IOC Report
Loader.exe

loading gif

Files

File Path
Type
Category
Malicious
Loader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Loader.exe_77471525334c8b14c8bdc1925498d9a2270c332_00a9e466_1e40f4b4-72b8-488c-93ed-b9672588f9e0\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Loader.exe_b815356964293c838cede0c4a3c92463e86ea911_00a9e466_32e7d15c-7355-41ce-b09f-98a33d50d914\Report.wer
data
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Loader.exe_cb31ed643f3fc60e893b10d5662d7ffd15dc47_d9249e67_e58a3cdf-0c76-4fca-bfea-a73be3584e5f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D9.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Oct 12 20:36:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3DF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD7B.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Oct 12 20:36:01 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCDE9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE19.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8FF.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Oct 12 20:36:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA48.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA78.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Loader.exe
"C:\Users\user\Desktop\Loader.exe"
malicious
C:\Users\user\Desktop\Loader.exe
"C:\Users\user\Desktop\Loader.exe"
malicious
C:\Users\user\Desktop\Loader.exe
"C:\Users\user\Desktop\Loader.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 284
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5200 -s 1884
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5200 -s 1904

URLs

Name
IP
Malicious
enlargkiw.sbs
malicious
allocatinow.sbs
malicious
drawwyobstacw.sbs
malicious
https://widdensmoywi.sbs/api
104.21.8.37
malicious
mathcucom.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vennurviot.sbs/api
172.67.140.193
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
ehticsprocw.sbs
malicious
condifendteu.sbs
malicious
https://drawwyobstacw.sbs/api
188.114.96.3
malicious
widdensmoywi.sbs
malicious
https://resinedyw.sbs/api
172.67.205.156
malicious
https://mathcucom.sbs/api
188.114.96.3
malicious
resinedyw.sbs
malicious
vennurviot.sbs
malicious
https://condifendteu.sbs/api
104.21.79.35
malicious
https://enlargkiw.sbs/api
104.21.33.249
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://ehticsprocw.sbs/api
172.67.173.224
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://resinedyw.sbs/v
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://resinedyw.sbs/1w#U
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://allocatinow.sbs/piP
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://enlargkiw.sbs/apibs-
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://enlargkiw.sbs/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://mathcucom.sbs/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://enlargkiw.sbs/api%U
unknown
https://enlargkiw.sbs/1w#U
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://allocatinow.sbs/api
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://resinedyw.sbs/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://resinedyw.sbs/api%U
unknown
https://resinedyw.sbs/api(
unknown
https://steamcommunity.com/workshop/
unknown
https://mathcucom.sbs/api4
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://allocatinow.sbs/apis
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://allocatinow.sbs/
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://resinedyw.sbs:443/apii
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
condifendteu.sbs
104.21.79.35
malicious
steamcommunity.com
104.102.49.254
malicious
vennurviot.sbs
172.67.140.193
malicious
drawwyobstacw.sbs
188.114.96.3
malicious
mathcucom.sbs
188.114.96.3
malicious
widdensmoywi.sbs
104.21.8.37
malicious
sergei-esenin.com
172.67.206.204
malicious
ehticsprocw.sbs
172.67.173.224
malicious
resinedyw.sbs
172.67.205.156
malicious
enlargkiw.sbs
104.21.33.249
malicious
allocatinow.sbs
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.33.249
enlargkiw.sbs
United States
malicious
172.67.173.224
ehticsprocw.sbs
United States
malicious
188.114.96.3
drawwyobstacw.sbs
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.205.156
resinedyw.sbs
United States
malicious
172.67.140.193
vennurviot.sbs
United States
malicious
104.21.79.35
condifendteu.sbs
United States
malicious
104.21.8.37
widdensmoywi.sbs
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
ProgramId
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
FileId
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
LowerCaseLongPath
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
LongPathHash
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
Name
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
OriginalFileName
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
Publisher
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
Version
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
BinFileVersion
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
BinaryType
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
ProductName
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
ProductVersion
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
LinkDate
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
BinProductVersion
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
AppxPackageFullName
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
AppxPackageRelativeId
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
Size
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
Language
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
CBE000
stack
page read and write
215000
unkown
page read and write
D27000
heap
page read and write
D99000
heap
page read and write
D3F000
stack
page read and write
2ABE000
stack
page read and write
191000
unkown
page execute read
D43000
heap
page read and write
305F000
stack
page read and write
191000
unkown
page execute read
26AE000
trusted library allocation
page read and write
D1C000
heap
page read and write
C7F000
stack
page read and write
DB0000
heap
page read and write
D46000
heap
page read and write
2730000
heap
page read and write
D2D000
heap
page read and write
309D000
stack
page read and write
1BE000
unkown
page write copy
DA6000
heap
page read and write
D9E000
heap
page read and write
190000
unkown
page readonly
1BE000
unkown
page write copy
D9E000
heap
page read and write
D46000
heap
page read and write
B75000
heap
page read and write
D00000
heap
page read and write
D6E000
heap
page read and write
CC0000
heap
page read and write
190000
unkown
page readonly
B50000
heap
page read and write
216000
unkown
page readonly
D91000
heap
page read and write
7D0000
heap
page read and write
B60000
heap
page read and write
31B0000
trusted library allocation
page read and write
2720000
remote allocation
page read and write
A30000
heap
page read and write
2A7D000
stack
page read and write
D4F000
heap
page read and write
6DB000
stack
page read and write
D6A000
heap
page read and write
297D000
stack
page read and write
D43000
heap
page read and write
3430000
heap
page read and write
2BBF000
stack
page read and write
1B3000
unkown
page readonly
DB0000
heap
page read and write
216000
unkown
page readonly
E9E000
stack
page read and write
F9F000
stack
page read and write
190000
unkown
page readonly
191000
unkown
page execute read
D2D000
heap
page read and write
D07000
heap
page read and write
B4E000
stack
page read and write
1B3000
unkown
page readonly
1B3000
unkown
page readonly
191000
unkown
page execute read
1BE000
unkown
page write copy
DA6000
heap
page read and write
1BE000
unkown
page write copy
271E000
stack
page read and write
7DB000
stack
page read and write
DE9000
heap
page read and write
D43000
heap
page read and write
319E000
stack
page read and write
190000
unkown
page readonly
DA7000
heap
page read and write
DA2000
heap
page read and write
D27000
heap
page read and write
1B3000
unkown
page readonly
D9F000
heap
page read and write
D2D000
heap
page read and write
191000
unkown
page execute read
213000
unkown
page execute and read and write
340F000
stack
page read and write
283C000
stack
page read and write
216000
unkown
page readonly
D46000
heap
page read and write
2720000
remote allocation
page read and write
77D000
stack
page read and write
D46000
heap
page read and write
DA1000
heap
page read and write
1BE000
unkown
page read and write
B3E000
stack
page read and write
1BE000
unkown
page write copy
269E000
stack
page read and write
AFD000
stack
page read and write
2F5E000
stack
page read and write
DA0000
heap
page read and write
26DD000
stack
page read and write
D26000
heap
page read and write
190000
unkown
page readonly
DB4000
heap
page read and write
D43000
heap
page read and write
216000
unkown
page readonly
D28000
heap
page read and write
D2D000
heap
page read and write
7E0000
heap
page read and write
31B7000
trusted library allocation
page read and write
293F000
stack
page read and write
DA7000
heap
page read and write
D60000
heap
page read and write
2720000
remote allocation
page read and write
330E000
stack
page read and write
191000
unkown
page execute read
216000
unkown
page readonly
216000
unkown
page readonly
D4F000
heap
page read and write
1B3000
unkown
page readonly
B70000
heap
page read and write
DE4000
heap
page read and write
D4C000
heap
page read and write
1B3000
unkown
page readonly
190000
unkown
page readonly
45C000
remote allocation
page execute and read and write
There are 108 hidden memdumps, click here to show them.