IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_79272d57-bfa4-4aae-abaf-fac7dfee1222\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF, NEL line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER498B.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 19:04:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D35.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D84.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1112

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://store.steampowered.com
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://store.steampower
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://avatars.akamai.steamstaticS3
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://sergei-esenin.com/apik
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://sergei-esenin.com/api2
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{7db89a2f-17a6-3779-277e-8c675d832fb8}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
881000
unkown
page execute and read and write
malicious
FB9000
heap
page read and write
294E000
stack
page read and write
A63000
unkown
page execute and read and write
EFE000
heap
page read and write
2F7F000
stack
page read and write
654000
heap
page read and write
8E0000
unkown
page execute and read and write
654000
heap
page read and write
654000
heap
page read and write
4B7F000
stack
page read and write
2B7F000
stack
page read and write
860000
direct allocation
page read and write
45C1000
heap
page read and write
4B90000
remote allocation
page read and write
4BB0000
direct allocation
page execute and read and write
654000
heap
page read and write
860000
direct allocation
page read and write
2960000
direct allocation
page execute and read and write
4B90000
direct allocation
page execute and read and write
45C1000
heap
page read and write
860000
direct allocation
page read and write
740000
heap
page read and write
423E000
stack
page read and write
2A7F000
stack
page read and write
36BF000
stack
page read and write
521D000
stack
page read and write
508E000
stack
page read and write
4B90000
remote allocation
page read and write
4A3E000
stack
page read and write
FDC000
heap
page read and write
F3D000
heap
page read and write
4B90000
direct allocation
page execute and read and write
393F000
stack
page read and write
F3D000
heap
page read and write
EFA000
heap
page read and write
EDE000
stack
page read and write
860000
direct allocation
page read and write
45C1000
heap
page read and write
32FF000
stack
page read and write
4BC0000
direct allocation
page execute and read and write
EE0000
direct allocation
page read and write
45C1000
heap
page read and write
3F7F000
stack
page read and write
860000
direct allocation
page read and write
F28000
heap
page read and write
4F8E000
stack
page read and write
297D000
heap
page read and write
4E0D000
stack
page read and write
654000
heap
page read and write
40FE000
stack
page read and write
54DE000
stack
page read and write
F5E000
heap
page read and write
654000
heap
page read and write
654000
heap
page read and write
5620000
heap
page read and write
51CE000
stack
page read and write
2977000
heap
page read and write
2950000
direct allocation
page execute and read and write
447F000
stack
page read and write
B81000
unkown
page execute and write copy
703B1000
unkown
page execute read
660000
heap
page read and write
2D7F000
stack
page read and write
860000
direct allocation
page read and write
FE2000
heap
page read and write
FB5000
heap
page read and write
433F000
stack
page read and write
860000
direct allocation
page read and write
703CF000
unkown
page readonly
3E3F000
stack
page read and write
FB7000
heap
page read and write
B71000
unkown
page execute and read and write
3BFE000
stack
page read and write
41FF000
stack
page read and write
860000
direct allocation
page read and write
2970000
heap
page read and write
654000
heap
page read and write
880000
unkown
page read and write
2E7F000
stack
page read and write
3FBE000
stack
page read and write
45C1000
heap
page read and write
860000
direct allocation
page read and write
45C1000
heap
page read and write
654000
heap
page read and write
860000
direct allocation
page read and write
537D000
stack
page read and write
55DF000
stack
page read and write
531D000
stack
page read and write
B41000
unkown
page execute and read and write
EF0000
heap
page read and write
650000
heap
page read and write
654000
heap
page read and write
B6A000
unkown
page execute and read and write
3BBF000
stack
page read and write
B81000
unkown
page execute and read and write
35BE000
stack
page read and write
654000
heap
page read and write
654000
heap
page read and write
3FB000
stack
page read and write
4CCE000
stack
page read and write
4BDD000
trusted library allocation
page read and write
654000
heap
page read and write
F5E000
heap
page read and write
10EF000
stack
page read and write
4B90000
direct allocation
page execute and read and write
547E000
stack
page read and write
31BF000
stack
page read and write
3ABE000
stack
page read and write
D1A000
unkown
page execute and read and write
28CE000
stack
page read and write
3A7F000
stack
page read and write
654000
heap
page read and write
45BF000
stack
page read and write
860000
direct allocation
page read and write
F50000
heap
page read and write
654000
heap
page read and write
45C1000
heap
page read and write
850000
heap
page read and write
37FF000
stack
page read and write
4D0E000
stack
page read and write
4B80000
direct allocation
page execute and read and write
290E000
stack
page read and write
654000
heap
page read and write
FE0000
heap
page read and write
343F000
stack
page read and write
437E000
stack
page read and write
44BE000
stack
page read and write
2C7F000
stack
page read and write
E9E000
stack
page read and write
45C1000
heap
page read and write
654000
heap
page read and write
7AE000
stack
page read and write
31FE000
stack
page read and write
F47000
heap
page read and write
3CFF000
stack
page read and write
FB1000
heap
page read and write
383E000
stack
page read and write
E5B000
stack
page read and write
F32000
heap
page read and write
FC0000
heap
page read and write
E1E000
stack
page read and write
4A40000
direct allocation
page read and write
4BA0000
direct allocation
page execute and read and write
860000
direct allocation
page read and write
30BE000
stack
page read and write
40BF000
stack
page read and write
EE0000
direct allocation
page read and write
654000
heap
page read and write
36FE000
stack
page read and write
880000
unkown
page readonly
654000
heap
page read and write
357F000
stack
page read and write
45C1000
heap
page read and write
50CD000
stack
page read and write
4E4E000
stack
page read and write
703C6000
unkown
page readonly
703B0000
unkown
page readonly
654000
heap
page read and write
654000
heap
page read and write
D1B000
unkown
page execute and write copy
703CD000
unkown
page read and write
4F4F000
stack
page read and write
4A7B000
stack
page read and write
F37000
heap
page read and write
2950000
heap
page read and write
860000
direct allocation
page read and write
FC8000
heap
page read and write
F50000
heap
page read and write
7EE000
stack
page read and write
3E7E000
stack
page read and write
4B90000
direct allocation
page execute and read and write
45C1000
heap
page read and write
347E000
stack
page read and write
4B90000
direct allocation
page execute and read and write
B82000
unkown
page execute and write copy
307F000
stack
page read and write
397E000
stack
page read and write
881000
unkown
page execute and write copy
333E000
stack
page read and write
860000
direct allocation
page read and write
4B90000
direct allocation
page execute and read and write
45D1000
heap
page read and write
45C0000
heap
page read and write
2FB000
stack
page read and write
654000
heap
page read and write
4B90000
remote allocation
page read and write
3D3E000
stack
page read and write
84E000
stack
page read and write
5630000
trusted library allocation
page read and write
46C0000
trusted library allocation
page read and write
There are 181 hidden memdumps, click here to show them.