IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_24d9a490-260c-479c-b0e5-c8ba074a91b8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD730.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Oct 12 09:18:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD8E6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD926.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 1936

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
https://sergei-esenin.com:443/apip
unknown
malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/moda
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzz
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://community.al/
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.j
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/learning/access-manag
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://cdn.akamai.
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://help.st
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://spirittunek.store:443/api8$
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://community.akamai.stea
unknown
https://login.steamp
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://steamcommunity.com/R
unknown
https://medal.tv
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/css
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://studennotediw.store:443/api
unknown
https://mobbipenju.store:443/api
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://clearancek.site:443/apii
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcl-
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{67ebb946-5893-da09-236d-3ea7997cceb1}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
671000
unkown
page execute and read and write
malicious
4701000
heap
page read and write
45AF000
stack
page read and write
46F0000
direct allocation
page read and write
C35000
heap
page read and write
2AEF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4B40000
trusted library allocation
page read and write
46F0000
direct allocation
page read and write
E35000
heap
page read and write
65B000
stack
page read and write
4701000
heap
page read and write
4701000
heap
page read and write
55DF000
stack
page read and write
346E000
stack
page read and write
4701000
heap
page read and write
332E000
stack
page read and write
422E000
stack
page read and write
46F0000
direct allocation
page read and write
97B000
unkown
page execute and write copy
37EF000
stack
page read and write
51CF000
stack
page read and write
4701000
heap
page read and write
547E000
stack
page read and write
40EE000
stack
page read and write
4701000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
4D1D000
stack
page read and write
4E4D000
stack
page read and write
46F0000
direct allocation
page read and write
29ED000
heap
page read and write
E6B000
heap
page read and write
4701000
heap
page read and write
ECA000
heap
page read and write
46F0000
direct allocation
page read and write
4D40000
direct allocation
page execute and read and write
4701000
heap
page read and write
3A6F000
stack
page read and write
46F0000
direct allocation
page read and write
54DE000
stack
page read and write
4D10000
direct allocation
page execute and read and write
ED2000
heap
page read and write
C30000
heap
page read and write
4701000
heap
page read and write
E38000
heap
page read and write
671000
unkown
page execute and write copy
DFE000
heap
page read and write
29E7000
heap
page read and write
31EE000
stack
page read and write
3AAE000
stack
page read and write
97B000
unkown
page execute and read and write
E8A000
heap
page read and write
55F0000
heap
page read and write
46F0000
direct allocation
page read and write
4710000
heap
page read and write
4B7D000
stack
page read and write
FEE000
stack
page read and write
29B0000
heap
page read and write
E72000
heap
page read and write
3E2F000
stack
page read and write
51E0000
remote allocation
page read and write
4D00000
direct allocation
page execute and read and write
4701000
heap
page read and write
4D51000
trusted library allocation
page read and write
392F000
stack
page read and write
E6F000
heap
page read and write
40AF000
stack
page read and write
51E0000
remote allocation
page read and write
E79000
heap
page read and write
4701000
heap
page read and write
41EF000
stack
page read and write
4700000
heap
page read and write
46F0000
direct allocation
page read and write
E2F000
heap
page read and write
5780000
trusted library allocation
page read and write
4701000
heap
page read and write
4D10000
direct allocation
page execute and read and write
DAE000
stack
page read and write
4D10000
direct allocation
page execute and read and write
446F000
stack
page read and write
4701000
heap
page read and write
2F6E000
stack
page read and write
B1B000
unkown
page execute and write copy
C1B000
stack
page read and write
E54000
heap
page read and write
29C0000
heap
page read and write
35AE000
stack
page read and write
3BAF000
stack
page read and write
D40000
heap
page read and write
36AF000
stack
page read and write
E79000
heap
page read and write
50CE000
stack
page read and write
B1B000
unkown
page execute and write copy
46F0000
direct allocation
page read and write
4701000
heap
page read and write
670000
unkown
page read and write
44AE000
stack
page read and write
C60000
heap
page read and write
4701000
heap
page read and write
436E000
stack
page read and write
396E000
stack
page read and write
4701000
heap
page read and write
432F000
stack
page read and write
3CEF000
stack
page read and write
2F2F000
stack
page read and write
4701000
heap
page read and write
B19000
unkown
page execute and read and write
4F4C000
stack
page read and write
E51000
heap
page read and write
29AE000
stack
page read and write
30AE000
stack
page read and write
537E000
stack
page read and write
306F000
stack
page read and write
E27000
heap
page read and write
E51000
heap
page read and write
4701000
heap
page read and write
296E000
stack
page read and write
3E6E000
stack
page read and write
670000
unkown
page readonly
DEE000
stack
page read and write
46F0000
direct allocation
page read and write
E3E000
heap
page read and write
45EE000
stack
page read and write
2CEF000
stack
page read and write
29E0000
heap
page read and write
28EE000
stack
page read and write
3FAE000
stack
page read and write
965000
unkown
page execute and read and write
508E000
stack
page read and write
E6F000
heap
page read and write
4D10000
direct allocation
page execute and read and write
4CCE000
stack
page read and write
46F0000
direct allocation
page read and write
3BEE000
stack
page read and write
6D0000
unkown
page execute and read and write
4701000
heap
page read and write
342F000
stack
page read and write
4B90000
direct allocation
page read and write
3F6F000
stack
page read and write
85A000
unkown
page execute and read and write
31AF000
stack
page read and write
4D10000
direct allocation
page execute and read and write
3D2E000
stack
page read and write
2DEF000
stack
page read and write
E72000
heap
page read and write
97C000
unkown
page execute and write copy
4B90000
direct allocation
page read and write
E32000
heap
page read and write
46F0000
direct allocation
page read and write
E8A000
heap
page read and write
96D000
unkown
page execute and read and write
4D10000
direct allocation
page execute and read and write
564E000
stack
page read and write
935000
unkown
page execute and read and write
46EF000
stack
page read and write
DF0000
heap
page read and write
51E0000
remote allocation
page read and write
E54000
heap
page read and write
10EF000
stack
page read and write
522D000
stack
page read and write
382E000
stack
page read and write
4BCC000
stack
page read and write
E3E000
heap
page read and write
4D30000
direct allocation
page execute and read and write
574F000
stack
page read and write
E6C000
heap
page read and write
2E2E000
stack
page read and write
4B90000
direct allocation
page read and write
DFA000
heap
page read and write
2BEE000
stack
page read and write
46F0000
direct allocation
page read and write
532E000
stack
page read and write
36EE000
stack
page read and write
292C000
stack
page read and write
32EF000
stack
page read and write
46F0000
direct allocation
page read and write
4CF0000
direct allocation
page execute and read and write
4F8E000
stack
page read and write
356F000
stack
page read and write
There are 169 hidden memdumps, click here to show them.