IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\BGDAAKJJ
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BKKFHIEG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BKKFHIEGDHJKECAAKKEBAFIJKF
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\CGDGCFBA
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\CGHCGIID
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
modified
C:\ProgramData\GIJECGDGCBKECAKFBGCA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199680449169[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (2969), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqlx[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=_Vry
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://95.217.245.42:9000/mozglue.dll
unknown
https://95.217.245.42:9000/r
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
unknown
https://95.217.245.42:9000/z
unknown
https://steamcommunity.com/profiles/76561199680449169
104.105.90.131
https://95.217.245.42:9000/msvcp140.dlldge
unknown
https://95.217.245.42:9000
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
unknown
https://95.217.245.42:9000l
unknown
https://95.217.245.42:9000/nss3.dllD
unknown
https://95.217.245.42:9000/nss3.dll)))
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://95.217.245.42:9000/Z
unknown
https://95.217.245.42:9000/nss3.dllft
unknown
https://95.217.245.42/
unknown
https://95.217.245.42:900090ea2le
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://95.217.245.42:9000/softokn3.dll
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://steamcommunity.com/profiles/76561199680449169/badges
unknown
https://www.ecosia.org/newtab/
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com/X
unknown
https://95.217.245.42:9000vcruntime140.dllUser
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic
unknown
https://95.217.245.42:9000/mozglue.dllt
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://95.217.245.42:9000/mozglue.dllEdge
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://95.217.245.42:9000/softokn3.dlldge
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://www.valvesoftware.com/en/contact?contact-person=T
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://95.217.245.42:9000/0ea2osoft
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://95.217.245.42:9000acrosoft
unknown
https://95.217.245.42:9000/vcruntime140.dllser
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=roSu8uqw
unknown
https://95.217.245.42:9000/nss3.dll
unknown
https://95.217.245.42:9000/freebl3.dllEdge
unknown
https://95.217.245.42:9000el
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199680449169
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://95.217.245.42:9000/vcruntime140.dllw=
unknown
https://steamcommunity.com/discussions/
unknown
https://t.me/r1g1o
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://95.217.245.42:9000/msvcp140.dll
unknown
https://95.217.245.42:9000/vcruntime140.dll_7)
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://www.sqlite.org/copyright.html.
unknown
https://95.217.245.42:9000/B
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=tIrWyaxi8ABA&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://95.217.245.42:9000/J
unknown
https://recaptcha.net
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.105.90.131

IPs

IP
Domain
Country
Malicious
95.217.245.42
unknown
Germany
104.105.90.131
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
E1D000
unkown
page read and write
malicious
1632D000
heap
page read and write
E9BE000
stack
page read and write
1C29F000
direct allocation
page readonly
D70000
heap
page read and write
1C091000
direct allocation
page execute read
1442000
heap
page read and write
144D000
heap
page read and write
1C2DF000
direct allocation
page readonly
63C000
remote allocation
page execute and read and write
100A000
heap
page read and write
1245000
heap
page read and write
1C2D2000
direct allocation
page read and write
15E20000
heap
page read and write
141F000
heap
page read and write
2BE0000
heap
page read and write
DF0000
unkown
page readonly
E1D000
unkown
page write copy
C5C000
stack
page read and write
F9E000
stack
page read and write
E4E000
unkown
page execute and read and write
DD0000
heap
page read and write
136C0000
heap
page read and write
1C29D000
direct allocation
page execute read
528000
remote allocation
page execute and read and write
16020000
heap
page read and write
9EAF000
stack
page read and write
1368B000
unkown
page read and write
137DD000
stack
page read and write
1C2FB000
heap
page read and write
12DD000
heap
page read and write
16268000
heap
page read and write
1000000
heap
page read and write
E50000
unkown
page readonly
525000
remote allocation
page execute and read and write
EABF000
stack
page read and write
1240000
heap
page read and write
1362F000
stack
page read and write
1632F000
heap
page read and write
12D5000
heap
page read and write
D80000
heap
page read and write
DF1000
unkown
page execute read
16024000
heap
page read and write
1C090000
direct allocation
page execute and read and write
1020000
heap
page read and write
128E000
stack
page read and write
1220000
heap
page read and write
D5C000
stack
page read and write
15B6000
heap
page read and write
E13000
unkown
page readonly
10F5000
stack
page read and write
1435000
heap
page read and write
110EE000
stack
page read and write
100E000
heap
page read and write
12FE000
stack
page read and write
156D000
heap
page read and write
D0C000
stack
page read and write
1374000
heap
page read and write
16121000
heap
page read and write
DF1000
unkown
page execute read
10FE000
stack
page read and write
1C2DD000
direct allocation
page readonly
E13000
unkown
page readonly
1C1F6000
direct allocation
page execute read
E1F000
unkown
page write copy
52E000
remote allocation
page execute and read and write
16286000
heap
page read and write
DF0000
unkown
page readonly
C42D000
stack
page read and write
606000
remote allocation
page execute and read and write
1466000
heap
page read and write
1310000
heap
page read and write
15D1D000
stack
page read and write
435000
remote allocation
page execute and read and write
FDE000
stack
page read and write
13CD000
heap
page read and write
1C2A8000
direct allocation
page readonly
1C098000
direct allocation
page execute read
EB1E000
stack
page read and write
C3EC000
stack
page read and write
145F000
heap
page read and write
16128000
heap
page read and write
15E1C000
stack
page read and write
1C2DA000
direct allocation
page readonly
F50000
heap
page read and write
E96D000
stack
page read and write
DC0000
heap
page read and write
1393000
heap
page read and write
431000
remote allocation
page execute and read and write
1105D000
stack
page read and write
13A3000
heap
page read and write
E50000
unkown
page readonly
12CD000
stack
page read and write
56C000
remote allocation
page execute and read and write
11FF000
stack
page read and write
12D0000
heap
page read and write
1584000
heap
page read and write
DF0000
heap
page read and write
1464000
heap
page read and write
There are 90 hidden memdumps, click here to show them.