IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5daac394a3f436a9cd33cf1dfc7575bd2793431_852b229c_b6832536-febd-4f40-8f1e-e18df67f50ac\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f1cc5b2e512f89f4cf16dd779fe2cb623cbd52_852b229c_0fa40af0-8a04-4bdb-bd9a-f587b97e2465\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8144.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 23:00:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER827D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER829E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6D8.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 14 00:47:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC7E3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC803.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 1888
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 1940

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://sergei-esenin.com:443/apiw
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://sergei-esenin.com:443/api
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://sergei-esenin.com/apij
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://sergei-esenin.com/api4
unknown
https://clearancek.site:443/api
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://spirittunek.store:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{1c8ad634-efaa-e039-7e49-737b5a6a9d63}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180011F3919FB4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
651000
unkown
page execute and read and write
malicious
1034000
heap
page read and write
47DE000
stack
page read and write
1034000
heap
page read and write
375F000
stack
page read and write
4FDE000
stack
page read and write
1034000
heap
page read and write
3DDE000
stack
page read and write
856000
unkown
page execute and read and write
4E60000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
1110000
direct allocation
page read and write
8CA000
unkown
page execute and write copy
515D000
stack
page read and write
3B5E000
stack
page read and write
3B1F000
stack
page read and write
11BE000
heap
page read and write
1110000
direct allocation
page read and write
11A5000
heap
page read and write
11B2000
heap
page read and write
1157000
heap
page read and write
1034000
heap
page read and write
928000
unkown
page execute and read and write
506A000
trusted library allocation
page read and write
1034000
heap
page read and write
8E2000
unkown
page execute and write copy
885000
unkown
page execute and write copy
2FDF000
stack
page read and write
365E000
stack
page read and write
651000
unkown
page execute and write copy
852000
unkown
page execute and read and write
469E000
stack
page read and write
1034000
heap
page read and write
5000000
direct allocation
page execute and read and write
115F000
heap
page read and write
429E000
stack
page read and write
56CE000
stack
page read and write
1110000
direct allocation
page read and write
8DD000
unkown
page execute and write copy
541E000
stack
page read and write
301E000
stack
page read and write
4A21000
heap
page read and write
11B9000
heap
page read and write
4EA0000
direct allocation
page read and write
4E90000
remote allocation
page read and write
5020000
direct allocation
page execute and read and write
329E000
stack
page read and write
5020000
direct allocation
page execute and read and write
112A000
heap
page read and write
2D5F000
stack
page read and write
8BF000
unkown
page execute and write copy
83D000
unkown
page execute and read and write
1110000
direct allocation
page read and write
315E000
stack
page read and write
519D000
stack
page read and write
4E90000
remote allocation
page read and write
1034000
heap
page read and write
131F000
stack
page read and write
5326000
trusted library allocation
page read and write
1034000
heap
page read and write
6BC000
unkown
page execute and write copy
11EF000
heap
page read and write
565D000
stack
page read and write
419E000
stack
page read and write
4EDC000
stack
page read and write
145F000
stack
page read and write
5020000
direct allocation
page execute and read and write
4E60000
heap
page read and write
11F8000
heap
page read and write
4A21000
heap
page read and write
5020000
direct allocation
page execute and read and write
502D000
stack
page read and write
491E000
stack
page read and write
1110000
direct allocation
page read and write
1034000
heap
page read and write
945000
unkown
page execute and write copy
1110000
direct allocation
page read and write
8FC000
unkown
page execute and write copy
4A21000
heap
page read and write
853000
unkown
page execute and write copy
339F000
stack
page read and write
11AB000
heap
page read and write
85E000
unkown
page execute and write copy
8A7000
unkown
page execute and write copy
325F000
stack
page read and write
592F000
stack
page read and write
3C9E000
stack
page read and write
1034000
heap
page read and write
52DE000
stack
page read and write
1030000
heap
page read and write
4A21000
heap
page read and write
441E000
stack
page read and write
11F3000
heap
page read and write
116E000
heap
page read and write
415E000
stack
page read and write
83E000
unkown
page execute and write copy
311F000
stack
page read and write
8AD000
unkown
page execute and write copy
389F000
stack
page read and write
401F000
stack
page read and write
1110000
direct allocation
page read and write
48DF000
stack
page read and write
11BE000
heap
page read and write
112E000
heap
page read and write
11BE000
heap
page read and write
1110000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
1181000
heap
page read and write
3C5F000
stack
page read and write
70490000
unkown
page readonly
6BB000
unkown
page execute and read and write
1163000
heap
page read and write
42DE000
stack
page read and write
704AF000
unkown
page readonly
83F000
unkown
page execute and read and write
2C3E000
stack
page read and write
4A20000
heap
page read and write
1034000
heap
page read and write
135E000
stack
page read and write
3F1E000
stack
page read and write
704A6000
unkown
page readonly
11B9000
heap
page read and write
650000
unkown
page read and write
4EA0000
direct allocation
page read and write
361F000
stack
page read and write
4A21000
heap
page read and write
F90000
heap
page read and write
11F0000
heap
page read and write
529D000
stack
page read and write
11B0000
heap
page read and write
96E000
unkown
page execute and write copy
351E000
stack
page read and write
955000
unkown
page execute and write copy
5020000
direct allocation
page execute and read and write
704AD000
unkown
page read and write
84B000
unkown
page execute and read and write
4A21000
heap
page read and write
5040000
direct allocation
page execute and read and write
879000
unkown
page execute and write copy
8B1000
unkown
page execute and read and write
864000
unkown
page execute and read and write
5328000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
555D000
stack
page read and write
2C57000
heap
page read and write
53DF000
stack
page read and write
379E000
stack
page read and write
E3B000
stack
page read and write
8FD000
unkown
page execute and read and write
1110000
direct allocation
page read and write
957000
unkown
page execute and write copy
4A21000
heap
page read and write
84B000
unkown
page execute and write copy
405E000
stack
page read and write
F80000
heap
page read and write
1184000
heap
page read and write
90D000
unkown
page execute and read and write
95F000
unkown
page execute and write copy
956000
unkown
page execute and read and write
4E90000
remote allocation
page read and write
1034000
heap
page read and write
96D000
unkown
page execute and write copy
70491000
unkown
page execute read
11AB000
heap
page read and write
8C3000
unkown
page execute and read and write
1034000
heap
page read and write
90B000
unkown
page execute and write copy
551F000
stack
page read and write
1110000
direct allocation
page read and write
11B2000
heap
page read and write
F3B000
stack
page read and write
1110000
direct allocation
page read and write
650000
unkown
page readonly
6BA000
unkown
page execute and write copy
522C000
trusted library allocation
page read and write
465F000
stack
page read and write
534D000
trusted library allocation
page read and write
479F000
stack
page read and write
5990000
heap
page read and write
1034000
heap
page read and write
5340000
trusted library allocation
page read and write
823000
unkown
page execute and write copy
2E9E000
stack
page read and write
6B0000
unkown
page execute and read and write
8EB000
unkown
page execute and read and write
1201000
heap
page read and write
1020000
heap
page read and write
33DE000
stack
page read and write
1034000
heap
page read and write
4A30000
heap
page read and write
4A1F000
stack
page read and write
3A1E000
stack
page read and write
3D9F000
stack
page read and write
5336000
trusted library allocation
page read and write
39DF000
stack
page read and write
821000
unkown
page execute and read and write
2D9C000
stack
page read and write
1034000
heap
page read and write
96D000
unkown
page execute and read and write
5010000
direct allocation
page execute and read and write
4A21000
heap
page read and write
34DF000
stack
page read and write
1034000
heap
page read and write
38DE000
stack
page read and write
1120000
heap
page read and write
451F000
stack
page read and write
4A21000
heap
page read and write
1110000
direct allocation
page read and write
1034000
heap
page read and write
1196000
heap
page read and write
1034000
heap
page read and write
2C5D000
heap
page read and write
6B0000
unkown
page execute and write copy
1034000
heap
page read and write
582E000
stack
page read and write
57CF000
stack
page read and write
1110000
direct allocation
page read and write
87B000
unkown
page execute and read and write
FFE000
stack
page read and write
892000
unkown
page execute and read and write
1034000
heap
page read and write
8E1000
unkown
page execute and read and write
947000
unkown
page execute and write copy
11A1000
heap
page read and write
955000
unkown
page execute and write copy
1110000
direct allocation
page read and write
2EDE000
stack
page read and write
1034000
heap
page read and write
8AC000
unkown
page execute and read and write
11AB000
heap
page read and write
95F000
unkown
page execute and write copy
1034000
heap
page read and write
850000
unkown
page execute and write copy
8DA000
unkown
page execute and write copy
8CB000
unkown
page execute and read and write
2C50000
heap
page read and write
8DC000
unkown
page execute and read and write
455E000
stack
page read and write
1034000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
11B2000
heap
page read and write
3EDF000
stack
page read and write
43DF000
stack
page read and write
5050000
direct allocation
page execute and read and write
1034000
heap
page read and write
There are 235 hidden memdumps, click here to show them.