IOC Report
pDHKarOK2v.exe

loading gif

Files

File Path
Type
Category
Malicious
pDHKarOK2v.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\katC422.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\BGIIDAEBGCAA\AAKEGD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGIIDAEBGCAA\AECAEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BGIIDAEBGCAA\BAFBFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\BGIIDAEBGCAA\DHCFID
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BGIIDAEBGCAA\FCFBFH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BGIIDAEBGCAA\HIDGCF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
modified
C:\ProgramData\BGIIDAEBGCAA\JEGHDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BGIIDAEBGCAA\JJJEGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\sqlt[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pDHKarOK2v.exe
"C:\Users\user\Desktop\pDHKarOK2v.exe"
malicious
C:\Users\user\AppData\Local\Temp\katC422.tmp
C:\Users\user\AppData\Local\Temp\katC422.tmp
malicious

URLs

Name
IP
Malicious
https://t.me/
unknown
malicious
https://steamcommunity.com/profiles/76561199707802586
malicious
https://t.me/g067n
149.154.167.99
malicious
https://49.13.159.121:9000/159.121:9000/freebl3.dll
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://49.13.159.121:9000oaming
unknown
https://49.13.159.121:9000ocal
unknown
https://web.telegram.org
unknown
https://steamcommunity.com/profiles/76561199707802586hellosqlt.dllsqlite3.dll
unknown
https://49.13.159.121:9000/J0
unknown
https://49.13.159.121:9000srss.exe
unknown
https://49.13.159.121:9000/softokn3.dllt
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://49.13.159.121:9000/nss3.dllhx
unknown
https://49.13.159.121:9000/vcruntime140.dllge
unknown
https://49.13.159.121/b
unknown
https://49.13.159.121:9000/softokn3.dll
unknown
https://49.13.159.121:9000/nss3.dlltx
unknown
https://49.13.159.121:9000/:0
unknown
https://49.13.159.121:9000/B7
unknown
https://49.13.159.121:9000/softokn3.dllZL
unknown
https://49.13.159.121:9000/mozglue.dllft
unknown
https://49.13.159.121:9000
unknown
https://49.13.159.121:9000/freebl3.dll
unknown
https://49.13.159.121:9000/freebl3.dll)Fqc?
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://49.13.159.121/
unknown
https://49.13.159.121:9000/freebl3.dllft
unknown
https://49.13.159.121:9000/mozglue.dll
unknown
https://49.13.159.121:9000/freebl3.dll)MIb
unknown
https://t.me/g067nry1neMozilla/5.0
unknown
https://49.13.159.121:9000/cal
unknown
http://www.sqlite.org/copyright.html.
unknown
https://49.13.159.121:9000/D
unknown
https://49.13.159.121:9000/nss3.dll
unknown
https://49.13.159.121:9000/vcruntime140.dllpet
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://49.13.159.121:9000/sqlt.dll
unknown
https://49.13.159.121:9000/L
unknown
https://49.13.159.121:9000/R
unknown
https://49.13.159.121:9000/vcruntime140.dlletsC
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://rpi.net.au/~ajohnson/resourcehacker
unknown
http://www.microsoft.
unknown
https://49.13.159.121:9000/msvcp140.dll
unknown
https://49.13.159.121:9000/X
unknown
https://www.ecosia.org/newtab/
unknown
https://49.13.159.121:9000/mozglue.dllposition:
unknown
https://49.13.159.121:90000c530oogle
unknown
https://49.1
unknown
https://49.13.159.121:9000/soft
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://49.13.159.121:9000/nss3.dllosoft
unknown
https://49.13.159.121:9000/lowedCert_AutoUpdate_1
unknown
https://49.13.159.121:9000/
unknown
https://49.13.159.121:9000/mozglue.dll4
unknown
https://49.13.159.121:9000/159.121:9000/msvcp140.dll
unknown
https://49.13.159.121:9000/r
unknown
https://49.13.159.121:9000/r0(b
unknown
https://49.13.159.121:9000el
unknown
https://49.13.159.121:9000/c530icrosoft
unknown
https://49.13.159.121:9000/msvcp140.dllt
unknown
https://49.13.159.121:9000/vcruntime140.dll
unknown
https://49.13.159.121:9000/j00b
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://49.13.159.121:9000/freebl3.dllmFMc5
unknown
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
t.me
149.154.167.99
malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
149.154.167.99
t.me
United Kingdom
malicious
49.13.159.121
unknown
Germany

Memdumps

Base Address
Regiontype
Protect
Malicious
28F0000
direct allocation
page execute and read and write
malicious
445000
remote allocation
page execute and read and write
malicious
29FB000
direct allocation
page execute and read and write
malicious
2BC0000
direct allocation
page execute and read and write
malicious
3FB0000
direct allocation
page read and write
malicious
20120000
heap
page read and write
1B37E000
stack
page read and write
817000
heap
page read and write
9061000
heap
page read and write
8A4000
heap
page read and write
650000
heap
page read and write
8D0000
heap
page read and write
7F7000
heap
page read and write
1FEF0000
heap
page read and write
993000
heap
page read and write
897000
heap
page read and write
9061000
heap
page read and write
899000
heap
page read and write
2320000
heap
page read and write
2004C000
stack
page read and write
8A7000
heap
page read and write
9D9000
heap
page read and write
6F4000
heap
page read and write
87C000
heap
page read and write
18DFF000
stack
page read and write
1FF0C000
heap
page read and write
87A000
heap
page read and write
1FF2D000
heap
page read and write
9D6000
heap
page read and write
5C8000
remote allocation
page execute and read and write
537E000
heap
page read and write
9C0000
heap
page read and write
6F4000
heap
page read and write
8A0000
heap
page read and write
6F4000
heap
page read and write
9061000
heap
page read and write
9061000
heap
page read and write
43F000
remote allocation
page execute and read and write
6F4000
heap
page read and write
81F000
heap
page read and write
87A000
heap
page read and write
9061000
heap
page read and write
8DF000
heap
page read and write
2033D000
direct allocation
page execute read
8B4000
heap
page read and write
915000
heap
page read and write
400000
unkown
page readonly
954000
heap
page read and write
8D3000
heap
page read and write
2BC1F000
heap
page read and write
9061000
heap
page read and write
6F4000
heap
page read and write
20296000
direct allocation
page execute read
885000
heap
page read and write
80B000
heap
page read and write
906F000
heap
page read and write
80A000
heap
page read and write
9C3000
heap
page read and write
8C0000
heap
page read and write
994000
heap
page read and write
50E000
remote allocation
page execute and read and write
9061000
heap
page read and write
26F8E000
stack
page read and write
96A000
heap
page read and write
8B0000
heap
page read and write
954000
heap
page read and write
9C3000
heap
page read and write
1D99E000
stack
page read and write
86A000
heap
page read and write
804000
heap
page read and write
86C000
heap
page read and write
8A6000
heap
page read and write
8B1000
heap
page read and write
8B0000
heap
page read and write
9061000
heap
page read and write
9061000
heap
page read and write
92E000
stack
page read and write
6F4000
heap
page read and write
80A000
heap
page read and write
9061000
heap
page read and write
819000
heap
page read and write
8C0000
heap
page read and write
655000
heap
page read and write
6F4000
heap
page read and write
8D3000
heap
page read and write
817000
heap
page read and write
891000
heap
page read and write
915000
heap
page read and write
899000
heap
page read and write
9C3000
heap
page read and write
9061000
heap
page read and write
89A000
heap
page read and write
9D1000
heap
page read and write
86B000
heap
page read and write
891000
heap
page read and write
8DB000
heap
page read and write
89B000
heap
page read and write
62E000
heap
page read and write
87A000
heap
page read and write
86E000
heap
page read and write
86B000
heap
page read and write
8D6000
heap
page read and write
7E2000
heap
page read and write
86E000
heap
page read and write
4AF000
unkown
page write copy
86E000
heap
page read and write
9D8000
heap
page read and write
8A8000
heap
page read and write
9061000
heap
page read and write
9061000
heap
page read and write
8D0000
heap
page read and write
983000
heap
page read and write
8D6000
heap
page read and write
883000
heap
page read and write
820000
heap
page read and write
965000
heap
page read and write
8AC000
heap
page read and write
9061000
heap
page read and write
87D000
heap
page read and write
89B000
heap
page read and write
9D5000
heap
page read and write
21E4000
direct allocation
page read and write
193000
stack
page read and write
816000
heap
page read and write
9C0000
heap
page read and write
858000
heap
page read and write
89B000
heap
page read and write
8A6000
heap
page read and write
6F4000
heap
page read and write
439000
remote allocation
page execute and read and write
8D3000
heap
page read and write
9065000
heap
page read and write
8A2000
heap
page read and write
52EE000
stack
page read and write
9C1000
heap
page read and write
2393000
heap
page read and write
8ED000
heap
page read and write
8D6000
heap
page read and write
829000
heap
page read and write
8B3000
heap
page read and write
9061000
heap
page read and write
9061000
heap
page read and write
8B4000
heap
page read and write
1FF1D000
heap
page read and write
9D8000
heap
page read and write
700000
trusted library allocation
page read and write
9061000
heap
page read and write
4DD000
remote allocation
page execute and read and write
891000
heap
page read and write
8BA000
heap
page read and write
8B5000
heap
page read and write
6F4000
heap
page read and write
425000
remote allocation
page execute and read and write
9D9000
heap
page read and write
5370000
heap
page read and write
881000
heap
page read and write
1D960000
remote allocation
page read and write
9061000
heap
page read and write
650000
heap
page read and write
9D6000
heap
page read and write
2BA13000
heap
page read and write
7FD000
heap
page read and write
80C000
heap
page read and write
812000
heap
page read and write
8C4000
heap
page read and write
9CD000
heap
page read and write
8AD000
heap
page read and write
9061000
heap
page read and write
532E000
stack
page read and write
7F0000
heap
page read and write
8E8000
heap
page read and write
8DF000
heap
page read and write
94E000
heap
page read and write
87A000
heap
page read and write
1F0000
heap
page read and write
9060000
heap
page read and write
82C000
heap
page read and write
2390000
heap
page read and write
9061000
heap
page read and write
87A000
heap
page read and write
11DDF000
stack
page read and write
7E9000
heap
page read and write
475000
unkown
page readonly
8D0000
heap
page read and write
62A000
heap
page read and write
839000
heap
page read and write
9C6000
heap
page read and write
76A000
heap
page read and write
864000
heap
page read and write
6F4000
heap
page read and write
27D0000
direct allocation
page execute and read and write
950000
heap
page read and write
7F0000
heap
page read and write
9C6000
heap
page read and write
20348000
direct allocation
page readonly
8B4000
heap
page read and write
21D0000
heap
page read and write
8C0000
heap
page read and write
871000
heap
page read and write
834000
heap
page read and write
8AA000
heap
page read and write
8C4000
heap
page read and write
8D1000
heap
page read and write
6F4000
heap
page read and write
88A000
heap
page read and write
9061000
heap
page read and write
294CC000
stack
page read and write
9C3000
heap
page read and write
52D000
remote allocation
page execute and read and write
8E8000
heap
page read and write
899000
heap
page read and write
87A000
heap
page read and write
7ED000
heap
page read and write
86E000
heap
page read and write
88A000
heap
page read and write
7E9000
heap
page read and write
6F0000
heap
page read and write
9D9000
heap
page read and write
8C0000
heap
page read and write
87E000
heap
page read and write
8AA000
heap
page read and write
9C9000
heap
page read and write
894000
heap
page read and write
9C0000
heap
page read and write
8D6000
heap
page read and write
9061000
heap
page read and write
5B0000
heap
page read and write
6F4000
heap
page read and write
1431F000
stack
page read and write
8BA000
heap
page read and write
41F3000
direct allocation
page read and write
8A7000
heap
page read and write
8D0000
heap
page read and write
7F5000
heap
page read and write
871000
heap
page read and write
97000
stack
page read and write
816000
heap
page read and write
8B0000
heap
page read and write
86A000
heap
page read and write
9061000
heap
page read and write
8EA000
heap
page read and write
9CD000
heap
page read and write
1685F000
stack
page read and write
981000
heap
page read and write
7E2000
heap
page read and write
401000
unkown
page execute read
9160000
unclassified section
page read and write
8C4000
heap
page read and write
8D6000
heap
page read and write
9061000
heap
page read and write
9C3000
heap
page read and write
6F4000
heap
page read and write
21E0000
direct allocation
page read and write
856000
heap
page read and write
87A000
heap
page read and write
9061000
heap
page read and write
87D000
heap
page read and write
8BA000
heap
page read and write
4A6000
remote allocation
page execute and read and write
982000
heap
page read and write
9070000
heap
page read and write
610000
heap
page read and write
9C0000
heap
page read and write
9C9000
heap
page read and write
834000
heap
page read and write
9061000
heap
page read and write
855000
heap
page read and write
855000
heap
page read and write
8CC000
heap
page read and write
8C4000
heap
page read and write
8D6000
heap
page read and write
8CC000
heap
page read and write
9D1000
heap
page read and write
881000
heap
page read and write
2310000
heap
page read and write
864000
heap
page read and write
885000
heap
page read and write
9061000
heap
page read and write
9CA000
heap
page read and write
80C000
heap
page read and write
982000
heap
page read and write
1FF6D000
heap
page read and write
8D3000
heap
page read and write
76E000
heap
page read and write
94D000
heap
page read and write
401000
unkown
page execute read
8B1000
heap
page read and write
6F4000
heap
page read and write
89D000
heap
page read and write
891000
heap
page read and write
9061000
heap
page read and write
46D000
unkown
page read and write
8D1000
heap
page read and write
9C6000
heap
page read and write
24A0E000
stack
page read and write
8A9000
heap
page read and write
810000
heap
page read and write
954000
heap
page read and write
9061000
heap
page read and write
9CD000
heap
page read and write
8C0000
heap
page read and write
8A6000
heap
page read and write
9D9000
heap
page read and write
815000
heap
page read and write
20060000
trusted library allocation
page read and write
9D6000
heap
page read and write
6F4000
heap
page read and write
4A9000
remote allocation
page execute and read and write
6F4000
heap
page read and write
871000
heap
page read and write
1FEDF000
stack
page read and write
9CB000
heap
page read and write
470000
unkown
page write copy
1FF00000
heap
page read and write
891000
heap
page read and write
9D5000
heap
page read and write
5377000
heap
page read and write
834000
heap
page read and write
9C3000
heap
page read and write
19C000
stack
page read and write
834000
heap
page read and write
8D6000
heap
page read and write
899000
heap
page read and write
8C0000
heap
page read and write
1D960000
remote allocation
page read and write
7E9000
heap
page read and write
9061000
heap
page read and write
86B000
heap
page read and write
9061000
heap
page read and write
891000
heap
page read and write
9061000
heap
page read and write
8A7000
heap
page read and write
8B1000
heap
page read and write
6F4000
heap
page read and write
9C0000
heap
page read and write
760000
heap
page read and write
802000
heap
page read and write
9061000
heap
page read and write
2330000
direct allocation
page execute and read and write
46D000
unkown
page write copy
893000
heap
page read and write
8CC000
heap
page read and write
955000
heap
page read and write
8A1000
heap
page read and write
828000
heap
page read and write
18E3E000
stack
page read and write
730000
heap
page read and write
20138000
direct allocation
page execute read
8AC000
heap
page read and write
19C000
stack
page read and write
954000
heap
page read and write
8C0000
heap
page read and write
8C4000
heap
page read and write
8A7000
heap
page read and write
400000
unkown
page readonly
9061000
heap
page read and write
820000
heap
page read and write
87A000
heap
page read and write
8A1000
heap
page read and write
9CF000
heap
page read and write
8B1000
heap
page read and write
883000
heap
page read and write
885000
heap
page read and write
2BA1A000
heap
page read and write
8B0000
heap
page read and write
8C4000
heap
page read and write
820000
heap
page read and write
1B3BE000
stack
page read and write
885000
heap
page read and write
9C3000
heap
page read and write
891000
heap
page read and write
8B3000
heap
page read and write
9CE000
heap
page read and write
8D0000
heap
page read and write
8D6000
heap
page read and write
8CF000
heap
page read and write
8AA000
heap
page read and write
641000
remote allocation
page execute and read and write
899000
heap
page read and write
8A3000
heap
page read and write
7B5000
heap
page read and write
8C0000
heap
page read and write
8EF000
stack
page read and write
7EE000
heap
page read and write
961000
heap
page read and write
8A4000
heap
page read and write
A2F000
stack
page read and write
7E5000
heap
page read and write
9061000
heap
page read and write
87A000
heap
page read and write
8D2000
heap
page read and write
8B3000
heap
page read and write
86B000
heap
page read and write
8B1000
heap
page read and write
865000
heap
page read and write
8C5000
heap
page read and write
2BC21000
heap
page read and write
823000
heap
page read and write
8C0000
heap
page read and write
20131000
direct allocation
page execute read
1F0000
heap
page read and write
8B4000
heap
page read and write
820000
heap
page read and write
958000
heap
page read and write
8A6000
heap
page read and write
2037D000
direct allocation
page readonly
9DD000
heap
page read and write
24A4E000
stack
page read and write
2037A000
direct allocation
page readonly
6F4000
heap
page read and write
9061000
heap
page read and write
8B1000
heap
page read and write
9D8000
heap
page read and write
9C000
stack
page read and write
8A1000
heap
page read and write
620000
heap
page read and write
8AA000
heap
page read and write
6F4000
heap
page read and write
89A000
heap
page read and write
8A1000
heap
page read and write
8D0000
heap
page read and write
4B4000
unkown
page readonly
2033F000
direct allocation
page readonly
897000
heap
page read and write
20372000
direct allocation
page read and write
834000
heap
page read and write
4AC000
unkown
page write copy
8D6000
heap
page read and write
8BA000
heap
page read and write
7FC000
heap
page read and write
8C0000
heap
page read and write
2039A000
heap
page read and write
2BB78000
heap
page read and write
9CE000
heap
page read and write
899000
heap
page read and write
9061000
heap
page read and write
878000
heap
page read and write
1D960000
remote allocation
page read and write
9C6000
heap
page read and write
9061000
heap
page read and write
87A000
heap
page read and write
539000
remote allocation
page execute and read and write
9061000
heap
page read and write
8E8000
heap
page read and write
8C4000
heap
page read and write
2037F000
direct allocation
page readonly
9CA000
heap
page read and write
224CE000
stack
page read and write
2BB5A000
heap
page read and write
9C6000
heap
page read and write
94D000
heap
page read and write
882000
heap
page read and write
86E000
heap
page read and write
86B000
heap
page read and write
889000
heap
page read and write
1D8FD000
stack
page read and write
430000
remote allocation
page execute and read and write
20130000
direct allocation
page execute and read and write
7D6000
heap
page read and write
4D1000
remote allocation
page execute and read and write
87D000
heap
page read and write
5FE000
stack
page read and write
9C6000
heap
page read and write
862000
heap
page read and write
8C4000
heap
page read and write
7E9000
heap
page read and write
881000
heap
page read and write
927000
heap
page read and write
9C6000
heap
page read and write
860000
heap
page read and write
8A6000
heap
page read and write
9061000
heap
page read and write
802000
heap
page read and write
9C1000
heap
page read and write
6F4000
heap
page read and write
4B1000
remote allocation
page execute and read and write
502000
remote allocation
page execute and read and write
953000
heap
page read and write
168BE000
stack
page read and write
9061000
heap
page read and write
9061000
heap
page read and write
9DC000
heap
page read and write
899000
heap
page read and write
8AD000
heap
page read and write
9063000
heap
page read and write
8D7000
heap
page read and write
9061000
heap
page read and write
9CE000
heap
page read and write
86E000
heap
page read and write
7F5000
heap
page read and write
87A000
heap
page read and write
8C4000
heap
page read and write
8AA000
heap
page read and write
536E000
stack
page read and write
8AA000
heap
page read and write
8A5000
heap
page read and write
8D3000
heap
page read and write
894000
heap
page read and write
8A3000
heap
page read and write
There are 489 hidden memdumps, click here to show them.