IOC Report
SoftWare.exe

loading gif

Files

File Path
Type
Category
Malicious
SoftWare.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SoftWare.exe_221e44084ae96beb4141c7a593e67d6c924a1a6_7a5e3dd0_4959676f-5a9c-498b-bc13-91cb6d451dae\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SoftWare.exe_317646f4c0a3fe5f926530b7a18fc2652ea2_488e1332_88ecd21f-daf3-448f-9220-068fce0f2031\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SoftWare.exe_df20711a399579ea28ba2fbb49341fd87bf_7a5e3dd0_7c617227-d5ee-429f-92ad-86185f46aecb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB729.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 14 03:10:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB798.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB7E7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE240.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 14 03:11:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE399.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE3C9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF943.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 14 03:11:16 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9C1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9F1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SoftWare.exe
"C:\Users\user\Desktop\SoftWare.exe"
malicious
C:\Users\user\Desktop\SoftWare.exe
"C:\Users\user\Desktop\SoftWare.exe"
malicious
C:\Users\user\Desktop\SoftWare.exe
"C:\Users\user\Desktop\SoftWare.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 308
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 1652
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 1724
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 1656

URLs

Name
IP
Malicious
enlargkiw.sbs
malicious
allocatinow.sbs
malicious
drawwyobstacw.sbs
malicious
https://widdensmoywi.sbs/api
172.67.156.197
malicious
mathcucom.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vennurviot.sbs/api
172.67.140.193
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
ehticsprocw.sbs
malicious
condifendteu.sbs
malicious
https://drawwyobstacw.sbs/api
188.114.96.3
malicious
widdensmoywi.sbs
malicious
https://resinedyw.sbs/api
172.67.205.156
malicious
https://mathcucom.sbs/api
188.114.96.3
malicious
resinedyw.sbs
malicious
vennurviot.sbs
malicious
https://condifendteu.sbs/api
104.21.79.35
malicious
https://enlargkiw.sbs/api
104.21.33.249
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://vennurviot.sbs/=m
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://ehticsprocw.sbs/apiA
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://steamcommunity.com/q
unknown
http://www.entrust.net/rpa03
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://avatars.akamai.steamstaticmmD
unknown
https://www.cloudflare.com/learning/access-man
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://sergei-esenin.com:443/api
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://ehticsprocw.sbs/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://www.entrust.net/rpa0
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/y
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=eng
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://help.steampowe
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://community.akamai.stea
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://sergei-esenin.com/apiD
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://resinedyw.sbs/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://ehticsprocw.sbs/piLV
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://ehticsprocw.sbs/piTV
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
condifendteu.sbs
104.21.79.35
malicious
steamcommunity.com
104.102.49.254
malicious
vennurviot.sbs
172.67.140.193
malicious
drawwyobstacw.sbs
188.114.96.3
malicious
mathcucom.sbs
188.114.96.3
malicious
widdensmoywi.sbs
172.67.156.197
malicious
sergei-esenin.com
104.21.53.8
malicious
ehticsprocw.sbs
172.67.173.224
malicious
resinedyw.sbs
172.67.205.156
malicious
enlargkiw.sbs
104.21.33.249
malicious
allocatinow.sbs
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
172.67.156.197
widdensmoywi.sbs
United States
malicious
104.21.33.249
enlargkiw.sbs
United States
malicious
172.67.173.224
ehticsprocw.sbs
United States
malicious
188.114.96.3
drawwyobstacw.sbs
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.205.156
resinedyw.sbs
United States
malicious
172.67.140.193
vennurviot.sbs
United States
malicious
104.21.79.35
condifendteu.sbs
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
ProgramId
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
FileId
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
LowerCaseLongPath
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
LongPathHash
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
Name
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
OriginalFileName
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
Publisher
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
Version
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
BinFileVersion
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
BinaryType
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
ProductName
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
ProductVersion
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
LinkDate
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
BinProductVersion
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
AppxPackageFullName
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
AppxPackageRelativeId
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
Size
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
Language
\REGISTRY\A\{db478c5f-334b-4176-01a2-8ab0d05f02ac}\Root\InventoryApplicationFile\software.exe|98ddcc4ff5dfcc62
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
001840100DF21C61
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
321000
unkown
page readonly
FDE000
stack
page read and write
2C1000
unkown
page readonly
2A0000
unkown
page readonly
D53000
heap
page read and write
326D000
stack
page read and write
FDC000
stack
page read and write
2CB000
unkown
page write copy
2A1000
unkown
page execute read
9B5000
heap
page read and write
1410000
heap
page read and write
29D0000
remote allocation
page read and write
D3D000
heap
page read and write
160E000
heap
page read and write
D39000
heap
page read and write
2A1000
unkown
page execute read
2CB000
unkown
page write copy
31E0000
heap
page read and write
350D000
stack
page read and write
2A1000
unkown
page execute read
DD2000
heap
page read and write
458000
remote allocation
page execute and read and write
DBA000
heap
page read and write
2C1000
unkown
page readonly
D37000
heap
page read and write
2A1E000
stack
page read and write
2A0000
unkown
page readonly
DB4000
heap
page read and write
2A1000
unkown
page execute read
1600000
heap
page read and write
321000
unkown
page readonly
27BD000
stack
page read and write
2A1000
unkown
page execute read
17FF000
stack
page read and write
145E000
stack
page read and write
321000
unkown
page readonly
33CF000
stack
page read and write
2A1000
unkown
page execute read
2CB000
unkown
page write copy
9C0000
heap
page read and write
DBB000
heap
page read and write
CFB000
stack
page read and write
32CE000
stack
page read and write
157F000
stack
page read and write
2CB000
unkown
page write copy
D53000
heap
page read and write
340D000
stack
page read and write
9B0000
heap
page read and write
321000
unkown
page readonly
9E0000
heap
page read and write
D37000
heap
page read and write
DAF000
heap
page read and write
D45000
heap
page read and write
321000
unkown
page readonly
D2C000
heap
page read and write
DC0000
heap
page read and write
2C2F000
stack
page read and write
356E000
stack
page read and write
372F000
stack
page read and write
2A0000
unkown
page readonly
DB4000
heap
page read and write
31F000
unkown
page read and write
2C1000
unkown
page readonly
DAF000
heap
page read and write
284E000
stack
page read and write
2C1000
unkown
page readonly
321000
unkown
page readonly
29D0000
remote allocation
page read and write
90B000
stack
page read and write
2A20000
heap
page read and write
15BE000
stack
page read and write
294E000
stack
page read and write
29CE000
stack
page read and write
2CB000
unkown
page write copy
D53000
heap
page read and write
DBA000
heap
page read and write
2C1000
unkown
page readonly
2E2F000
stack
page read and write
D3D000
heap
page read and write
D56000
heap
page read and write
DAF000
heap
page read and write
2CB000
unkown
page read and write
309D000
stack
page read and write
D56000
heap
page read and write
D10000
heap
page read and write
298D000
stack
page read and write
D3D000
heap
page read and write
1470000
heap
page read and write
DC6000
heap
page read and write
2C1000
unkown
page readonly
D56000
heap
page read and write
160A000
heap
page read and write
D17000
heap
page read and write
9AE000
stack
page read and write
2A0000
unkown
page readonly
960000
heap
page read and write
DAF000
heap
page read and write
31E000
unkown
page execute and read and write
29D0000
remote allocation
page read and write
12FC000
stack
page read and write
15FD000
stack
page read and write
1330000
heap
page read and write
3620000
heap
page read and write
2A0000
unkown
page readonly
DC6000
heap
page read and write
2B2D000
stack
page read and write
27FD000
stack
page read and write
2D2E000
stack
page read and write
2784000
trusted library allocation
page read and write
2A0000
unkown
page readonly
There are 101 hidden memdumps, click here to show them.