IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\DAEBKKKEHD.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\ProgramData\GHIJJJEGDBFH\AAAAKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHIJJJEGDBFH\BFBGCF
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GHIJJJEGDBFH\CAAKFI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GHIJJJEGDBFH\CAAKFI-shm
data
dropped
C:\ProgramData\GHIJJJEGDBFH\CFHDBF
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\GHIJJJEGDBFH\DAEBKK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHIJJJEGDBFH\DAKJDH
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHIJJJEGDBFH\EBKKKE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHIJJJEGDBFH\EBKKKE-shm
data
dropped
C:\ProgramData\GHIJJJEGDBFH\FCAAEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\GHIJJJEGDBFH\HCGDGI
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHIJJJEGDBFH\HJJJDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\GHIJJJEGDBFH\JDGHII
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\ljhgfsd[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ISO-8859 text, with very long lines (65536), with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://5.75.211.162/mozglue.dll
5.75.211.162
malicious
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
malicious
https://5.75.211.162/freebl3.dll
5.75.211.162
malicious
https://5.75.211.162AAAFC
unknown
malicious
https://5.75.211.162/vcruntime140.dll
5.75.211.162
malicious
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
malicious
https://5.75.211.162
unknown
malicious
https://t.me/ae5ed
unknown
malicious
https://5.75.211.162rt/form-data;
unknown
malicious
https://5.75.211.162/softokn3.dll6V#~
unknown
malicious
https://5.75.211.162AKKJD
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
https://5.75.211.162/xmx~3
unknown
malicious
https://5.75.211.162/softokn3.dll
5.75.211.162
malicious
https://5.75.211.162/sqlp.dll
5.75.211.162
malicious
https://5.75.211.162/msvcp140.dll
5.75.211.162
malicious
https://5.75.211.162EBFBA
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://dbsmena.com/ljhgfsd.exea;
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://steamcommunity.com/profiles/76561199780418869$
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://steamcommunity.com/profiles/765611997804188695
unknown
https://store.steampowered.com/privac
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://mozilla.org0/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
http://www.entrust.net/rpa03
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://dbsmena.com/ljhgfsd.exefCp3YWxsZXQqLiosKnNlZWQqLiosKmJ0YyouKiwqa2V5Ki4qLCoyZmEqLiosKmNyeXB0b
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://dbsmena.com/ljhgfsd.exe1kkkk1218740https://dbsmena.com/vdshfd.exe1kkkk783966f7e54258
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://dbsmena.com/ljhgfsd.exe)
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://www.entrust.net/rpa0
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://dbsmena.com/ljhgfsd.exe?
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://store.steampowered.com/stats/
unknown
https://dbsmena.com/ljhgfsd.exe
172.105.54.160
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://dbsmena.com/vdshfd.exetent-Disposition:
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://steamcommunity.com/6
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
http://www.sqlite.org/copyright.html.
unknown
https://dbsmena.com/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
dbsmena.com
172.105.54.160

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
5.75.211.162
unknown
Germany
malicious
172.105.54.160
dbsmena.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
3FE5000
trusted library allocation
page read and write
malicious
135F000
heap
page read and write
malicious
A140000
heap
page read and write
1564000
heap
page read and write
46B000
remote allocation
page execute and read and write
1217000
trusted library allocation
page execute and read and write
392D000
stack
page read and write
582000
remote allocation
page execute and read and write
12C7D000
stack
page read and write
121B000
trusted library allocation
page execute and read and write
1C4B2000
heap
page read and write
6C091000
unkown
page execute read
1530000
heap
page read and write
1258000
heap
page read and write
1C9E7000
heap
page read and write
544CD000
heap
page read and write
12EA000
heap
page read and write
1210000
heap
page read and write
1C9E5000
heap
page read and write
7F620000
trusted library allocation
page execute read
127C000
heap
page read and write
1C7E0000
heap
page read and write
544B4000
heap
page read and write
1480000
heap
page read and write
544C9000
heap
page read and write
1132000
stack
page read and write
152FF000
stack
page read and write
11F6000
trusted library allocation
page read and write
156A000
heap
page read and write
11BE000
stack
page read and write
12DE000
stack
page read and write
50DE000
stack
page read and write
467000
remote allocation
page execute and read and write
1C920000
heap
page read and write
1190000
heap
page read and write
1295000
heap
page read and write
163F000
stack
page read and write
4F4EC000
stack
page read and write
4F64F000
stack
page read and write
1636000
heap
page read and write
51E8E000
stack
page read and write
34E93000
heap
page read and write
1787C000
stack
page read and write
54497000
heap
page read and write
19DFE000
stack
page read and write
543E0000
trusted library allocation
page read and write
2304B000
stack
page read and write
151FE000
stack
page read and write
14CE000
stack
page read and write
39E6000
heap
page read and write
55A000
remote allocation
page execute and read and write
563E2000
trusted library allocation
page read and write
165E000
heap
page read and write
6C30E000
unkown
page read and write
3FE1000
trusted library allocation
page read and write
165B000
heap
page read and write
22740000
direct allocation
page execute and read and write
1C6C0000
heap
page read and write
15D7000
heap
page read and write
6C310000
unkown
page read and write
1331000
heap
page read and write
1601000
heap
page read and write
1292000
heap
page read and write
11A0000
heap
page read and write
178BD000
stack
page read and write
6C2CF000
unkown
page readonly
6C130000
unkown
page readonly
1C6DB000
heap
page read and write
15C0000
heap
page read and write
1230000
trusted library allocation
page read and write
22748000
direct allocation
page execute read
55D000
remote allocation
page execute and read and write
54490000
heap
page read and write
22982000
direct allocation
page read and write
63A000
remote allocation
page execute and read and write
6C090000
unkown
page readonly
134D000
heap
page read and write
11F0000
trusted library allocation
page read and write
1277000
heap
page read and write
15D2000
heap
page read and write
144F000
stack
page read and write
15CA000
heap
page read and write
2294F000
direct allocation
page readonly
1010000
heap
page read and write
543CE000
stack
page read and write
1250000
heap
page read and write
1C3EC000
heap
page read and write
2EF2B000
heap
page read and write
1533C000
stack
page read and write
15E5000
heap
page read and write
1C7D9000
heap
page read and write
1C3DC000
heap
page read and write
1450000
heap
page read and write
4F8ED000
stack
page read and write
5449C000
heap
page read and write
463000
remote allocation
page execute and read and write
1C4C4000
heap
page read and write
1C3BF000
stack
page read and write
1470000
trusted library allocation
page read and write
1C43E000
heap
page read and write
A240000
unclassified section
page read and write
14CE000
heap
page read and write
40D70000
heap
page read and write
22D8C000
stack
page read and write
22741000
direct allocation
page execute read
11C0000
trusted library allocation
page read and write
28FBA000
heap
page read and write
11D0000
heap
page read and write
2298F000
direct allocation
page readonly
120A000
trusted library allocation
page execute and read and write
112D000
stack
page read and write
1240000
trusted library allocation
page execute and read and write
1130000
heap
page read and write
1C4D0000
heap
page read and write
544B8000
heap
page read and write
1C445000
heap
page read and write
161C000
heap
page read and write
10F0000
heap
page read and write
544A4000
heap
page read and write
141C000
heap
page read and write
125E000
heap
page read and write
229A0000
heap
page read and write
19E7E000
stack
page read and write
11E3000
trusted library allocation
page execute and read and write
1C44D000
heap
page read and write
670000
remote allocation
page execute and read and write
6C11E000
unkown
page read and write
544C2000
heap
page read and write
6C122000
unkown
page readonly
1210000
trusted library allocation
page read and write
22958000
direct allocation
page readonly
1284000
heap
page read and write
4F7EC000
stack
page read and write
BB2000
unkown
page readonly
2ED0000
heap
page execute and read and write
12E0000
heap
page read and write
1200000
trusted library allocation
page read and write
15DE000
heap
page read and write
1C52C000
stack
page read and write
1139000
stack
page read and write
14BE000
heap
page read and write
6C131000
unkown
page execute read
4F3E2000
stack
page read and write
1073F000
stack
page read and write
150E000
stack
page read and write
3AE07000
heap
page read and write
4F54C000
stack
page read and write
563000
remote allocation
page execute and read and write
39E0000
heap
page read and write
15BC000
heap
page read and write
6C315000
unkown
page readonly
1C3FE000
heap
page read and write
140E000
heap
page read and write
11F4000
trusted library allocation
page read and write
5A1000
remote allocation
page execute and read and write
103C000
stack
page read and write
113C000
stack
page read and write
544C5000
heap
page read and write
396E000
stack
page read and write
228A6000
direct allocation
page execute read
22A49000
heap
page read and write
15B8000
heap
page read and write
1538000
heap
page read and write
1C3D1000
heap
page read and write
1562000
heap
page read and write
2FE1000
trusted library allocation
page execute and read and write
13D3000
heap
page read and write
544A8000
heap
page read and write
1C62D000
stack
page read and write
2298D000
direct allocation
page readonly
151BE000
stack
page read and write
1280000
heap
page read and write
2FDF000
stack
page read and write
117D000
stack
page read and write
23050000
heap
page read and write
2298A000
direct allocation
page readonly
2294D000
direct allocation
page execute read
BB0000
unkown
page readonly
6C30F000
unkown
page write copy
2FE3000
trusted library allocation
page read and write
1C93E000
heap
page read and write
DA8000
stack
page read and write
56830000
heap
page read and write
CAC000
stack
page read and write
15D0000
heap
page read and write
158E000
heap
page read and write
11E4000
trusted library allocation
page read and write
1135000
heap
page read and write
6C10D000
unkown
page readonly
There are 180 hidden memdumps, click here to show them.