IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\BAEBGHCF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CFCFHJDB
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\CGDHIEGC
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DGDAEHCBGIIJJJJKKKEH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DGHIECGCBKFHIEBGHDBKFHJDGI
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\ECBGCGCGIEGCBFHIIEBFCAFHIE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\ECFHJKEBAAECBFHIECGIECFCBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HCAEGCBFHJDGCBFHDAFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JDHCBAEH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_e44d4e5ec9aabba2d97b68ec8acab9772a87d613_dff20964_afb0b794-8d8d-466b-ae88-c53c51aa402b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD0A.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 14:50:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFDF5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFE54.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199658817715[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3041), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqlm[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 884

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://78.46.229.36/softokn3.dll)%
unknown
https://duckduckgo.com/ac/?q=
unknown
https://78.46.229.36/msvcp140.dll
78.46.229.36
https://steamcommunity.com/?subsection=broadcasts
unknown
https://78.46.229.36/Jl
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=GRA9
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://78.46.229.36/nss3.dllw
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016exe
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
https://steamcommunity.com/profiles/76561199658817715/badges
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://78.46.229.36/freebl3.dllf
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://78.46.229.36/mozglue.dll
78.46.229.36
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=KrKRjQbCfNh0&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Zj8Lt-uyXH8R&
unknown
https://78.46.229.36/
78.46.229.36
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&l=
unknown
https://78.46.229.36DAKFB
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://78.46.229.36/softokn3.dll
78.46.229.36
http://store.steampowered.com/privacy_agreement/
unknown
https://78.46.229.36/mozglue.dllY%B
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ributabl
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://78.46.229.36/freebl3.dll
78.46.229.36
https://78.46.229.36/nss3.dll
78.46.229.36
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://78.46.229.36
unknown
https://78.46.229.36/~o
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://78.46.229.36/sqlm.dlls#
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://78.46.229.36/vcruntime140.dll
78.46.229.36
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=yp9unEzrjc_Z&amp
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://78.46.229.36/wo
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/$
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://78.46.229.36/fO4
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=PyuRtGtUpR0t&l=englis
unknown
https://78.46.229.36/sqlm.dll
78.46.229.36
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://steamcommunity.com/discussions/
unknown
https://steamcommunity.com/profiles/76561199658817715
104.102.129.112
https://steamcommunity.com/profiles/76561199658817715/inventory/
unknown
https://store.steampowered.com/stats/
unknown
https://steamcommunity.com/profiles/76561199658817715https://t.me/sa9okRed
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://78.46.229.36/softokn3.dll=%
unknown
https://78.46.229.36/B
unknown
https://78.46.229.36/D
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
http://www.sqlite.org/copyright.html.
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199658817715
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://78.46.229.36GIJEH
unknown
https://78.46.229.36h;
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=n5zImpoIZ8N
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.129.112

IPs

IP
Domain
Country
Malicious
104.102.129.112
steamcommunity.com
United States
78.46.229.36
unknown
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{a94349a0-cf80-e785-3ce9-d71c22b56d6f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F75000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
14B0000
heap
page read and write
malicious
13B4000
trusted library allocation
page read and write
523000
remote allocation
page execute and read and write
6CA0D000
unkown
page readonly
1244000
heap
page read and write
138E000
stack
page read and write
143A000
heap
page read and write
138D000
stack
page read and write
1320000
heap
page read and write
6CA22000
unkown
page readonly
13DA000
trusted library allocation
page execute and read and write
13EB000
trusted library allocation
page execute and read and write
2F2E000
stack
page read and write
16199000
heap
page read and write
1382E000
stack
page read and write
1C5A0000
heap
page read and write
1210000
heap
page read and write
6C990000
unkown
page readonly
162FE000
heap
page read and write
168C000
heap
page read and write
13C0000
trusted library allocation
page read and write
1649000
heap
page read and write
59CE000
stack
page read and write
13CE000
stack
page read and write
1400000
trusted library allocation
page read and write
10F6000
stack
page read and write
1126E000
stack
page read and write
6CA1E000
unkown
page read and write
39AE000
stack
page read and write
163F000
stack
page read and write
DD0000
heap
page read and write
150B000
heap
page read and write
162E0000
heap
page read and write
15F20000
heap
page read and write
1C318000
direct allocation
page readonly
15D6F000
stack
page read and write
A0EF000
stack
page read and write
2E20000
heap
page read and write
13F5000
heap
page read and write
15EDC000
stack
page read and write
56C0000
heap
page execute and read and write
1C34A000
direct allocation
page readonly
16098000
heap
page read and write
D5C000
stack
page read and write
121E000
heap
page read and write
1218000
heap
page read and write
58CE000
stack
page read and write
123B000
heap
page read and write
520000
remote allocation
page execute and read and write
13BD000
trusted library allocation
page execute and read and write
13F0000
heap
page read and write
11D0000
heap
page read and write
15DDB000
stack
page read and write
6C991000
unkown
page execute read
3F71000
trusted library allocation
page read and write
EB6D000
stack
page read and write
1EBDE000
stack
page read and write
529000
remote allocation
page execute and read and write
13B3000
trusted library allocation
page execute and read and write
FCF000
stack
page read and write
11F0000
heap
page read and write
149B000
heap
page read and write
57CF000
stack
page read and write
15D80000
heap
page read and write
63C000
remote allocation
page execute and read and write
1C30F000
direct allocation
page readonly
13E0000
trusted library allocation
page read and write
39EE000
stack
page read and write
514D000
stack
page read and write
3A80000
heap
page read and write
568E000
stack
page read and write
C92000
unkown
page readonly
2F60000
heap
page execute and read and write
431000
remote allocation
page execute and read and write
DF0000
heap
page read and write
16080000
heap
page read and write
163A5000
heap
page read and write
1237000
heap
page read and write
776E000
stack
page read and write
147E000
heap
page read and write
EBAE000
stack
page read and write
1C100000
direct allocation
page execute and read and write
FCB000
stack
page read and write
163A7000
heap
page read and write
161A0000
heap
page read and write
3A8A000
heap
page read and write
2E1E000
stack
page read and write
1252000
heap
page read and write
1400000
heap
page read and write
127E000
heap
page read and write
1430000
heap
page read and write
1122C000
stack
page read and write
1272000
heap
page read and write
6C755000
unkown
page readonly
EDC000
stack
page read and write
6C570000
unkown
page readonly
FDC000
stack
page read and write
13E7000
trusted library allocation
page execute and read and write
6C571000
unkown
page execute read
1C5A9000
heap
page read and write
2F73000
trusted library allocation
page read and write
3A2E000
stack
page read and write
6C74E000
unkown
page read and write
1607D000
stack
page read and write
FD3000
stack
page read and write
ECAF000
stack
page read and write
1C34D000
direct allocation
page readonly
11F5000
heap
page read and write
ECED000
stack
page read and write
FD8000
stack
page read and write
C62E000
stack
page read and write
1C615000
heap
page read and write
1420000
trusted library allocation
page read and write
CC6000
unkown
page readonly
1C342000
direct allocation
page read and write
1410000
trusted library allocation
page execute and read and write
1430000
heap
page read and write
153F000
stack
page read and write
C90000
unkown
page readonly
2F71000
trusted library allocation
page execute and read and write
13A0000
trusted library allocation
page read and write
137AD000
stack
page read and write
1C101000
direct allocation
page execute read
6C750000
unkown
page read and write
9CAF000
stack
page read and write
560E000
stack
page read and write
1C266000
direct allocation
page execute read
1C108000
direct allocation
page execute read
564E000
stack
page read and write
DC0000
heap
page read and write
1240000
heap
page read and write
1C34F000
direct allocation
page readonly
1C5A5000
heap
page read and write
1C611000
heap
page read and write
134E000
stack
page read and write
504E000
stack
page read and write
1C30D000
direct allocation
page execute read
16C2000
heap
page read and write
6C74F000
unkown
page write copy
600000
remote allocation
page execute and read and write
1C625000
heap
page read and write
6C70F000
unkown
page readonly
FCD000
stack
page read and write
567000
remote allocation
page execute and read and write
There are 136 hidden memdumps, click here to show them.