IOC Report
INQUIRY 032925 (ASTM A572,AISISAE 4130,AISI 304).exe

loading gifFilesProcessesURLsDomainsIPsMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
INQUIRY 032925 (ASTM A572,AISISAE 4130,AISI 304).exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\8m89j3K6
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INQUIRY 032925 (ASTM A572,AISISAE 4130,AISI 304).exe
"C:\Users\user\Desktop\INQUIRY 032925 (ASTM A572,AISISAE 4130,AISI 304).exe"
malicious
C:\Program Files (x86)\YwalPDbopbvRLoyxMkeZyluBIPkXWetvCAwmZkDXNTuuMDPQhwgKcLbLfEaaKMoYSgXkL\1h36yydaHEcruJ.exe
"C:\Program Files (x86)\YwalPDbopbvRLoyxMkeZyluBIPkXWetvCAwmZkDXNTuuMDPQhwgKcLbLfEaaKMoYSgXkL\OroVWMFU.exe"
malicious
C:\Windows\SysWOW64\sdiagnhost.exe
"C:\Windows\SysWOW64\sdiagnhost.exe"
malicious
C:\Program Files (x86)\YwalPDbopbvRLoyxMkeZyluBIPkXWetvCAwmZkDXNTuuMDPQhwgKcLbLfEaaKMoYSgXkL\1h36yydaHEcruJ.exe
"C:\Program Files (x86)\YwalPDbopbvRLoyxMkeZyluBIPkXWetvCAwmZkDXNTuuMDPQhwgKcLbLfEaaKMoYSgXkL\qXosEJzTxcGKC.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious

URLs

Name
IP
Malicious
http://www.truenorthcards.org/xumw/?FDC=6nidXIeTjwp+/8jNuUA4NOAmp7TMVRFP12WwgCMMdzORX2Ri86uOscPEUO1eXyN18jrqCkChD4uO80oJ0ZYEru1LcypcNZ+EzBt3sDp4nbllqs6w+McIm44y3SfnBO83FfhMFvVSb6SQ&NZX=LDapchnppPpDKdbp
74.208.236.36
malicious
http://www.dramavietsub.net/tsak/?NZX=LDapchnppPpDKdbp&FDC=YQHVXA7vk5Ejd4ZLrjcmRRVFj2S28kh5GkASxIA+KfBd6gRSELiW++EKJDSr3fSHhVfVzVIMxi/ALCU2icaEk0C5lnpuwBP+tTkpBnJwWERIYePvG2inYJKyTCXgbTjoOCLuJuLK4r6+
104.21.32.1
malicious
http://www.truenorthcards.org/xumw/
74.208.236.36
malicious
http://www.atepl.info/4132/
15.197.148.33
malicious
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://www.ecosia.org/newtab/v20
unknown
https://duckduckgo.com/ac/?q=
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.atepl.info
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atepl.info
15.197.148.33
malicious
www.dramavietsub.net
104.21.32.1
www.truenorthcards.org
74.208.236.36
www.atepl.info
unknown

IPs

IP
Domain
Country
Malicious
15.197.148.33
atepl.info
United States
malicious
104.21.32.1
www.dramavietsub.net
United States
74.208.236.36
www.truenorthcards.org
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2CA0000
system
page execute and read and write
malicious
4F80000
unkown
page execute and read and write
malicious
4930000
trusted library allocation
page read and write
malicious
30F0000
unclassified section
page execute and read and write
malicious
4980000
trusted library allocation
page read and write
malicious
AA1000
unkown
page execute and read and write
malicious
11C0000
unclassified section
page execute and read and write
malicious
C10000
system
page execute and read and write
malicious
7D84000
heap
page read and write
3180000
unkown
page execute and read and write
7CCF000
heap
page read and write
900000
unkown
page readonly
F60000
unkown
page readonly
2F5A000
heap
page read and write
1FD27F50000
heap
page read and write
3051000
heap
page read and write
2E40000
unkown
page read and write
302A000
heap
page read and write
1200000
unkown
page readonly
3051000
heap
page read and write
1FD27F9B000
heap
page read and write
C6E000
system
page execute and read and write
8A1000
unkown
page execute read
1CF0000
unclassified section
page execute and read and write
3051000
heap
page read and write
3051000
heap
page read and write
82BF000
stack
page read and write
6F0000
unkown
page readonly
3051000
heap
page read and write
B2F5FE000
stack
page read and write
2C3B000
stack
page read and write
3051000
heap
page read and write
87C000
stack
page read and write
3051000
heap
page read and write
1891000
unkown
page readonly
710000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
539F000
stack
page read and write
3160000
heap
page read and write
3051000
heap
page read and write
854000
heap
page read and write
3051000
heap
page read and write
9BE000
heap
page read and write
3051000
heap
page read and write
1460000
unkown
page read and write
E70000
unkown
page readonly
8AF000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
C95000
system
page execute and read and write
3051000
heap
page read and write
3051000
heap
page read and write
2FA0000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
9B9000
heap
page read and write
854000
heap
page read and write
168F000
stack
page read and write
9BC000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
5137000
unkown
page execute and read and write
3051000
heap
page read and write
7CD2000
heap
page read and write
1430000
unkown
page readonly
3051000
heap
page read and write
4580000
unkown
page execute and read and write
910000
heap
page read and write
7D10000
heap
page read and write
E70000
direct allocation
page execute and read and write
3051000
heap
page read and write
1FD29870000
trusted library allocation
page read and write
3051000
heap
page read and write
96E000
stack
page read and write
854000
heap
page read and write
3051000
heap
page read and write
7D7B000
heap
page read and write
2B8C000
unkown
page read and write
7D2F000
heap
page read and write
7CC1000
heap
page read and write
3051000
heap
page read and write
2794000
heap
page read and write
83E000
stack
page read and write
3051000
heap
page read and write
2FA0000
unkown
page readonly
3051000
heap
page read and write
2F5B000
heap
page read and write
133A000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
82FE000
stack
page read and write
3051000
heap
page read and write
1320000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
2FB0000
heap
page read and write
3051000
heap
page read and write
1FD27EB6000
system
page execute and read and write
3051000
heap
page read and write
2F56000
heap
page read and write
9B3000
heap
page read and write
32A7000
unclassified section
page execute and read and write
3051000
heap
page read and write
7D57000
heap
page read and write
4A41000
heap
page read and write
2760000
unkown
page readonly
3051000
heap
page read and write
1450000
heap
page read and write
3051000
heap
page read and write
4DAD000
direct allocation
page execute and read and write
3051000
heap
page read and write
3051000
heap
page read and write
7D72000
heap
page read and write
1450000
heap
page read and write
4A80000
trusted library allocation
page execute and read and write
1355000
heap
page read and write
1FD29A00000
heap
page read and write
7D91000
heap
page read and write
27DC2000
system
page read and write
2C78000
stack
page read and write
9A0000
heap
page read and write
3051000
heap
page read and write
2F74000
unkown
page read and write
2E9E000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
7CF1000
heap
page read and write
1891000
unkown
page readonly
2F65000
heap
page read and write
AA0000
unkown
page readonly
12E0000
heap
page read and write
515E000
stack
page read and write
1440000
unkown
page readonly
4BF4000
heap
page read and write
3051000
heap
page read and write
3174000
heap
page read and write
11C0000
direct allocation
page read and write
DA7000
heap
page read and write
8B9000
unkown
page readonly
1FD29C0A000
trusted library allocation
page read and write
50EC000
unclassified section
page read and write
4B30000
trusted library allocation
page read and write
87C000
stack
page read and write
B01000
heap
page read and write
C25000
heap
page read and write
DE6000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
300D000
heap
page read and write
710000
unkown
page readonly
9BE000
heap
page read and write
3051000
heap
page read and write
1201000
unkown
page readonly
833F000
stack
page read and write
8B9000
unkown
page readonly
2FFA000
heap
page read and write
8E0000
unkown
page readonly
4F4D000
direct allocation
page execute and read and write
2790000
heap
page read and write
3051000
heap
page read and write
2E74000
heap
page read and write
4B30000
trusted library allocation
page read and write
3051000
heap
page read and write
133E000
heap
page read and write
4FC0000
unkown
page read and write
2F40000
heap
page read and write
3051000
heap
page read and write
8B6000
unkown
page read and write
8AF000
unkown
page readonly
7D52000
heap
page read and write
C86000
system
page execute and read and write
4B30000
trusted library allocation
page read and write
9C4000
heap
page read and write
2E74000
heap
page read and write
3051000
heap
page read and write
DA3000
heap
page read and write
B2DDFD000
stack
page read and write
2F54000
heap
page read and write
F80000
unkown
page readonly
9B3000
heap
page read and write
3051000
heap
page read and write
2F9F000
stack
page read and write
2FB7000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
E5B000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
1A30000
unkown
page readonly
3051000
heap
page read and write
1FD27F8C000
heap
page read and write
F70000
unkown
page readonly
11B2000
direct allocation
page execute and read and write
D7A000
heap
page read and write
78B000
stack
page read and write
3051000
heap
page read and write
D7E000
heap
page read and write
3051000
heap
page read and write
519F000
unkown
page execute and read and write
1430000
unkown
page readonly
3051000
heap
page read and write
9C4000
heap
page read and write
D7A000
heap
page read and write
1320000
unkown
page readonly
D51000
unkown
page readonly
2F56000
heap
page read and write
3051000
heap
page read and write
850000
heap
page read and write
3051000
heap
page read and write
3174000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
1330000
heap
page read and write
3051000
heap
page read and write
1FD29C21000
trusted library allocation
page read and write
9F0000
heap
page read and write
3051000
heap
page read and write
27B0000
heap
page read and write
3051000
heap
page read and write
B00000
heap
page read and write
3106000
unkown
page read and write
3051000
heap
page read and write
800000
direct allocation
page read and write
4C70000
heap
page read and write
2780000
unkown
page read and write
3051000
heap
page read and write
7F0000
heap
page read and write
3051000
heap
page read and write
8A0000
unkown
page readonly
CFE000
stack
page read and write
3051000
heap
page read and write
1470000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
8E0000
unkown
page readonly
525F000
stack
page read and write
2F5A000
heap
page read and write
B02000
heap
page read and write
C6C000
system
page execute and read and write
2F65000
heap
page read and write
8AF000
unkown
page readonly
8A1000
unkown
page execute read
3051000
heap
page read and write
8F0000
unkown
page readonly
30C0000
unkown
page read and write
3051000
heap
page read and write
4ACB000
heap
page read and write
7D17000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
7D27000
heap
page read and write
5826000
unclassified section
page read and write
3051000
heap
page read and write
77A000
stack
page read and write
9BE000
heap
page read and write
1690000
unkown
page readonly
3051000
heap
page read and write
F99000
direct allocation
page execute and read and write
E70000
unkown
page readonly
1FD29DBE000
trusted library allocation
page read and write
D70000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
9F6000
heap
page read and write
1330000
heap
page read and write
3051000
heap
page read and write
11C0000
direct allocation
page read and write
9C4000
heap
page read and write
1FD29870000
trusted library allocation
page read and write
2F5F000
heap
page read and write
3051000
heap
page read and write
7D36000
heap
page read and write
4910000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
8A0000
unkown
page readonly
3051000
heap
page read and write
1FD27F7F000
heap
page read and write
133A000
heap
page read and write
7CDD000
heap
page read and write
B2EDFE000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
52AC000
unclassified section
page read and write
4BEE000
stack
page read and write
1FD29870000
trusted library allocation
page read and write
3170000
heap
page read and write
854000
heap
page read and write
1FD29D01000
trusted library allocation
page read and write
1690000
unkown
page readonly
D99000
heap
page read and write
3051000
heap
page read and write
1FD29850000
heap
page read and write
3051000
heap
page read and write
3170000
heap
page read and write
2B8C000
unkown
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
4DA9000
direct allocation
page execute and read and write
3004000
heap
page read and write
4910000
trusted library allocation
page read and write
3051000
heap
page read and write
910000
heap
page read and write
838E000
stack
page read and write
F70000
unkown
page readonly
3051000
heap
page read and write
330F000
unclassified section
page execute and read and write
68C000
stack
page read and write
FEA000
stack
page read and write
1470000
heap
page read and write
29CC000
unkown
page read and write
3051000
heap
page read and write
8B9000
unkown
page readonly
7D24000
heap
page read and write
6F0000
unkown
page readonly
1440000
unkown
page readonly
3051000
heap
page read and write
1FD27E30000
system
page execute and read and write
AE7000
unkown
page readonly
7D22000
heap
page read and write
B01000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
D51000
unkown
page readonly
3051000
heap
page read and write
1FD27FA2000
heap
page read and write
3051000
heap
page read and write
700000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
9F0000
heap
page read and write
854000
heap
page read and write
F80000
unkown
page readonly
12F0000
unclassified section
page execute and read and write
2FC0000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
2F5F000
heap
page read and write
1FD28080000
heap
page read and write
2F54000
heap
page read and write
D30000
unkown
page read and write
3051000
heap
page read and write
AA0000
unkown
page readonly
2FE0000
heap
page read and write
1367000
heap
page read and write
1FD29C0E000
trusted library allocation
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
D60000
unkown
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
FEA000
stack
page read and write
28B2000
unkown
page read and write
3051000
heap
page read and write
7CFB000
heap
page read and write
2809C000
system
page read and write
3B80000
unkown
page execute and read and write
8A0000
unkown
page readonly
3051000
heap
page read and write
B01000
heap
page read and write
27C0000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
7CEB000
heap
page read and write
D7E000
heap
page read and write
2E40000
heap
page read and write
1141000
direct allocation
page execute and read and write
7D1D000
heap
page read and write
4BAD000
stack
page read and write
2F5F000
heap
page read and write
11C0000
direct allocation
page read and write
3051000
heap
page read and write
4C69000
heap
page read and write
8B6000
unkown
page read and write
3007000
heap
page read and write
854000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
2790000
heap
page read and write
4E1E000
direct allocation
page execute and read and write
854000
heap
page read and write
B2D5FB000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
27C0000
unkown
page readonly
2F5F000
heap
page read and write
1FD29DC4000
trusted library allocation
page read and write
3051000
heap
page read and write
3025000
heap
page read and write
3051000
heap
page read and write
2D20000
heap
page read and write
158E000
stack
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
1FD27FA2000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
529E000
stack
page read and write
491E000
heap
page read and write
D60000
unkown
page read and write
2794000
heap
page read and write
1368000
unkown
page read and write
E00000
direct allocation
page read and write
7D4C000
heap
page read and write
3051000
heap
page read and write
7E0000
heap
page read and write
3051000
heap
page read and write
AE7000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
8A1000
unkown
page execute read
113D000
direct allocation
page execute and read and write
1FD29C03000
trusted library allocation
page read and write
3051000
heap
page read and write
823D000
stack
page read and write
8B6000
unkown
page read and write
100E000
direct allocation
page execute and read and write
3051000
heap
page read and write
1FD27F77000
heap
page read and write
8AF000
unkown
page readonly
7CF6000
heap
page read and write
7D29000
heap
page read and write
827E000
stack
page read and write
2FC0000
unkown
page readonly
7D12000
heap
page read and write
C92000
system
page execute and read and write
9AA000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
2F5F000
heap
page read and write
2E74000
heap
page read and write
3051000
heap
page read and write
1FD27EB9000
system
page execute and read and write
F9D000
direct allocation
page execute and read and write
3051000
heap
page read and write
3051000
heap
page read and write
854000
heap
page read and write
2E70000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
7D88000
heap
page read and write
2760000
unkown
page readonly
4C5C000
stack
page read and write
2780000
unkown
page read and write
3051000
heap
page read and write
26F0000
unclassified section
page execute and read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
4C80000
direct allocation
page execute and read and write
30C0000
unkown
page read and write
854000
heap
page read and write
F60000
unkown
page readonly
7D5C000
heap
page read and write
3051000
heap
page read and write
7D94000
heap
page read and write
4FD2000
unclassified section
page read and write
B2E5FF000
stack
page read and write
DFF000
stack
page read and write
301A000
heap
page read and write
D70000
heap
page read and write
7CD9000
heap
page read and write
9BE000
heap
page read and write
1FD29C00000
trusted library allocation
page read and write
2FB0000
heap
page read and write
8F0000
unkown
page readonly
28B2000
unkown
page read and write
77A000
stack
page read and write
3051000
heap
page read and write
8B6000
unkown
page read and write
12FC000
stack
page read and write
2F48000
heap
page read and write
3051000
heap
page read and write
27B0000
heap
page read and write
3051000
heap
page read and write
700000
unkown
page readonly
9B9000
heap
page read and write
8A0000
unkown
page readonly
1A31000
unkown
page readonly
1FD27F70000
heap
page read and write
3051000
heap
page read and write
9BE000
heap
page read and write
3051000
heap
page read and write
AA1000
unkown
page execute read
854000
heap
page read and write
3051000
heap
page read and write
3051000
heap
page read and write
900000
unkown
page readonly
3051000
heap
page read and write
3051000
heap
page read and write
501C000
stack
page read and write
7D2B000
heap
page read and write
1FD29C13000
trusted library allocation
page read and write
3051000
heap
page read and write
133E000
heap
page read and write
CE9000
system
page execute and read and write
12FC000
stack
page read and write
5694000
unclassified section
page read and write
9AE000
heap
page read and write
4FC2000
direct allocation
page execute and read and write
2FF5000
heap
page read and write
4F51000
direct allocation
page execute and read and write
1FD29B00000
trusted library allocation
page read and write
2FDD000
heap
page read and write
1FD29DA6000
trusted library allocation
page read and write
3050000
heap
page read and write
CBD000
heap
page read and write
1FD29DCE000
trusted library allocation
page read and write
7CD4000
heap
page read and write
49D0000
trusted library allocation
page read and write
1FD29C11000
trusted library allocation
page read and write
C00000
unkown
page read and write
2F5F000
heap
page read and write
854000
heap
page read and write
9BD000
heap
page read and write
8B9000
unkown
page readonly
C00000
unkown
page read and write
8A1000
unkown
page execute read
2E40000
unkown
page read and write
511C000
stack
page read and write
4BF8000
heap
page read and write
3051000
heap
page read and write
DEA000
heap
page read and write
7D81000
heap
page read and write
1460000
unkown
page read and write
83CF000
stack
page read and write
C76000
system
page execute and read and write
854000
heap
page read and write
9BE000
heap
page read and write
There are 533 hidden memdumps, click here to show them.