IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AKKEGHJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BGCBGCAF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
modified
C:\ProgramData\DHJDAFIEHIEGDHIDGDGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHDHJEBFBFHJECAKFCAA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JDAKJJDB
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\JEBFIIIEHCFHJKFHDHDAAFBGDB
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\KFIIJJJD
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199680449169[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3041), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqlx[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://95.217.245.42:9000/mozglue.dll
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://steamcommunity.com/profiles/76561199680449169
184.87.56.26
https://95.217.245.42:9000
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://95.217.245.42:9000msvcp140.dll0_15_7)
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=roSu
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://store.steampowere/(:
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://95.217.245.42:9000/nss3.dll2
unknown
https://95.217.245.42:9000/vcruntime140.dll4
unknown
https://95.217.245.42:9000l
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&
unknown
https://95.217.245.42:9000/0ed9osoft
unknown
https://95.217.245.42/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&l=
unknown
https://95.217.245.42:9000/Pd
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://steamcommunity.com/profiles/76561199680449169;C
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://95.217.245.42:9000/softokn3.dll
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=tIrWyaxi8A
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://steamcommunity.com/profiles/76561199680449169/badges
unknown
https://www.ecosia.org/newtab/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://95.217.245.42:9000/freebl3.dllu
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=2VoZa2M8Wh3k&
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://95.217.245.42:9000/mozglue.dllEdge
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://95.217.245.42:9000/mozglue.dllome
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://95.217.245.42:9000acrosoft
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/toolt
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=PyuRtGtUpR0t&l=englis
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=KyfgrihL0xta&amp
unknown
https://95.217.245.42:9000/nss3.dll
unknown
https://95.217.245.42:9000/freebl3.dllEdge
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199680449169
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://steamcommunity.com/discussions/
unknown
https://t.me/r1g1o
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://95.217.245.42:9000/softokn3.dllh
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://95.217.245.42:9000/msvcp140.dll
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/r
unknown
http://www.sqlite.org/copyright.html.
unknown
https://95.217.245.42:9000/B
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/tQ
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://95.217.245.42:9000/M
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://95.217.245.42:9000/vcruntime140.dllUser
unknown
https://store.steampowered.com/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
unknown
https://95.217.245.42:9000/sqlx.dll
unknown
https://steamcommunity.com/profiles/76561199680449169/inventory/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://95.217.245.42:9000ing
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://95.217.245.42:9000/freebl3.dll
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
steamcommunity.com
184.87.56.26

IPs

IP
Domain
Country
Malicious
95.217.245.42
unknown
Germany
184.87.56.26
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
84D000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1BD78000
direct allocation
page readonly
E30000
heap
page read and write
15E0B000
heap
page read and write
E72000
heap
page read and write
D10000
heap
page read and write
E5ED000
stack
page read and write
15D64000
heap
page read and write
E2E000
heap
page read and write
158EC000
stack
page read and write
10B7E000
stack
page read and write
32AE000
stack
page read and write
525000
remote allocation
page execute and read and write
606000
remote allocation
page execute and read and write
1567F000
stack
page read and write
D74000
heap
page read and write
AF5000
stack
page read and write
E20000
heap
page read and write
E8E000
stack
page read and write
1BDAF000
direct allocation
page readonly
DCC000
heap
page read and write
E48E000
stack
page read and write
1BD6D000
direct allocation
page execute read
15BFF000
heap
page read and write
D1A000
heap
page read and write
E40000
heap
page read and write
820000
unkown
page readonly
15E0D000
heap
page read and write
1010000
heap
page read and write
E44E000
stack
page read and write
156DC000
unkown
page read and write
1BB68000
direct allocation
page execute read
821000
unkown
page execute read
B40000
heap
page read and write
32E5000
heap
page read and write
435000
remote allocation
page execute and read and write
84D000
unkown
page write copy
1BDAA000
direct allocation
page readonly
7DC000
stack
page read and write
1BDA2000
direct allocation
page read and write
101A000
heap
page read and write
52E000
remote allocation
page execute and read and write
FD0000
heap
page read and write
158F0000
heap
page read and write
821000
unkown
page execute read
EF3000
heap
page read and write
1313E000
stack
page read and write
101E000
heap
page read and write
ADC000
stack
page read and write
15AF0000
heap
page read and write
15D46000
heap
page read and write
87E000
unkown
page execute and read and write
994F000
stack
page read and write
1BB60000
direct allocation
page execute and read and write
3250000
heap
page read and write
120F000
stack
page read and write
10B2D000
stack
page read and write
1BD6F000
direct allocation
page readonly
15AFC000
heap
page read and write
998D000
stack
page read and write
880000
unkown
page readonly
C90000
heap
page read and write
CE0000
heap
page read and write
843000
unkown
page readonly
84F000
unkown
page write copy
E85000
heap
page read and write
528000
remote allocation
page execute and read and write
C95000
heap
page read and write
E90000
heap
page read and write
32E0000
heap
page read and write
159F6000
heap
page read and write
1BCC6000
direct allocation
page execute read
882000
unkown
page execute and read and write
E5D000
heap
page read and write
E16000
heap
page read and write
E1B000
heap
page read and write
15780000
heap
page read and write
F84000
heap
page read and write
D92000
heap
page read and write
431000
remote allocation
page execute and read and write
FAE000
stack
page read and write
15AF4000
heap
page read and write
E4C000
heap
page read and write
820000
unkown
page readonly
F6E000
heap
page read and write
E58F000
stack
page read and write
E45000
heap
page read and write
BECE000
stack
page read and write
130F000
stack
page read and write
1BDAD000
direct allocation
page readonly
880000
unkown
page readonly
843000
unkown
page readonly
E2B000
heap
page read and write
1BB61000
direct allocation
page execute read
C20000
heap
page read and write
BF0D000
stack
page read and write
56C000
remote allocation
page execute and read and write
D9D000
heap
page read and write
BDC000
stack
page read and write
E80000
heap
page read and write
15C06000
heap
page read and write
882000
unkown
page execute and read and write
63C000
remote allocation
page execute and read and write
130BC000
stack
page read and write
AFE000
stack
page read and write
There are 96 hidden memdumps, click here to show them.