IOC Report
5IRIk4f1PO.exe

loading gif

Files

File Path
Type
Category
Malicious
5IRIk4f1PO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\kat6899.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\HIIEGHJJDGHC\AAAKEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\HIIEGHJJDGHC\CFIECB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
modified
C:\ProgramData\HIIEGHJJDGHC\DAKJDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIIEGHJJDGHC\DBKFHJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HIIEGHJJDGHC\EBGCBA
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIIEGHJJDGHC\EBKJDB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HIIEGHJJDGHC\GCFHDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sqlt[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\5IRIk4f1PO.exe
"C:\Users\user\Desktop\5IRIk4f1PO.exe"
malicious
C:\Users\user\AppData\Local\Temp\kat6899.tmp
C:\Users\user\AppData\Local\Temp\kat6899.tmp
malicious

URLs

Name
IP
Malicious
https://t.me/
unknown
malicious
https://steamcommunity.com/profiles/76561199707802586
malicious
https://t.me/g067n
149.154.167.99
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
https://195.201.251.214:9000/mozglue.dll
unknown
https://195.201.251.214:9000/nss3.dll
unknown
https://web.telegram.org
unknown
https://steamcommunity.com/profiles/76561199707802586hellosqlt.dllsqlite3.dll
unknown
https://195.201.251.214:9000/
unknown
http://www.borland.com/namespaces/TypesP
unknown
https://195.201.251.214:9000/freebl3.dllD
unknown
https://195.201.251.214:9000/l
unknown
https://195.201.251.214:9000/mozglue.dllge
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/soap/encoding/on-c
unknown
https://195.201.251.214:9000/k
unknown
https://195.201.251.214:9000/Mac
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://195.201.251.214:9000/icrosoft
unknown
http://www.borland.com/namespaces/Types
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://195.201.251.214:9000/sqlt.dllV
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://195.201.251.214:900010ale
unknown
https://195.201.251.214:9000/0aosoft
unknown
https://195.201.251.214:9000/freebl3.dll
unknown
https://195.201.251.214:9000/sqlt.dllL
unknown
https://t.me/g067nr
unknown
https://195.201.251.214:9000/softokn3.dll
unknown
https://t.me/g067nry1neMozilla/5.0
unknown
http://www.sqlite.org/copyright.html.
unknown
https://195.201.251.214:9000/freebl3.dllet
unknown
https://195.201.251.214:9000/nss3.dllm
unknown
https://195.201.251.214:9000g
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://195.201.251.214:9000/msvcp140.dll
unknown
https://195.201.251.214:9000/vcruntime140.dll/
unknown
https://195.201.251.214:9000/C
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://rpi.net.au/~ajohnson/resourcehacker
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://195.201.251.214:9000/vcruntime140.dllrv:129.0)
unknown
https://195.201.251.214:9000/freebl3.dlll
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
unknown
https://www.ecosia.org/newtab/
unknown
https://195.201.251.214:9000/vcruntime140.dller
unknown
https://195.201.251.214:9000/vcruntime140.dll
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://195.201.251.214:9000/msvcp140.dlle
unknown
https://195.201.251.214:9000/softokn3.dlle
unknown
https://195.201.251.214:9000/xg
unknown
https://195.201.251.214:9000/d
unknown
https://195.201.251.214:9000/freebl3.dllge
unknown
http://www.borland.com/namespaces/Types0
unknown
http://www.borland.com/namespaces/Types2u.dll
unknown
https://195.201.251.214/
unknown
http://www.borland.com/namespaces/Typesmmon-c
unknown
https://195.201.251.214:9000
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://www.borland.com/namespaces/Typesc0da53
unknown
http://www.borland.com/namespaces/Typesxt_4
unknown
http://www.borland.com/namespaces/TypesStv4
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://195.201.251.214:9000/sqlt.dll
unknown
https://195.201.251.214:9000ontent-Disposition:
unknown
https://195.201.251.214:9000Microsoft
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
t.me
149.154.167.99
malicious
windowsupdatebg.s.llnwi.net
178.79.238.0

IPs

IP
Domain
Country
Malicious
149.154.167.99
t.me
United Kingdom
malicious
195.201.251.214
unknown
Germany

Memdumps

Base Address
Regiontype
Protect
Malicious
29D0000
direct allocation
page execute and read and write
malicious
445000
remote allocation
page execute and read and write
malicious
2ADB000
direct allocation
page execute and read and write
malicious
40A0000
direct allocation
page read and write
malicious
2420000
direct allocation
page execute and read and write
malicious
9BD000
heap
page read and write
A82000
heap
page read and write
96A000
heap
page read and write
AEC000
heap
page read and write
2480000
heap
page read and write
A82000
heap
page read and write
400000
unkown
page readonly
804000
heap
page read and write
991000
heap
page read and write
ADD000
heap
page read and write
9DD000
heap
page read and write
804000
heap
page read and write
8FF1000
heap
page read and write
99C000
heap
page read and write
8FF1000
heap
page read and write
994000
heap
page read and write
2BB7B000
heap
page read and write
ADD000
heap
page read and write
95A000
heap
page read and write
994000
heap
page read and write
1D960000
remote allocation
page read and write
168AE000
stack
page read and write
A6D000
heap
page read and write
ADD000
heap
page read and write
43F000
remote allocation
page execute and read and write
720000
heap
page read and write
AD1000
heap
page read and write
9CD000
heap
page read and write
8F4000
heap
page read and write
9BD000
heap
page read and write
9F9000
heap
page read and write
A23000
heap
page read and write
9D2000
heap
page read and write
8FF1000
heap
page read and write
200E0000
heap
page read and write
18E3E000
stack
page read and write
502000
remote allocation
page execute and read and write
11D6F000
stack
page read and write
945000
heap
page read and write
804000
heap
page read and write
91F000
heap
page read and write
8FF1000
heap
page read and write
202FF000
direct allocation
page readonly
20332000
direct allocation
page read and write
90F0000
unclassified section
page read and write
9BD000
heap
page read and write
8FF1000
heap
page read and write
9C8000
heap
page read and write
5C8000
remote allocation
page execute and read and write
1FF2D000
heap
page read and write
9D2000
heap
page read and write
A82000
heap
page read and write
ADF000
heap
page read and write
439000
remote allocation
page execute and read and write
A05000
heap
page read and write
AB0000
heap
page read and write
A23000
heap
page read and write
A26000
heap
page read and write
9EC000
heap
page read and write
9EB000
heap
page read and write
9F3000
heap
page read and write
8FF1000
heap
page read and write
A05000
heap
page read and write
8FF1000
heap
page read and write
24A0E000
stack
page read and write
AB0000
heap
page read and write
19C000
stack
page read and write
142EF000
stack
page read and write
A16000
heap
page read and write
4AC000
unkown
page write copy
430000
remote allocation
page execute and read and write
99C000
heap
page read and write
4F1000
unkown
page read and write
9F3000
heap
page read and write
988000
heap
page read and write
900000
heap
page read and write
A82000
heap
page read and write
1D960000
remote allocation
page read and write
804000
heap
page read and write
9DD000
heap
page read and write
804000
heap
page read and write
200F1000
direct allocation
page execute read
20308000
direct allocation
page readonly
A05000
heap
page read and write
804000
heap
page read and write
890000
heap
page read and write
1B37D000
stack
page read and write
A2D000
heap
page read and write
A22000
heap
page read and write
2BC22000
heap
page read and write
18DEF000
stack
page read and write
ADC000
heap
page read and write
1FF75000
heap
page read and write
8FF1000
heap
page read and write
804000
heap
page read and write
9EB000
heap
page read and write
950000
heap
page read and write
11DAE000
stack
page read and write
A28000
heap
page read and write
ADC000
heap
page read and write
9BD000
heap
page read and write
ADD000
heap
page read and write
1C0000
heap
page read and write
8FF1000
heap
page read and write
720000
heap
page read and write
ADC000
heap
page read and write
9D2000
heap
page read and write
9F2000
heap
page read and write
640000
heap
page read and write
9FA000
heap
page read and write
77E000
heap
page read and write
8FF1000
heap
page read and write
8FF1000
heap
page read and write
2033D000
direct allocation
page readonly
A26000
heap
page read and write
4D1000
remote allocation
page execute and read and write
804000
heap
page read and write
9E7000
heap
page read and write
A56000
heap
page read and write
AE3000
heap
page read and write
ADD000
heap
page read and write
804000
heap
page read and write
9DD000
heap
page read and write
9FC000
heap
page read and write
8FF1000
heap
page read and write
8FF1000
heap
page read and write
4F5000
unkown
page write copy
AE3000
heap
page read and write
8FF1000
heap
page read and write
8FF1000
heap
page read and write
966000
heap
page read and write
A0B000
heap
page read and write
804000
heap
page read and write
4B1000
remote allocation
page execute and read and write
8FF1000
heap
page read and write
A05000
heap
page read and write
1FF00000
heap
page read and write
9C1000
heap
page read and write
95A000
heap
page read and write
86E000
stack
page read and write
804000
heap
page read and write
AC7000
heap
page read and write
A0C000
heap
page read and write
A1A000
heap
page read and write
7EE000
heap
page read and write
98B000
heap
page read and write
401000
unkown
page execute read
A05000
heap
page read and write
A1C000
heap
page read and write
8FF1000
heap
page read and write
7EB000
heap
page read and write
A6D000
heap
page read and write
20060000
trusted library allocation
page read and write
B0F000
heap
page read and write
AB1000
heap
page read and write
924000
heap
page read and write
9CE000
heap
page read and write
2BC24000
heap
page read and write
9E2000
heap
page read and write
8FF1000
heap
page read and write
95A000
heap
page read and write
8FF1000
heap
page read and write
982000
heap
page read and write
ADC000
heap
page read and write
8FF1000
heap
page read and write
B10000
heap
page read and write
A06000
heap
page read and write
8FF1000
heap
page read and write
7E0000
heap
page read and write
8FF1000
heap
page read and write
9C6000
heap
page read and write
8F7000
heap
page read and write
A22000
heap
page read and write
A28000
heap
page read and write
8FF1000
heap
page read and write
988000
heap
page read and write
983000
heap
page read and write
9E7000
heap
page read and write
2BA16000
heap
page read and write
AE2000
heap
page read and write
7A9000
heap
page read and write
224CE000
stack
page read and write
2BB5D000
heap
page read and write
1FF6D000
heap
page read and write
933000
heap
page read and write
90C000
heap
page read and write
A26000
heap
page read and write
AC7000
heap
page read and write
A26000
heap
page read and write
89E000
heap
page read and write
987000
heap
page read and write
A0D000
heap
page read and write
A0C000
heap
page read and write
ADF000
heap
page read and write
8FF1000
heap
page read and write
AF5000
heap
page read and write
8FF1000
heap
page read and write
A82000
heap
page read and write
97000
stack
page read and write
ADD000
heap
page read and write
52D000
remote allocation
page execute and read and write
1B3BE000
stack
page read and write
9E5000
heap
page read and write
1D960000
remote allocation
page read and write
B0F000
heap
page read and write
4A9000
remote allocation
page execute and read and write
50E000
remote allocation
page execute and read and write
8FF1000
heap
page read and write
9F3000
heap
page read and write
800000
heap
page read and write
9DC000
heap
page read and write
991000
heap
page read and write
804000
heap
page read and write
9E0000
heap
page read and write
9E1000
heap
page read and write
96A000
heap
page read and write
9DD000
heap
page read and write
99C000
heap
page read and write
202FD000
direct allocation
page execute read
A2B000
heap
page read and write
2280000
heap
page read and write
A27000
heap
page read and write
20256000
direct allocation
page execute read
A1D000
heap
page read and write
A06000
heap
page read and write
810000
trusted library allocation
page read and write
9F2000
heap
page read and write
AE9000
heap
page read and write
9E5000
heap
page read and write
4F1000
unkown
page write copy
917000
heap
page read and write
9EF000
heap
page read and write
400000
unkown
page readonly
995000
heap
page read and write
539000
remote allocation
page execute and read and write
89A000
heap
page read and write
1432E000
stack
page read and write
1F0000
heap
page read and write
4AF000
unkown
page write copy
2483000
heap
page read and write
A0A000
heap
page read and write
944000
heap
page read and write
A16000
heap
page read and write
1FF0C000
heap
page read and write
22F0000
heap
page read and write
8FF1000
heap
page read and write
200F8000
direct allocation
page execute read
A08000
heap
page read and write
810000
heap
page read and write
9C000
stack
page read and write
19C000
stack
page read and write
804000
heap
page read and write
9FA000
heap
page read and write
962000
heap
page read and write
9D8000
heap
page read and write
ADC000
heap
page read and write
987000
heap
page read and write
401000
unkown
page execute read
804000
heap
page read and write
ADD000
heap
page read and write
8FF1000
heap
page read and write
42E3000
direct allocation
page read and write
A28000
heap
page read and write
9EA000
heap
page read and write
24A4E000
stack
page read and write
AFC000
heap
page read and write
AAF000
stack
page read and write
4F4000
unkown
page read and write
9DD000
heap
page read and write
A24000
heap
page read and write
A9A000
heap
page read and write
8FF1000
heap
page read and write
B10000
heap
page read and write
950000
heap
page read and write
1D8FE000
stack
page read and write
9D2000
heap
page read and write
2BA1D000
heap
page read and write
94E000
heap
page read and write
1FEF0000
heap
page read and write
2004C000
stack
page read and write
9E4000
heap
page read and write
26F8E000
stack
page read and write
8FF1000
heap
page read and write
ADF000
heap
page read and write
2300000
direct allocation
page read and write
A0A000
heap
page read and write
8FF1000
heap
page read and write
AB0000
heap
page read and write
9EC000
heap
page read and write
1FEDF000
stack
page read and write
9D2000
heap
page read and write
A05000
heap
page read and write
8FF1000
heap
page read and write
8FF1000
heap
page read and write
A1F000
heap
page read and write
97E000
heap
page read and write
8FF1000
heap
page read and write
A0A000
heap
page read and write
933000
heap
page read and write
9E4000
heap
page read and write
A28000
heap
page read and write
1686F000
stack
page read and write
A83000
heap
page read and write
8FF1000
heap
page read and write
A5B000
heap
page read and write
2033A000
direct allocation
page readonly
A9B000
heap
page read and write
8FF1000
heap
page read and write
76E000
stack
page read and write
92D000
heap
page read and write
779000
heap
page read and write
9F3000
heap
page read and write
A1F000
heap
page read and write
804000
heap
page read and write
A22000
heap
page read and write
4B4000
unkown
page readonly
9CB000
heap
page read and write
96F000
stack
page read and write
A20000
heap
page read and write
804000
heap
page read and write
AC7000
heap
page read and write
982000
heap
page read and write
804000
heap
page read and write
96E000
heap
page read and write
A1A000
heap
page read and write
98F000
heap
page read and write
980000
heap
page read and write
96E000
heap
page read and write
8FF1000
heap
page read and write
99C000
heap
page read and write
98F000
heap
page read and write
A1C000
heap
page read and write
7AD000
heap
page read and write
8FF0000
heap
page read and write
9F4000
heap
page read and write
982000
heap
page read and write
A44000
heap
page read and write
8FF1000
heap
page read and write
8FF1000
heap
page read and write
8FF1000
heap
page read and write
95C000
heap
page read and write
A22000
heap
page read and write
99A000
heap
page read and write
641000
remote allocation
page execute and read and write
A0C000
heap
page read and write
9C9000
heap
page read and write
9D7000
heap
page read and write
A0D000
heap
page read and write
9000000
heap
page read and write
ADC000
heap
page read and write
4DD000
remote allocation
page execute and read and write
22B0000
direct allocation
page execute and read and write
8FF1000
heap
page read and write
A6D000
heap
page read and write
9C6000
heap
page read and write
A10000
heap
page read and write
99C000
heap
page read and write
8E2000
heap
page read and write
294CC000
stack
page read and write
22A0000
heap
page read and write
994000
heap
page read and write
91E000
heap
page read and write
8FF1000
heap
page read and write
7E7000
heap
page read and write
9FA000
heap
page read and write
4FA000
unkown
page readonly
AF0000
heap
page read and write
425000
remote allocation
page execute and read and write
1D99E000
stack
page read and write
A22000
heap
page read and write
9E4000
heap
page read and write
9C6000
heap
page read and write
9F5000
heap
page read and write
9D9000
heap
page read and write
9CB000
heap
page read and write
9BF000
heap
page read and write
804000
heap
page read and write
95F000
heap
page read and write
963000
heap
page read and write
8FF1000
heap
page read and write
99C000
heap
page read and write
A23000
heap
page read and write
991000
heap
page read and write
9C3000
heap
page read and write
AB0000
heap
page read and write
28C0000
direct allocation
page execute and read and write
4A6000
remote allocation
page execute and read and write
193000
stack
page read and write
A44000
heap
page read and write
962000
heap
page read and write
98C000
heap
page read and write
8FF1000
heap
page read and write
AE2000
heap
page read and write
A5B000
heap
page read and write
9CB000
heap
page read and write
9C6000
heap
page read and write
8FF1000
heap
page read and write
9AE000
stack
page read and write
770000
heap
page read and write
1FF1D000
heap
page read and write
996000
heap
page read and write
A27000
heap
page read and write
20355000
heap
page read and write
9EA000
heap
page read and write
96A000
heap
page read and write
ADC000
heap
page read and write
200F0000
direct allocation
page execute and read and write
A24000
heap
page read and write
A26000
heap
page read and write
96A000
heap
page read and write
B10000
heap
page read and write
AE1000
heap
page read and write
2033F000
direct allocation
page readonly
9F8000
heap
page read and write
There are 409 hidden memdumps, click here to show them.