IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_497270b0-0621-4ea5-a5d6-f6e8b5b26324\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_afac75e7374545c8b9b34e6ee89dc4192bd059_852b229c_5775f751-9873-4f52-a41a-6b189ae72ea2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER46CC.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 14:49:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B70.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4BA0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDFD4.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 12:49:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE11E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE14D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6356 -s 1928
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6356 -s 1848

URLs

Name
IP
Malicious
https://sergei-esenin.com/apie
unknown
malicious
https://sergei-esenin.com/
unknown
malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
https://sergei-esenin.com/apiF
unknown
malicious
https://sergei-esenin.com/api:
unknown
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://sergei-esenin.com:443/api$
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/X
unknown
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://sergei-esenin.com:443/apiiz
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_respons0
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://clearancek.site:443/api$
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.cloudflare.com/learning/ac-Encodi
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://licendfilteo.site:443/api
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://mobbipenju.store:443/api
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://api.s
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://store.steampowered.com/about/
unknown
There are 77 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{33ee598d-35cc-b22f-9de3-20f834960429}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00FAC6F3471
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A1000
unkown
page execute and read and write
malicious
5BFE000
stack
page read and write
568D000
stack
page read and write
4CC1000
heap
page read and write
3AD000
unkown
page execute and write copy
2E6D000
heap
page read and write
490E000
stack
page read and write
13ED000
heap
page read and write
1461000
heap
page read and write
39BF000
stack
page read and write
34FE000
stack
page read and write
57EE000
stack
page read and write
52F0000
direct allocation
page execute and read and write
A0000
unkown
page readonly
13B0000
heap
page read and write
70471000
unkown
page execute read
43BF000
stack
page read and write
363E000
stack
page read and write
1300000
heap
page read and write
1477000
heap
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
327E000
stack
page read and write
3AC000
unkown
page execute and read and write
44FF000
stack
page read and write
43FE000
stack
page read and write
70470000
unkown
page readonly
4CC1000
heap
page read and write
13BE000
heap
page read and write
136E000
stack
page read and write
52D0000
direct allocation
page execute and read and write
2E60000
heap
page read and write
5315000
trusted library allocation
page read and write
15AF000
stack
page read and write
100000
unkown
page execute and read and write
2E67000
heap
page read and write
323F000
stack
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
16AF000
stack
page read and write
52D0000
direct allocation
page execute and read and write
578D000
stack
page read and write
141F000
heap
page read and write
463F000
stack
page read and write
396000
unkown
page execute and read and write
3FFF000
stack
page read and write
373F000
stack
page read and write
5150000
direct allocation
page read and write
4CC1000
heap
page read and write
4CC0000
heap
page read and write
A1000
unkown
page execute and write copy
4CB0000
direct allocation
page read and write
3AFF000
stack
page read and write
1480000
heap
page read and write
7048F000
unkown
page readonly
1411000
heap
page read and write
7048D000
unkown
page read and write
4CC1000
heap
page read and write
5300000
direct allocation
page execute and read and write
4CC1000
heap
page read and write
4CB0000
direct allocation
page read and write
4CC1000
heap
page read and write
52A0000
direct allocation
page execute and read and write
143D000
heap
page read and write
4B8E000
stack
page read and write
377E000
stack
page read and write
288000
unkown
page execute and read and write
4A4E000
stack
page read and write
3AC000
unkown
page execute and write copy
387F000
stack
page read and write
4CB0000
direct allocation
page read and write
13E8000
heap
page read and write
42BE000
stack
page read and write
38BE000
stack
page read and write
52B0000
direct allocation
page execute and read and write
52E0000
direct allocation
page execute and read and write
52C0000
direct allocation
page execute and read and write
4CB0000
direct allocation
page read and write
4CB0000
direct allocation
page read and write
2FBF000
stack
page read and write
52D0000
direct allocation
page execute and read and write
1220000
heap
page read and write
4CC1000
heap
page read and write
467E000
stack
page read and write
A0000
unkown
page read and write
4CB0000
direct allocation
page read and write
EBB000
stack
page read and write
4CB0000
direct allocation
page read and write
4CC1000
heap
page read and write
4CB0000
direct allocation
page read and write
34BF000
stack
page read and write
365000
unkown
page execute and read and write
518B000
stack
page read and write
4CD0000
heap
page read and write
30FE000
stack
page read and write
4CB0000
direct allocation
page read and write
1479000
heap
page read and write
513D000
stack
page read and write
48BF000
stack
page read and write
403E000
stack
page read and write
57A0000
remote allocation
page read and write
1472000
heap
page read and write
13AE000
stack
page read and write
5150000
direct allocation
page read and write
5D80000
heap
page read and write
4B4F000
stack
page read and write
141F000
heap
page read and write
4CB0000
direct allocation
page read and write
417E000
stack
page read and write
4CB0000
direct allocation
page read and write
4CC1000
heap
page read and write
13F0000
heap
page read and write
337F000
stack
page read and write
554E000
stack
page read and write
57A0000
remote allocation
page read and write
593E000
stack
page read and write
413F000
stack
page read and write
FBB000
stack
page read and write
140F000
heap
page read and write
143D000
heap
page read and write
147D000
heap
page read and write
4C8F000
stack
page read and write
4CC1000
heap
page read and write
52D0000
direct allocation
page execute and read and write
33BE000
stack
page read and write
13F7000
heap
page read and write
13FD000
heap
page read and write
5CFF000
stack
page read and write
39FE000
stack
page read and write
141F000
heap
page read and write
4CC1000
heap
page read and write
3C7E000
stack
page read and write
5A9D000
stack
page read and write
453E000
stack
page read and write
58EE000
stack
page read and write
147F000
heap
page read and write
528E000
stack
page read and write
13BA000
heap
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
5100000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
4CC1000
heap
page read and write
13FD000
heap
page read and write
3EFE000
stack
page read and write
427F000
stack
page read and write
3D7F000
stack
page read and write
477F000
stack
page read and write
4CB0000
direct allocation
page read and write
3C3F000
stack
page read and write
540D000
stack
page read and write
4A0F000
stack
page read and write
54E000
unkown
page execute and read and write
3EBF000
stack
page read and write
48C0000
heap
page read and write
5B9E000
stack
page read and write
70486000
unkown
page readonly
313E000
stack
page read and write
3B3E000
stack
page read and write
140F000
heap
page read and write
4CC1000
heap
page read and write
54F000
unkown
page execute and write copy
13F4000
heap
page read and write
5A3D000
stack
page read and write
52D0000
direct allocation
page execute and read and write
3DBE000
stack
page read and write
2FFB000
stack
page read and write
564F000
stack
page read and write
FE5000
heap
page read and write
FE0000
heap
page read and write
4CB0000
direct allocation
page read and write
2EBE000
stack
page read and write
4C90000
heap
page read and write
143D000
heap
page read and write
5150000
direct allocation
page read and write
52DD000
stack
page read and write
39E000
unkown
page execute and read and write
52D0000
direct allocation
page execute and read and write
550D000
stack
page read and write
47BE000
stack
page read and write
1461000
heap
page read and write
35FF000
stack
page read and write
57A0000
remote allocation
page read and write
There are 173 hidden memdumps, click here to show them.