IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_d55876a5-eb33-46da-b017-03e896b833b4\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3205.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 11:59:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER332F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER335F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6616 -s 1924

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bathdoomgaz.store
malicious
https://sergei-esenin.com/apiK
unknown
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/moda
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzz
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=L
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steambroadcast-test.akamaized
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://www.cloudflare.com/learning/access-managrs
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/learning/access-manag
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.jL
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://cdn.akamai.
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://help.st
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://checkout.steampow
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://community.akamai.stea
unknown
https://login.steamp
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.a
unknown
https://community.akamai.steamstatic.com/public/css
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://steamcommunity.com/profiles/765611997
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{db5d98ac-a3bb-6d45-73dc-5e673fdf29fe}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F71000
unkown
page execute and read and write
malicious
15BC000
heap
page read and write
4C91000
heap
page read and write
48BF000
stack
page read and write
551D000
stack
page read and write
5110000
remote allocation
page read and write
EEE000
stack
page read and write
403E000
stack
page read and write
453E000
stack
page read and write
15AE000
heap
page read and write
3EFE000
stack
page read and write
DD0000
heap
page read and write
DD4000
heap
page read and write
3DBE000
stack
page read and write
4C80000
direct allocation
page read and write
1569000
heap
page read and write
DD4000
heap
page read and write
1520000
heap
page read and write
31BE000
stack
page read and write
143B000
unkown
page execute and read and write
43BF000
stack
page read and write
DD4000
heap
page read and write
4C91000
heap
page read and write
4C7F000
stack
page read and write
565F000
stack
page read and write
427F000
stack
page read and write
1167000
unkown
page execute and read and write
5110000
remote allocation
page read and write
DD4000
heap
page read and write
4C91000
heap
page read and write
5C30000
heap
page read and write
525F000
stack
page read and write
3D7F000
stack
page read and write
15BC000
heap
page read and write
F70000
unkown
page read and write
52A0000
direct allocation
page execute and read and write
1291000
unkown
page execute and write copy
4C80000
direct allocation
page read and write
4B7E000
stack
page read and write
151D000
heap
page read and write
156E000
heap
page read and write
DD4000
heap
page read and write
52A0000
direct allocation
page execute and read and write
181E000
stack
page read and write
4C80000
direct allocation
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
5AAE000
stack
page read and write
15BC000
heap
page read and write
15AE000
heap
page read and write
52EC000
trusted library allocation
page read and write
463F000
stack
page read and write
CFB000
stack
page read and write
38BE000
stack
page read and write
15AE000
heap
page read and write
9DB000
stack
page read and write
57DE000
stack
page read and write
DD4000
heap
page read and write
477F000
stack
page read and write
14BE000
stack
page read and write
1565000
heap
page read and write
579F000
stack
page read and write
52B0000
direct allocation
page execute and read and write
32BF000
stack
page read and write
F6B000
stack
page read and write
594D000
stack
page read and write
47BE000
stack
page read and write
DD4000
heap
page read and write
156E000
heap
page read and write
1580000
heap
page read and write
39FE000
stack
page read and write
1517000
heap
page read and write
52D0000
direct allocation
page execute and read and write
5A4E000
stack
page read and write
1500000
heap
page read and write
48FE000
stack
page read and write
3B3E000
stack
page read and write
152E000
heap
page read and write
4C80000
direct allocation
page read and write
4C80000
direct allocation
page read and write
1292000
unkown
page execute and write copy
3C7E000
stack
page read and write
5BAF000
stack
page read and write
42BE000
stack
page read and write
DD4000
heap
page read and write
52A0000
direct allocation
page execute and read and write
15B2000
heap
page read and write
52AD000
stack
page read and write
F70000
unkown
page readonly
152A000
heap
page read and write
DD4000
heap
page read and write
4C91000
heap
page read and write
F71000
unkown
page execute and write copy
3FFF000
stack
page read and write
5120000
direct allocation
page read and write
FD0000
unkown
page execute and read and write
DAE000
stack
page read and write
43FE000
stack
page read and write
417E000
stack
page read and write
53DD000
stack
page read and write
1568000
heap
page read and write
15FB000
heap
page read and write
4C80000
direct allocation
page read and write
34FE000
stack
page read and write
50D0000
heap
page read and write
4C91000
heap
page read and write
39BF000
stack
page read and write
147E000
stack
page read and write
569E000
stack
page read and write
387F000
stack
page read and write
15A9000
heap
page read and write
58DD000
stack
page read and write
467E000
stack
page read and write
363E000
stack
page read and write
33BF000
stack
page read and write
3EBF000
stack
page read and write
1283000
unkown
page execute and read and write
DD4000
heap
page read and write
34BF000
stack
page read and write
4C80000
direct allocation
page read and write
5270000
direct allocation
page execute and read and write
4C91000
heap
page read and write
35FF000
stack
page read and write
1291000
unkown
page execute and read and write
127A000
unkown
page execute and read and write
52A0000
direct allocation
page execute and read and write
1582000
heap
page read and write
4C91000
heap
page read and write
4B3F000
stack
page read and write
30BF000
stack
page read and write
373F000
stack
page read and write
DD4000
heap
page read and write
515C000
stack
page read and write
5280000
direct allocation
page execute and read and write
DD4000
heap
page read and write
143C000
unkown
page execute and write copy
413F000
stack
page read and write
DD4000
heap
page read and write
124B000
unkown
page execute and read and write
1599000
heap
page read and write
4C80000
direct allocation
page read and write
4C80000
direct allocation
page read and write
171F000
stack
page read and write
377E000
stack
page read and write
1599000
heap
page read and write
1561000
heap
page read and write
DD4000
heap
page read and write
4C80000
direct allocation
page read and write
5120000
direct allocation
page read and write
541D000
stack
page read and write
DD4000
heap
page read and write
52C0000
direct allocation
page execute and read and write
49FF000
stack
page read and write
1580000
heap
page read and write
1510000
heap
page read and write
4C91000
heap
page read and write
DD4000
heap
page read and write
1558000
heap
page read and write
555E000
stack
page read and write
DD4000
heap
page read and write
D40000
heap
page read and write
F2E000
stack
page read and write
4C80000
direct allocation
page read and write
4D90000
trusted library allocation
page read and write
1599000
heap
page read and write
15BC000
heap
page read and write
44FF000
stack
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
DD4000
heap
page read and write
4A3E000
stack
page read and write
3AFF000
stack
page read and write
DD4000
heap
page read and write
4C80000
direct allocation
page read and write
3C3F000
stack
page read and write
14FE000
stack
page read and write
4C91000
heap
page read and write
4C90000
heap
page read and write
52A0000
direct allocation
page execute and read and write
5120000
direct allocation
page read and write
15F2000
heap
page read and write
5110000
remote allocation
page read and write
D30000
heap
page read and write
DD4000
heap
page read and write
4C80000
direct allocation
page read and write
52A0000
direct allocation
page execute and read and write
4C80000
direct allocation
page read and write
5290000
direct allocation
page execute and read and write
There are 179 hidden memdumps, click here to show them.