IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\SelfDel.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe
C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe /VERYSILENT /SP- /NORESTART
malicious
C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp
"C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp" /SL5="$20468,737659,54272,C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe" /VERYSILENT /SP- /NORESTART

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://www.remobjects.com/psU
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.remobjects.com/ps
unknown
http://msn.youbak.com2
unknown
http://msn.youbak.com#
unknown
http://msn.youbak.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
643000
heap
page read and write
20C0000
heap
page read and write
313E000
stack
page read and write
72A000
heap
page read and write
73C000
heap
page read and write
27CF000
stack
page read and write
337F000
stack
page read and write
21E8000
direct allocation
page read and write
40B000
unkown
page read and write
1F61000
direct allocation
page read and write
49B000
unkown
page write copy
5D0000
heap
page read and write
500000
heap
page read and write
755000
heap
page read and write
401000
unkown
page execute read
9B000
stack
page read and write
1F3F000
stack
page read and write
409000
unkown
page read and write
21DC000
direct allocation
page read and write
60B000
heap
page read and write
498000
unkown
page write copy
430000
heap
page read and write
21D7000
direct allocation
page read and write
1F40000
heap
page read and write
221C000
direct allocation
page read and write
6C0000
heap
page read and write
770000
heap
page read and write
670000
heap
page read and write
600000
heap
page read and write
220C000
direct allocation
page read and write
650000
heap
page read and write
251F000
stack
page read and write
21D0000
direct allocation
page read and write
9B000
stack
page read and write
407000
unkown
page readonly
52A000
heap
page read and write
6D0000
heap
page read and write
21D8000
direct allocation
page read and write
1F68000
direct allocation
page read and write
1F0000
heap
page read and write
4A9000
unkown
page readonly
675000
heap
page read and write
400000
unkown
page readonly
411000
unkown
page readonly
409000
unkown
page write copy
20BF000
stack
page read and write
2214000
direct allocation
page read and write
510000
heap
page read and write
67A000
heap
page read and write
61D000
heap
page read and write
48E000
stack
page read and write
401000
unkown
page execute read
19A000
stack
page read and write
19C000
stack
page read and write
700000
direct allocation
page read and write
400000
unkown
page readonly
20C4000
heap
page read and write
2210000
direct allocation
page read and write
21DF000
stack
page read and write
400000
unkown
page readonly
40B000
unkown
page write copy
690000
direct allocation
page execute and read and write
60E000
stack
page read and write
21D0000
direct allocation
page read and write
1F54000
direct allocation
page read and write
7B2000
heap
page read and write
407000
unkown
page readonly
4A9000
unkown
page readonly
830000
heap
page read and write
1E3E000
stack
page read and write
740000
heap
page read and write
651000
heap
page read and write
3100000
direct allocation
page read and write
652000
heap
page read and write
520000
heap
page read and write
5CE000
stack
page read and write
651000
heap
page read and write
4B0000
heap
page read and write
53D000
heap
page read and write
73E000
stack
page read and write
2780000
trusted library allocation
page read and write
7B3000
heap
page read and write
42C000
unkown
page readonly
420000
heap
page read and write
720000
heap
page read and write
27D9000
heap
page read and write
401000
unkown
page execute read
22DF000
stack
page read and write
241E000
stack
page read and write
766000
heap
page read and write
2204000
direct allocation
page read and write
421000
unkown
page read and write
21F4000
direct allocation
page read and write
411000
unkown
page readonly
7B5000
heap
page read and write
7B2000
heap
page read and write
98000
stack
page read and write
323F000
stack
page read and write
27DA000
heap
page read and write
42C000
unkown
page readonly
327E000
stack
page read and write
21E8000
direct allocation
page read and write
5A0000
heap
page read and write
7B5000
heap
page read and write
4C0000
heap
page read and write
401000
unkown
page execute read
27D3000
heap
page read and write
5B0000
heap
page read and write
21D0000
direct allocation
page read and write
400000
unkown
page readonly
4B5000
heap
page read and write
401000
unkown
page execute read
64E000
stack
page read and write
2380000
heap
page read and write
19C000
stack
page read and write
2018000
direct allocation
page read and write
2201000
direct allocation
page read and write
700000
direct allocation
page read and write
40D000
unkown
page write copy
401000
unkown
page execute read
2208000
direct allocation
page read and write
7BE000
stack
page read and write
20DF000
stack
page read and write
400000
unkown
page readonly
1F50000
direct allocation
page read and write
497000
unkown
page write copy
400000
unkown
page readonly
497000
unkown
page read and write
2218000
direct allocation
page read and write
429000
unkown
page read and write
644000
heap
page read and write
3100000
direct allocation
page read and write
751000
heap
page read and write
2203000
direct allocation
page read and write
21CF000
stack
page read and write
499000
unkown
page read and write
1F61000
direct allocation
page read and write
There are 127 hidden memdumps, click here to show them.