IOC Report
SoftWare(1).exe

loading gif

Files

File Path
Type
Category
Malicious
SoftWare(1).exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SoftWare(1).exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\msvcp110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_90207b4b93c0fbe6f8caeaf6efed237ac9f15ca0_d8295a56_b82e07be-d2da-420e-ab35-b2749b42adf7\Report.wer
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER860B.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 14 03:01:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88EB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER892A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SoftWare(1).exe
"C:\Users\user\Desktop\SoftWare(1).exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 1724

URLs

Name
IP
Malicious
enlargkiw.sbs
malicious
allocatinow.sbs
malicious
drawwyobstacw.sbs
malicious
mathcucom.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vennurviot.sbs/api
104.21.46.170
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
ehticsprocw.sbs
malicious
passimovrt.cfd
malicious
condifendteu.sbs
malicious
https://drawwyobstacw.sbs/api
188.114.96.3
malicious
https://resinedyw.sbs/api
172.67.205.156
malicious
https://passimovrt.cfd/api
104.21.28.222
malicious
https://mathcucom.sbs/api
188.114.96.3
malicious
resinedyw.sbs
malicious
vennurviot.sbs
malicious
https://condifendteu.sbs/api
172.67.141.136
malicious
https://enlargkiw.sbs/api
172.67.152.13
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://mathcucom.sbs/g
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=engliHh
unknown
https://sergei-esenin.com/
unknown
https://vennurviot.sbs/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PA
unknown
https://resinedyw.sbs/apiq#V
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://www.cloudflare.com/learning/access-man2
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://mathcucom.sbs/apiq#V
unknown
https://store.steampowered.com/points/shop/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://mathcucom.sbs/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.a#h
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamehY
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://allocatinow.sbs/api
unknown
https://community.akamai.steamstatic.com/public/shared/css/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://vennurviot.sbs/&
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://passimovrt.cfd/
unknown
https://mathcucom.sbs/y#W
unknown
https://mathcucom.sbs/apiPy
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://resinedyw.sbs/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://allocatinow.sbs/pi
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://mathcucom.sbs/api2
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://allocatinow.sbs/apir
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://resinedyw.sbs:443/api
unknown
https://allocatinow.sbs/
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
condifendteu.sbs
172.67.141.136
malicious
steamcommunity.com
104.102.49.254
malicious
vennurviot.sbs
104.21.46.170
malicious
drawwyobstacw.sbs
188.114.96.3
malicious
mathcucom.sbs
188.114.96.3
malicious
sergei-esenin.com
104.21.53.8
malicious
passimovrt.cfd
104.21.28.222
malicious
ehticsprocw.sbs
104.21.30.221
malicious
resinedyw.sbs
172.67.205.156
malicious
enlargkiw.sbs
172.67.152.13
malicious
allocatinow.sbs
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
188.114.96.3
drawwyobstacw.sbs
European Union
malicious
172.67.152.13
enlargkiw.sbs
United States
malicious
104.21.30.221
ehticsprocw.sbs
United States
malicious
172.67.141.136
condifendteu.sbs
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious
104.21.28.222
passimovrt.cfd
United States
malicious
172.67.205.156
resinedyw.sbs
United States
malicious
104.21.46.170
vennurviot.sbs
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProgramId
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
FileId
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LowerCaseLongPath
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LongPathHash
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Name
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
OriginalFileName
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Publisher
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Version
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinFileVersion
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinaryType
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProductName
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProductVersion
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LinkDate
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinProductVersion
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
AppxPackageFullName
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
AppxPackageRelativeId
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Size
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Language
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
IsOsComponent
\REGISTRY\A\{4d6db1c5-4457-69d8-1537-e2aba31c1c0e}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
595000
remote allocation
page readonly
malicious
2939000
heap
page read and write
2939000
heap
page read and write
29B3000
heap
page read and write
29AD000
heap
page read and write
15F0000
trusted library allocation
page read and write
6CF74000
unkown
page read and write
292C000
heap
page read and write
30E7000
trusted library allocation
page read and write
29B9000
heap
page read and write
29AA000
heap
page read and write
2EEA000
trusted library allocation
page execute and read and write
5720000
trusted library section
page read and write
28E0000
heap
page read and write
29DB000
heap
page read and write
2A02000
heap
page read and write
4ECA000
trusted library allocation
page read and write
4430000
heap
page read and write
4E2E000
stack
page read and write
30E3000
trusted library allocation
page read and write
2F5E000
stack
page read and write
30C0000
heap
page execute and read and write
2976000
heap
page read and write
29AA000
heap
page read and write
DD2000
unkown
page execute and read and write
30DB000
trusted library allocation
page read and write
2918000
heap
page read and write
29AA000
heap
page read and write
FBB000
stack
page read and write
25F5000
heap
page read and write
1624000
trusted library allocation
page read and write
29B4000
heap
page read and write
48D5000
trusted library allocation
page read and write
2953000
heap
page read and write
2B8E000
stack
page read and write
2800000
heap
page read and write
29F7000
heap
page read and write
30D1000
trusted library allocation
page read and write
550000
remote allocation
page execute and read and write
45CD000
stack
page read and write
29B2000
heap
page read and write
13DE000
heap
page read and write
6CF6D000
unkown
page readonly
29B1000
heap
page read and write
29A9000
heap
page read and write
AC3E000
stack
page read and write
551000
remote allocation
page execute read
2955000
heap
page read and write
4A7D000
stack
page read and write
FF5000
heap
page read and write
29D3000
heap
page read and write
29D3000
heap
page read and write
2934000
heap
page read and write
2F9E000
stack
page read and write
29AD000
heap
page read and write
29AC000
heap
page read and write
29AB000
heap
page read and write
13E6000
heap
page read and write
6CFC8000
unkown
page readonly
2EF0000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
13F3000
heap
page read and write
15B0000
heap
page read and write
5F41000
trusted library allocation
page read and write
4E8E000
stack
page read and write
29B8000
heap
page read and write
46FE000
stack
page read and write
29CF000
heap
page read and write
45F0000
heap
page read and write
2EFB000
trusted library allocation
page execute and read and write
4F8F000
stack
page read and write
570E000
stack
page read and write
29CF000
heap
page read and write
5730000
heap
page execute and read and write
1620000
trusted library allocation
page read and write
1310000
heap
page read and write
141B000
heap
page read and write
15AE000
stack
page read and write
173F000
stack
page read and write
29AA000
heap
page read and write
29B8000
heap
page read and write
135E000
stack
page read and write
145D000
heap
page read and write
598000
remote allocation
page execute and read and write
29AF000
heap
page read and write
6CF41000
unkown
page execute read
29BD000
heap
page read and write
293E000
heap
page read and write
29B8000
heap
page read and write
7AFE000
stack
page read and write
2953000
heap
page read and write
45E0000
remote allocation
page read and write
25F0000
heap
page read and write
2910000
heap
page read and write
526E000
stack
page read and write
4BDD000
stack
page read and write
29D3000
heap
page read and write
DD0000
unkown
page readonly
448C000
stack
page read and write
29B8000
heap
page read and write
29B8000
heap
page read and write
29AC000
heap
page read and write
DD0000
unkown
page execute and read and write
29AA000
heap
page read and write
293E000
heap
page read and write
560E000
stack
page read and write
2B4F000
stack
page read and write
30AE000
stack
page read and write
2955000
heap
page read and write
2A4E000
stack
page read and write
1610000
heap
page read and write
4FB0000
heap
page read and write
AD8E000
stack
page read and write
293E000
heap
page read and write
AE8E000
stack
page read and write
2EE0000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page execute and read and write
1230000
heap
page read and write
29B8000
heap
page read and write
2947000
heap
page read and write
29AB000
heap
page read and write
55B0000
trusted library allocation
page read and write
45E0000
remote allocation
page read and write
29B4000
heap
page read and write
139E000
stack
page read and write
13BE000
heap
page read and write
5A8000
remote allocation
page readonly
FF0000
heap
page read and write
1462000
heap
page read and write
40D1000
trusted library allocation
page read and write
4D2E000
stack
page read and write
29AF000
heap
page read and write
2F10000
trusted library allocation
page read and write
2975000
heap
page read and write
29CF000
heap
page read and write
1603000
trusted library allocation
page execute and read and write
13D9000
heap
page read and write
4CDE000
stack
page read and write
41B000
stack
page read and write
6CF40000
unkown
page readonly
4B7C000
stack
page read and write
DD2000
unkown
page readonly
13B0000
heap
page read and write
458D000
stack
page read and write
13BA000
heap
page read and write
51B000
stack
page read and write
29B1000
heap
page read and write
30B0000
trusted library allocation
page execute and read and write
7BFE000
stack
page read and write
2953000
heap
page read and write
45E0000
remote allocation
page read and write
EBC000
stack
page read and write
2FA0000
heap
page read and write
29D0000
heap
page read and write
AD3D000
stack
page read and write
2C8E000
stack
page read and write
29CF000
heap
page read and write
1630000
heap
page read and write
1604000
trusted library allocation
page read and write
There are 149 hidden memdumps, click here to show them.