IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive
initial sample
malicious
C:\Program Files (x86)\Split Files\SplitFiles131.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
modified
malicious
C:\Program Files (x86)\Split Files\is-5V8K4.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Split Files\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-GA371.tmp\is-EPSRP.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-R8QPS.tmp\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-R8QPS.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\rf6CwnLa.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Split Files\ReadMe - EN.txt (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\ReadMe - RU.txt (copy)
ISO-8859 text, with very long lines (1053), with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\is-DPLT0.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\is-JPC2L.tmp
MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\is-K6KAG.tmp
data
dropped
C:\Program Files (x86)\Split Files\is-MR54O.tmp
ISO-8859 text, with very long lines (1053), with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\Arabic.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\Chinese.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\Dutch.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\English.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\French.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\Italian.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\Russian.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\Spanish.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\Turkish.ini (copy)
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-2C8S0.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-2KTR4.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-4QNQO.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-8T8VP.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-BOL01.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-IRLOP.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-KJUD7.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-L90L4.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\language\is-T2GFQ.tmp
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\Split Files\unins000.dat
InnoSetup Log Split Files {215D64A9-0240-4952-9F4D-4D0A65391F2C}, version 0x2a, 4440 bytes, 760639\user, "C:\Program Files (x86)\Split Files"
dropped
C:\Program Files (x86)\Split Files\webpage.url (copy)
MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\count[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\ping[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\is-R8QPS.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Split Files\SplitFiles131.exe
"C:\Program Files (x86)\Split Files\SplitFiles131.exe"
malicious
C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\rf6CwnLa.exe
malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
C:\Users\user\AppData\Local\Temp\is-GA371.tmp\is-EPSRP.tmp
"C:\Users\user\AppData\Local\Temp\is-GA371.tmp\is-EPSRP.tmp" /SL4 $502DC "C:\Users\user\Desktop\file.exe" 1694939 170496
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "SplitFiles131.exe" /f

URLs

Name
IP
Malicious
http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
45.139.105.171
malicious
http://107.182.129.235/storage/extension.php
107.182.129.235
malicious
http://107.182.129.235/storage/ping.php
107.182.129.235
malicious
http://171.22.30.106/library.php
171.22.30.106
malicious
http://www.innosetup.com/
unknown
http://107.182.129.235/storage/extension.php8
unknown
http://www.altarsoft.com/split_files.shtml
unknown
http://www.remobjects.com/?ps
unknown
http://rus.altarsoft.com/split_files.shtml
unknown
http://www.innosetup.com
unknown
http://107.182.129.235ibrary.php
unknown
http://www.innosetup.comDVarFileInfo$
unknown
http://www.remobjects.com/?psU
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.139.105.171
unknown
Italy
malicious
45.139.105.1
unknown
Italy
malicious
85.31.46.167
unknown
Germany
malicious
107.182.129.235
unknown
Reserved
malicious
171.22.30.106
unknown
Germany

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Avepoint Software\SplitFiles131
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
NoRepair
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3210000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
3270000
direct allocation
page read and write
malicious
9C000
stack
page read and write
151D000
unkown
page execute and write copy
4667000
trusted library allocation
page read and write
417000
unkown
page readonly
6B0000
heap
page read and write
151F000
unkown
page execute and write copy
595000
heap
page read and write
550000
trusted library allocation
page read and write
39B1000
heap
page read and write
401000
unkown
page execute read
39B1000
heap
page read and write
44FE000
stack
page read and write
417E000
stack
page read and write
21C0000
heap
page read and write
10002000
unkown
page readonly
34C0000
direct allocation
page read and write
22CF000
stack
page read and write
2160000
direct allocation
page execute and read and write
4C4000
unkown
page readonly
39B1000
heap
page read and write
16A4000
heap
page read and write
16A4000
heap
page read and write
466D000
trusted library allocation
page read and write
3E7F000
stack
page read and write
19C000
stack
page read and write
16A4000
heap
page read and write
3AB0000
trusted library allocation
page read and write
39B1000
heap
page read and write
2024000
direct allocation
page read and write
6BA000
heap
page read and write
501B000
direct allocation
page read and write
1509000
unkown
page execute and write copy
400000
unkown
page readonly
46B9000
trusted library allocation
page read and write
501F000
direct allocation
page read and write
39B1000
heap
page read and write
39B1000
heap
page read and write
410000
unkown
page readonly
16A4000
heap
page read and write
5011000
direct allocation
page read and write
33D1000
trusted library allocation
page read and write
4F4F000
direct allocation
page read and write
322E000
stack
page read and write
144B000
unkown
page execute and write copy
39B1000
heap
page read and write
16A4000
heap
page read and write
16A4000
heap
page read and write
151B000
unkown
page execute and write copy
4C4000
unkown
page readonly
2300000
direct allocation
page read and write
3AFE000
stack
page read and write
493D000
stack
page read and write
16A4000
heap
page read and write
10001000
unkown
page execute read
474A000
trusted library allocation
page read and write
16A0000
heap
page read and write
1275000
unkown
page readonly
4F56000
direct allocation
page read and write
46B9000
trusted library allocation
page read and write
4F61000
direct allocation
page read and write
1935000
heap
page read and write
4AE000
unkown
page read and write
39B1000
heap
page read and write
410000
unkown
page readonly
468B000
trusted library allocation
page read and write
143E000
unkown
page execute and write copy
30000
heap
page read and write
1519000
unkown
page execute and write copy
6B8000
heap
page read and write
20CF000
stack
page read and write
39B1000
heap
page read and write
474A000
trusted library allocation
page read and write
400000
unkown
page readonly
1920000
direct allocation
page read and write
1314000
unkown
page readonly
1613000
heap
page read and write
352D000
stack
page read and write
39B1000
heap
page read and write
2190000
trusted library allocation
page read and write
46B9000
trusted library allocation
page read and write
6CC000
heap
page read and write
46B9000
trusted library allocation
page read and write
16A4000
heap
page read and write
32B0000
heap
page read and write
452000
unkown
page execute and read and write
474A000
trusted library allocation
page read and write
20E8000
direct allocation
page read and write
86F000
stack
page read and write
6A0000
trusted library allocation
page read and write
501D000
direct allocation
page read and write
468B000
trusted library allocation
page read and write
16A4000
heap
page read and write
3FD0000
heap
page read and write
31EF000
stack
page read and write
46B9000
trusted library allocation
page read and write
16A4000
heap
page read and write
466D000
trusted library allocation
page read and write
39B1000
heap
page read and write
34E0000
direct allocation
page read and write
164B000
heap
page read and write
39B1000
heap
page read and write
18F000
stack
page read and write
4D96000
direct allocation
page read and write
34FE000
stack
page read and write
10001000
direct allocation
page execute read
1930000
heap
page read and write
16A4000
heap
page read and write
4D00000
direct allocation
page read and write
12E0000
trusted library allocation
page read and write
23A9000
direct allocation
page read and write
1300000
unkown
page readonly
16A4000
heap
page read and write
203C000
direct allocation
page read and write
1750000
heap
page read and write
466D000
trusted library allocation
page read and write
412E000
stack
page read and write
39B1000
heap
page read and write
401000
unkown
page execute read
1710000
heap
page read and write
156A000
heap
page read and write
43FE000
stack
page read and write
468B000
trusted library allocation
page read and write
1506000
unkown
page execute and write copy
465F000
trusted library allocation
page read and write
10010000
direct allocation
page readonly
10019000
direct allocation
page readonly
31E0000
direct allocation
page read and write
1301000
unkown
page execute read
400000
unkown
page readonly
16A4000
heap
page read and write
4D78000
direct allocation
page read and write
466D000
trusted library allocation
page read and write
34BF000
stack
page read and write
42BE000
stack
page read and write
39C0000
heap
page read and write
3D3F000
stack
page read and write
39B1000
heap
page read and write
14F6000
unkown
page execute and write copy
39B1000
heap
page read and write
43BF000
stack
page read and write
466D000
trusted library allocation
page read and write
129C000
unkown
page execute and write copy
16A4000
heap
page read and write
6D5000
heap
page read and write
30EE000
stack
page read and write
165C000
heap
page read and write
39B1000
heap
page read and write
39B1000
heap
page read and write
32FE000
stack
page read and write
3BFF000
stack
page read and write
39B1000
heap
page read and write
26D0000
trusted library allocation
page read and write
970000
heap
page read and write
203C000
direct allocation
page read and write
39B1000
heap
page read and write
468B000
trusted library allocation
page read and write
468B000
trusted library allocation
page read and write
580000
heap
page read and write
6A8000
heap
page read and write
130C000
unkown
page readonly
474A000
trusted library allocation
page read and write
39B1000
heap
page read and write
20E1000
direct allocation
page read and write
20E1000
direct allocation
page read and write
1FCE000
stack
page read and write
1540000
heap
page read and write
16A4000
heap
page read and write
1312000
unkown
page read and write
16A4000
heap
page read and write
45BB000
trusted library allocation
page read and write
3D7E000
stack
page read and write
3EBE000
stack
page read and write
402E000
stack
page read and write
1001A000
direct allocation
page read and write
32A0000
direct allocation
page read and write
3AB0000
trusted library allocation
page read and write
16A4000
heap
page read and write
1312000
unkown
page write copy
463D000
trusted library allocation
page read and write
417000
unkown
page readonly
16A4000
heap
page read and write
362F000
stack
page read and write
40A000
unkown
page read and write
670000
heap
page read and write
16A4000
heap
page read and write
590000
heap
page read and write
16A4000
heap
page read and write
466D000
trusted library allocation
page read and write
4BC000
unkown
page readonly
16A4000
heap
page read and write
39B0000
heap
page read and write
48C000
unkown
page read and write
130C000
unkown
page readonly
4AF000
unkown
page write copy
1449000
unkown
page execute and write copy
21C4000
heap
page read and write
3AB0000
trusted library allocation
page read and write
203C000
direct allocation
page read and write
67A000
heap
page read and write
39B1000
heap
page read and write
6C8000
heap
page read and write
6CF000
heap
page read and write
2300000
direct allocation
page read and write
46B9000
trusted library allocation
page read and write
401000
unkown
page execute read
141C000
stack
page read and write
1459000
unkown
page execute and write copy
870000
heap
page read and write
40C000
unkown
page write copy
87A000
heap
page read and write
39B1000
heap
page read and write
468B000
trusted library allocation
page read and write
427A000
stack
page read and write
3C3E000
stack
page read and write
401000
unkown
page execute read
468B000
trusted library allocation
page read and write
468B000
trusted library allocation
page read and write
1301000
unkown
page execute read
217E000
direct allocation
page read and write
466D000
trusted library allocation
page read and write
203C000
direct allocation
page read and write
16A4000
heap
page read and write
5013000
direct allocation
page read and write
97000
stack
page read and write
218D000
direct allocation
page read and write
400000
unkown
page readonly
39B1000
heap
page read and write
39B1000
heap
page read and write
150D000
unkown
page execute and write copy
1300000
unkown
page readonly
3080000
direct allocation
page read and write
466D000
trusted library allocation
page read and write
401000
unkown
page execute read
39B1000
heap
page read and write
2020000
direct allocation
page read and write
4640000
trusted library allocation
page read and write
2045000
direct allocation
page read and write
1452000
unkown
page execute and write copy
4660000
trusted library allocation
page read and write
39B1000
heap
page read and write
4BC000
unkown
page readonly
39B1000
heap
page read and write
16A4000
heap
page read and write
30000
heap
page read and write
16A4000
heap
page read and write
46B9000
trusted library allocation
page read and write
3FBF000
stack
page read and write
39B1000
heap
page read and write
5021000
direct allocation
page read and write
39B1000
heap
page read and write
33BE000
stack
page read and write
127C000
stack
page read and write
6CF000
heap
page read and write
470000
unkown
page readonly
4F4D000
direct allocation
page read and write
46B9000
trusted library allocation
page read and write
39B1000
heap
page read and write
39B1000
heap
page read and write
16A4000
heap
page read and write
14FA000
unkown
page execute and write copy
44FC000
stack
page read and write
39B1000
heap
page read and write
16A4000
heap
page read and write
14F8000
unkown
page execute and write copy
474A000
trusted library allocation
page read and write
150F000
unkown
page execute and write copy
1530000
trusted library allocation
page read and write
145D000
unkown
page execute and write copy
400000
unkown
page readonly
39B1000
heap
page read and write
39B1000
heap
page read and write
39B1000
heap
page read and write
468B000
trusted library allocation
page read and write
48FF000
stack
page read and write
20D0000
direct allocation
page read and write
500000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
9C000
stack
page read and write
2F90000
heap
page read and write
1517000
unkown
page execute and write copy
1446000
unkown
page execute and write copy
39B1000
heap
page read and write
199000
stack
page read and write
204C000
direct allocation
page read and write
1560000
heap
page read and write
876000
heap
page read and write
54E000
stack
page read and write
39B1000
heap
page read and write
175A000
heap
page read and write
6CC000
heap
page read and write
1550000
trusted library allocation
page read and write
1444000
unkown
page execute and write copy
40A000
unkown
page write copy
16A4000
heap
page read and write
520000
heap
page read and write
10000000
unkown
page readonly
46B9000
trusted library allocation
page read and write
468B000
trusted library allocation
page read and write
48C000
unkown
page write copy
474A000
trusted library allocation
page read and write
39B1000
heap
page read and write
21A8000
direct allocation
page read and write
2034000
direct allocation
page read and write
39B1000
heap
page read and write
39B1000
heap
page read and write
143A000
unkown
page execute and write copy
3080000
direct allocation
page read and write
46B9000
trusted library allocation
page read and write
10017000
direct allocation
page read and write
16A4000
heap
page read and write
FF0000
heap
page read and write
169E000
stack
page read and write
466D000
trusted library allocation
page read and write
5023000
direct allocation
page read and write
215E000
stack
page read and write
30000
heap
page read and write
2750000
trusted library allocation
page read and write
39B1000
heap
page read and write
16A4000
heap
page read and write
1314000
unkown
page readonly
39B1000
heap
page read and write
468B000
trusted library allocation
page read and write
1457000
unkown
page execute and write copy
46B9000
trusted library allocation
page read and write
332F000
stack
page read and write
474A000
trusted library allocation
page read and write
4F0000
trusted library allocation
page read and write
16A4000
heap
page read and write
1560000
heap
page read and write
3080000
heap
page read and write
500D000
direct allocation
page read and write
39B1000
heap
page read and write
309F000
stack
page read and write
39B1000
heap
page read and write
There are 327 hidden memdumps, click here to show them.