IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\AECAKJJECAEGCBGDHDHCFCFHJD
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\AFCFHDHIIIECBGCAKFIJDHJEGI
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BAEBGHCFCAAFIECAFIIIDBAFII
SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 6
dropped
C:\ProgramData\CGDHIEGC
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECAEGHIJEHJDHIDHIDAE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GCAFCAFH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\HDAFBAEBKJKFIDHJJKJKKFBAFB
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIDBFCBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\IJEHIDHDAKJDHJKEBFIE
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KFCGDBAK
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_46295dc254ed0112f7af36e8d4fb4383967ee_a4c4a70a_16ba7210-c1f9-4ac0-8547-e3f2990a2e8f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3DCE.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Mar 28 19:34:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER405F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4080.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\sqlm[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\76561199658817715[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3041), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 848

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://78.46.229.36/msvcp140.dll
78.46.229.36
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=GRA9
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://78.46.229.36/Bi
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://78.46.229.36/msvcp140.dllh
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
https://steamcommunity.com/profiles/76561199658817715/badges
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://78.46.229.36/mozglue.dllZ
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://78.46.229.36/mozglue.dll
78.46.229.36
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=KrKRjQbCfNh0&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Zj8Lt-uyXH8R&
unknown
https://78.46.229.36/
78.46.229.36
https://78.46.229.36/sqlm.dllf
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&l=
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://78.46.229.36/softokn3.dll
78.46.229.36
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://78.46.229.36/freebl3.dll
78.46.229.36
https://78.46.229.36/ramData
unknown
https://78.46.229.36/nss3.dll
78.46.229.36
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://78.46.229.36
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://78.46.229.36/s
unknown
https://78.46.229.36/softokn3.dllr
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://78.46.229.36/vcruntime140.dll
78.46.229.36
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=yp9unEzrjc_Z&amp
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=PyuRtGtUpR0t&l=englis
unknown
https://78.46.229.36/sqlm.dll
78.46.229.36
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://78.46.229.36/f
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://steamcommunity.com/discussions/
unknown
https://steamcommunity.com/profiles/76561199658817715
104.105.90.131
https://78.46.229.36DBKJJ
unknown
https://steamcommunity.com/profiles/76561199658817715/inventory/
unknown
https://store.steampowered.com/stats/
unknown
https://steamcommunity.com/profiles/76561199658817715https://t.me/sa9okRed
unknown
https://78.46.229.36/6
unknown
https://steamcommunity.com/profiles/76561199658817715t
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://78.46.229.36/te5
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://78.46.229.36/0
unknown
https://78.46.229.36/D
unknown
https://78.46.229.36/F
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
http://www.sqlite.org/copyright.html.
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199658817715
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
http://upx.sf.net
unknown
https://78.46.229.36/$
unknown
https://store.steampowered.com/
unknown
https://78.46.229.36/freebl3.dll6
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=n5zImpoIZ8N
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://78.46.229.36/Z0t
unknown
https://78.46.229.36HJEBK
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://t.me/sa9ok
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=96N66CvLHl
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.105.90.131

IPs

IP
Domain
Country
Malicious
78.46.229.36
unknown
Germany
104.105.90.131
steamcommunity.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
\REGISTRY\A\{d1563552-0119-270f-92c8-32d17790cb38}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1427000
heap
page read and write
malicious
4315000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
13D08000
heap
page read and write
3130000
heap
page read and write
EC3F000
stack
page read and write
4311000
trusted library allocation
page read and write
1440000
heap
page read and write
11C0000
heap
page read and write
39DE000
stack
page read and write
118C000
stack
page read and write
1540000
trusted library allocation
page read and write
567000
remote allocation
page execute and read and write
15E0000
heap
page read and write
32E0000
heap
page read and write
13A82000
heap
page read and write
14DF000
heap
page read and write
6CEA0000
unkown
page read and write
140E000
stack
page read and write
9C0E000
stack
page read and write
19D28000
direct allocation
page readonly
3300000
heap
page execute and read and write
593E000
stack
page read and write
13B0000
heap
page read and write
1A105000
heap
page read and write
1A183000
heap
page read and write
431000
remote allocation
page execute and read and write
3311000
trusted library allocation
page execute and read and write
6CE9E000
unkown
page read and write
19D5F000
direct allocation
page readonly
19B18000
direct allocation
page execute read
1410000
trusted library allocation
page read and write
EACC000
stack
page read and write
E80000
unkown
page readonly
395E000
stack
page read and write
174F000
stack
page read and write
1496000
heap
page read and write
19D1D000
direct allocation
page execute read
39EA000
heap
page read and write
6CBC0000
unkown
page readonly
1676000
heap
page read and write
1A100000
heap
page read and write
19D5D000
direct allocation
page readonly
EB3E000
stack
page read and write
14E0000
heap
page read and write
19C76000
direct allocation
page execute read
6CBC1000
unkown
page execute read
14A0000
trusted library allocation
page read and write
19D52000
direct allocation
page read and write
1C83E000
stack
page read and write
13910000
heap
page read and write
58FE000
stack
page read and write
1380B000
stack
page read and write
A04F000
stack
page read and write
13BA3000
heap
page read and write
FB0000
heap
page read and write
1583000
heap
page read and write
EB6000
unkown
page readonly
1A171000
heap
page read and write
1188000
stack
page read and write
FC0000
heap
page read and write
6CE5F000
unkown
page readonly
157B000
heap
page read and write
184F000
stack
page read and write
111CD000
stack
page read and write
12F6000
stack
page read and write
520000
remote allocation
page execute and read and write
529000
remote allocation
page execute and read and write
6CC4E000
unkown
page read and write
32DD000
stack
page read and write
149A000
trusted library allocation
page execute and read and write
EC8D000
stack
page read and write
108C000
stack
page read and write
F4C000
stack
page read and write
1590000
heap
page read and write
1423000
trusted library allocation
page execute and read and write
57F0000
heap
page execute and read and write
399D000
stack
page read and write
19FFE000
stack
page read and write
117B000
stack
page read and write
1558000
heap
page read and write
14D0000
trusted library allocation
page execute and read and write
76CF000
stack
page read and write
14A7000
trusted library allocation
page execute and read and write
141F000
heap
page read and write
1430000
trusted library allocation
page read and write
117F000
stack
page read and write
155E000
heap
page read and write
63C000
remote allocation
page execute and read and write
19D5A000
direct allocation
page readonly
11C5000
heap
page read and write
5B7E000
stack
page read and write
13CEA000
heap
page read and write
142D000
trusted library allocation
page execute and read and write
1445000
heap
page read and write
1183000
stack
page read and write
1550000
heap
page read and write
30EE000
stack
page read and write
1379F000
stack
page read and write
13BAA000
heap
page read and write
1390C000
stack
page read and write
5A7E000
stack
page read and write
12E0000
heap
page read and write
6CE9F000
unkown
page write copy
149C000
heap
page read and write
312E000
stack
page read and write
5A3E000
stack
page read and write
3148000
trusted library allocation
page read and write
13960000
heap
page read and write
14C0000
trusted library allocation
page read and write
523000
remote allocation
page execute and read and write
E82000
unkown
page readonly
138E000
stack
page read and write
1530000
heap
page read and write
1576000
heap
page read and write
6CC52000
unkown
page readonly
1200000
heap
page read and write
14EE000
heap
page read and write
3313000
trusted library allocation
page read and write
6CCC1000
unkown
page execute read
13BA000
heap
page read and write
57CE000
stack
page read and write
C58D000
stack
page read and write
14E4000
heap
page read and write
1424000
trusted library allocation
page read and write
6CCC0000
unkown
page readonly
19D1F000
direct allocation
page readonly
6CEA5000
unkown
page readonly
6CC3D000
unkown
page readonly
13DB1000
heap
page read and write
14AB000
trusted library allocation
page execute and read and write
13DAF000
heap
page read and write
19B11000
direct allocation
page execute read
1401000
heap
page read and write
137B0000
heap
page read and write
134E000
stack
page read and write
39E0000
heap
page read and write
38F0000
heap
page read and write
1125E000
stack
page read and write
152E000
stack
page read and write
600000
remote allocation
page execute and read and write
19B10000
direct allocation
page execute and read and write
148E000
stack
page read and write
There are 133 hidden memdumps, click here to show them.