IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_f365d048-d750-4d31-8c84-dc291f86ae1d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9980.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 00:44:05 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9AAA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9ADA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6172 -s 1084
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6172 -s 1888

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
https://sergei-esenin.com/apiE
unknown
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://sergei-esenin.com/apiWq
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://avatars.akamai.steamstatica
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://clearancek.site:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://bathdoomgaz.store:443/apiL
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://studennotediw.store:443/api
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://spirittunek.store:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://store.steampowered.com/about/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{2033b02b-8313-f905-4807-203899401c3c}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9B1000
unkown
page execute and read and write
malicious
145F000
heap
page read and write
5C9F000
stack
page read and write
584F000
stack
page read and write
4D41000
heap
page read and write
A10000
unkown
page execute and read and write
44AE000
stack
page read and write
13E3000
heap
page read and write
14D4000
heap
page read and write
13E0000
heap
page read and write
5350000
direct allocation
page execute and read and write
3AAE000
stack
page read and write
145F000
heap
page read and write
4D30000
direct allocation
page read and write
14D4000
heap
page read and write
2F4F000
stack
page read and write
54CD000
stack
page read and write
3CEF000
stack
page read and write
41EF000
stack
page read and write
141A000
heap
page read and write
4D2F000
stack
page read and write
4D30000
direct allocation
page read and write
14D4000
heap
page read and write
342F000
stack
page read and write
560E000
stack
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
E52000
unkown
page execute and write copy
396E000
stack
page read and write
4D40000
heap
page read and write
51D0000
direct allocation
page read and write
392F000
stack
page read and write
588E000
stack
page read and write
45EE000
stack
page read and write
4D30000
direct allocation
page read and write
530F000
stack
page read and write
14D4000
heap
page read and write
137E000
stack
page read and write
4D30000
direct allocation
page read and write
B95000
unkown
page execute and read and write
1380000
heap
page read and write
1415000
heap
page read and write
36AF000
stack
page read and write
14D4000
heap
page read and write
4D30000
direct allocation
page read and write
1410000
heap
page read and write
14CE000
stack
page read and write
4D41000
heap
page read and write
436E000
stack
page read and write
3FAE000
stack
page read and write
2FA7000
heap
page read and write
2F90000
heap
page read and write
45AF000
stack
page read and write
1401000
heap
page read and write
356F000
stack
page read and write
5370000
direct allocation
page execute and read and write
14D4000
heap
page read and write
5350000
direct allocation
page execute and read and write
4D30000
direct allocation
page read and write
548E000
stack
page read and write
133D000
stack
page read and write
346E000
stack
page read and write
138E000
heap
page read and write
13CE000
heap
page read and write
3E2F000
stack
page read and write
14D4000
heap
page read and write
4D30000
direct allocation
page read and write
59FD000
stack
page read and write
4D41000
heap
page read and write
422E000
stack
page read and write
1410000
heap
page read and write
598D000
stack
page read and write
486E000
stack
page read and write
4BEF000
stack
page read and write
1471000
heap
page read and write
4D30000
direct allocation
page read and write
14D4000
heap
page read and write
1426000
heap
page read and write
5380000
direct allocation
page execute and read and write
13C8000
heap
page read and write
482F000
stack
page read and write
5180000
trusted library allocation
page read and write
14D4000
heap
page read and write
51C0000
remote allocation
page read and write
5180000
heap
page read and write
16AE000
stack
page read and write
5B9E000
stack
page read and write
4D41000
heap
page read and write
2FAD000
heap
page read and write
CB7000
unkown
page execute and read and write
14D4000
heap
page read and write
3BEE000
stack
page read and write
36EE000
stack
page read and write
1415000
heap
page read and write
31AF000
stack
page read and write
E51000
unkown
page execute and read and write
51C0000
remote allocation
page read and write
5330000
direct allocation
page execute and read and write
5CA0000
trusted library allocation
page read and write
CB7000
unkown
page execute and write copy
5350000
direct allocation
page execute and read and write
535D000
stack
page read and write
C72000
unkown
page execute and read and write
496F000
stack
page read and write
138A000
heap
page read and write
4D41000
heap
page read and write
446F000
stack
page read and write
432F000
stack
page read and write
30AF000
stack
page read and write
14D0000
heap
page read and write
141A000
heap
page read and write
3D2E000
stack
page read and write
46EF000
stack
page read and write
31EE000
stack
page read and write
FC0000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
49AE000
stack
page read and write
14D4000
heap
page read and write
32EF000
stack
page read and write
5350000
direct allocation
page execute and read and write
4AAF000
stack
page read and write
1410000
heap
page read and write
9B1000
unkown
page execute and write copy
3F6F000
stack
page read and write
1401000
heap
page read and write
3BAF000
stack
page read and write
4D30000
direct allocation
page read and write
13FF000
heap
page read and write
14D4000
heap
page read and write
35AE000
stack
page read and write
574E000
stack
page read and write
13C5000
heap
page read and write
2F8C000
stack
page read and write
51D0000
direct allocation
page read and write
1476000
heap
page read and write
CA1000
unkown
page execute and read and write
1418000
heap
page read and write
4D50000
heap
page read and write
5360000
direct allocation
page execute and read and write
14D4000
heap
page read and write
9B0000
unkown
page readonly
2FA0000
heap
page read and write
141A000
heap
page read and write
4D30000
direct allocation
page read and write
4D41000
heap
page read and write
3A6F000
stack
page read and write
40AF000
stack
page read and write
51C0000
remote allocation
page read and write
5B50000
heap
page read and write
1401000
heap
page read and write
5320000
direct allocation
page execute and read and write
13CE000
heap
page read and write
55CD000
stack
page read and write
13C0000
heap
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
4D41000
heap
page read and write
4C2E000
stack
page read and write
145A000
heap
page read and write
9B0000
unkown
page read and write
14D4000
heap
page read and write
12FB000
stack
page read and write
4D30000
direct allocation
page read and write
13E0000
heap
page read and write
1426000
heap
page read and write
37EF000
stack
page read and write
332E000
stack
page read and write
14D4000
heap
page read and write
1469000
heap
page read and write
570F000
stack
page read and write
4D41000
heap
page read and write
4AEE000
stack
page read and write
4D30000
direct allocation
page read and write
14D4000
heap
page read and write
146C000
heap
page read and write
4D30000
direct allocation
page read and write
5350000
direct allocation
page execute and read and write
13E3000
heap
page read and write
5340000
direct allocation
page execute and read and write
51D0000
direct allocation
page read and write
CA8000
unkown
page execute and read and write
472E000
stack
page read and write
14D4000
heap
page read and write
1418000
heap
page read and write
4D30000
direct allocation
page read and write
13BD000
heap
page read and write
4D41000
heap
page read and write
146C000
heap
page read and write
13B8000
heap
page read and write
40EE000
stack
page read and write
3E6E000
stack
page read and write
5350000
direct allocation
page execute and read and write
5AFE000
stack
page read and write
F5B000
stack
page read and write
14D4000
heap
page read and write
14D4000
heap
page read and write
FB0000
heap
page read and write
1418000
heap
page read and write
5399000
trusted library allocation
page read and write
CB8000
unkown
page execute and write copy
382E000
stack
page read and write
1415000
heap
page read and write
520B000
stack
page read and write
There are 194 hidden memdumps, click here to show them.