IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_f5b4a6202a53ee73c263cc4c99e711b13cd935ac_85207d7d_60a13b95-4b9d-48c6-9f21-7624c89f66a0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3470.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3490.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER24A0.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7576 -s 1940

URLs

Name
IP
Malicious
https://sergei-esenin.com/
unknown
malicious
https://sergei-esenin.com/apiM
unknown
malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://sergei-esenin.com/LOu
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
https://sergei-esenin.com:443/apifiles/76561199724331900
unknown
malicious
https://sergei-esenin.com:443/api
unknown
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://store.steampowU)
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://licendfilteo.site:443/apid
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://steamcommunity.com/workshop/
unknown
https://eaglepawnoy.store:443/api
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://upx.sf.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://www.cloudflare.com/learning/access-manMV
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://www.cloudflare.com/learning/access-man
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://www.cloudflare.com/5xx-errop
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://store.steampowered.com/about/
unknown
https://studennotediw.store:443/api:
unknown
There are 75 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{b2517614-415f-6cd4-7d68-a04c1f0f5489}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
AA1000
unkown
page execute and read and write
malicious
388E000
stack
page read and write
338E000
stack
page read and write
CBB000
unkown
page execute and read and write
12D4000
heap
page read and write
14AF000
stack
page read and write
55EE000
stack
page read and write
D18000
unkown
page execute and write copy
546F000
stack
page read and write
3ACF000
stack
page read and write
1100000
direct allocation
page read and write
5BFA000
trusted library allocation
page read and write
3B0E000
stack
page read and write
73D0F000
unkown
page readonly
310E000
stack
page read and write
50E0000
direct allocation
page execute and read and write
CBA000
unkown
page execute and write copy
10FB000
stack
page read and write
4B11000
heap
page read and write
D21000
unkown
page execute and read and write
12D4000
heap
page read and write
39CE000
stack
page read and write
2EA0000
direct allocation
page execute and read and write
398F000
stack
page read and write
5C00000
trusted library allocation
page read and write
4B11000
heap
page read and write
5BE0000
trusted library allocation
page read and write
CE6000
unkown
page execute and write copy
12D4000
heap
page read and write
4B11000
heap
page read and write
DF0000
heap
page read and write
D3B000
unkown
page execute and write copy
1190000
heap
page read and write
2EC0000
heap
page read and write
1100000
direct allocation
page read and write
1100000
direct allocation
page read and write
4F90000
direct allocation
page read and write
12D4000
heap
page read and write
CCE000
unkown
page execute and read and write
1200000
heap
page read and write
384F000
stack
page read and write
C7E000
unkown
page execute and write copy
1209000
heap
page read and write
117D000
heap
page read and write
450E000
stack
page read and write
73D06000
unkown
page readonly
12D4000
heap
page read and write
424F000
stack
page read and write
2E90000
direct allocation
page execute and read and write
2ECD000
heap
page read and write
D02000
unkown
page execute and read and write
3E8F000
stack
page read and write
CEC000
unkown
page execute and read and write
73CF0000
unkown
page readonly
12B0000
heap
page read and write
C9C000
unkown
page execute and read and write
4B0F000
stack
page read and write
DAA000
unkown
page execute and read and write
D2C000
unkown
page execute and read and write
1100000
direct allocation
page read and write
4B11000
heap
page read and write
A00000
heap
page read and write
428E000
stack
page read and write
C6C000
unkown
page execute and write copy
1120000
direct allocation
page read and write
12D4000
heap
page read and write
589D000
stack
page read and write
12D4000
heap
page read and write
5BDF000
stack
page read and write
2EB0000
direct allocation
page execute and read and write
116D000
heap
page read and write
11BD000
heap
page read and write
12D4000
heap
page read and write
11AF000
heap
page read and write
A10000
heap
page read and write
1100000
direct allocation
page read and write
348F000
stack
page read and write
4B11000
heap
page read and write
51ED000
stack
page read and write
D6B000
unkown
page execute and read and write
2EA0000
direct allocation
page execute and read and write
2EA0000
direct allocation
page execute and read and write
3ECE000
stack
page read and write
C9B000
unkown
page execute and write copy
59FE000
stack
page read and write
573D000
stack
page read and write
2D4E000
stack
page read and write
11BD000
heap
page read and write
12C0000
direct allocation
page execute and read and write
48CE000
stack
page read and write
12D4000
heap
page read and write
583E000
stack
page read and write
1100000
direct allocation
page read and write
5BEB000
trusted library allocation
page read and write
12D4000
heap
page read and write
478E000
stack
page read and write
2EA0000
direct allocation
page execute and read and write
44CF000
stack
page read and write
CFE000
unkown
page execute and write copy
C7C000
unkown
page execute and read and write
4F50000
trusted library allocation
page read and write
52AB000
trusted library allocation
page read and write
B0A000
unkown
page execute and write copy
C6A000
unkown
page execute and read and write
1100000
direct allocation
page read and write
126E000
stack
page read and write
4B11000
heap
page read and write
12D4000
heap
page read and write
1208000
heap
page read and write
374E000
stack
page read and write
1100000
direct allocation
page read and write
360E000
stack
page read and write
D95000
unkown
page execute and read and write
A7E000
stack
page read and write
53C0000
trusted library allocation
page read and write
50FC000
trusted library allocation
page read and write
334F000
stack
page read and write
4A0E000
stack
page read and write
113A000
heap
page read and write
D80000
unkown
page execute and write copy
532D000
stack
page read and write
460F000
stack
page read and write
4FCC000
stack
page read and write
D0F000
unkown
page execute and read and write
3FCF000
stack
page read and write
9AB000
stack
page read and write
12D4000
heap
page read and write
2EA0000
direct allocation
page execute and read and write
3D8E000
stack
page read and write
1130000
heap
page read and write
2FCE000
stack
page read and write
D0B000
unkown
page execute and read and write
410F000
stack
page read and write
73D0D000
unkown
page read and write
B0C000
unkown
page execute and write copy
12D4000
heap
page read and write
B0B000
unkown
page execute and read and write
12D4000
heap
page read and write
C88000
unkown
page execute and write copy
1100000
direct allocation
page read and write
2EA0000
remote allocation
page read and write
D95000
unkown
page execute and write copy
12D4000
heap
page read and write
35CF000
stack
page read and write
B00000
unkown
page execute and read and write
1168000
heap
page read and write
D0A000
unkown
page execute and write copy
DAB000
unkown
page execute and write copy
12B0000
direct allocation
page execute and read and write
2EA0000
remote allocation
page read and write
73CF1000
unkown
page execute read
CC4000
unkown
page execute and write copy
414E000
stack
page read and write
2EC7000
heap
page read and write
1175000
heap
page read and write
370F000
stack
page read and write
53CD000
trusted library allocation
page read and write
12D4000
heap
page read and write
53B8000
trusted library allocation
page read and write
12D4000
heap
page read and write
43CE000
stack
page read and write
CED000
unkown
page execute and write copy
DAA000
unkown
page execute and write copy
488F000
stack
page read and write
536E000
stack
page read and write
12D4000
heap
page read and write
1170000
heap
page read and write
1120000
direct allocation
page read and write
4B20000
heap
page read and write
1100000
direct allocation
page read and write
2EA0000
remote allocation
page read and write
D0C000
unkown
page execute and write copy
DEE000
stack
page read and write
55AE000
stack
page read and write
4B11000
heap
page read and write
CCB000
unkown
page execute and read and write
522D000
stack
page read and write
CF2000
unkown
page execute and read and write
12D4000
heap
page read and write
1100000
direct allocation
page read and write
4F8D000
stack
page read and write
D87000
unkown
page execute and write copy
D9D000
unkown
page execute and write copy
12D4000
heap
page read and write
12D4000
heap
page read and write
AA1000
unkown
page execute and write copy
3C0F000
stack
page read and write
4B11000
heap
page read and write
D9D000
unkown
page execute and write copy
11BD000
heap
page read and write
1100000
direct allocation
page read and write
320F000
stack
page read and write
1100000
direct allocation
page read and write
599E000
stack
page read and write
AA0000
unkown
page readonly
2E4F000
stack
page read and write
C89000
unkown
page execute and read and write
324E000
stack
page read and write
400E000
stack
page read and write
113E000
heap
page read and write
54AD000
stack
page read and write
AA0000
unkown
page read and write
12D4000
heap
page read and write
1100000
direct allocation
page read and write
56EE000
stack
page read and write
11A5000
heap
page read and write
1193000
heap
page read and write
C7F000
unkown
page execute and read and write
11E8000
heap
page read and write
D96000
unkown
page execute and write copy
D3C000
unkown
page execute and read and write
438F000
stack
page read and write
B00000
unkown
page execute and write copy
3C4E000
stack
page read and write
4B11000
heap
page read and write
D28000
unkown
page execute and write copy
11F3000
heap
page read and write
12D4000
heap
page read and write
D81000
unkown
page execute and read and write
30CF000
stack
page read and write
12D4000
heap
page read and write
53AA000
trusted library allocation
page read and write
12D4000
heap
page read and write
50CE000
stack
page read and write
5AD0000
heap
page read and write
CCC000
unkown
page execute and write copy
4B10000
heap
page read and write
12D0000
heap
page read and write
12AC000
stack
page read and write
50D0000
direct allocation
page execute and read and write
2EA0000
direct allocation
page execute and read and write
34CE000
stack
page read and write
49CF000
stack
page read and write
3D4F000
stack
page read and write
474F000
stack
page read and write
2E8E000
stack
page read and write
464E000
stack
page read and write
There are 227 hidden memdumps, click here to show them.