IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_de226bca-5d07-408b-8189-7b2a945470e5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18E5.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 15:46:16 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A7C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1ABC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7352 -s 1920

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900S)
unknown
malicious
eaglepawnoy.store
malicious
https://sergei-esenin.com:443/api%
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com/apitory
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
https://sergei-esenin.com/apit
unknown
malicious
https://sergei-esenin.com/ER
unknown
malicious
https://sergei-esenin.com/apiX
unknown
malicious
bathdoomgaz.store
malicious
https://sergei-esenin.com/apiJ
unknown
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://www.cloudflare.com/learning/access-manqqx
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vP
unknown
https://eaglepawnoy.store:443/api
unknown
https://community.akamai.steamsta
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.akam
unknown
https://store.steampowered.com/points/shop/
unknown
https://www.cloudflare.com/learning/access-man
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.co
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_resp
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://studennotediw.store:443/api
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilevC
unknown
https://steamcommunity.com/K)
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://steamcommunity.com/lin
unknown
https://spirittunek.store:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vP05w
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGt
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://clearancek.site:443/apiz
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{901d480d-2a44-fcb4-1f6a-32024771cbbd}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6A1000
unkown
page execute and read and write
malicious
409F000
stack
page read and write
3F9E000
stack
page read and write
2CDE000
stack
page read and write
5A4000
heap
page read and write
5A4000
heap
page read and write
963000
unkown
page execute and read and write
5A4000
heap
page read and write
431F000
stack
page read and write
3E5E000
stack
page read and write
4A40000
direct allocation
page execute and read and write
888000
unkown
page execute and read and write
4461000
heap
page read and write
74EF6000
unkown
page readonly
5A4000
heap
page read and write
6A0000
unkown
page read and write
CA7000
heap
page read and write
395E000
stack
page read and write
74EFF000
unkown
page readonly
32DF000
stack
page read and write
3A5F000
stack
page read and write
C2E000
heap
page read and write
359E000
stack
page read and write
48C0000
remote allocation
page read and write
990000
unkown
page execute and read and write
5A4000
heap
page read and write
533E000
stack
page read and write
369F000
stack
page read and write
C49000
heap
page read and write
305F000
stack
page read and write
4560000
trusted library allocation
page read and write
5A4000
heap
page read and write
37DF000
stack
page read and write
5A4000
heap
page read and write
700000
unkown
page execute and read and write
680000
direct allocation
page read and write
421E000
stack
page read and write
BA0000
direct allocation
page execute and read and write
4461000
heap
page read and write
48C0000
remote allocation
page read and write
4A50000
direct allocation
page execute and read and write
4FBD000
stack
page read and write
4461000
heap
page read and write
281B000
heap
page read and write
680000
direct allocation
page read and write
4A60000
direct allocation
page execute and read and write
435E000
stack
page read and write
3D1E000
stack
page read and write
4A40000
direct allocation
page execute and read and write
391F000
stack
page read and write
C2C000
heap
page read and write
4461000
heap
page read and write
B90000
direct allocation
page read and write
CA1000
heap
page read and write
74EE0000
unkown
page readonly
2E1E000
stack
page read and write
9A6000
unkown
page execute and read and write
5A4000
heap
page read and write
2F1F000
stack
page read and write
5490000
heap
page read and write
3E1F000
stack
page read and write
5A4000
heap
page read and write
291E000
stack
page read and write
680000
direct allocation
page read and write
680000
direct allocation
page read and write
2A1F000
stack
page read and write
4A87000
trusted library allocation
page read and write
C1E000
heap
page read and write
5A4000
heap
page read and write
5A4000
heap
page read and write
C9A000
heap
page read and write
5A4000
heap
page read and write
680000
direct allocation
page read and write
36DE000
stack
page read and write
4A70000
direct allocation
page execute and read and write
27CB000
stack
page read and write
C9C000
heap
page read and write
5A4000
heap
page read and write
2B5F000
stack
page read and write
DAF000
stack
page read and write
4461000
heap
page read and write
3F5F000
stack
page read and write
5A4000
heap
page read and write
341F000
stack
page read and write
4D3E000
stack
page read and write
4A40000
direct allocation
page execute and read and write
345E000
stack
page read and write
319F000
stack
page read and write
538E000
stack
page read and write
C8C000
heap
page read and write
281D000
heap
page read and write
5A4000
heap
page read and write
4BFD000
stack
page read and write
6A0000
unkown
page readonly
4BBC000
stack
page read and write
51FE000
stack
page read and write
C38000
heap
page read and write
331E000
stack
page read and write
4A40000
direct allocation
page execute and read and write
680000
direct allocation
page read and write
B90000
direct allocation
page read and write
4CFD000
stack
page read and write
C86000
heap
page read and write
1F0000
heap
page read and write
309E000
stack
page read and write
4A20000
direct allocation
page execute and read and write
381E000
stack
page read and write
BB0000
heap
page read and write
280E000
stack
page read and write
2B9E000
stack
page read and write
680000
direct allocation
page read and write
56E000
stack
page read and write
BBE000
heap
page read and write
C98000
heap
page read and write
CA1000
heap
page read and write
5A4000
heap
page read and write
C9C000
heap
page read and write
C38000
heap
page read and write
5A4000
heap
page read and write
4A40000
direct allocation
page execute and read and write
50BE000
stack
page read and write
680000
direct allocation
page read and write
C31000
heap
page read and write
C10000
heap
page read and write
B3F000
unkown
page execute and read and write
19B000
stack
page read and write
9A6000
unkown
page execute and write copy
C83000
heap
page read and write
5A4000
heap
page read and write
2C9F000
stack
page read and write
278F000
stack
page read and write
40DE000
stack
page read and write
74EE1000
unkown
page execute read
48A0000
heap
page read and write
680000
direct allocation
page read and write
4A40000
direct allocation
page execute and read and write
4E7E000
stack
page read and write
548F000
stack
page read and write
BE8000
heap
page read and write
2DDF000
stack
page read and write
C8D000
heap
page read and write
5A0000
heap
page read and write
BEF000
heap
page read and write
590000
heap
page read and write
C97000
heap
page read and write
4461000
heap
page read and write
5A4000
heap
page read and write
C12000
heap
page read and write
4461000
heap
page read and write
48C0000
remote allocation
page read and write
2817000
heap
page read and write
4461000
heap
page read and write
680000
direct allocation
page read and write
50FD000
stack
page read and write
5A4000
heap
page read and write
4FB000
stack
page read and write
2F5E000
stack
page read and write
C9C000
heap
page read and write
BF2000
heap
page read and write
523E000
stack
page read and write
CAB000
heap
page read and write
C31000
heap
page read and write
491C000
stack
page read and write
4461000
heap
page read and write
5A4000
heap
page read and write
BF4000
heap
page read and write
EAF000
stack
page read and write
4A30000
direct allocation
page execute and read and write
998000
unkown
page execute and read and write
445F000
stack
page read and write
74EFD000
unkown
page read and write
4E3E000
stack
page read and write
680000
direct allocation
page read and write
CAD000
heap
page read and write
680000
direct allocation
page read and write
3B9F000
stack
page read and write
5A4000
heap
page read and write
9A7000
unkown
page execute and write copy
B8E000
stack
page read and write
48E0000
direct allocation
page read and write
500000
heap
page read and write
3BDE000
stack
page read and write
C88000
heap
page read and write
3CDF000
stack
page read and write
680000
direct allocation
page read and write
CA7000
heap
page read and write
4460000
heap
page read and write
5A4000
heap
page read and write
680000
direct allocation
page read and write
BFE000
heap
page read and write
41DF000
stack
page read and write
BBA000
heap
page read and write
2810000
heap
page read and write
31DE000
stack
page read and write
4A1F000
stack
page read and write
6A1000
unkown
page execute and write copy
5A4000
heap
page read and write
5A4000
heap
page read and write
4ABD000
stack
page read and write
355F000
stack
page read and write
4F7F000
stack
page read and write
268E000
stack
page read and write
3A9E000
stack
page read and write
2A5E000
stack
page read and write
B40000
unkown
page execute and write copy
C1E000
heap
page read and write
There are 196 hidden memdumps, click here to show them.