IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\BKKJKFBKKECFHJKEBKEHIDAEBK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CAAKKFHC
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\CAAKKFHCFIECAAAKEGCF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\ECFHIJKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\EGIDAAFI
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\GCBGCAFI
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHDHDBAECGCAFHJJDAKF
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HDAKJDHIEBFIIDGDGDBAEGCGDA
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\IIJDBGDGCGDAKFIDGIDBFIEHDH
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c5ac9ded19774e294e4b23df51992ee9addb81_c9e05f82_07d774b4-4f7f-424b-b977-909ace4dfb05\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD260.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Mar 29 11:07:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3B9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD3D9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199658817715[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3041), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\sqlm[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 932

URLs

Name
IP
Malicious
https://78.46.229.36/msvcp140.dll
78.46.229.36
malicious
https://78.46.229.36/mozglue.dll
78.46.229.36
malicious
https://78.46.229.36/
78.46.229.36
malicious
https://78.46.229.36/softokn3.dll
78.46.229.36
malicious
https://78.46.229.36/freebl3.dll
78.46.229.36
malicious
https://78.46.229.36/nss3.dll
78.46.229.36
malicious
https://78.46.229.36/vcruntime140.dll
78.46.229.36
malicious
https://78.46.229.36/sqlm.dll
78.46.229.36
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=swtsTjCD0CFZ&amp
unknown
https://78.46.229.36/Hos
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://78.46.229.36/~&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
https://steamcommunity.com/profiles/76561199658817715/badges
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://78.46.229.36/U&
unknown
https://78.46.229.36/msvcp140.dllxE
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=kMVE
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=KrKRjQbCfNh0&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.TP5s6TzX6LLh&
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Zj8Lt-uyXH8R&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=Wd0kCESeJquW&l=
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://steamcommunity.com/g
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://78.46.229.36/ramData
unknown
https://steamcommunity.com/profiles/76561199658817715c
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://www.ecosia.org/newtab/
unknown
https://78.46.229.36/mozglue.dll2E
unknown
https://78.46.229.36/p&
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://78.46.229.36HIJKF
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://78.46.229.36
unknown
https://78.46.229.36/msvcp140.dllnE
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://78.46.229.36/nes
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://78.46.229.36/softokn3.dllBE
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://help.steampowered.com/en/
unknown
https://78.46.229.36IDGIE
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=PyuRtGtUpR0t&l=englis
unknown
https://78.46.229.36/d
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://78.46.229.36/g
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://steamcommunity.com/discussions/
unknown
https://steamcommunity.com/profiles/76561199658817715
104.112.44.153
https://78.46.229.36/2
unknown
https://steamcommunity.com/profiles/76561199658817715/inventory/
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://78.46.229.36/B
unknown
https://78.46.229.36/D
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://steamcommunity.com/profiles/76561199658817715https://t.me/sa9okCristina
unknown
http://www.sqlite.org/copyright.html.
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://78.46.229.36JEBKE
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199658817715
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
http://upx.sf.net
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.112.44.153

IPs

IP
Domain
Country
Malicious
78.46.229.36
unknown
Germany
malicious
104.112.44.153
steamcommunity.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
\REGISTRY\A\{ff42358a-8dc8-68cd-eb18-15aa29ccfa2f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3EC5000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
16A4000
heap
page read and write
6C7E0000
unkown
page readonly
63F000
remote allocation
page execute and read and write
1550000
trusted library allocation
page read and write
C6CD000
stack
page read and write
53E0000
trusted library allocation
page read and write
2D60000
heap
page read and write
1C77F000
unkown
page read and write
1646000
heap
page read and write
186D000
heap
page read and write
13AF0000
heap
page read and write
9D0F000
stack
page read and write
1030000
heap
page read and write
1150000
heap
page read and write
1530000
trusted library allocation
page read and write
ED9F000
stack
page read and write
1133D000
stack
page read and write
569E000
stack
page read and write
EDFD000
stack
page read and write
EC4C000
stack
page read and write
19EED000
direct allocation
page readonly
158E000
stack
page read and write
523000
remote allocation
page execute and read and write
19EEF000
direct allocation
page readonly
1313000
trusted library allocation
page execute and read and write
6C7E1000
unkown
page execute read
1560000
heap
page read and write
6C762000
unkown
page readonly
C20000
unkown
page readonly
17D2000
heap
page read and write
152F000
stack
page read and write
6C9BE000
unkown
page read and write
C22000
unkown
page readonly
16E2000
heap
page read and write
13D3E000
heap
page read and write
C70D000
stack
page read and write
A14F000
stack
page read and write
13D45000
heap
page read and write
2EC3000
trusted library allocation
page read and write
14CA000
heap
page read and write
12F3000
stack
page read and write
113CE000
stack
page read and write
13BF6000
heap
page read and write
1320000
heap
page read and write
19CA8000
direct allocation
page execute read
434000
remote allocation
page execute and read and write
CEC000
stack
page read and write
12EB000
stack
page read and write
12EF000
stack
page read and write
1300000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
19E06000
direct allocation
page execute read
1038000
heap
page read and write
EC9E000
stack
page read and write
2EC1000
trusted library allocation
page execute and read and write
603000
remote allocation
page execute and read and write
131D000
trusted library allocation
page execute and read and write
13F4A000
heap
page read and write
DE6000
stack
page read and write
103E000
heap
page read and write
15BA000
heap
page read and write
19CA0000
direct allocation
page execute and read and write
13EA3000
heap
page read and write
6C75E000
unkown
page read and write
19EB8000
direct allocation
page readonly
13AE0000
heap
page read and write
1160000
heap
page read and write
1A13E000
stack
page read and write
13A7C000
stack
page read and write
6C9C5000
unkown
page readonly
170D000
heap
page read and write
56A000
remote allocation
page execute and read and write
1195000
heap
page read and write
142F000
stack
page read and write
1557000
trusted library allocation
page execute and read and write
154A000
trusted library allocation
page execute and read and write
1A1B1000
heap
page read and write
15B0000
heap
page read and write
13920000
heap
page read and write
56DE000
stack
page read and write
1072000
heap
page read and write
1057000
heap
page read and write
4F9E000
stack
page read and write
6C97F000
unkown
page readonly
77CE000
stack
page read and write
12AE000
stack
page read and write
15FE000
heap
page read and write
12ED000
stack
page read and write
5590000
heap
page execute and read and write
581E000
stack
page read and write
6C74D000
unkown
page readonly
526000
remote allocation
page execute and read and write
556E000
stack
page read and write
13B0000
heap
page read and write
1A140000
heap
page read and write
19CA1000
direct allocation
page execute read
2DAE000
stack
page read and write
52C000
remote allocation
page execute and read and write
FFC000
stack
page read and write
19EE2000
direct allocation
page read and write
1370000
heap
page read and write
1314000
trusted library allocation
page read and write
10A2000
heap
page read and write
19EAF000
direct allocation
page readonly
14C0000
heap
page read and write
2D40000
heap
page read and write
57DE000
stack
page read and write
1A1C3000
heap
page read and write
1397B000
stack
page read and write
2EBE000
stack
page read and write
6C6D0000
unkown
page readonly
1064000
heap
page read and write
1490000
heap
page read and write
6C9BF000
unkown
page write copy
3EC1000
trusted library allocation
page read and write
105B000
heap
page read and write
13F4C000
heap
page read and write
12EE000
stack
page read and write
155B000
trusted library allocation
page execute and read and write
161D000
heap
page read and write
19EEA000
direct allocation
page readonly
13B5000
heap
page read and write
16E4000
heap
page read and write
591E000
stack
page read and write
1390F000
stack
page read and write
2D30000
trusted library allocation
page execute and read and write
154E000
stack
page read and write
19EAD000
direct allocation
page execute read
150E000
stack
page read and write
C5A000
unkown
page readonly
162C000
heap
page read and write
12F8000
stack
page read and write
2DB0000
heap
page execute and read and write
12FC000
stack
page read and write
6C9C0000
unkown
page read and write
1360000
heap
page read and write
13E85000
heap
page read and write
1190000
heap
page read and write
6C6D1000
unkown
page execute read
1847000
heap
page read and write
509E000
stack
page read and write
A18E000
stack
page read and write
There are 134 hidden memdumps, click here to show them.