IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegAsm.exe_e235e8390a5f5d4ab4774135de2aa259e4fc77_f98b0a6f_25a09605-2cc1-4c26-9cf8-a24aca792532\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9397.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Sep 26 17:49:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94F0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER956E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\76561199780418869[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ISO-8859 text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5676 -s 2188

URLs

Name
IP
Malicious
https://5.75.211.162/sqlp.dllg
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869H
unknown
malicious
https://5.75.211.162/sqlp.dllb
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869/badges
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869/inventory/
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869
104.102.49.254
malicious
https://5.75.211.162/%
unknown
malicious
https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
unknown
malicious
https://5.75.211.162
unknown
malicious
https://t.me/ae5ed
unknown
malicious
https://5.75.211.162.exe
unknown
malicious
https://5.75.211.162/sqlp.dll
unknown
malicious
https://5.75.211.162/sqlp.dlls.exe
unknown
malicious
https://5.75.211.162/E
unknown
malicious
https://5.75.211.162/2
unknown
malicious
https://5.75.211.162/V
unknown
malicious
https://5.75.211.162/c
unknown
malicious
https://5.75.211.162/M
unknown
malicious
https://5.75.211.162/
5.75.211.162
malicious
https://steamcommunity.com/
unknown
malicious
https://5.75.211.162BKFCB
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://ocsp.entrust.net03
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://ocsp.entrust.net02
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&l=e
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://store.steampowered.com/stats/
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://store.steampowered.com/privac
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
unknown
http://www.entrust.net/rpa03
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=PzKBszTg
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://www.entrust.net/rpa0
unknown
https://store.steampowered.com/about/
unknown
There are 77 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
5.75.211.162
unknown
Germany
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
ProgramId
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
FileId
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
LowerCaseLongPath
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
LongPathHash
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Name
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
OriginalFileName
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Publisher
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Version
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
BinFileVersion
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
BinaryType
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
ProductName
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
ProductVersion
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
LinkDate
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
BinProductVersion
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
AppxPackageFullName
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
AppxPackageRelativeId
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Size
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Language
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
IsOsComponent
\REGISTRY\A\{a010e3ff-a323-9184-b717-7b8603f2d200}\Root\InventoryApplicationFile\regasm.exe|930881d2b722b2fe
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33D5000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
89E000
stack
page read and write
C70000
heap
page read and write
90000
unkown
page readonly
198D6000
heap
page read and write
DEC000
heap
page read and write
2340000
trusted library allocation
page read and write
4F8000
stack
page read and write
9D0000
trusted library allocation
page read and write
198E1000
heap
page read and write
5E0000
heap
page read and write
335D000
heap
page read and write
222E000
stack
page read and write
957E000
stack
page read and write
23D1000
trusted library allocation
page execute and read and write
32FE000
stack
page read and write
DE1000
heap
page read and write
563000
remote allocation
page execute and read and write
21C7000
trusted library allocation
page execute and read and write
1262E000
stack
page read and write
23D3000
trusted library allocation
page read and write
19ADC000
stack
page read and write
33D1000
trusted library allocation
page read and write
E10000
heap
page read and write
3350000
heap
page read and write
58A000
remote allocation
page execute and read and write
55A000
remote allocation
page execute and read and write
1F0000
heap
page read and write
703E000
stack
page read and write
C3E000
stack
page read and write
5E5000
heap
page read and write
46B000
remote allocation
page execute and read and write
21E0000
trusted library allocation
page read and write
A5C000
stack
page read and write
BD0000
heap
page read and write
14D5D000
stack
page read and write
198DD000
heap
page read and write
7CA000
heap
page read and write
A0A000
trusted library allocation
page execute and read and write
C50000
heap
page read and write
19C10000
heap
page read and write
467000
remote allocation
page execute and read and write
198E5000
heap
page read and write
E01000
heap
page read and write
E5F000
heap
page read and write
9F4000
trusted library allocation
page read and write
D80000
heap
page read and write
19D1E000
stack
page read and write
A10000
heap
page read and write
463000
remote allocation
page execute and read and write
57C000
remote allocation
page execute and read and write
9A0000
heap
page read and write
63A000
remote allocation
page execute and read and write
76E000
heap
page read and write
78C000
heap
page read and write
9E4000
trusted library allocation
page read and write
B52000
stack
page read and write
198CF000
heap
page read and write
768000
heap
page read and write
578000
remote allocation
page execute and read and write
5A1000
remote allocation
page execute and read and write
3356000
heap
page read and write
7A3000
heap
page read and write
199DB000
stack
page read and write
1732E000
stack
page read and write
9E3000
trusted library allocation
page execute and read and write
1266D000
stack
page read and write
730000
heap
page read and write
9BB0000
unclassified section
page read and write
1988C000
heap
page read and write
2360000
heap
page execute and read and write
198AE000
heap
page read and write
21CB000
trusted library allocation
page execute and read and write
9AB0000
heap
page read and write
48B000
remote allocation
page execute and read and write
483000
remote allocation
page execute and read and write
55D000
remote allocation
page execute and read and write
72F000
stack
page read and write
23C0000
heap
page read and write
760000
heap
page read and write
670000
remote allocation
page execute and read and write
794000
heap
page read and write
198DA000
heap
page read and write
23AE000
stack
page read and write
14CFF000
stack
page read and write
232E000
stack
page read and write
580000
remote allocation
page execute and read and write
19882000
heap
page read and write
100AF000
stack
page read and write
19980000
heap
page read and write
92000
unkown
page readonly
21C0000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
198D3000
heap
page read and write
100ED000
stack
page read and write
DDF000
heap
page read and write
57E000
remote allocation
page execute and read and write
DD3000
heap
page read and write
582000
remote allocation
page execute and read and write
14BFE000
stack
page read and write
D8A000
heap
page read and write
E77000
heap
page read and write
2330000
trusted library allocation
page execute and read and write
487000
remote allocation
page execute and read and write
19B4E000
stack
page read and write
1989D000
heap
page read and write
62E000
stack
page read and write
1986F000
stack
page read and write
456E000
stack
page read and write
B5C000
stack
page read and write
333E000
stack
page read and write
14BAC000
stack
page read and write
99F000
stack
page read and write
1729E000
stack
page read and write
BC0000
heap
page read and write
9F6000
trusted library allocation
page read and write
18C000
stack
page read and write
5D0000
heap
page read and write
There are 109 hidden memdumps, click here to show them.