IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_8c8a902d-c42d-4370-b513-83f4a0b38645\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators, with overstriking
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_afac75e7374545c8b9b34e6ee89dc4192bd059_852b229c_cbefd944-74ad-4262-b2f2-273d8747905d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators, with overstriking
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51C2.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 14:54:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53A7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53D7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBE6.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 14:54:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBCC2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBCF2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1904
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1988

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
https://sergei-esenin.com/tC
unknown
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
https://sergei-esenin.com/api~
unknown
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/LC
unknown
malicious
https://sergei-esenin.com/apit
unknown
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://www.cloudflare.com/learning/access-mr
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://community.akamai.steamstatic.com/public/shared/images/resp
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gw
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://www.cloudflare.com/learning/access-management
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://clearancek.site/apid
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalConten
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://store.steampowered.com/about/
unknown
There are 77 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
241.42.69.40.in-addr.arpa
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{7d6d3d31-794a-5d44-0c8a-ce1a270676d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00188010C472BF19
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E41000
unkown
page execute and read and write
malicious
5750000
direct allocation
page execute and read and write
4D7F000
stack
page read and write
605F000
stack
page read and write
17EC000
heap
page read and write
18A4000
heap
page read and write
135B000
stack
page read and write
39BE000
stack
page read and write
1784000
heap
page read and write
44FE000
stack
page read and write
18A4000
heap
page read and write
560C000
stack
page read and write
5750000
direct allocation
page execute and read and write
18A4000
heap
page read and write
13B0000
heap
page read and write
3D3F000
stack
page read and write
55C0000
remote allocation
page read and write
5720000
direct allocation
page execute and read and write
33A0000
direct allocation
page read and write
18A4000
heap
page read and write
1A7F000
stack
page read and write
3C3E000
stack
page read and write
5C8D000
stack
page read and write
3ABF000
stack
page read and write
1772000
heap
page read and write
5B4E000
stack
page read and write
5141000
heap
page read and write
331F000
stack
page read and write
1138000
unkown
page execute and write copy
33A0000
direct allocation
page read and write
620E000
stack
page read and write
58CD000
stack
page read and write
437F000
stack
page read and write
33B7000
heap
page read and write
18A4000
heap
page read and write
179E000
heap
page read and write
33A0000
direct allocation
page read and write
5D8E000
stack
page read and write
18A4000
heap
page read and write
477E000
stack
page read and write
18A4000
heap
page read and write
427E000
stack
page read and write
575E000
stack
page read and write
55C0000
remote allocation
page read and write
18A0000
heap
page read and write
5780000
direct allocation
page execute and read and write
40FF000
stack
page read and write
55D0000
direct allocation
page read and write
112B000
unkown
page execute and read and write
5770000
direct allocation
page execute and read and write
33A0000
direct allocation
page read and write
44BF000
stack
page read and write
55D0000
direct allocation
page read and write
1772000
heap
page read and write
60C0000
heap
page read and write
35FE000
stack
page read and write
10F5000
unkown
page execute and read and write
18A4000
heap
page read and write
1121000
unkown
page execute and read and write
5141000
heap
page read and write
5750000
direct allocation
page execute and read and write
18A4000
heap
page read and write
18A4000
heap
page read and write
59CD000
stack
page read and write
176F000
heap
page read and write
6210000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
48BE000
stack
page read and write
E40000
unkown
page readonly
413E000
stack
page read and write
55C0000
remote allocation
page read and write
E41000
unkown
page execute and write copy
179E000
heap
page read and write
339C000
stack
page read and write
33A0000
direct allocation
page read and write
4B3E000
stack
page read and write
179F000
heap
page read and write
1755000
heap
page read and write
610E000
stack
page read and write
4EFE000
stack
page read and write
171A000
heap
page read and write
423F000
stack
page read and write
5141000
heap
page read and write
33A0000
direct allocation
page read and write
18A4000
heap
page read and write
188E000
stack
page read and write
5730000
direct allocation
page execute and read and write
1751000
heap
page read and write
5141000
heap
page read and write
33A0000
direct allocation
page read and write
3EBE000
stack
page read and write
18A4000
heap
page read and write
588D000
stack
page read and write
1748000
heap
page read and write
33A0000
direct allocation
page read and write
18A4000
heap
page read and write
5750000
direct allocation
page execute and read and write
4DBE000
stack
page read and write
35BE000
stack
page read and write
33A0000
direct allocation
page read and write
503E000
stack
page read and write
1139000
unkown
page execute and write copy
1890000
heap
page read and write
176F000
heap
page read and write
49BF000
stack
page read and write
397F000
stack
page read and write
4EBF000
stack
page read and write
12CC000
unkown
page execute and write copy
1789000
heap
page read and write
18A4000
heap
page read and write
5740000
direct allocation
page execute and read and write
5141000
heap
page read and write
18A4000
heap
page read and write
EA0000
unkown
page execute and read and write
18A4000
heap
page read and write
18A4000
heap
page read and write
12CB000
unkown
page execute and read and write
49FE000
stack
page read and write
18A4000
heap
page read and write
18A4000
heap
page read and write
34BF000
stack
page read and write
5F5E000
stack
page read and write
4AFF000
stack
page read and write
18A4000
heap
page read and write
175E000
heap
page read and write
3E7F000
stack
page read and write
487E000
stack
page read and write
3FFE000
stack
page read and write
171E000
heap
page read and write
4FFF000
stack
page read and write
33B0000
heap
page read and write
5141000
heap
page read and write
5A0D000
stack
page read and write
579E000
trusted library allocation
page read and write
5B0D000
stack
page read and write
18A4000
heap
page read and write
18A4000
heap
page read and write
473F000
stack
page read and write
1138000
unkown
page execute and read and write
5DFD000
stack
page read and write
36FF000
stack
page read and write
4C3F000
stack
page read and write
33BD000
heap
page read and write
45FF000
stack
page read and write
33A0000
direct allocation
page read and write
3BFF000
stack
page read and write
5C4F000
stack
page read and write
18A4000
heap
page read and write
383F000
stack
page read and write
33A0000
direct allocation
page read and write
5141000
heap
page read and write
55D0000
direct allocation
page read and write
18A4000
heap
page read and write
33A0000
direct allocation
page read and write
373E000
stack
page read and write
5141000
heap
page read and write
5750000
direct allocation
page execute and read and write
174F000
heap
page read and write
3AFE000
stack
page read and write
175E000
heap
page read and write
1766000
heap
page read and write
43BE000
stack
page read and write
1710000
heap
page read and write
17E1000
heap
page read and write
5140000
heap
page read and write
1789000
heap
page read and write
387E000
stack
page read and write
335E000
stack
page read and write
5750000
direct allocation
page execute and read and write
1020000
unkown
page execute and read and write
5240000
trusted library allocation
page read and write
570E000
stack
page read and write
4C7E000
stack
page read and write
184D000
stack
page read and write
33A0000
direct allocation
page read and write
3FBF000
stack
page read and write
1759000
heap
page read and write
5EFE000
stack
page read and write
18A4000
heap
page read and write
5580000
heap
page read and write
5141000
heap
page read and write
513F000
stack
page read and write
16FB000
stack
page read and write
13C0000
heap
page read and write
5760000
direct allocation
page execute and read and write
E40000
unkown
page read and write
3D7E000
stack
page read and write
463E000
stack
page read and write
There are 178 hidden memdumps, click here to show them.