IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_92fb6e2e-1bd9-4b91-8814-cd6295476d3d\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF61A.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 14 01:57:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF89C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8DB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 1904
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 1896

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
https://sergei-esenin.com/k
unknown
malicious
bathdoomgaz.store
malicious
https://sergei-esenin.com/apiF
unknown
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory
unknown
malicious
https://sergei-esenin.com/ll
unknown
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptacul
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/)
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.akam
unknown
https://store.steampowered.com/points/shop/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://steamcommunity.com/profiles/76561
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://www.cloudflare.com/learning/access-management/
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://spirittunek.store:443/apii%
unknown
https://steamcommunity.com/?subsection
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://dissapoiznw.store:443/api
unknown
https://steamcommunity.com/discussions/
unknown
https://steamcommunity.com/N
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://community.akamai.steam
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://licendfilteo.site/api
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://clearancek.site:443/api=
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valMr
unknown
https://clearancek.site/apin
unknown
https://clearancek.site:443/apii
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.com/publdq
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
There are 88 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{182dd7c9-519a-8d36-e1d9-31226353b399}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
341000
unkown
page execute and read and write
malicious
373E000
stack
page read and write
BA4000
heap
page read and write
4940000
remote allocation
page read and write
2BFE000
stack
page read and write
44C0000
heap
page read and write
624000
unkown
page execute and write copy
D35000
heap
page read and write
2720000
direct allocation
page read and write
7DB000
stack
page read and write
5AD000
unkown
page execute and read and write
CFE000
heap
page read and write
44C1000
heap
page read and write
34BE000
stack
page read and write
BA4000
heap
page read and write
44C1000
heap
page read and write
D82000
heap
page read and write
297E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
4CC8000
trusted library allocation
page read and write
55B000
unkown
page execute and write copy
4ADD000
stack
page read and write
333F000
stack
page read and write
D55000
heap
page read and write
427E000
stack
page read and write
44C1000
heap
page read and write
BA4000
heap
page read and write
B10000
heap
page read and write
B7E000
stack
page read and write
542000
unkown
page execute and read and write
DD0000
heap
page read and write
BA4000
heap
page read and write
44C1000
heap
page read and write
D6F000
heap
page read and write
D82000
heap
page read and write
510E000
stack
page read and write
270B000
stack
page read and write
DDD000
heap
page read and write
D53000
heap
page read and write
DD5000
heap
page read and write
4DD9000
trusted library allocation
page read and write
337E000
stack
page read and write
340000
unkown
page read and write
DAA000
heap
page read and write
341000
unkown
page execute and write copy
4DE7000
trusted library allocation
page read and write
3FFE000
stack
page read and write
2FBE000
stack
page read and write
59A000
unkown
page execute and write copy
586000
unkown
page execute and write copy
2720000
direct allocation
page read and write
527F000
stack
page read and write
D67000
heap
page read and write
540000
unkown
page execute and write copy
D29000
heap
page read and write
4AE000
unkown
page execute and write copy
4AD0000
direct allocation
page execute and read and write
5DC000
unkown
page execute and read and write
531000
unkown
page execute and write copy
BA4000
heap
page read and write
4940000
remote allocation
page read and write
4B00000
direct allocation
page execute and read and write
437F000
stack
page read and write
3D3F000
stack
page read and write
53A000
unkown
page execute and write copy
397F000
stack
page read and write
2720000
direct allocation
page read and write
44C1000
heap
page read and write
383F000
stack
page read and write
2720000
direct allocation
page read and write
2E3F000
stack
page read and write
4FCF000
stack
page read and write
BA0000
heap
page read and write
2710000
heap
page read and write
30BF000
stack
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
4B19000
trusted library allocation
page read and write
BA4000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
2720000
direct allocation
page read and write
4C4D000
stack
page read and write
4900000
heap
page read and write
DE6000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
648000
unkown
page execute and read and write
4AC0000
direct allocation
page execute and read and write
D72000
heap
page read and write
5E4000
unkown
page execute and write copy
2720000
direct allocation
page read and write
BA4000
heap
page read and write
D67000
heap
page read and write
533000
unkown
page execute and read and write
413E000
stack
page read and write
4950000
direct allocation
page read and write
293E000
stack
page read and write
BA4000
heap
page read and write
CFA000
heap
page read and write
2720000
direct allocation
page read and write
4950000
direct allocation
page read and write
2737000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
3AFE000
stack
page read and write
4E8F000
stack
page read and write
DAA000
heap
page read and write
44C1000
heap
page read and write
4A8E000
stack
page read and write
4D4D000
stack
page read and write
4DD2000
trusted library allocation
page read and write
639000
unkown
page execute and write copy
4DC4000
trusted library allocation
page read and write
2ABE000
stack
page read and write
502000
unkown
page execute and write copy
4940000
remote allocation
page read and write
528000
unkown
page execute and read and write
5F8000
unkown
page execute and read and write
551E000
stack
page read and write
BA4000
heap
page read and write
5BA000
unkown
page execute and write copy
3C3E000
stack
page read and write
607000
unkown
page execute and read and write
2BBF000
stack
page read and write
BA4000
heap
page read and write
568F000
stack
page read and write
44C1000
heap
page read and write
CF0000
heap
page read and write
347F000
stack
page read and write
633000
unkown
page execute and write copy
26CE000
stack
page read and write
2720000
direct allocation
page read and write
3A0000
unkown
page execute and read and write
51E000
unkown
page execute and read and write
3BFF000
stack
page read and write
BA4000
heap
page read and write
51D000
unkown
page execute and write copy
5B9000
unkown
page execute and read and write
D6F000
heap
page read and write
632000
unkown
page execute and read and write
2F7F000
stack
page read and write
36FF000
stack
page read and write
BA4000
heap
page read and write
30FE000
stack
page read and write
EEF000
stack
page read and write
DD7000
heap
page read and write
323E000
stack
page read and write
581000
unkown
page execute and write copy
BA4000
heap
page read and write
DE6000
heap
page read and write
2A7F000
stack
page read and write
528000
unkown
page execute and write copy
D2F000
heap
page read and write
D73000
heap
page read and write
BA4000
heap
page read and write
3FBF000
stack
page read and write
BA4000
heap
page read and write
632000
unkown
page execute and write copy
44BF000
stack
page read and write
4C0D000
stack
page read and write
3EBE000
stack
page read and write
3D7E000
stack
page read and write
39BE000
stack
page read and write
44C1000
heap
page read and write
31FF000
stack
page read and write
D3F000
heap
page read and write
2D3E000
stack
page read and write
DD3000
heap
page read and write
DD8000
heap
page read and write
2720000
direct allocation
page read and write
5DA000
unkown
page execute and write copy
58B000
unkown
page execute and read and write
53B000
unkown
page execute and read and write
4AD000
unkown
page execute and read and write
35BF000
stack
page read and write
3E7F000
stack
page read and write
D82000
heap
page read and write
498C000
stack
page read and write
340000
unkown
page readonly
5B4000
unkown
page execute and write copy
4950000
direct allocation
page read and write
CEE000
stack
page read and write
35FE000
stack
page read and write
59E000
unkown
page execute and read and write
2720000
direct allocation
page read and write
5BD000
unkown
page execute and read and write
53C0000
trusted library allocation
page read and write
283F000
stack
page read and write
5580000
heap
page read and write
500D000
stack
page read and write
BA4000
heap
page read and write
5C6000
unkown
page execute and read and write
6DB000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
5C4000
unkown
page execute and write copy
56E000
unkown
page execute and read and write
4AE0000
direct allocation
page execute and read and write
53C6000
trusted library allocation
page read and write
2720000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
517E000
stack
page read and write
2720000
direct allocation
page read and write
5BC000
unkown
page execute and write copy
53BE000
stack
page read and write
DCC000
heap
page read and write
2E7E000
stack
page read and write
BA4000
heap
page read and write
2720000
direct allocation
page read and write
A30000
heap
page read and write
5A8000
unkown
page execute and write copy
44C1000
heap
page read and write
2720000
direct allocation
page read and write
5BB000
unkown
page execute and read and write
3A0000
unkown
page execute and write copy
2730000
heap
page read and write
BA4000
heap
page read and write
45C0000
trusted library allocation
page read and write
CAE000
stack
page read and write
3ABF000
stack
page read and write
273D000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
4ECE000
stack
page read and write
DDD000
heap
page read and write
585000
unkown
page execute and read and write
51B000
unkown
page execute and read and write
4FF000
unkown
page execute and read and write
DC9000
heap
page read and write
43BE000
stack
page read and write
DCB000
heap
page read and write
53C000
unkown
page execute and write copy
423F000
stack
page read and write
387E000
stack
page read and write
DE6000
heap
page read and write
649000
unkown
page execute and write copy
648000
unkown
page execute and write copy
5E5000
unkown
page execute and read and write
DE6000
heap
page read and write
4D8D000
stack
page read and write
2CFF000
stack
page read and write
52BE000
stack
page read and write
3AC000
unkown
page execute and write copy
639000
unkown
page execute and write copy
5F7000
unkown
page execute and write copy
53D000
unkown
page execute and read and write
40FF000
stack
page read and write
There are 239 hidden memdumps, click here to show them.