IOC Report
out.exe

loading gif

Files

File Path
Type
Category
Malicious
out.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\BKEBFHIJECFI\AFIDGD
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BKEBFHIJECFI\AFIDGD-shm
data
dropped
C:\ProgramData\BKEBFHIJECFI\BAKKEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKEBFHIJECFI\CGIDGC
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKEBFHIJECFI\CGIDGC-shm
data
dropped
C:\ProgramData\BKEBFHIJECFI\EGCBAF
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\BKEBFHIJECFI\FBKJKE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKEBFHIJECFI\GCAKKE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\BKEBFHIJECFI\HDAAAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKEBFHIJECFI\HDHJEB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\BKEBFHIJECFI\IIIEBG
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\BKEBFHIJECFI\KEHJKJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BKEBFHIJECFI\KKEHIE
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\out.exe
"C:\Users\user\Desktop\out.exe"
malicious
C:\Windows\SysWOW64\timeout.exe
timeout /t 10
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BKEBFHIJECFI" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
malicious
https://t.me/ae5ed
unknown
malicious
https://49.12.106.214/mozglue.dll
49.12.106.214
malicious
https://49.12.106.214/
49.12.106.214
malicious
https://49.12.106.214/nss3.dll
49.12.106.214
malicious
https://49.12.106.214/softokn3.dll
49.12.106.214
malicious
https://49.12.106.214/freebl3.dll
49.12.106.214
malicious
https://49.12.106.214/softokn3.dllE
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://community.akamai.steamstatic.
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://steamcommunity.com/profiles/76561199780418869U
unknown
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://49.12.106.214
unknown
https://49.12.106.214/softokn3.dllg
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://49.12.106.214/softokn3.dllm
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
http://cowod.hopto.
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
http://cowod.hoptoEBFHJKK
unknown
https://49.12.106.214/msvcp140.dll.4.349.12.106.214DEX
unknown
https://49.12.106.214/msvcp140.dll#
unknown
http://cowod.hopto
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://community.akamai.steams
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://49.12.106.214GDAK
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://49.12.106.214/vcruntime140.dll4/msvcp140.dllGE
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://steamcommunity.com/profiles/76561199780418869h
unknown
https://49.12.106.214/msvcp140.dllGE
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
http://cowod.HJKFIEBFHJKK
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://49.12.106.214/s
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://49.12.106.214/o
unknown
https://49.12.106.214/n
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://49.12.106.214/e
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
https://49.12.106.214/_
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://49.12.106.214/V
unknown
https://community.akamai.steamstatic.com/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://49.12.106.214/msvcp140.dlly
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://49.12.106.214/I
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious

IPs

IP
Domain
Country
Malicious
49.12.106.214
unknown
Germany
malicious
104.102.49.254
steamcommunity.com
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
50000
unkown
page readonly
malicious
50000
unkown
page readonly
malicious
BD31000
heap
page read and write
27516000
heap
page read and write
29CD7000
heap
page read and write
29CF5000
heap
page read and write
83000
unkown
page read and write
BD31000
heap
page read and write
BD31000
heap
page read and write
3062000
heap
page read and write
6C695000
unkown
page readonly
2F4F000
stack
page read and write
2841E000
heap
page read and write
2DE4000
heap
page read and write
20330000
remote allocation
page read and write
16CAF000
stack
page read and write
2FAD000
heap
page read and write
3057000
heap
page read and write
3089000
heap
page read and write
A050000
heap
page read and write
2FB2000
heap
page read and write
300D000
heap
page read and write
3067000
heap
page read and write
306A000
heap
page read and write
2785F000
direct allocation
page readonly
BD31000
heap
page read and write
1922E000
stack
page read and write
BD31000
heap
page read and write
2DE4000
heap
page read and write
307B000
heap
page read and write
BD31000
heap
page read and write
BD42000
heap
page read and write
3065000
heap
page read and write
1B80E000
stack
page read and write
BD31000
heap
page read and write
27E09000
heap
page read and write
3071000
heap
page read and write
3131000
heap
page read and write
320D000
heap
page read and write
6C68F000
unkown
page write copy
5E16C000
stack
page read and write
3074000
heap
page read and write
2DE4000
heap
page read and write
2DE4000
heap
page read and write
2FAD000
heap
page read and write
BD31000
heap
page read and write
5D000
unkown
page write copy
6C690000
unkown
page read and write
BD31000
heap
page read and write
27600000
trusted library allocation
page read and write
9FFE000
stack
page read and write
304E000
heap
page read and write
BD40000
heap
page read and write
3067000
heap
page read and write
31CD000
heap
page read and write
3071000
heap
page read and write
2FAD000
heap
page read and write
3069000
heap
page read and write
1B7BF000
stack
page read and write
27E01000
heap
page read and write
2DAC000
stack
page read and write
BD31000
heap
page read and write
2F8E000
stack
page read and write
304D000
heap
page read and write
2F90000
heap
page read and write
2036E000
stack
page read and write
3DF10000
heap
page read and write
2DE4000
heap
page read and write
3063000
heap
page read and write
183000
unkown
page read and write
BD31000
heap
page read and write
3099000
heap
page read and write
20330000
remote allocation
page read and write
2DAE000
stack
page read and write
3038000
heap
page read and write
275ED000
stack
page read and write
6C68E000
unkown
page read and write
307A000
heap
page read and write
3053000
heap
page read and write
2FB2000
heap
page read and write
3136000
heap
page read and write
27640000
heap
page read and write
3053000
heap
page read and write
549E000
stack
page read and write
24E50000
heap
page read and write
3067000
heap
page read and write
3059000
heap
page read and write
BD84000
heap
page read and write
2785D000
direct allocation
page execute read
BD31000
heap
page read and write
3063000
heap
page read and write
1476F000
stack
page read and write
2FA7000
heap
page read and write
27F00000
heap
page read and write
BD31000
heap
page read and write
24F44000
heap
page read and write
2DE4000
heap
page read and write
306E000
heap
page read and write
2FEC000
heap
page read and write
2FA6000
heap
page read and write
2DE0000
heap
page read and write
304D000
heap
page read and write
3065000
heap
page read and write
3082000
heap
page read and write
307D000
heap
page read and write
2DE4000
heap
page read and write
21000
unkown
page execute and write copy
3080000
heap
page read and write
BD31000
heap
page read and write
17D000
unkown
page read and write
2789D000
direct allocation
page readonly
29B97000
heap
page read and write
1927E000
stack
page read and write
27650000
direct allocation
page execute and read and write
2FA5000
heap
page read and write
BD31000
heap
page read and write
24F33000
heap
page read and write
303A000
heap
page read and write
6C4B0000
unkown
page readonly
3072000
heap
page read and write
31B8000
heap
page read and write
3031000
heap
page read and write
306D000
heap
page read and write
2DE4000
heap
page read and write
202CC000
stack
page read and write
87000
unkown
page read and write
2DE4000
heap
page read and write
24E7D000
heap
page read and write
43E75000
heap
page read and write
3062000
heap
page read and write
307C000
heap
page read and write
3069000
heap
page read and write
29D9C000
heap
page read and write
3093000
heap
page read and write
27892000
direct allocation
page read and write
2FF4000
heap
page read and write
3077000
heap
page read and write
BD31000
heap
page read and write
3058000
heap
page read and write
24ECD000
heap
page read and write
2FA6000
heap
page read and write
2F20000
heap
page read and write
3064000
heap
page read and write
4FD52000
heap
page read and write
307B000
heap
page read and write
BD31000
heap
page read and write
3062000
heap
page read and write
2DE4000
heap
page read and write
BD31000
heap
page read and write
3063000
heap
page read and write
31B0000
heap
page read and write
2FB2000
heap
page read and write
2DE4000
heap
page read and write
BD31000
heap
page read and write
3062000
heap
page read and write
305C000
heap
page read and write
2808B000
stack
page read and write
3066000
heap
page read and write
6C410000
unkown
page readonly
303D000
heap
page read and write
BD31000
heap
page read and write
27D60000
trusted library allocation
page read and write
16CEE000
stack
page read and write
3066000
heap
page read and write
27E03000
heap
page read and write
306E000
heap
page read and write
2DB2000
stack
page read and write
2795F000
heap
page read and write
2F9B000
heap
page read and write
303D000
heap
page read and write
228FC000
stack
page read and write
3059000
heap
page read and write
2DE4000
heap
page read and write
3069000
heap
page read and write
A05E000
heap
page read and write
2F2E000
heap
page read and write
307B000
heap
page read and write
2E20000
heap
page read and write
3064000
heap
page read and write
1DD4E000
stack
page read and write
A056000
heap
page read and write
BD31000
heap
page read and write
306E000
heap
page read and write
32033000
heap
page read and write
BD31000
heap
page read and write
2FB2000
heap
page read and write
3069000
heap
page read and write
302A000
heap
page read and write
BD30000
heap
page read and write
6C48D000
unkown
page readonly
6C4B1000
unkown
page execute read
3090000
heap
page read and write
307B000
heap
page read and write
2FB4000
heap
page read and write
24E3C000
stack
page read and write
BD31000
heap
page read and write
2F82000
heap
page read and write
31D9000
heap
page read and write
3202E000
stack
page read and write
3087000
heap
page read and write
BD31000
heap
page read and write
BD31000
heap
page read and write
6C49E000
unkown
page read and write
304D000
heap
page read and write
BD31000
heap
page read and write
3037000
heap
page read and write
6C411000
unkown
page execute read
2789F000
direct allocation
page readonly
3064000
heap
page read and write
BD31000
heap
page read and write
304D000
heap
page read and write
A03E000
stack
page read and write
290000
unkown
page readonly
303E000
heap
page read and write
27DF9000
heap
page read and write
1DD8D000
stack
page read and write
304D000
heap
page read and write
BD31000
heap
page read and write
20000
unkown
page readonly
24E6C000
heap
page read and write
280CC000
stack
page read and write
BD31000
heap
page read and write
3066000
heap
page read and write
BD31000
heap
page read and write
2F00000
heap
page read and write
31A6000
heap
page read and write
305A000
heap
page read and write
24EBD000
heap
page read and write
BD31000
heap
page read and write
3098000
heap
page read and write
1A2000
unkown
page read and write
307D000
heap
page read and write
BD31000
heap
page read and write
5D000
unkown
page write copy
6C4A2000
unkown
page readonly
2FB4000
heap
page read and write
BD31000
heap
page read and write
BD31000
heap
page read and write
307D000
heap
page read and write
9F5E000
stack
page read and write
27DFB000
heap
page read and write
277B6000
direct allocation
page execute read
304D000
heap
page read and write
307F000
heap
page read and write
BD31000
heap
page read and write
290000
unkown
page readonly
3069000
heap
page read and write
2FB0000
heap
page read and write
3066000
heap
page read and write
29B90000
heap
page read and write
21000
unkown
page execute and write copy
3057000
heap
page read and write
3066000
heap
page read and write
27F0A000
heap
page read and write
2FAD000
heap
page read and write
3057000
heap
page read and write
307B000
heap
page read and write
3064000
heap
page read and write
BD31000
heap
page read and write
3067000
heap
page read and write
3062000
heap
page read and write
2FB3000
heap
page read and write
BD31000
heap
page read and write
27868000
direct allocation
page readonly
BD31000
heap
page read and write
3037000
heap
page read and write
2B1C000
stack
page read and write
2BC0000
heap
page read and write
37FA5000
heap
page read and write
24F9B000
stack
page read and write
2FFF000
stack
page read and write
29D9E000
heap
page read and write
3081000
heap
page read and write
228AF000
stack
page read and write
306E000
heap
page read and write
6C64F000
unkown
page readonly
25A000
unkown
page read and write
2F90000
heap
page read and write
17A000
unkown
page read and write
20000
unkown
page readonly
3062000
heap
page read and write
31D0000
heap
page read and write
BD31000
heap
page read and write
2FAD000
heap
page read and write
2DE4000
heap
page read and write
3085000
heap
page read and write
3084000
heap
page read and write
3069000
heap
page read and write
BD31000
heap
page read and write
2F96000
heap
page read and write
BD31000
heap
page read and write
303E000
heap
page read and write
BD31000
heap
page read and write
27658000
direct allocation
page execute read
27510000
trusted library allocation
page read and write
BD31000
heap
page read and write
87C000
stack
page read and write
303A000
heap
page read and write
3074000
heap
page read and write
3074000
heap
page read and write
BD31000
heap
page read and write
7D000
unkown
page read and write
2DE4000
heap
page read and write
8B000
unkown
page read and write
BD31000
heap
page read and write
24F31000
heap
page read and write
BD31000
heap
page read and write
4AB0000
heap
page read and write
20330000
remote allocation
page read and write
306D000
heap
page read and write
27651000
direct allocation
page execute read
BD31000
heap
page read and write
2BD0000
heap
page read and write
3066000
heap
page read and write
24EC5000
heap
page read and write
3067000
heap
page read and write
79DE000
stack
page read and write
9F70000
trusted library allocation
page read and write
1C1000
unkown
page read and write
3069000
heap
page read and write
BD31000
heap
page read and write
2DE4000
heap
page read and write
9F80000
heap
page read and write
3062000
heap
page read and write
21000
unkown
page execute and write copy
2DBC000
stack
page read and write
7A1E000
stack
page read and write
3059000
heap
page read and write
278B7000
heap
page read and write
2F0E000
stack
page read and write
BD31000
heap
page read and write
3069000
heap
page read and write
2F98000
heap
page read and write
3134000
heap
page read and write
306D000
heap
page read and write
BD31000
heap
page read and write
3083000
heap
page read and write
BD31000
heap
page read and write
307B000
heap
page read and write
BD31000
heap
page read and write
274DA000
stack
page read and write
306A000
heap
page read and write
BD31000
heap
page read and write
2FE9000
heap
page read and write
BD50000
heap
page read and write
2B5C000
stack
page read and write
3053000
heap
page read and write
2F75000
heap
page read and write
2F2A000
heap
page read and write
307A000
heap
page read and write
2789A000
direct allocation
page readonly
2F9B000
heap
page read and write
BD31000
heap
page read and write
306E000
heap
page read and write
49DE1000
heap
page read and write
BD31000
heap
page read and write
BD31000
heap
page read and write
BD31000
heap
page read and write
3053000
heap
page read and write
3028000
heap
page read and write
BD31000
heap
page read and write
BE30000
unclassified section
page read and write
BD31000
heap
page read and write
24E5C000
heap
page read and write
606AC000
stack
page read and write
24E40000
heap
page read and write
There are 356 hidden memdumps, click here to show them.