IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Eclipse IO Library 9.27.43\Eclipse IO Library 9.27.43.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\is-N5JHT.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\is-REN2E.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\is-UG21C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\libssl-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\ssleay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\uninstall\is-GKUSE.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\uninstall\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\ec927it43.dat
ISO-8859 text, with no line terminators
dropped
C:\ProgramData\ec927rc43.dat
data
dropped
C:\ProgramData\ec927resa.dat
ASCII text, with no line terminators
dropped
C:\ProgramData\ec927resb.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\Qt5OpenGL.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\is-3CJHL.tmp
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\is-8SV2U.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\is-RDVP8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\is-T0OEI.tmp
data
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\msvcp71.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\msvcr71.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Gerda Play3 SE\uninstall\unins000.dat
InnoSetup Log Gerda Play3 SE, version 0x30, 4476 bytes, 767668\user, "C:\Users\user\AppData\Local\Gerda Play3 SE"
dropped
C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
"C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe" -i
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
"C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp" /SL5="$20434,3031792,56832,C:\Users\user\Desktop\file.exe"

URLs

Name
IP
Malicious
http://ceyqbgr.net/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf815c5ee949b32
185.208.158.248
malicious
http://ceyqbgr.net/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f
185.208.158.248
malicious
ceyqbgr.net
malicious
http://www.innosetup.com/
unknown
https://sectigo.com/CPS0
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://ocsp.thawte.com0
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://www.certum.pl/CPS0
unknown
http://crl.certum.pl/cscasha2.crl0q
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948
unknown
http://cscasha2.ocsp-certum.com04
unknown
http://www.openssl.org/support/faq.html
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.remobjects.com/psU
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://subca.ocsp-certum.com01
unknown
https://www.openssl.org/H
unknown
http://www.remobjects.com/ps
unknown
http://www.openssl.org/f
unknown
http://www.certum.pl/CPS0
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ceyqbgr.net
185.208.158.248
malicious
18.31.95.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.208.158.248
ceyqbgr.net
Switzerland
malicious
89.105.201.183
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gerda Play3 SE_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\LargeTour
eclipse_io_library_i43_10
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2721000
heap
page read and write
malicious
2D61000
direct allocation
page execute and read and write
malicious
57D1000
heap
page read and write
632000
unkown
page write copy
20D0000
direct allocation
page read and write
2D9A000
direct allocation
page execute and read and write
2520000
heap
page read and write
2152000
direct allocation
page read and write
540000
heap
page read and write
400000
unkown
page readonly
4AC000
unkown
page readonly
5B4B000
direct allocation
page read and write
23D0000
direct allocation
page read and write
2120000
direct allocation
page read and write
401000
unkown
page execute read
5DA000
heap
page read and write
329E000
stack
page read and write
798000
heap
page read and write
604000
heap
page read and write
5A6000
unkown
page execute and write copy
2310000
direct allocation
page read and write
35DF000
stack
page read and write
49A000
unkown
page write copy
30F0000
heap
page read and write
2544000
heap
page read and write
8E0000
direct allocation
page read and write
738000
heap
page read and write
2127000
direct allocation
page read and write
365A000
heap
page read and write
400000
unkown
page readonly
2810000
heap
page read and write
49A000
unkown
page read and write
10000000
unkown
page readonly
62C000
unkown
page readonly
400000
unkown
page readonly
9B000
stack
page read and write
5750000
heap
page read and write
3722000
heap
page read and write
10001000
unkown
page execute read
655000
unkown
page readonly
20E1000
direct allocation
page read and write
2260000
heap
page read and write
27B0000
trusted library allocation
page read and write
2220000
direct allocation
page execute and read and write
5B6A000
direct allocation
page read and write
550000
heap
page read and write
2138000
direct allocation
page read and write
315E000
stack
page read and write
411000
unkown
page readonly
5A4000
unkown
page execute and write copy
420000
heap
page read and write
5AB8000
direct allocation
page read and write
58E0000
direct allocation
page read and write
5B12000
direct allocation
page read and write
2128000
direct allocation
page read and write
2C5D000
stack
page read and write
26FE000
stack
page read and write
22D0000
direct allocation
page read and write
401000
unkown
page execute read
339F000
stack
page read and write
588000
heap
page read and write
212C000
direct allocation
page read and write
2561000
heap
page read and write
2650000
direct allocation
page read and write
238E000
stack
page read and write
58D0000
direct allocation
page read and write
660000
unkown
page readonly
5BF8000
direct allocation
page read and write
790000
heap
page read and write
66E000
unkown
page readonly
636000
unkown
page readonly
31FE000
stack
page read and write
27FC000
stack
page read and write
560000
heap
page read and write
866000
heap
page read and write
49E000
unkown
page write copy
2540000
heap
page read and write
19D000
stack
page read and write
325F000
stack
page read and write
5E7000
heap
page read and write
36A9000
heap
page read and write
19C000
stack
page read and write
40B000
unkown
page read and write
6A7000
heap
page read and write
2250000
heap
page read and write
65E000
unkown
page readonly
36A1000
heap
page read and write
18D000
stack
page read and write
37A7000
heap
page read and write
6D0000
heap
page read and write
6A0000
heap
page read and write
304F000
stack
page read and write
5750000
heap
page read and write
5B5D000
direct allocation
page read and write
68D000
unkown
page readonly
8D0000
heap
page read and write
2747000
heap
page read and write
400000
unkown
page readonly
5B0C000
direct allocation
page read and write
30F0000
direct allocation
page read and write
26D0000
heap
page read and write
30F0000
direct allocation
page read and write
36E0000
heap
page read and write
720000
heap
page read and write
401000
unkown
page execute read
2F4E000
stack
page read and write
5A8000
unkown
page execute and write copy
401000
unkown
page execute and write copy
216E000
direct allocation
page read and write
5D1000
heap
page read and write
71B000
unkown
page readonly
2390000
heap
page read and write
400000
unkown
page execute and read and write
400000
unkown
page readonly
5F2000
heap
page read and write
32FE000
stack
page read and write
401000
unkown
page execute read
22D0000
heap
page read and write
580000
heap
page read and write
5E0000
heap
page read and write
2150000
direct allocation
page read and write
5A88000
direct allocation
page read and write
20E1000
direct allocation
page read and write
910000
heap
page read and write
890000
heap
page read and write
349F000
stack
page read and write
22D9000
heap
page read and write
8B0000
direct allocation
page read and write
5A86000
direct allocation
page read and write
57D0000
heap
page read and write
20D4000
direct allocation
page read and write
40D000
unkown
page write copy
83F000
heap
page read and write
411000
unkown
page readonly
8C2000
direct allocation
page read and write
31AF000
stack
page read and write
2310000
direct allocation
page read and write
20E8000
direct allocation
page read and write
5B3B000
direct allocation
page read and write
23E0000
heap
page read and write
49C000
unkown
page read and write
915000
heap
page read and write
96000
stack
page read and write
845000
heap
page read and write
88C000
heap
page read and write
770000
heap
page read and write
5A84000
direct allocation
page read and write
5750000
heap
page read and write
35E8000
heap
page read and write
197000
stack
page read and write
680000
unkown
page readonly
6A5000
heap
page read and write
5D8000
unkown
page execute and write copy
34DE000
stack
page read and write
5B3D000
direct allocation
page read and write
49B000
unkown
page write copy
2710000
heap
page read and write
5D5000
heap
page read and write
9C000
stack
page read and write
884000
heap
page read and write
24A9000
direct allocation
page read and write
23D0000
direct allocation
page read and write
630000
heap
page read and write
272F000
heap
page read and write
630000
unkown
page write copy
30AE000
stack
page read and write
2198000
direct allocation
page read and write
4AC000
unkown
page readonly
4C0000
heap
page read and write
8C0000
direct allocation
page read and write
2D5F000
stack
page read and write
2138000
direct allocation
page read and write
409000
unkown
page execute and read and write
339E000
stack
page read and write
730000
heap
page read and write
22D5000
heap
page read and write
23E4000
heap
page read and write
10002000
unkown
page readonly
40B000
unkown
page write copy
3614000
heap
page read and write
2F0B000
stack
page read and write
8A0000
direct allocation
page read and write
5750000
heap
page read and write
5B32000
direct allocation
page read and write
5CB000
heap
page read and write
56D0000
trusted library allocation
page read and write
24A0000
direct allocation
page read and write
There are 177 hidden memdumps, click here to show them.