IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_91cf98b8-f850-4f01-b2eb-8616ce693643\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EB8.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Oct 12 22:48:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9FF1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA021.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 1900

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com/S
unknown
malicious
https://sergei-esenin.com/apigYa
unknown
malicious
https://sergei-esenin.com/3
unknown
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
https://steamcommunity.com/profiles/76561199724331900h
unknown
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://spirittunek.store/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://steamcommunity.com/z1
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/learning/access-manag
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://avatars.akamai.steamstaticQn
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steam
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://store.steampowered.com;
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
s-part-0032.t-0009.t-msedge.net
13.107.246.60
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
ProgramId
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
FileId
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
LowerCaseLongPath
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
LongPathHash
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
Name
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
OriginalFileName
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
Publisher
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
Version
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
BinFileVersion
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
BinaryType
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
ProductName
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
ProductVersion
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
LinkDate
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
BinProductVersion
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
AppxPackageFullName
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
AppxPackageRelativeId
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
Size
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
Language
malicious
\REGISTRY\A\{bb2d5c57-ab1b-4fda-0b13-1241cd2f3061}\Root\InventoryApplicationFile\file.exe|6945bd954f79b1ce
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C71000
unkown
page execute and read and write
malicious
5BA000
heap
page read and write
2CFE000
stack
page read and write
44B1000
heap
page read and write
32FF000
stack
page read and write
6EE000
stack
page read and write
36BF000
stack
page read and write
610000
heap
page read and write
F6C000
unkown
page execute and read and write
4AB0000
direct allocation
page execute and read and write
5F8000
heap
page read and write
6A6000
heap
page read and write
4FDD000
stack
page read and write
528E000
stack
page read and write
44B1000
heap
page read and write
538F000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
44A0000
direct allocation
page read and write
C6E000
stack
page read and write
6F0000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
44A0000
direct allocation
page read and write
649000
heap
page read and write
5F9000
heap
page read and write
F7C000
unkown
page execute and write copy
437E000
stack
page read and write
550F000
stack
page read and write
C70000
unkown
page readonly
347E000
stack
page read and write
44B1000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
4AC0000
direct allocation
page execute and read and write
C2C000
heap
page read and write
2F7E000
stack
page read and write
5530000
trusted library allocation
page read and write
F7B000
unkown
page execute and read and write
649000
heap
page read and write
638000
heap
page read and write
4FB000
stack
page read and write
2BBE000
stack
page read and write
44B1000
heap
page read and write
649000
heap
page read and write
2CBF000
stack
page read and write
383E000
stack
page read and write
111B000
unkown
page execute and write copy
5F0000
heap
page read and write
4E7E000
stack
page read and write
4ACD000
stack
page read and write
638000
heap
page read and write
53C0000
heap
page read and write
E52000
unkown
page execute and read and write
F63000
unkown
page execute and read and write
522E000
stack
page read and write
3E7E000
stack
page read and write
2E3E000
stack
page read and write
44A0000
direct allocation
page read and write
3FBE000
stack
page read and write
44B1000
heap
page read and write
67C000
heap
page read and write
62A000
heap
page read and write
111A000
unkown
page execute and read and write
4F7F000
stack
page read and write
423E000
stack
page read and write
27BF000
stack
page read and write
68C000
heap
page read and write
44B1000
heap
page read and write
31BF000
stack
page read and write
560000
heap
page read and write
3CFF000
stack
page read and write
5FE000
heap
page read and write
4F90000
remote allocation
page read and write
44B0000
heap
page read and write
5F4000
heap
page read and write
3ABE000
stack
page read and write
447F000
stack
page read and write
649000
heap
page read and write
1FB000
stack
page read and write
4E3E000
stack
page read and write
62A000
heap
page read and write
44A0000
direct allocation
page read and write
35BE000
stack
page read and write
44A0000
direct allocation
page read and write
F37000
unkown
page execute and read and write
682000
heap
page read and write
A0F000
stack
page read and write
644000
heap
page read and write
CD0000
unkown
page execute and read and write
638000
heap
page read and write
31FE000
stack
page read and write
3F7F000
stack
page read and write
44B1000
heap
page read and write
4CFD000
stack
page read and write
4AC0000
direct allocation
page execute and read and write
F7B000
unkown
page execute and write copy
30BE000
stack
page read and write
2F3F000
stack
page read and write
4A90000
direct allocation
page execute and read and write
40FE000
stack
page read and write
45B0000
trusted library allocation
page read and write
4A7F000
stack
page read and write
44B1000
heap
page read and write
6AA000
heap
page read and write
697000
heap
page read and write
44A0000
direct allocation
page read and write
6AA000
heap
page read and write
3A7F000
stack
page read and write
5E7000
heap
page read and write
44B1000
heap
page read and write
638000
heap
page read and write
44A0000
direct allocation
page read and write
4AF0000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
44B1000
heap
page read and write
C27000
heap
page read and write
C70000
unkown
page read and write
50DD000
stack
page read and write
2B7F000
stack
page read and write
44A0000
direct allocation
page read and write
44B1000
heap
page read and write
397E000
stack
page read and write
2A7E000
stack
page read and write
8CE000
stack
page read and write
4940000
direct allocation
page read and write
6F5000
heap
page read and write
540E000
stack
page read and write
90E000
stack
page read and write
44A0000
direct allocation
page read and write
512E000
stack
page read and write
4F90000
remote allocation
page read and write
5FE000
heap
page read and write
4F90000
remote allocation
page read and write
4AC0000
direct allocation
page execute and read and write
3E3F000
stack
page read and write
492D000
stack
page read and write
497B000
stack
page read and write
433F000
stack
page read and write
62B000
heap
page read and write
5BE000
heap
page read and write
649000
heap
page read and write
44A0000
direct allocation
page read and write
C71000
unkown
page execute and write copy
44B1000
heap
page read and write
C10000
heap
page read and write
4940000
direct allocation
page read and write
27FC000
stack
page read and write
44A0000
direct allocation
page read and write
44B1000
heap
page read and write
37FF000
stack
page read and write
44C0000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
4480000
heap
page read and write
550000
heap
page read and write
44B1000
heap
page read and write
357F000
stack
page read and write
44A0000
direct allocation
page read and write
44A0000
direct allocation
page read and write
3BFE000
stack
page read and write
4D3E000
stack
page read and write
610000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
644000
heap
page read and write
2A3F000
stack
page read and write
4BFE000
stack
page read and write
44B1000
heap
page read and write
3D3E000
stack
page read and write
28FE000
stack
page read and write
2DFF000
stack
page read and write
333E000
stack
page read and write
343F000
stack
page read and write
69F000
heap
page read and write
307F000
stack
page read and write
44B1000
heap
page read and write
68B000
heap
page read and write
44B1000
heap
page read and write
40BF000
stack
page read and write
293E000
stack
page read and write
C20000
heap
page read and write
62B000
heap
page read and write
68B000
heap
page read and write
44B1000
heap
page read and write
5B0000
heap
page read and write
41FF000
stack
page read and write
4B06000
trusted library allocation
page read and write
62A000
heap
page read and write
393F000
stack
page read and write
610000
heap
page read and write
637000
heap
page read and write
44A0000
direct allocation
page read and write
4940000
direct allocation
page read and write
36FE000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
44B1000
heap
page read and write
5FE000
heap
page read and write
There are 183 hidden memdumps, click here to show them.