IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_751b817d-e2b7-4560-abd1-2049e95d3565\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_86d780998731d44cc37040f9271b2fbde5bee817_852b229c_1320a61e-987a-4014-b0aa-d450fd97afba\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9602.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Oct 12 11:17:16 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER976B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER978B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD9B2.tmp.dmp
Mini DuMP crash report, 15 streams, CheckSum 0x00000004, Sat Oct 12 11:17:33 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA6F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDA9F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 1916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 1908

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://steamcommunity.com/linkfilter/?
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://steamcommunity.com/AOg
unknown
http://store.steampol
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://store.steampowered.com/about/
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
206.23.85.13.in-addr.arpa
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{89d29a12-05fc-979b-c4dc-231b35ebcc0a}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
001840100A2E9FBE
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
131000
unkown
page execute and read and write
malicious
3E7E000
stack
page read and write
4981000
heap
page read and write
3FBD000
stack
page read and write
4F60000
direct allocation
page execute and read and write
1190000
direct allocation
page read and write
40FE000
stack
page read and write
1190000
direct allocation
page read and write
4981000
heap
page read and write
3F6000
unkown
page execute and read and write
43A000
unkown
page execute and read and write
1190000
direct allocation
page read and write
BB0000
heap
page read and write
3F7F000
stack
page read and write
535E000
stack
page read and write
4981000
heap
page read and write
447F000
stack
page read and write
574E000
stack
page read and write
437E000
stack
page read and write
5D8000
unkown
page execute and write copy
1190000
direct allocation
page read and write
3CFF000
stack
page read and write
4981000
heap
page read and write
393F000
stack
page read and write
4F40000
remote allocation
page read and write
4F90000
direct allocation
page execute and read and write
2B7E000
stack
page read and write
383E000
stack
page read and write
32FF000
stack
page read and write
31BF000
stack
page read and write
1190000
direct allocation
page read and write
2E3E000
stack
page read and write
4981000
heap
page read and write
4F60000
direct allocation
page execute and read and write
2B90000
direct allocation
page read and write
2BB7000
heap
page read and write
2BB0000
heap
page read and write
118E000
stack
page read and write
1190000
direct allocation
page read and write
2F7E000
stack
page read and write
4F60000
direct allocation
page execute and read and write
4F70000
direct allocation
page execute and read and write
11FF000
heap
page read and write
5890000
trusted library allocation
page read and write
4981000
heap
page read and write
3A7F000
stack
page read and write
4F60000
direct allocation
page execute and read and write
1296000
heap
page read and write
3BBF000
stack
page read and write
4F40000
remote allocation
page read and write
3E3F000
stack
page read and write
45BF000
stack
page read and write
521E000
stack
page read and write
1040000
heap
page read and write
41FF000
stack
page read and write
1045000
heap
page read and write
559D000
stack
page read and write
31D000
unkown
page execute and read and write
2CFB000
stack
page read and write
4F3F000
stack
page read and write
4980000
heap
page read and write
2BBD000
heap
page read and write
131000
unkown
page execute and write copy
46FF000
stack
page read and write
B4B000
stack
page read and write
4981000
heap
page read and write
2B90000
direct allocation
page read and write
4981000
heap
page read and write
1292000
heap
page read and write
423E000
stack
page read and write
121A000
heap
page read and write
1020000
heap
page read and write
4981000
heap
page read and write
5D7000
unkown
page execute and read and write
1190000
direct allocation
page read and write
1190000
direct allocation
page read and write
35BE000
stack
page read and write
45FE000
stack
page read and write
5770000
heap
page read and write
11AA000
heap
page read and write
1190000
direct allocation
page read and write
4DC0000
trusted library allocation
page read and write
40BE000
stack
page read and write
473E000
stack
page read and write
347E000
stack
page read and write
4F40000
remote allocation
page read and write
51DC000
stack
page read and write
333E000
stack
page read and write
397E000
stack
page read and write
531F000
stack
page read and write
343F000
stack
page read and write
487E000
stack
page read and write
36FE000
stack
page read and write
4981000
heap
page read and write
357F000
stack
page read and write
114F000
stack
page read and write
190000
unkown
page execute and read and write
37FF000
stack
page read and write
307F000
stack
page read and write
2DFE000
stack
page read and write
1190000
direct allocation
page read and write
55EE000
stack
page read and write
4F80000
direct allocation
page execute and read and write
11A0000
heap
page read and write
4981000
heap
page read and write
497F000
stack
page read and write
11E0000
heap
page read and write
50DD000
stack
page read and write
4E3E000
stack
page read and write
130000
unkown
page readonly
433F000
stack
page read and write
2F3F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
30BE000
stack
page read and write
1190000
direct allocation
page read and write
56EF000
stack
page read and write
4981000
heap
page read and write
11E5000
heap
page read and write
4F50000
direct allocation
page execute and read and write
43B000
unkown
page execute and write copy
1190000
direct allocation
page read and write
1190000
direct allocation
page read and write
483F000
stack
page read and write
BA0000
heap
page read and write
4F60000
direct allocation
page execute and read and write
31FE000
stack
page read and write
EFB000
stack
page read and write
3BFE000
stack
page read and write
545F000
stack
page read and write
4E00000
direct allocation
page read and write
1231000
heap
page read and write
425000
unkown
page execute and read and write
4F60000
direct allocation
page execute and read and write
1223000
heap
page read and write
2CBF000
stack
page read and write
1280000
heap
page read and write
4981000
heap
page read and write
4990000
heap
page read and write
11EE000
heap
page read and write
4F40000
direct allocation
page execute and read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
139F000
stack
page read and write
509E000
stack
page read and write
1190000
direct allocation
page read and write
11D8000
heap
page read and write
4FA0000
trusted library allocation
page read and write
100E000
stack
page read and write
11AE000
heap
page read and write
4DFD000
stack
page read and write
2BA0000
direct allocation
page execute and read and write
44BE000
stack
page read and write
549D000
stack
page read and write
42D000
unkown
page execute and read and write
3ABE000
stack
page read and write
130000
unkown
page read and write
36BF000
stack
page read and write
43A000
unkown
page execute and write copy
3D3E000
stack
page read and write
587F000
stack
page read and write
1010000
heap
page read and write
4981000
heap
page read and write
There are 154 hidden memdumps, click here to show them.