IOC Report
Unlock_Tool_2.3.1.exe

loading gif

Files

File Path
Type
Category
Malicious
Unlock_Tool_2.3.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Unlock_Tool_2.3._2aeb643dce4cdcbeeaaa9deab94801d87eb2245_2e620264_e4511507-1d45-44dd-b311-3e06606d6c77\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER813B.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 20 15:58:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8320.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83DD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\76561199786602107[1].htm
HTML document, Unicode text, UTF-8 text, with very long lines (3146), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
ISO-8859 text, with very long lines (65536), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Unlock_Tool_2.3.1.exe
"C:\Users\user\Desktop\Unlock_Tool_2.3.1.exe"
malicious
C:\Users\user\Desktop\Unlock_Tool_2.3.1.exe
"C:\Users\user\Desktop\Unlock_Tool_2.3.1.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\user\Desktop\Unlock_Tool_2.3.1.exe" & rd /s /q "C:\ProgramData\IDGIJEGHDAEC" & exit
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7336 -s 272
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
https://player.vimeo.com
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199786602107
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://cowod.hopto.org
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=jq1jQyX1843y&amp
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://recaptcha.net/recaptcha/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://steamcommunity.com/profiles/76561199786602107y
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
http://cowod.hopto.orgclass=
unknown
http://cowod.hopto.
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://t.me/lpnjokeg0b4cMozilla/5.0
unknown
https://steamcommunity.com/profiles/76561199786602107h
unknown
http://cowod.hopto
unknown
https://community.cloudflare.steamstatic.com/public/css/app
unknown
https://65.109.142.154
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
http://www.entrust.net/rpa03
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=4Xou
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://t.me/lpnjoke
149.154.167.99
https://store.steampowered.com/points/shop/
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=D_iTAfDsLH
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v
unknown
https://community.cloudflare.stea
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
http://cowod.hoptotml
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://store.steampowered.com/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://www.entrust.net/rpa0
unknown
https://store.steampowered.com/about/
unknown
http://cowod.hopto.orgsive/header_logo.png
unknown
https://community.cloudflare.steamstatic.com/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://t.me/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://steamcommunity.com/profiles/76561199786602107g0b4cMozilla/5.0
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.
unknown
https://65.109.142.154/0
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://65.109.142.154/%
unknown
https://recaptcha.net/recaptcha/;
unknown
https://steamcommunity.com/discussions/
unknown
http://cowod.hopto.re
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://65.109.142.154/L
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=nBdvNPPzc0qI&
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/6
unknown
https://community.c
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://65.109.142.154/U
unknown
http://cowod.hopto.org/
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://recaptcha.net
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
t.me
149.154.167.99
cowod.hopto.org
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
65.109.142.154
unknown
United States
149.154.167.99
t.me
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
ProgramId
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
FileId
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
LowerCaseLongPath
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
LongPathHash
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
Name
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
OriginalFileName
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
Publisher
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
Version
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
BinFileVersion
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
BinaryType
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
ProductName
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
ProductVersion
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
LinkDate
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
BinProductVersion
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
AppxPackageFullName
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
AppxPackageRelativeId
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
Size
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
Language
\REGISTRY\A\{5649b2c9-4045-8242-34a4-8ed490638ca1}\Root\InventoryApplicationFile\unlock_tool_2.3.|5063d7dbcffaeb99
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7AB000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
481000
remote allocation
page execute and read and write
malicious
10E4000
heap
page read and write
1792D000
heap
page read and write
566000
remote allocation
page execute and read and write
1368000
heap
page read and write
127A000
heap
page read and write
59F000
remote allocation
page execute and read and write
10E4000
heap
page read and write
7AB000
unkown
page write copy
1299000
heap
page read and write
12E5000
heap
page read and write
E8A000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
1315000
heap
page read and write
5C8E000
stack
page read and write
126F000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
529000
remote allocation
page execute and read and write
15300000
heap
page read and write
12A6000
heap
page read and write
107E000
stack
page read and write
12DBB000
stack
page read and write
17B6B000
stack
page read and write
C00000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
17A10000
heap
page read and write
10E4000
heap
page read and write
1DE0B000
stack
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
80D000
unkown
page readonly
80B000
unkown
page execute and read and write
10E4000
heap
page read and write
17966000
heap
page read and write
12EA000
heap
page read and write
10E4000
heap
page read and write
1100000
trusted library allocation
page read and write
10E5000
heap
page read and write
F60000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
C5E000
stack
page read and write
10E4000
heap
page read and write
E8E000
heap
page read and write
12A4000
heap
page read and write
5F9000
remote allocation
page execute and read and write
10E4000
heap
page read and write
790000
unkown
page readonly
670000
remote allocation
page execute and read and write
10E4000
heap
page read and write
472000
remote allocation
page execute and read and write
118E000
stack
page read and write
1286000
heap
page read and write
7A4000
unkown
page readonly
10E4000
heap
page read and write
2C70000
heap
page read and write
10E4000
heap
page read and write
15380000
remote allocation
page read and write
10E4000
heap
page read and write
BBC000
stack
page read and write
585000
remote allocation
page execute and read and write
11DE000
stack
page read and write
10E4000
heap
page read and write
12E1000
heap
page read and write
1793E000
heap
page read and write
10E4000
heap
page read and write
80D000
unkown
page readonly
178FF000
stack
page read and write
10E4000
heap
page read and write
810000
unkown
page write copy
791000
unkown
page execute read
307F000
stack
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
80D000
unkown
page readonly
3188000
heap
page read and write
10E4000
heap
page read and write
C10000
heap
page read and write
1341000
heap
page read and write
790000
unkown
page readonly
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
1796D000
heap
page read and write
12A6000
heap
page read and write
10E4000
heap
page read and write
128C000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
1795F000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
7AB000
unkown
page write copy
55F000
remote allocation
page execute and read and write
EF2000
stack
page read and write
1196000
heap
page read and write
E80000
heap
page read and write
10E4000
heap
page read and write
80D000
unkown
page readonly
17A6C000
stack
page read and write
10E4000
heap
page read and write
1DF4C000
stack
page read and write
65D000
remote allocation
page execute and read and write
12A6000
heap
page read and write
1049F000
stack
page read and write
2DAE000
stack
page read and write
10E4000
heap
page read and write
152FD000
stack
page read and write
10E4000
heap
page read and write
3140000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E0000
heap
page read and write
3180000
heap
page read and write
17BA0000
trusted library allocation
page read and write
10E4000
heap
page read and write
E5F000
stack
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
9EA1000
heap
page read and write
810000
unkown
page write copy
EFD000
stack
page read and write
303E000
stack
page read and write
467000
remote allocation
page execute and read and write
C80000
heap
page read and write
10E4000
heap
page read and write
17C50000
heap
page read and write
BFC000
stack
page read and write
10E4000
heap
page read and write
119E000
heap
page read and write
9EB2000
heap
page read and write
114E000
stack
page read and write
9FA0000
unclassified section
page read and write
17980000
heap
page read and write
BFC000
stack
page read and write
790000
unkown
page readonly
10E4000
heap
page read and write
10E4000
heap
page read and write
10C0000
heap
page read and write
58C000
remote allocation
page execute and read and write
2D60000
heap
page read and write
1291000
heap
page read and write
2DEF000
stack
page read and write
1190000
heap
page read and write
10E4000
heap
page read and write
89C000
stack
page read and write
1308000
heap
page read and write
7A4000
unkown
page readonly
15380000
remote allocation
page read and write
12D7C000
stack
page read and write
10BE000
stack
page read and write
7A4000
unkown
page readonly
10E4000
heap
page read and write
56D000
remote allocation
page execute and read and write
1083D000
stack
page read and write
10E4000
heap
page read and write
80C000
unkown
page read and write
10E4000
heap
page read and write
5D8000
remote allocation
page execute and read and write
10E4000
heap
page read and write
1796A000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
12DE000
heap
page read and write
17964000
heap
page read and write
5AB000
remote allocation
page execute and read and write
9EA1000
heap
page read and write
791000
unkown
page execute read
10E4000
heap
page read and write
10E4000
heap
page read and write
791000
unkown
page execute read
791000
unkown
page execute read
1DF0C000
stack
page read and write
7A4000
unkown
page readonly
17971000
heap
page read and write
99D000
stack
page read and write
810000
unkown
page write copy
12A2000
heap
page read and write
1E04D000
stack
page read and write
17975000
heap
page read and write
153BE000
stack
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
7AB000
unkown
page write copy
10E4000
heap
page read and write
10E4000
heap
page read and write
106EE000
stack
page read and write
81CE000
stack
page read and write
15380000
remote allocation
page read and write
130C000
heap
page read and write
9EA0000
heap
page read and write
574000
remote allocation
page execute and read and write
523000
remote allocation
page execute and read and write
810000
unkown
page write copy
1069F000
stack
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
119C000
heap
page read and write
17912000
heap
page read and write
107EF000
stack
page read and write
2D50000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
1210000
heap
page read and write
463000
remote allocation
page execute and read and write
10BF000
stack
page read and write
10E4000
heap
page read and write
1059F000
stack
page read and write
10E4000
heap
page read and write
12E0000
heap
page read and write
1791C000
heap
page read and write
10E4000
heap
page read and write
1344000
heap
page read and write
1218000
heap
page read and write
12F1000
heap
page read and write
FBE000
stack
page read and write
17BA0000
trusted library allocation
page read and write
790000
unkown
page readonly
125B000
heap
page read and write
10E4000
heap
page read and write
10E4000
heap
page read and write
There are 225 hidden memdumps, click here to show them.