IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.stor
malicious
spirittunek.stor
malicious
eaglepawnoy.stor
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://steamcommunity.com/profiles/765611997243319001
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=qu55UpguGheU&l=e
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://sergei-esenin.com:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
unknown
https://store.steampowered.com/about/
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sergei-esenin.com
104.21.53.8
malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
steamcommunity.com
104.102.49.254
eaglepawnoy.store
unknown
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
dissapoiznw.store
unknown

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
DA1000
unkown
page execute and read and write
malicious
464F000
stack
page read and write
A9E000
heap
page read and write
350E000
stack
page read and write
51AE000
stack
page read and write
506E000
stack
page read and write
884000
heap
page read and write
4BC000
stack
page read and write
A20000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
A20000
direct allocation
page read and write
820000
heap
page read and write
43CF000
stack
page read and write
A1E000
stack
page read and write
A50000
heap
page read and write
4D80000
direct allocation
page execute and read and write
884000
heap
page read and write
A20000
direct allocation
page read and write
4C10000
direct allocation
page read and write
3C4F000
stack
page read and write
870000
heap
page read and write
D8B000
stack
page read and write
884000
heap
page read and write
450F000
stack
page read and write
38CE000
stack
page read and write
1070000
unkown
page execute and read and write
884000
heap
page read and write
4890000
trusted library allocation
page read and write
A20000
direct allocation
page read and write
4791000
heap
page read and write
4791000
heap
page read and write
3F0E000
stack
page read and write
884000
heap
page read and write
338F000
stack
page read and write
4D50000
direct allocation
page execute and read and write
884000
heap
page read and write
53EE000
stack
page read and write
10B2000
unkown
page execute and write copy
884000
heap
page read and write
2ECE000
stack
page read and write
4D70000
direct allocation
page execute and read and write
884000
heap
page read and write
109A000
unkown
page execute and read and write
884000
heap
page read and write
4791000
heap
page read and write
4DB0000
trusted library allocation
page read and write
39CF000
stack
page read and write
5BD000
stack
page read and write
4791000
heap
page read and write
884000
heap
page read and write
A40000
direct allocation
page read and write
AEF000
heap
page read and write
884000
heap
page read and write
414F000
stack
page read and write
884000
heap
page read and write
ABF000
heap
page read and write
2B87000
heap
page read and write
A20000
direct allocation
page read and write
374F000
stack
page read and write
404E000
stack
page read and write
2AFF000
stack
page read and write
468E000
stack
page read and write
4791000
heap
page read and write
884000
heap
page read and write
428F000
stack
page read and write
10B3000
unkown
page execute and write copy
542E000
stack
page read and write
A20000
direct allocation
page read and write
42CE000
stack
page read and write
2FCF000
stack
page read and write
DA0000
unkown
page readonly
4BF0000
remote allocation
page read and write
9DE000
stack
page read and write
10B2000
unkown
page execute and read and write
4D70000
direct allocation
page execute and read and write
AE8000
heap
page read and write
AF0000
heap
page read and write
C4F000
stack
page read and write
314E000
stack
page read and write
502D000
stack
page read and write
F91000
unkown
page execute and read and write
4D60000
direct allocation
page execute and read and write
2B80000
heap
page read and write
300E000
stack
page read and write
884000
heap
page read and write
A20000
direct allocation
page read and write
4DA0000
direct allocation
page execute and read and write
884000
heap
page read and write
454E000
stack
page read and write
34CF000
stack
page read and write
388F000
stack
page read and write
D4F000
stack
page read and write
4790000
heap
page read and write
516E000
stack
page read and write
4791000
heap
page read and write
52ED000
stack
page read and write
4791000
heap
page read and write
884000
heap
page read and write
3ECE000
stack
page read and write
360F000
stack
page read and write
4791000
heap
page read and write
400F000
stack
page read and write
4F2E000
stack
page read and write
4BD0000
heap
page read and write
DA0000
unkown
page read and write
884000
heap
page read and write
880000
heap
page read and write
2B7E000
stack
page read and write
A20000
direct allocation
page read and write
A20000
direct allocation
page read and write
884000
heap
page read and write
328E000
stack
page read and write
33CE000
stack
page read and write
2D8F000
stack
page read and write
364E000
stack
page read and write
4D90000
direct allocation
page execute and read and write
884000
heap
page read and write
A20000
direct allocation
page read and write
884000
heap
page read and write
2E8F000
stack
page read and write
A87000
heap
page read and write
3C8E000
stack
page read and write
A20000
direct allocation
page read and write
4BF0000
remote allocation
page read and write
324F000
stack
page read and write
99E000
stack
page read and write
4BF0000
remote allocation
page read and write
4791000
heap
page read and write
A5E000
heap
page read and write
AB0000
heap
page read and write
552F000
stack
page read and write
884000
heap
page read and write
E00000
unkown
page execute and read and write
884000
heap
page read and write
884000
heap
page read and write
A93000
heap
page read and write
3DCE000
stack
page read and write
B36000
heap
page read and write
D90000
direct allocation
page execute and read and write
A8F000
heap
page read and write
10A3000
unkown
page execute and read and write
378E000
stack
page read and write
418E000
stack
page read and write
4D70000
direct allocation
page execute and read and write
A20000
direct allocation
page read and write
4D4F000
stack
page read and write
A40000
direct allocation
page read and write
4DED000
stack
page read and write
A20000
direct allocation
page read and write
4D70000
direct allocation
page execute and read and write
310F000
stack
page read and write
AD8000
heap
page read and write
AE5000
heap
page read and write
1252000
unkown
page execute and read and write
2B3E000
stack
page read and write
478F000
stack
page read and write
2C8F000
stack
page read and write
B41000
heap
page read and write
A5A000
heap
page read and write
3B4E000
stack
page read and write
4C4E000
stack
page read and write
884000
heap
page read and write
3B0F000
stack
page read and write
810000
heap
page read and write
440E000
stack
page read and write
52AF000
stack
page read and write
884000
heap
page read and write
ADB000
heap
page read and write
3D8F000
stack
page read and write
AD0000
heap
page read and write
A20000
direct allocation
page read and write
3A0E000
stack
page read and write
4EED000
stack
page read and write
4D70000
direct allocation
page execute and read and write
DA1000
unkown
page execute and write copy
There are 165 hidden memdumps, click here to show them.