IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_608fde29-56f7-4e2d-9659-2ddb2e35186b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89B7.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 16:59:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AE1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B01.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6460 -s 1896

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
https://sergei-esenin.com/ic.com
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://steamcommunity.com/profiles/765612
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://clearancek.site/api
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://lv.queniujq.cn
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/publ
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://api.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://store.steampowered.com/about/
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0023.t-0009.t-msedge.net
13.107.246.51
fp2e7a.wpc.phicdn.net
192.229.221.95
There are 3 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{275e00f7-dafb-e21f-6af3-a5694ab13d6b}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
001840100CFA53E0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A71000
unkown
page execute and read and write
malicious
4371000
heap
page read and write
4990000
direct allocation
page execute and read and write
420000
heap
page read and write
27FE000
stack
page read and write
2F7E000
stack
page read and write
423E000
stack
page read and write
4BBD000
stack
page read and write
40FE000
stack
page read and write
3E3F000
stack
page read and write
D32000
unkown
page execute and read and write
4371000
heap
page read and write
2B7F000
stack
page read and write
4360000
direct allocation
page read and write
47B0000
trusted library allocation
page read and write
2BBE000
stack
page read and write
41FF000
stack
page read and write
256E000
stack
page read and write
4970000
direct allocation
page execute and read and write
64A000
heap
page read and write
4371000
heap
page read and write
4ABD000
stack
page read and write
D60000
unkown
page execute and read and write
4960000
direct allocation
page execute and read and write
4360000
direct allocation
page read and write
4340000
heap
page read and write
333E000
stack
page read and write
36FE000
stack
page read and write
433F000
stack
page read and write
79E000
stack
page read and write
3F7F000
stack
page read and write
7DE000
stack
page read and write
49B0000
direct allocation
page execute and read and write
4E50000
remote allocation
page read and write
3BBF000
stack
page read and write
2E3E000
stack
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
500E000
stack
page read and write
631000
heap
page read and write
393F000
stack
page read and write
5C3000
heap
page read and write
4360000
direct allocation
page read and write
63A000
heap
page read and write
480000
heap
page read and write
4980000
direct allocation
page execute and read and write
347E000
stack
page read and write
2CFE000
stack
page read and write
4360000
direct allocation
page read and write
4980000
direct allocation
page execute and read and write
5A2000
heap
page read and write
4370000
heap
page read and write
4E50000
remote allocation
page read and write
4371000
heap
page read and write
30BE000
stack
page read and write
4371000
heap
page read and write
485000
heap
page read and write
26BD000
heap
page read and write
26B7000
heap
page read and write
510F000
stack
page read and write
56E000
heap
page read and write
5230000
heap
page read and write
A71000
unkown
page execute and write copy
27BE000
stack
page read and write
4950000
direct allocation
page execute and read and write
493E000
stack
page read and write
4E50000
remote allocation
page read and write
4371000
heap
page read and write
533F000
stack
page read and write
37FF000
stack
page read and write
69E000
stack
page read and write
3BFE000
stack
page read and write
4371000
heap
page read and write
410000
heap
page read and write
4360000
direct allocation
page read and write
32FF000
stack
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
5AE000
heap
page read and write
4980000
direct allocation
page execute and read and write
4980000
direct allocation
page execute and read and write
4371000
heap
page read and write
59F000
heap
page read and write
BB000
stack
page read and write
8DE000
stack
page read and write
4360000
direct allocation
page read and write
383E000
stack
page read and write
4360000
direct allocation
page read and write
293E000
stack
page read and write
4E9D000
stack
page read and write
642000
heap
page read and write
D7A000
unkown
page execute and write copy
2CBF000
stack
page read and write
26B0000
heap
page read and write
397D000
stack
page read and write
483C000
stack
page read and write
498E000
stack
page read and write
AD0000
unkown
page execute and read and write
4800000
direct allocation
page read and write
A70000
unkown
page readonly
3ABE000
stack
page read and write
4371000
heap
page read and write
28FF000
stack
page read and write
5E0000
heap
page read and write
64E000
heap
page read and write
4360000
direct allocation
page read and write
4980000
direct allocation
page execute and read and write
4CFF000
stack
page read and write
D79000
unkown
page execute and write copy
4360000
direct allocation
page read and write
343F000
stack
page read and write
31BF000
stack
page read and write
64C000
heap
page read and write
3D3E000
stack
page read and write
2A3F000
stack
page read and write
2A7E000
stack
page read and write
357F000
stack
page read and write
36BF000
stack
page read and write
4360000
direct allocation
page read and write
4E3F000
stack
page read and write
4371000
heap
page read and write
F15000
unkown
page execute and write copy
598000
heap
page read and write
4800000
direct allocation
page read and write
3FBE000
stack
page read and write
652000
heap
page read and write
4980000
direct allocation
page execute and read and write
C56000
unkown
page execute and read and write
470000
heap
page read and write
307F000
stack
page read and write
650000
heap
page read and write
5C0000
heap
page read and write
62E000
heap
page read and write
D79000
unkown
page execute and read and write
4800000
direct allocation
page read and write
47EE000
stack
page read and write
4F9E000
stack
page read and write
4371000
heap
page read and write
A70000
unkown
page read and write
3CFF000
stack
page read and write
1BB000
stack
page read and write
4BFE000
stack
page read and write
F14000
unkown
page execute and read and write
4371000
heap
page read and write
2F3F000
stack
page read and write
35BE000
stack
page read and write
3E7E000
stack
page read and write
2DFF000
stack
page read and write
56A000
heap
page read and write
40BF000
stack
page read and write
4360000
direct allocation
page read and write
31FE000
stack
page read and write
266F000
stack
page read and write
4371000
heap
page read and write
D6A000
unkown
page execute and read and write
49A0000
direct allocation
page execute and read and write
4D3E000
stack
page read and write
560000
heap
page read and write
4360000
direct allocation
page read and write
4360000
direct allocation
page read and write
516E000
stack
page read and write
3A7F000
stack
page read and write
64C000
heap
page read and write
26AB000
stack
page read and write
49C9000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
647000
heap
page read and write
64C000
heap
page read and write
4371000
heap
page read and write
There are 159 hidden memdumps, click here to show them.