IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\KJDGIJECFIEB\DHCFID
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\KJDGIJECFIEB\EBAEBF
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJDGIJECFIEB\FHJEGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KJDGIJECFIEB\GCGHJE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJDGIJECFIEB\HDBGDH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
modified
C:\ProgramData\KJDGIJECFIEB\KFBAEC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KJDGIJECFIEB\KJDGIJ
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199686524322[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (2969), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqlx[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://116.202.5.235:9000/soft
unknown
malicious
https://116.202.5.235:9000/softokn3.dllP
unknown
malicious
https://116.202.5.235:9000/msvcp140.dll
unknown
malicious
https://116.202.5.235:9000EB
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=L35TrLJDfqtD&l=engl
unknown
https://116.202.5.235:9000/softokn3.dlldge
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.s
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=6MtR
unknown
https://116.202.5.235:9000/mozglue.dllEdge
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=B7Vsdo1okyaC&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=Iy1ies1ROjUT&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=SPpMitTYp6ku&l=en
unknown
https://116.202.5.235:9000/nss3.dll2
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://116.202.5.235:9000/softokn3.dllf
unknown
https://116.202.5.235:9000/freebl3.dllEdge
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://116.202.5.235:9000
unknown
https://116.202.5.235:9000/vcruntime140.dllets
unknown
https://116.202.5.235:9000/msvcp140.dlldge
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199686524322
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://116.202.5.235:9000/sqlx.dll
unknown
https://116.202.5.235:9000ing
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://steamcommunity.com/_
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://116.202.5.235:9000/softokn3.dll
unknown
https://116.202.5.235:9000/softokn3.dll2
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://116.202.5.235:9000/nss3.dllft
unknown
https://store.steampowered.com/about/
unknown
https://116.202.5.235:9000/vcruntime140.dllUser
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/
unknown
https://116.202.5.235:9000/vcruntime140.dll.
unknown
https://web.telegram.org
unknown
https://116.202.5.235:9000/v
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=5CgcHEsWGAFt&a
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://116.202.5.235:9000/mozglue.dll
unknown
https://116.202.5.235:9000/
unknown
https://116.202.5.235:9000/f
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://116.202.5.235:9000/b
unknown
https://steamcommunity.com/discussions/
unknown
https://116.202.5.235:9000/vcruntime140.dllO
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://t.me/k0mono
149.154.167.99
https://steamcommunity.com/profiles/76561199686524322/inventory/
unknown
https://steamcommunity.com/profiles/76561199686524322/badges
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=L3Ed_Gybseku&l=e
unknown
http://www.sqlite.org/copyright.html.
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=soQOTmUz
unknown
https://116.202.5.235:9000/vcruntime140.dllh
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://116.202.5.235:9000/msvcp140.dllD
unknown
https://116.202.5.235:9000/vcruntime140.dllc
unknown
https://116.202.5.235:9000/freebl3.dll
unknown
https://116.202.5.235/
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.42.29
malicious
t.me
149.154.167.99

IPs

IP
Domain
Country
Malicious
104.102.42.29
steamcommunity.com
United States
malicious
116.202.5.235
unknown
Germany
149.154.167.99
t.me
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
158000
unkown
page read and write
malicious
446000
remote allocation
page execute and read and write
malicious
379D000
stack
page read and write
134DC000
heap
page read and write
13E9000
heap
page read and write
1070000
heap
page read and write
19472000
direct allocation
page read and write
567000
remote allocation
page execute and read and write
108CE000
stack
page read and write
CEF000
stack
page read and write
131000
unkown
page execute read
13F1000
heap
page read and write
960000
heap
page read and write
134DA000
heap
page read and write
132D5000
heap
page read and write
EF4000
stack
page read and write
13F7000
heap
page read and write
12A5000
heap
page read and write
9E0000
heap
page read and write
55E000
remote allocation
page execute and read and write
BE0000
heap
page read and write
1380000
heap
page read and write
E48F000
stack
page read and write
158000
unkown
page write copy
19238000
direct allocation
page execute read
1947A000
direct allocation
page readonly
130000
unkown
page readonly
EFE000
stack
page read and write
F40000
heap
page read and write
5A5000
remote allocation
page execute and read and write
373E000
stack
page read and write
19396000
direct allocation
page execute read
1947F000
direct allocation
page readonly
E2F000
stack
page read and write
10C5000
heap
page read and write
19230000
direct allocation
page execute and read and write
12DB0000
heap
page read and write
9AE000
stack
page read and write
1272000
heap
page read and write
14E000
unkown
page readonly
13433000
heap
page read and write
131000
unkown
page execute read
A20000
heap
page read and write
10C9000
heap
page read and write
523000
remote allocation
page execute and read and write
120F000
stack
page read and write
121A000
heap
page read and write
A2A000
heap
page read and write
1293000
heap
page read and write
B7C000
stack
page read and write
37A5000
heap
page read and write
9B0000
direct allocation
page execute and read and write
63F000
remote allocation
page execute and read and write
950000
heap
page read and write
12EFB000
stack
page read and write
E38D000
stack
page read and write
1210000
heap
page read and write
18A000
unkown
page read and write
1090000
heap
page read and write
BF4C000
stack
page read and write
1404000
heap
page read and write
19231000
direct allocation
page execute read
561000
remote allocation
page execute and read and write
A2E000
heap
page read and write
1943D000
direct allocation
page execute read
138F000
heap
page read and write
10C0000
heap
page read and write
BF0000
heap
page read and write
368E000
stack
page read and write
1095E000
stack
page read and write
18D000
unkown
page readonly
132CE000
heap
page read and write
1943F000
direct allocation
page readonly
D2E000
stack
page read and write
1369000
heap
page read and write
12DB4000
heap
page read and write
36CD000
stack
page read and write
586000
remote allocation
page execute and read and write
18D000
unkown
page readonly
1370000
heap
page read and write
1410000
heap
page read and write
110E000
stack
page read and write
37A0000
heap
page read and write
1947D000
direct allocation
page readonly
14E000
unkown
page readonly
130000
unkown
page readonly
5FC000
stack
page read and write
8FD000
stack
page read and write
12FFC000
stack
page read and write
13415000
heap
page read and write
62E000
remote allocation
page execute and read and write
131C3000
heap
page read and write
19448000
direct allocation
page readonly
130C0000
heap
page read and write
130B0000
heap
page read and write
12D9F000
stack
page read and write
There are 87 hidden memdumps, click here to show them.