IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\AAEHIDAKECFIEBGDHJEBKKKKJK
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\BAKKEGCA
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAFHIDGIJKJKECBGDBGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAKEBAKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\EHCGIJDHDGDBGDGCGCFHJKKECG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FIECBFID
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GIIEGHID
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJEGDBGDBFIJKECBAKFBFIDGCF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JEHIJJKEGHJJKECBKECF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JKKEHJDHJKFIECAAKFIJJKJKFH
SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\76561199673019888[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (2969), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\sqln[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199673019888
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=EyWBqDQS-6jg&a
unknown
https://95.217.9.149IJKEH
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
unknown
http://postarca.posta.si/dokumenti/0n
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://95.217.9.149/vcruntime140.dllK
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://95.217.9.149/4c
unknown
https://95.217.9.149/vcruntime140.dllD
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
unknown
https://95.217.9.149/rontdesk
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=1_BxDGVvfXwv&am
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=c4UneKQJ
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://store.steampowered.com/privacy_agreement/
unknown
http://ocsp.posta.si0
unknown
https://95.217.9.149/msvcp140.dllZ
unknown
http://postarca.posta.si/files/POSTArCA-G2.cer0
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://postarca.posta.si/files/POSTArCA-Root.cer0
unknown
https://steamcommunity.com/profiles/76561199673019888/badges
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=ZVlkBFZXqRp1&l=e
unknown
http://postarca.posta.si/crl/postarca-g2.crl
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://postarca.posta.si/crl/POSTArCA-Root.crl
unknown
https://steamcommunity.com/profiles/76561199673019888Cq
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://95.217.9.149/
95.217.9.149
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/irfailAt
unknown
https://postarca.posta.si/dokumenti/postarca_pds_sl.pdf
unknown
https://95.217.9.149/mozglue.dll
95.217.9.149
https://github.com/mgravell/protobuf-netJ
unknown
https://95.217.9.149
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://95.217.9.149/softokn3.dllr
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://95.217.9.149/msvcp140.dll
95.217.9.149
https://95.217.9.149/freebl3.dll
95.217.9.149
https://steamcommunity.com/workshop/
unknown
https://t.me/irfail
unknown
https://store.steampowered.com/legal/
unknown
https://postarca.posta.si/dokumenti/postarca_pds_en.pdf
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://95.217.9.149/softokn3.dllx
unknown
http://www.sqlite.org/copyright.html.
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://95.217.9.149/X
unknown
https://95.217.9.149CGCFH
unknown
https://95.217.9.149/ontdesk
unknown
https://github.com/mgravell/protobuf-net
unknown
https://steamcommunity.com/profiles/76561199673019888ve74rMozilla/5.0
unknown
https://store.steampowered.com/
unknown
https://steamcommunity.com/profiles/76561199673019888
23.66.133.162
https://95.217.9.149/G
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://95.217.9.149/H
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.66.133.162

IPs

IP
Domain
Country
Malicious
95.217.9.149
unknown
Germany
23.66.133.162
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
1062000
heap
page read and write
malicious
329B000
trusted library allocation
page read and write
malicious
46E2000
trusted library allocation
page read and write
malicious
5620000
trusted library section
page read and write
malicious
2FB1000
trusted library allocation
page read and write
malicious
4C76000
trusted library allocation
page read and write
malicious
4129000
trusted library allocation
page read and write
malicious
4216000
trusted library allocation
page read and write
malicious
5AC0000
trusted library section
page read and write
malicious
3462000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
6D5B5000
unkown
page readonly
6D331000
unkown
page execute read
159F000
stack
page read and write
334B000
trusted library allocation
page read and write
1037000
heap
page read and write
122D000
trusted library allocation
page execute and read and write
1210000
trusted library allocation
page read and write
2DB8000
trusted library allocation
page read and write
363D000
stack
page read and write
40A1000
trusted library allocation
page read and write
3464000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
19EE5000
heap
page read and write
332A000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
6D330000
unkown
page readonly
3466000
trusted library allocation
page read and write
6D5AF000
unkown
page write copy
FF8000
heap
page read and write
1224000
trusted library allocation
page read and write
10AE000
stack
page read and write
9F0000
unkown
page readonly
5420000
trusted library allocation
page execute and read and write
5A40000
trusted library allocation
page execute and read and write
12C7000
heap
page read and write
5870000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
19B8D000
direct allocation
page execute read
1046000
heap
page read and write
E3C000
stack
page read and write
3FB1000
trusted library allocation
page read and write
5C50000
trusted library section
page read and write
2FAF000
stack
page read and write
5B7E000
stack
page read and write
4D32000
trusted library allocation
page read and write
5C2E000
stack
page read and write
1267000
trusted library allocation
page execute and read and write
347B000
trusted library allocation
page read and write
10D0000
heap
page read and write
1359000
heap
page read and write
6EEF6000
unkown
page readonly
19EE0000
heap
page read and write
58B5000
trusted library allocation
page read and write
19EE8000
heap
page read and write
9D5F000
stack
page read and write
561F000
stack
page read and write
5A9E000
stack
page read and write
E8CE000
stack
page read and write
1252000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
FC0000
heap
page read and write
148E000
stack
page read and write
5900000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
10D5000
heap
page read and write
125A000
trusted library allocation
page execute and read and write
6D5AE000
unkown
page read and write
3347000
trusted library allocation
page read and write
126B000
trusted library allocation
page execute and read and write
32FC000
trusted library allocation
page read and write
134F000
heap
page read and write
3475000
trusted library allocation
page read and write
19AE6000
direct allocation
page execute read
3317000
trusted library allocation
page read and write
2EA0000
heap
page execute and read and write
9C5E000
stack
page read and write
19980000
direct allocation
page execute and read and write
FA5000
heap
page read and write
331C000
trusted library allocation
page read and write
F33000
stack
page read and write
6EEE1000
unkown
page execute read
5440000
trusted library allocation
page read and write
CFC000
stack
page read and write
19B8F000
direct allocation
page readonly
1364F000
stack
page read and write
3345000
trusted library allocation
page read and write
58D9000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
32FA000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
11EE000
stack
page read and write
19988000
direct allocation
page execute read
5970000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
137BC000
stack
page read and write
589E000
trusted library allocation
page read and write
13C22000
heap
page read and write
3332000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
13900000
heap
page read and write
124D000
trusted library allocation
page execute and read and write
6EEFF000
unkown
page readonly
5A50000
trusted library allocation
page read and write
64C0000
heap
page read and write
6EEFD000
unkown
page read and write
1110E000
stack
page read and write
3300000
trusted library allocation
page read and write
1055000
heap
page read and write
1223000
trusted library allocation
page execute and read and write
6530000
heap
page read and write
6D5B0000
unkown
page read and write
349A000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
DF7000
stack
page read and write
32FE000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
13A1B000
heap
page read and write
2E8E000
stack
page read and write
558000
remote allocation
page execute and read and write
8120000
heap
page read and write
34B3000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
19981000
direct allocation
page execute read
32C2000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
2DA0000
heap
page read and write
1262000
trusted library allocation
page read and write
FA0000
heap
page read and write
3494000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
50AE000
stack
page read and write
E9D0000
heap
page read and write
5F1000
remote allocation
page execute and read and write
FF0000
heap
page read and write
434000
remote allocation
page execute and read and write
5DD0000
trusted library section
page read and write
6506000
heap
page read and write
64D6000
heap
page read and write
19BCF000
direct allocation
page readonly
C2DC000
stack
page read and write
9F2000
unkown
page readonly
34B5000
trusted library allocation
page read and write
34AD000
trusted library allocation
page read and write
19F65000
heap
page read and write
F2B000
stack
page read and write
1289000
heap
page read and write
58F0000
trusted library allocation
page read and write
3319000
trusted library allocation
page read and write
53F0000
heap
page read and write
2D80000
trusted library allocation
page execute and read and write
3311000
trusted library allocation
page read and write
2D7E000
stack
page read and write
1120000
heap
page read and write
34C4000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
1399E000
stack
page read and write
514000
remote allocation
page execute and read and write
5980000
trusted library allocation
page execute and read and write
51A000
remote allocation
page execute and read and write
6D3BE000
unkown
page read and write
1490000
heap
page read and write
3FDD000
trusted library allocation
page read and write
F38000
stack
page read and write
6D3AD000
unkown
page readonly
3492000
trusted library allocation
page read and write
13A14000
heap
page read and write
1290000
heap
page read and write
6EEFD000
unkown
page read and write
5450000
trusted library allocation
page read and write
6D3D1000
unkown
page execute read
13B79000
heap
page read and write
10B0000
heap
page read and write
5850000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
13C20000
heap
page read and write
5910000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
19F55000
heap
page read and write
10F7D000
stack
page read and write
34B7000
trusted library allocation
page read and write
9D9D000
stack
page read and write
5BBE000
stack
page read and write
1298000
heap
page read and write
32EE000
trusted library allocation
page read and write
64DA000
heap
page read and write
10FC0000
heap
page read and write
64F2000
heap
page read and write
F2D000
stack
page read and write
1154000
heap
page read and write
122D000
heap
page read and write
6D3D0000
unkown
page readonly
332E000
trusted library allocation
page read and write
812A000
heap
page read and write
5A30000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
420E000
trusted library allocation
page read and write
13B5B000
heap
page read and write
34C6000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page execute and read and write
5DC0000
trusted library allocation
page execute and read and write
58E0000
trusted library allocation
page execute and read and write
19BCD000
direct allocation
page readonly
E85D000
stack
page read and write
12BA000
heap
page read and write
C31D000
stack
page read and write
E9CF000
stack
page read and write
110F000
heap
page read and write
136BB000
stack
page read and write
EA3E000
stack
page read and write
63F000
remote allocation
page execute and read and write
347F000
trusted library allocation
page read and write
5410000
heap
page execute and read and write
551E000
stack
page read and write
5890000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
3313000
trusted library allocation
page read and write
13803000
heap
page read and write
FB0000
heap
page read and write
5C3F000
trusted library allocation
page read and write
19B98000
direct allocation
page readonly
3490000
trusted library allocation
page read and write
6D3C2000
unkown
page readonly
58C6000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
3477000
trusted library allocation
page read and write
19F51000
heap
page read and write
6EEE0000
unkown
page readonly
19BCA000
direct allocation
page readonly
13660000
heap
page read and write
6D56F000
unkown
page readonly
2D90000
trusted library allocation
page read and write
1256000
trusted library allocation
page execute and read and write
4175000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
1060000
heap
page read and write
3498000
trusted library allocation
page read and write
1243000
trusted library allocation
page read and write
F2F000
stack
page read and write
32F6000
trusted library allocation
page read and write
5C40000
trusted library allocation
page execute and read and write
63E0000
trusted library allocation
page read and write
80FE000
stack
page read and write
349D000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
1230000
heap
page read and write
330F000
trusted library allocation
page read and write
511000
remote allocation
page execute and read and write
3315000
trusted library allocation
page read and write
34B1000
trusted library allocation
page read and write
F3C000
stack
page read and write
1C62F000
stack
page read and write
347D000
trusted library allocation
page read and write
334F000
trusted library allocation
page read and write
19BC2000
direct allocation
page read and write
There are 254 hidden memdumps, click here to show them.