IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\DBFCBGCGIJKJ\AKJDGI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DBFCBGCGIJKJ\EGIDHD
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\DBFCBGCGIJKJ\FBFHJJ
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBFCBGCGIJKJ\FBFHJJ-shm
data
dropped
C:\ProgramData\DBFCBGCGIJKJ\FHDAFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBFCBGCGIJKJ\FIEHII
ASCII text, with very long lines (1717), with CRLF line terminators
dropped
C:\ProgramData\DBFCBGCGIJKJ\GHJDBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBFCBGCGIJKJ\HCFIJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DBFCBGCGIJKJ\IEHCAK
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBFCBGCGIJKJ\IEHCAK-shm
data
dropped
C:\ProgramData\DBFCBGCGIJKJ\KEBFBG
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBFCBGCGIJKJ\KJKJJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DBFCBGCGIJKJ\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\DBFCBGCGIJKJ\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\DBFCBGCGIJKJ\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\DBFCBGCGIJKJ\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\DBFCBGCGIJKJ\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\DBFCBGCGIJKJ\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\sqls[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\76561199689717899[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3041), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DBFCBGCGIJKJ" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199689717899
23.197.127.21
malicious
https://steamcommunity.com/
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=7tll
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://78.47.123.174/nss3.dll
78.47.123.174
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://78.47.123.174/mozglue.dll
78.47.123.174
https://78.47.123.174
unknown
https://t.me/copterwin
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=E0c90DJSB6Ld&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&l=
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://steamcommunity.com/m
unknown
https://mozilla.org0/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://www.ecosia.org/newtab/
unknown
https://78.47.123.174/freebl3.dll
78.47.123.174
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://78.47.123.174;
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://78.47.123.174/msvcp140.dll
78.47.123.174
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://78.47.123.174/
78.47.123.174
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/heade
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://78.47.123.174HCAF
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=PyuRtGtUpR0t&l=englis
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://78.47.123.174/sqls.dll
78.47.123.174
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://steamcommunity.com/workshop/
unknown
https://78.47.123.174/softokn3.dll
78.47.123.174
https://steamcommunity.com/profiles/76561199689717899/badges
unknown
https://store.steampowered.com/legal/
unknown
http://www.sqlite.org/copyright.html.
unknown
https://78.47.123.174/vcruntime140.dll
78.47.123.174
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://steamcommunity.com/profiles/76561199689717899/inventory/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=Hpc3R3GOIT
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=1rP88j3WZLBx&amp
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=X93cgZRtuH6z&l=engli
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
https://78.47.123.174/sqls.dllb
unknown
https://78.47.123.174DBKE
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://steamcommunity.com/login/ho
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199689717899
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.197.127.21
malicious

IPs

IP
Domain
Country
Malicious
23.197.127.21
steamcommunity.com
United States
malicious
78.47.123.174
unknown
Germany

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
F37000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
157000
unkown
page read and write
malicious
6CEAF000
unkown
page write copy
1BA8E000
stack
page read and write
B2A000
heap
page read and write
CEE000
stack
page read and write
6FFE000
stack
page read and write
10E6000
heap
page read and write
6CEAE000
unkown
page read and write
12DAA000
stack
page read and write
3220000
heap
page read and write
13061000
heap
page read and write
E30000
heap
page read and write
E10000
heap
page read and write
C20000
heap
page read and write
18C000
unkown
page readonly
E0FE000
stack
page read and write
1172000
heap
page read and write
3420000
heap
page read and write
7CD000
stack
page read and write
10DE000
heap
page read and write
C50000
heap
page read and write
2FBC000
stack
page read and write
534000
remote allocation
page execute and read and write
E0E000
stack
page read and write
43C000
remote allocation
page execute and read and write
B20000
heap
page read and write
130000
unkown
page readonly
4E50000
heap
page read and write
10EF000
stack
page read and write
E7D000
stack
page read and write
6CCAD000
unkown
page readonly
14D000
unkown
page readonly
FB2000
heap
page read and write
F13000
heap
page read and write
1030000
heap
page read and write
CF2000
stack
page read and write
12F50000
heap
page read and write
131C6000
heap
page read and write
18C000
unkown
page readonly
21ADC000
stack
page read and write
C30000
heap
page read and write
12BE3000
heap
page read and write
EB0000
heap
page read and write
52E000
remote allocation
page execute and read and write
2F7C000
stack
page read and write
6CEB5000
unkown
page readonly
4CFF000
stack
page read and write
18FD1000
direct allocation
page execute read
CFD000
stack
page read and write
AFD000
stack
page read and write
572000
remote allocation
page execute and read and write
B2E000
heap
page read and write
3415000
heap
page read and write
1039000
heap
page read and write
E35000
heap
page read and write
1921D000
direct allocation
page readonly
131000
unkown
page execute read
3427000
heap
page read and write
FEE000
stack
page read and write
18FD8000
direct allocation
page execute read
6CCC2000
unkown
page readonly
1937E000
unkown
page read and write
6CC30000
unkown
page readonly
19212000
direct allocation
page read and write
52B000
remote allocation
page execute and read and write
3410000
heap
page read and write
116A000
heap
page read and write
63F000
remote allocation
page execute and read and write
21DBC000
stack
page read and write
13068000
heap
page read and write
6CCBE000
unkown
page read and write
19136000
direct allocation
page execute read
9D0000
heap
page read and write
1067D000
stack
page read and write
438000
remote allocation
page execute and read and write
6CCD0000
unkown
page readonly
12B64000
heap
page read and write
BCBD000
stack
page read and write
21EFC000
stack
page read and write
12DF0000
heap
page read and write
131A8000
heap
page read and write
33EE000
stack
page read and write
553000
remote allocation
page execute and read and write
6CEB0000
unkown
page read and write
FAF000
stack
page read and write
12B60000
heap
page read and write
18FD0000
direct allocation
page execute and read and write
21DFB000
stack
page read and write
987F000
stack
page read and write
191E8000
direct allocation
page readonly
6CE6F000
unkown
page readonly
EAE000
stack
page read and write
943E000
stack
page read and write
1326D000
heap
page read and write
1070E000
stack
page read and write
191DD000
direct allocation
page execute read
FB8000
heap
page read and write
332E000
stack
page read and write
E23D000
stack
page read and write
CEA000
stack
page read and write
434000
remote allocation
page execute and read and write
E1FF000
stack
page read and write
14D000
unkown
page readonly
60B000
remote allocation
page execute and read and write
9A0000
heap
page read and write
1018000
heap
page read and write
12BD0000
heap
page read and write
EBA000
heap
page read and write
131000
unkown
page execute read
12B4F000
stack
page read and write
1326F000
heap
page read and write
990000
heap
page read and write
336E000
stack
page read and write
1144000
heap
page read and write
189000
unkown
page read and write
3320000
heap
page read and write
3300000
heap
page read and write
6CC31000
unkown
page execute read
157000
unkown
page write copy
130000
unkown
page readonly
33AF000
stack
page read and write
103E000
heap
page read and write
92C000
stack
page read and write
191DF000
direct allocation
page readonly
12CAB000
stack
page read and write
E30000
heap
page read and write
33FE000
stack
page read and write
1921A000
direct allocation
page readonly
336B000
stack
page read and write
C40000
direct allocation
page execute and read and write
6CCD1000
unkown
page execute read
1921F000
direct allocation
page readonly
33AE000
stack
page read and write
1923E000
heap
page read and write
There are 126 hidden memdumps, click here to show them.