IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_2f26e4b65edfc9809a16d7533fcfcfa7c28d99cc_852b229c_6a2bb52a-8ce2-4c81-ac10-6151ce28c804\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA12D.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 14 04:52:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA787.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA814.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 1924
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6988 -s 1936

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
https://sergei-esenin.com/0
unknown
malicious
https://sergei-esenin.com/apiA
unknown
malicious
bathdoomgaz.store
malicious
https://sergei-esenin.com/apirt.c
unknown
malicious
https://sergei-esenin.com/api0
unknown
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://sergei-esenin.com/C:
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://eaglepawnoy.store:443/apiP
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/learning/access-manag
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://dissapoiznw.store:443/api
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://clearancek.site:443/api
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://studennotediw.store:443/api
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
241.42.69.40.in-addr.arpa
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{e91c8de6-98e2-bd78-c7f6-f4ad81b75974}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
531000
unkown
page execute and read and write
malicious
35BF000
stack
page read and write
3C3E000
stack
page read and write
4A01000
heap
page read and write
514E000
stack
page read and write
7C8000
unkown
page execute and write copy
7F3000
unkown
page execute and read and write
423F000
stack
page read and write
49F0000
direct allocation
page read and write
12C7000
heap
page read and write
820000
unkown
page execute and write copy
4A01000
heap
page read and write
49F0000
direct allocation
page read and write
49F0000
direct allocation
page read and write
7C9000
unkown
page execute and read and write
464E000
stack
page read and write
49F0000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
5322000
trusted library allocation
page read and write
530000
unkown
page read and write
596F000
stack
page read and write
7A9000
unkown
page execute and read and write
488F000
stack
page read and write
7D1000
unkown
page execute and write copy
4A01000
heap
page read and write
5830000
trusted library allocation
page read and write
4A01000
heap
page read and write
1293000
heap
page read and write
51F7000
trusted library allocation
page read and write
4FCF000
stack
page read and write
538F000
stack
page read and write
70F000
unkown
page execute and write copy
12C7000
heap
page read and write
373E000
stack
page read and write
791000
unkown
page execute and write copy
2FBF000
stack
page read and write
4A01000
heap
page read and write
49F0000
direct allocation
page read and write
568E000
stack
page read and write
49F0000
direct allocation
page read and write
59B000
unkown
page execute and read and write
49F0000
direct allocation
page read and write
474F000
stack
page read and write
7A2000
unkown
page execute and write copy
10CE000
stack
page read and write
12D7000
heap
page read and write
76F000
unkown
page execute and write copy
43BE000
stack
page read and write
4A01000
heap
page read and write
3FBF000
stack
page read and write
554E000
stack
page read and write
1318000
heap
page read and write
49F0000
direct allocation
page read and write
72E000
unkown
page execute and write copy
78E000
unkown
page execute and write copy
3D7E000
stack
page read and write
120D000
stack
page read and write
2CB7000
heap
page read and write
2C2C000
stack
page read and write
501D000
stack
page read and write
4A01000
heap
page read and write
3E7F000
stack
page read and write
3ABF000
stack
page read and write
413E000
stack
page read and write
478E000
stack
page read and write
49D0000
heap
page read and write
3AFE000
stack
page read and write
39BE000
stack
page read and write
4E7D000
stack
page read and write
130D000
heap
page read and write
2CAE000
stack
page read and write
52F8000
trusted library allocation
page read and write
49F0000
direct allocation
page read and write
129E000
heap
page read and write
7AA000
unkown
page execute and write copy
825000
unkown
page execute and read and write
323E000
stack
page read and write
44BF000
stack
page read and write
7A1000
unkown
page execute and read and write
59A000
unkown
page execute and write copy
131D000
heap
page read and write
4B00000
trusted library allocation
page read and write
83A000
unkown
page execute and write copy
810000
unkown
page execute and write copy
82B000
unkown
page execute and write copy
82B000
unkown
page execute and write copy
124E000
stack
page read and write
1080000
heap
page read and write
4A00000
heap
page read and write
6F2000
unkown
page execute and read and write
5010000
direct allocation
page execute and read and write
347F000
stack
page read and write
125A000
heap
page read and write
1289000
heap
page read and write
427E000
stack
page read and write
49F0000
direct allocation
page read and write
144E000
stack
page read and write
49F0000
direct allocation
page read and write
4E90000
direct allocation
page read and write
741000
unkown
page execute and write copy
1332000
heap
page read and write
530000
unkown
page readonly
5020000
direct allocation
page execute and read and write
6F4000
unkown
page execute and write copy
5010000
direct allocation
page execute and read and write
1298000
heap
page read and write
820000
unkown
page execute and write copy
3FFD000
stack
page read and write
7D3000
unkown
page execute and read and write
54CF000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
12B3000
heap
page read and write
4A01000
heap
page read and write
437F000
stack
page read and write
460F000
stack
page read and write
1030000
heap
page read and write
4ECC000
stack
page read and write
1085000
heap
page read and write
590000
unkown
page execute and write copy
4E90000
direct allocation
page read and write
83A000
unkown
page execute and read and write
35FE000
stack
page read and write
718000
unkown
page execute and write copy
4A01000
heap
page read and write
704000
unkown
page execute and read and write
387E000
stack
page read and write
1250000
heap
page read and write
773000
unkown
page execute and read and write
52FB000
trusted library allocation
page read and write
5860000
heap
page read and write
531000
unkown
page execute and write copy
53CE000
stack
page read and write
5040000
direct allocation
page execute and read and write
4E90000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
778000
unkown
page execute and read and write
4FE0000
direct allocation
page execute and read and write
49F0000
direct allocation
page read and write
79F000
unkown
page execute and write copy
59C000
unkown
page execute and write copy
450E000
stack
page read and write
57FE000
stack
page read and write
4A01000
heap
page read and write
49F0000
direct allocation
page read and write
564F000
stack
page read and write
11CE000
stack
page read and write
4A01000
heap
page read and write
44C0000
heap
page read and write
1340000
heap
page read and write
12B3000
heap
page read and write
1326000
heap
page read and write
5313000
trusted library allocation
page read and write
2CB0000
heap
page read and write
36FF000
stack
page read and write
F50000
heap
page read and write
48CE000
stack
page read and write
4A01000
heap
page read and write
1340000
heap
page read and write
397F000
stack
page read and write
383F000
stack
page read and write
5010000
direct allocation
page execute and read and write
4A01000
heap
page read and write
3EBE000
stack
page read and write
49F0000
direct allocation
page read and write
4A01000
heap
page read and write
719000
unkown
page execute and read and write
130F000
heap
page read and write
337E000
stack
page read and write
54E0000
remote allocation
page read and write
786000
unkown
page execute and read and write
5010000
direct allocation
page execute and read and write
30BF000
stack
page read and write
31FF000
stack
page read and write
128F000
heap
page read and write
790000
unkown
page execute and read and write
774000
unkown
page execute and write copy
EFB000
stack
page read and write
780000
unkown
page execute and write copy
72F000
unkown
page execute and read and write
4A01000
heap
page read and write
578E000
stack
page read and write
54E0000
remote allocation
page read and write
5000000
direct allocation
page execute and read and write
129E000
heap
page read and write
792000
unkown
page execute and read and write
4A01000
heap
page read and write
5051000
trusted library allocation
page read and write
333F000
stack
page read and write
590000
unkown
page execute and read and write
2CBD000
heap
page read and write
2DBF000
stack
page read and write
5308000
trusted library allocation
page read and write
524D000
stack
page read and write
7B3000
unkown
page execute and read and write
3D3F000
stack
page read and write
54E0000
remote allocation
page read and write
4A01000
heap
page read and write
2C6E000
stack
page read and write
813000
unkown
page execute and write copy
2EBE000
stack
page read and write
3BFF000
stack
page read and write
4A01000
heap
page read and write
49CF000
stack
page read and write
BFB000
stack
page read and write
5010000
direct allocation
page execute and read and write
125E000
heap
page read and write
40FE000
stack
page read and write
528E000
stack
page read and write
826000
unkown
page execute and write copy
30FE000
stack
page read and write
70F000
unkown
page execute and read and write
34BE000
stack
page read and write
754000
unkown
page execute and read and write
There are 203 hidden memdumps, click here to show them.