IOC Report
YyIDUCFWC1.exe

loading gif

Files

File Path
Type
Category
Malicious
YyIDUCFWC1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\BKECAEBG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FBFCGIDA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCBGIIEC
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GHDHDGHJ
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIDBKKKKKFBGDGDHIDBGHIEBGD
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\HJJJDAEGIDHCBFHJJJEG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IDBKFHJEBAAEBGDGDBFBGIEBAA
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KEHCAFHIJECGCAKFCGDBKEGIDH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KFIEHIIIJDAAAAAAKECB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YyIDUCFWC1.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199673019888[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (2969), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqln[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\YyIDUCFWC1.exe
"C:\Users\user\Desktop\YyIDUCFWC1.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/StopResponseR
unknown
https://duckduckgo.com/ac/?q=
unknown
https://65.109.242.73/B
unknown
https://65.109.242.73/nss3.dllE
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199673019888
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e1730.exe
unknown
https://65.109.242.73T
unknown
https://65.109.242.73/X
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://tempuri.org/IoBoardInputsSet.xsd
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://65.109.242.73/09.242.73/Local
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://65.109.242.73/vcruntime140.dllc
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
http://tempuri.org/RawEvent.xsd$StaffCategoriesSetRhttp://tempuri.org/StaffCategoriesSet.xsd
unknown
https://65.109.242.73/$
unknown
https://65.109.242.73/mozglue.dll
65.109.242.73
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://65.109.242.73/
65.109.242.73
https://65.109.242.73/2
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=1_BxDGVvfXwv&am
unknown
http://tempuri.org/TimesheetSummarySet.xsd
unknown
https://65.109.242.73/amData
unknown
http://ACVC.WPF.Service.WcfT
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Kg_v7CMM
unknown
https://65.109.242.73/sqln.dll
65.109.242.73
https://65.109.242.73/freebl3.dll
65.109.242.73
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jU8h8CqVh6FY&l=e
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://steamcommunity.com/s
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=BMF068jICwP9&
unknown
http://tempuri.org/TimesheetEventLogsSet.xsd
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://65.109.242.73/es
unknown
https://65.109.242.73/msvcp140.dll
65.109.242.73
https://store.steampowered.com/points/shop/
unknown
http://tempuri.org/TimesheetCategoriesSet.xsd
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17.exe
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://steamcommunity.com/profiles/76561199673019888/badges
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://65.109.242.73/vcruntime140.dll
65.109.242.73
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
http://tempuri.org/UsersSet.xsd
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
http://127.0.0.1:
unknown
http://tempuri.org/EventsSet.xsd
unknown
http://tempuri.org/CardTemplateSet.xsd
unknown
http://tempuri.org/IoBoardOutputsSet.xsd
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://65.109.242.73BKJD
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://urn.to/r/sds_see
unknown
https://urn.to/r/sds_see=isolation
unknown
http://tempuri.org/TimesheetDetailsSet.xsd
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://65.109.242.73/softokn3.dllX
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/irfailAt
unknown
http://tempuri.org/DepartmentsSet.xsd
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://tempuri.org/TimezonesSet.xsd
unknown
http://ocsp.sectigo.com0
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
http://tempuri.org/CardsSet.xsd
unknown
https://system.data.sqlite.org/X
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://ACVC.WPF.Service.Wcf/IOvpnProcessRunner/StartResponse
unknown
https://65.109.242.73/XR
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://65.109.242.73/nss3.dll
65.109.242.73
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
http://tempuri.org/OperatorSet.xsd
unknown
http://tempuri.org/CameraAuthenticationsSet.xsd
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.4.32.216
fp2e7a.wpc.phicdn.net
192.229.211.108
windowsupdatebg.s.llnwi.net
69.164.42.0

IPs

IP
Domain
Country
Malicious
65.109.242.73
unknown
United States
23.4.32.216
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3DA5000
trusted library allocation
page read and write
malicious
FD3000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2E75000
trusted library allocation
page read and write
malicious
3E3F000
trusted library allocation
page read and write
malicious
5CC0000
heap
page read and write
malicious
682000
unkown
page readonly
malicious
2D6A000
trusted library allocation
page read and write
5B00000
trusted library allocation
page execute and read and write
2B6E000
stack
page read and write
449D000
trusted library allocation
page read and write
EF8000
stack
page read and write
19A56000
heap
page read and write
5320000
trusted library allocation
page execute and read and write
2B8A000
trusted library allocation
page execute and read and write
2B86000
trusted library allocation
page execute and read and write
2BB0000
trusted library allocation
page read and write
FC5000
heap
page read and write
2B97000
trusted library allocation
page execute and read and write
107E000
heap
page read and write
1240000
heap
page read and write
5F1000
remote allocation
page execute and read and write
5EFE000
stack
page read and write
577A000
trusted library section
page read and write
2B78000
trusted library allocation
page read and write
E70E000
stack
page read and write
6CC70000
unkown
page read and write
5ACE000
stack
page read and write
9EB000
stack
page read and write
F75000
heap
page read and write
5B36000
heap
page read and write
C60000
heap
page read and write
9F3000
stack
page read and write
F56000
heap
page read and write
1280000
heap
page read and write
1270000
trusted library allocation
page read and write
1983F000
direct allocation
page readonly
BF5000
heap
page read and write
2E4A000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
2D50000
trusted library allocation
page execute and read and write
EEE000
stack
page read and write
1983A000
direct allocation
page readonly
6CEF0000
unkown
page readonly
9EF000
stack
page read and write
10B0000
heap
page read and write
55BE000
stack
page read and write
4F3D000
stack
page read and write
19756000
direct allocation
page execute read
10CCE000
stack
page read and write
DE0000
heap
page read and write
19A50000
heap
page read and write
6CC75000
unkown
page readonly
137EF000
heap
page read and write
6CC2F000
unkown
page readonly
F10000
heap
page read and write
118A000
heap
page read and write
9F8000
stack
page read and write
2BFE000
stack
page read and write
6CA91000
unkown
page execute read
EAD000
stack
page read and write
E6CF000
stack
page read and write
54BA000
heap
page execute and read and write
63F000
remote allocation
page execute and read and write
6CED1000
unkown
page execute read
2B80000
trusted library allocation
page read and write
547E000
stack
page read and write
54B0000
heap
page execute and read and write
80B0000
heap
page read and write
13589000
heap
page read and write
514000
remote allocation
page execute and read and write
5FFE000
stack
page read and write
10A7000
heap
page read and write
1044000
heap
page read and write
2D4E000
stack
page read and write
2D60000
trusted library allocation
page read and write
6CEF1000
unkown
page execute read
2B7D000
trusted library allocation
page execute and read and write
1341E000
stack
page read and write
127D000
trusted library allocation
page execute and read and write
6CF70000
unkown
page write copy
FA8000
heap
page read and write
13480000
heap
page read and write
2E22000
trusted library allocation
page read and write
19832000
direct allocation
page read and write
13896000
heap
page read and write
DE5000
heap
page read and write
543E000
stack
page read and write
5490000
heap
page read and write
588E000
stack
page read and write
6CF6E000
unkown
page read and write
2E8C000
trusted library allocation
page read and write
5AF0000
heap
page read and write
6CC6F000
unkown
page write copy
680000
unkown
page readonly
1220000
heap
page read and write
BC0000
heap
page read and write
1260000
trusted library allocation
page read and write
FD7000
heap
page read and write
43CE000
trusted library allocation
page read and write
F60000
heap
page read and write
5340000
trusted library allocation
page read and write
2B73000
trusted library allocation
page read and write
E10000
heap
page read and write
BD0000
heap
page read and write
1C19F000
stack
page read and write
195F1000
direct allocation
page execute read
2A6E000
stack
page read and write
2E17000
trusted library allocation
page read and write
1320F000
stack
page read and write
10AA000
heap
page read and write
2C4B000
heap
page read and write
1274000
trusted library allocation
page read and write
19808000
direct allocation
page readonly
195F0000
direct allocation
page execute and read and write
10B5000
heap
page read and write
F53000
heap
page read and write
5B41000
heap
page read and write
4312000
trusted library allocation
page read and write
DC0000
heap
page read and write
511000
remote allocation
page execute and read and write
531A000
trusted library allocation
page read and write
13470000
heap
page read and write
5B30000
heap
page read and write
6CF82000
unkown
page readonly
19AC1000
heap
page read and write
7F1E000
stack
page read and write
6CF73000
unkown
page write copy
2B95000
trusted library allocation
page execute and read and write
F68000
heap
page read and write
5AD0000
trusted library section
page read and write
6CA90000
unkown
page readonly
51A000
remote allocation
page execute and read and write
121E000
stack
page read and write
2C40000
heap
page read and write
111E000
stack
page read and write
5DC0000
heap
page execute and read and write
19AC5000
heap
page read and write
2B90000
trusted library allocation
page read and write
197FF000
direct allocation
page readonly
F1E000
heap
page read and write
1074000
heap
page read and write
E6E000
stack
page read and write
59DE000
stack
page read and write
2D6D000
trusted library allocation
page read and write
6CF7E000
unkown
page readonly
D7E000
stack
page read and write
2C3D000
stack
page read and write
2B92000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
3DA1000
trusted library allocation
page read and write
1368A000
heap
page read and write
13691000
heap
page read and write
E5CE000
stack
page read and write
56BF000
stack
page read and write
137D1000
heap
page read and write
B5B000
stack
page read and write
6CC6E000
unkown
page read and write
1983D000
direct allocation
page readonly
9FC000
stack
page read and write
54A0000
heap
page execute and read and write
13220000
heap
page read and write
56C0000
trusted library section
page read and write
DBE000
stack
page read and write
5280000
trusted library allocation
page read and write
6CF7A000
unkown
page read and write
19AD5000
heap
page read and write
9B0F000
stack
page read and write
2D90000
heap
page execute and read and write
E58C000
stack
page read and write
2B9B000
trusted library allocation
page execute and read and write
13898000
heap
page read and write
10BA000
heap
page read and write
F18000
heap
page read and write
5330000
trusted library allocation
page read and write
3E72000
trusted library allocation
page read and write
6CF71000
unkown
page read and write
6CF6D000
unkown
page readonly
197FD000
direct allocation
page execute read
2D80000
trusted library allocation
page read and write
4243000
trusted library allocation
page read and write
59CE000
stack
page read and write
5311000
trusted library allocation
page read and write
1093000
heap
page read and write
80BA000
heap
page read and write
5350000
heap
page read and write
C04D000
stack
page read and write
8FC000
stack
page read and write
598E000
stack
page read and write
6CF7E000
unkown
page read and write
2D70000
trusted library allocation
page read and write
558000
remote allocation
page execute and read and write
6CF54000
unkown
page readonly
195F8000
direct allocation
page execute read
6CF7C000
unkown
page read and write
434000
remote allocation
page execute and read and write
6CED0000
unkown
page readonly
2D73000
trusted library allocation
page read and write
5848000
trusted library section
page read and write
10C4D000
stack
page read and write
1327B000
stack
page read and write
BF0000
heap
page read and write
11E6000
heap
page read and write
1337C000
stack
page read and write
F37000
heap
page read and write
2DA1000
trusted library allocation
page read and write
There are 196 hidden memdumps, click here to show them.