2F40000
trusted library allocation
page read and write
2306000
heap
page read and write
2435000
heap
page read and write
2431000
heap
page read and write
7E3000
unkown
page readonly
504000
heap
page read and write
36A12000
heap
page read and write
306B000
heap
page read and write
36DB7000
heap
page read and write
36D99000
heap
page read and write
53E000
stack
page read and write
3072000
heap
page read and write
2FA0000
direct allocation
page read and write
6098000
heap
page read and write
611E000
heap
page read and write
2BB2000
heap
page read and write
91F000
stack
page read and write
36F70000
direct allocation
page read and write
243D000
heap
page read and write
4B60000
direct allocation
page execute and read and write
26B0000
heap
page read and write
4DA0000
remote allocation
page execute and read and write
594000
heap
page read and write
2F10000
direct allocation
page read and write
2B74000
heap
page read and write
B30000
heap
page read and write
2B46000
heap
page read and write
612A000
heap
page read and write
505000
heap
page read and write
30000
heap
page read and write
75E000
heap
page read and write
2489000
heap
page read and write
627000
heap
page read and write
91E000
stack
page read and write
2BB2000
heap
page read and write
2B50000
heap
page read and write
786000
unkown
page read and write
5A0000
heap
page read and write
8A0000
heap
page read and write
620000
heap
page read and write
36BB1000
heap
page read and write
400000
system
page execute and read and write
30A7000
heap
page read and write
98000
stack
page read and write
E2F000
stack
page read and write
610F000
heap
page read and write
2BB2000
heap
page read and write
2B41000
heap
page read and write
895000
heap
page read and write
2B41000
heap
page read and write
3699A000
heap
page read and write
2429000
heap
page read and write
2B5B000
heap
page read and write
40A000
unkown
page write copy
2BB2000
heap
page read and write
401000
unkown
page execute read
2F40000
trusted library allocation
page read and write
2B41000
heap
page read and write
505000
heap
page read and write
AD0000
trusted library allocation
page read and write
2841000
heap
page read and write
40A000
unkown
page write copy
40A000
unkown
page write copy
2B41000
heap
page read and write
2B41000
heap
page read and write
60C0000
heap
page read and write
2260000
heap
page read and write
241C000
heap
page read and write
40A000
unkown
page write copy
2841000
heap
page read and write
2421000
heap
page read and write
36F86000
direct allocation
page execute and read and write
63B000
heap
page read and write
2494000
heap
page read and write
4BE000
stack
page read and write
2B46000
heap
page read and write
2BB2000
heap
page read and write
401000
unkown
page execute read
2B55000
heap
page read and write
2435000
heap
page read and write
400000
unkown
page readonly
2F40000
trusted library allocation
page read and write
A90000
heap
page read and write
400000
unkown
page readonly
A5F000
stack
page read and write
241C000
heap
page read and write
2429000
heap
page read and write
612A000
heap
page read and write
243D000
heap
page read and write
2B5B000
heap
page read and write
2BB2000
heap
page read and write
2AC4000
heap
page read and write
2B74000
heap
page read and write
17C000
stack
page read and write
2BB2000
heap
page read and write
35F3F000
stack
page read and write
36EC3000
unclassified section
page execute and read and write
400000
system
page execute and read and write
2B42000
heap
page read and write
2B46000
heap
page read and write
2FDA000
heap
page read and write
243D000
heap
page read and write
243D000
heap
page read and write
666E000
stack
page read and write
36D99000
heap
page read and write
2870000
heap
page read and write
2438000
heap
page read and write
6280000
heap
page read and write
7E40000
direct allocation
page read and write
2B49000
heap
page read and write
2B55000
heap
page read and write
2430000
heap
page read and write
36F26000
unclassified section
page execute and read and write
594000
heap
page read and write
6195000
heap
page read and write
2B41000
heap
page read and write
268E000
stack
page read and write
2B41000
heap
page read and write
2BB2000
heap
page read and write
1A80000
remote allocation
page execute and read and write
2BB2000
heap
page read and write
64F0000
heap
page read and write
8A8000
heap
page read and write
36E50000
unclassified section
page execute and read and write
611A000
heap
page read and write
504000
heap
page read and write
2B41000
heap
page read and write
243D000
heap
page read and write
2941000
heap
page read and write
7E60000
direct allocation
page read and write
36998000
heap
page read and write
611A000
heap
page read and write
2BB2000
heap
page read and write
6156000
heap
page read and write
36998000
heap
page read and write
75D000
heap
page read and write
7E90000
direct allocation
page read and write
2B55000
heap
page read and write
8DF000
stack
page read and write
505000
heap
page read and write
8DE000
heap
page read and write
2BB2000
heap
page read and write
504000
heap
page read and write
2B41000
heap
page read and write
2BB2000
heap
page read and write
594000
heap
page read and write
2421000
heap
page read and write
2B41000
heap
page read and write
2BB2000
heap
page read and write
2BB2000
heap
page read and write
There are 580 hidden memdumps, click here to show them.