IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_7eeee3cd-0fe0-4b63-9a13-07fd42067fd5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_86d780998731d44cc37040f9271b2fbde5bee817_852b229c_ee58e84f-9a8e-4a0b-8280-396f39a741df\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER35FD.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 08:39:12 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER385F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER388F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7651.tmp.dmp
Mini DuMP crash report, 15 streams, CheckSum 0x00000004, Sun Oct 13 08:39:28 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76CF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76F0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 1936
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 1972

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://broadcast.st.dl.ecc
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://studennotediw.store/api9
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://avatars.akamai.steamstatict
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{8280d9fa-52d1-cb9d-6929-adbbf2642821}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180011F24A2029
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
EB1000
unkown
page execute and read and write
malicious
7FB000
stack
page read and write
DA7000
heap
page read and write
DAA000
heap
page read and write
49D1000
heap
page read and write
E09000
heap
page read and write
2D20000
heap
page read and write
2D0F000
stack
page read and write
5000000
direct allocation
page execute and read and write
54A0000
remote allocation
page read and write
49E0000
heap
page read and write
34AE000
stack
page read and write
332F000
stack
page read and write
EB0000
unkown
page readonly
589E000
stack
page read and write
6FB000
stack
page read and write
EA0000
direct allocation
page read and write
4FD0000
direct allocation
page execute and read and write
11B0000
unkown
page execute and read and write
55ED000
stack
page read and write
36EF000
stack
page read and write
EA0000
direct allocation
page read and write
D8F000
heap
page read and write
49D1000
heap
page read and write
EA0000
direct allocation
page read and write
4E50000
direct allocation
page read and write
DA7000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
4FB0000
direct allocation
page execute and read and write
49D1000
heap
page read and write
4AD0000
trusted library allocation
page read and write
D94000
heap
page read and write
11BF000
unkown
page execute and write copy
2E6E000
stack
page read and write
49D1000
heap
page read and write
5980000
heap
page read and write
D58000
heap
page read and write
1180000
unkown
page execute and read and write
49D0000
heap
page read and write
372E000
stack
page read and write
520D000
stack
page read and write
396F000
stack
page read and write
B9E000
stack
page read and write
486F000
stack
page read and write
54A0000
remote allocation
page read and write
D6F000
heap
page read and write
3C2E000
stack
page read and write
D1A000
heap
page read and write
DE5000
heap
page read and write
D94000
heap
page read and write
BC0000
heap
page read and write
DA7000
heap
page read and write
3E6F000
stack
page read and write
135D000
unkown
page execute and read and write
4FC0000
direct allocation
page execute and read and write
49D1000
heap
page read and write
D1E000
heap
page read and write
49D1000
heap
page read and write
49B0000
heap
page read and write
54A0000
remote allocation
page read and write
3AEE000
stack
page read and write
2F6F000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
F10000
unkown
page execute and read and write
135E000
unkown
page execute and write copy
EA0000
direct allocation
page read and write
DDF000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
4E50000
direct allocation
page read and write
2D27000
heap
page read and write
EA0000
direct allocation
page read and write
3AAF000
stack
page read and write
DEB000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
2E2E000
stack
page read and write
386E000
stack
page read and write
EA0000
direct allocation
page read and write
45EF000
stack
page read and write
E90000
heap
page read and write
EB0000
unkown
page read and write
426E000
stack
page read and write
DDC000
heap
page read and write
4E8B000
stack
page read and write
E8C000
stack
page read and write
D94000
heap
page read and write
43AE000
stack
page read and write
49D1000
heap
page read and write
575F000
stack
page read and write
422F000
stack
page read and write
D48000
heap
page read and write
3EAE000
stack
page read and write
BC5000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
DA7000
heap
page read and write
5012000
trusted library allocation
page read and write
3FAF000
stack
page read and write
11C0000
unkown
page execute and write copy
322E000
stack
page read and write
346F000
stack
page read and write
D4F000
heap
page read and write
579E000
stack
page read and write
565E000
stack
page read and write
EB1000
unkown
page execute and write copy
D86000
heap
page read and write
5A8F000
stack
page read and write
DE2000
heap
page read and write
534F000
stack
page read and write
D72000
heap
page read and write
EA0000
direct allocation
page read and write
EA0000
direct allocation
page read and write
109F000
unkown
page execute and read and write
35EE000
stack
page read and write
4F8F000
stack
page read and write
3BEF000
stack
page read and write
2FAE000
stack
page read and write
44AF000
stack
page read and write
49D1000
heap
page read and write
39AE000
stack
page read and write
3D2F000
stack
page read and write
524E000
stack
page read and write
49D1000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
D9B000
heap
page read and write
49D1000
heap
page read and write
146E000
stack
page read and write
476E000
stack
page read and write
48AE000
stack
page read and write
49D1000
heap
page read and write
EA0000
direct allocation
page read and write
CCE000
stack
page read and write
30AF000
stack
page read and write
4E4E000
stack
page read and write
A50000
heap
page read and write
30EE000
stack
page read and write
54ED000
stack
page read and write
EA0000
direct allocation
page read and write
11A9000
unkown
page execute and read and write
49D1000
heap
page read and write
D6F000
heap
page read and write
D55000
heap
page read and write
D0E000
stack
page read and write
4FE0000
direct allocation
page execute and read and write
35AF000
stack
page read and write
436F000
stack
page read and write
D10000
heap
page read and write
4E50000
direct allocation
page read and write
510D000
stack
page read and write
40EE000
stack
page read and write
EA0000
direct allocation
page read and write
4FD0000
direct allocation
page execute and read and write
58FE000
stack
page read and write
2D2D000
heap
page read and write
D5E000
heap
page read and write
EA0000
direct allocation
page read and write
44EE000
stack
page read and write
462E000
stack
page read and write
472F000
stack
page read and write
382F000
stack
page read and write
B30000
heap
page read and write
49D1000
heap
page read and write
D72000
heap
page read and write
DFA000
heap
page read and write
EA0000
direct allocation
page read and write
11BF000
unkown
page execute and read and write
E4E000
stack
page read and write
412E000
stack
page read and write
548E000
stack
page read and write
538E000
stack
page read and write
3FED000
stack
page read and write
3D6E000
stack
page read and write
31EF000
stack
page read and write
EA0000
direct allocation
page read and write
4FDD000
stack
page read and write
49D1000
heap
page read and write
336E000
stack
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
49D1000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
49AF000
stack
page read and write
D5E000
heap
page read and write
There are 172 hidden memdumps, click here to show them.