IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\CAFHIJDH
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\DBFCBGCG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBFCBGCGIJKJKECAKEGC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FHCBGDAAFBKEBGDHDBKECAEBGH
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\GDAAKFIDGIEGDGDHIDAK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GDHIEHJE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHJDBAKE
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GIIJEBAECGCBKECAAAEBFBGHJJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJJDGIECFCAKKFHIIIJEGDHIIE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199673019888[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (2969), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqln[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://37.27.87.155/freebl3.dllr
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199673019888
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://37.27.87.155/sqln.dll
37.27.87.155
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://37.27.87.155/softokn3.dllX
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://37.27.87.155/softokn3.dll
37.27.87.155
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://37.27.87.155/vcruntime140.dll&
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=1_BxDGVvfXwv&am
unknown
https://steamcommunity.com/yF
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Kg_v7CMM
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jU8h8CqVh6FY&l=e
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://37.27.87.155/nss3.dll
37.27.87.155
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://37.27.87.155/vcruntime140.dll
37.27.87.155
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=BMF068jICwP9&
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://steamcommunity.com/profiles/76561199673019888$aM
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://37.27.87.155/%-
unknown
https://steamcommunity.com/profiles/76561199673019888/badges
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://37.27.87.155/et
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://37.27.87.155/msvcp140.dll
37.27.87.155
https://37.27.87.155AFBKF
unknown
https://37.27.87.155/
37.27.87.155
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://steamcommunity.com/QFp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://37.27.87.1550e3a617e50bnt-Disposition:
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/irfailAt
unknown
https://37.27.87.155/:
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://37.27.87.155/freebl3.dll
37.27.87.155
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://37.27.87.155/%
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://37.27.87.155/ata
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://37.27.87.155/Q
unknown
https://37.27.87.155AKEHI
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://37.27.87.155/J
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=96N66CvLHly8&a
unknown
https://37.27.87.155/N
unknown
https://37.27.87.155/nes
unknown
https://steamcommunity.com/workshop/
unknown
https://t.me/irfail
unknown
https://37.27.87.155/B
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://www.sqlite.org/copyright.html.
unknown
https://37.27.87.155/C
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/profiles/76561199673019888ve74rMozilla/5.0
unknown
https://37.27.87.155
unknown
https://store.steampowered.com/
unknown
https://steamcommunity.com/profiles/76561199673019888
184.30.122.179
https://37.27.87.155/mozglue.dll
37.27.87.155
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
184.30.122.179

IPs

IP
Domain
Country
Malicious
37.27.87.155
unknown
Iran (ISLAMIC Republic Of)
184.30.122.179
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3EE000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
15BC000
heap
page read and write
13EDA000
heap
page read and write
13E15000
heap
page read and write
9E3E000
stack
page read and write
139BC000
stack
page read and write
13AC0000
heap
page read and write
19C31000
direct allocation
page execute read
13CCE000
heap
page read and write
13EDC000
heap
page read and write
12F8000
stack
page read and write
17F0000
heap
page read and write
19E7A000
direct allocation
page readonly
3BEE000
stack
page read and write
5F1000
remote allocation
page execute and read and write
19E72000
direct allocation
page read and write
100E000
heap
page read and write
3C1000
unkown
page execute read
E3D000
stack
page read and write
1A096000
heap
page read and write
424000
unkown
page readonly
12FC000
stack
page read and write
12EB000
stack
page read and write
6C891000
unkown
page execute read
1489000
heap
page read and write
6CA2F000
unkown
page readonly
140D000
stack
page read and write
6C7F1000
unkown
page execute read
423000
unkown
page read and write
6CA70000
unkown
page read and write
154D000
stack
page read and write
ECFF000
stack
page read and write
6C7F0000
unkown
page readonly
1A113000
heap
page read and write
FA0000
heap
page read and write
3C1A000
heap
page read and write
511000
remote allocation
page execute and read and write
6CA75000
unkown
page readonly
6C890000
unkown
page readonly
434000
remote allocation
page execute and read and write
159E000
heap
page read and write
ED3D000
stack
page read and write
3C0000
unkown
page readonly
558000
remote allocation
page execute and read and write
1480000
heap
page read and write
424000
unkown
page readonly
3C0000
unkown
page readonly
14CE000
stack
page read and write
13CD5000
heap
page read and write
C6BD000
stack
page read and write
130E000
stack
page read and write
1130E000
stack
page read and write
FB0000
heap
page read and write
1127C000
stack
page read and write
3E4000
unkown
page readonly
163A000
heap
page read and write
12F3000
stack
page read and write
19E48000
direct allocation
page readonly
12EF000
stack
page read and write
175F000
heap
page read and write
17C2000
heap
page read and write
1384F000
stack
page read and write
13E33000
heap
page read and write
19C38000
direct allocation
page execute read
1A090000
heap
page read and write
138BB000
stack
page read and write
FA0000
heap
page read and write
155A000
heap
page read and write
19C30000
direct allocation
page execute and read and write
6C86D000
unkown
page readonly
13A5E000
stack
page read and write
19E7D000
direct allocation
page readonly
144E000
stack
page read and write
19D96000
direct allocation
page execute read
6CA6E000
unkown
page read and write
EBFD000
stack
page read and write
1485000
heap
page read and write
1450000
heap
page read and write
1669000
heap
page read and write
13BCA000
heap
page read and write
3C10000
heap
page read and write
1A101000
heap
page read and write
13AB0000
heap
page read and write
19E3D000
direct allocation
page execute read
1290000
heap
page read and write
13860000
heap
page read and write
F2C000
stack
page read and write
6C87E000
unkown
page read and write
100A000
heap
page read and write
F60000
heap
page read and write
3C1000
unkown
page execute read
63F000
remote allocation
page execute and read and write
154F000
stack
page read and write
150D000
stack
page read and write
19E3F000
direct allocation
page readonly
1000000
heap
page read and write
19E7F000
direct allocation
page readonly
16A5000
heap
page read and write
144E000
stack
page read and write
1C6CF000
stack
page read and write
3EE000
unkown
page write copy
163C000
heap
page read and write
F90000
heap
page read and write
6C882000
unkown
page readonly
15CA000
heap
page read and write
3B8F000
stack
page read and write
1550000
heap
page read and write
422000
unkown
page execute and read and write
51A000
remote allocation
page execute and read and write
F3D000
stack
page read and write
3E4000
unkown
page readonly
140F000
stack
page read and write
78FE000
stack
page read and write
6CA6F000
unkown
page write copy
514000
remote allocation
page execute and read and write
There are 106 hidden memdumps, click here to show them.