IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://store.steampoweK;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstati#
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.c
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://sergei-esenin.com/apilG
unknown
https://steam.tv/
unknown
https://store.ste
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://sergei-esenin.com/Ap:
unknown
https://community.akamai.steamstatic.com/public/images/skin
unknown
https://store.r
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.akam
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.akamai
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/learning/access
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://store.steampowered.com/B
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://sergei-esenin.com/apim
unknown
https://sergei-esenin.com/apin
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://community.akamai.steamstatic.com-
unknown
https://store.steampowered.com/stat
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geon
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://sergei-esenin.com/nb
unknown
https://store.k;
unknown
http://store.steampowered.com/subscriber_agree
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://steamcommunity.c
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1C1000
unkown
page execute and read and write
malicious
3E7E000
stack
page read and write
AA3000
heap
page read and write
2DFF000
stack
page read and write
984000
heap
page read and write
4B4000
unkown
page execute and write copy
47D0000
direct allocation
page read and write
4B40000
trusted library allocation
page read and write
55B000
stack
page read and write
25B7000
heap
page read and write
398000
unkown
page execute and read and write
4A8D000
stack
page read and write
3A9000
unkown
page execute and write copy
47C0000
remote allocation
page read and write
984000
heap
page read and write
AE1000
heap
page read and write
984000
heap
page read and write
4920000
direct allocation
page execute and read and write
3BB000
unkown
page execute and read and write
36FE000
stack
page read and write
5B0000
heap
page read and write
433000
unkown
page execute and write copy
4BCC000
stack
page read and write
4341000
heap
page read and write
4C5000
unkown
page execute and write copy
4950000
direct allocation
page execute and read and write
3AB000
unkown
page execute and write copy
3FBE000
stack
page read and write
409000
unkown
page execute and write copy
2A3F000
stack
page read and write
984000
heap
page read and write
4AF000
unkown
page execute and write copy
984000
heap
page read and write
30BE000
stack
page read and write
3F9000
unkown
page execute and write copy
36BF000
stack
page read and write
B24000
heap
page read and write
513E000
stack
page read and write
B37000
heap
page read and write
429000
unkown
page execute and read and write
C5F000
stack
page read and write
B32000
heap
page read and write
984000
heap
page read and write
254E000
stack
page read and write
25A0000
direct allocation
page read and write
AAE000
heap
page read and write
523F000
stack
page read and write
4AE000
unkown
page execute and read and write
4341000
heap
page read and write
377000
unkown
page execute and read and write
47C0000
remote allocation
page read and write
495D000
stack
page read and write
4C0E000
stack
page read and write
258C000
stack
page read and write
4950000
direct allocation
page execute and read and write
A6E000
heap
page read and write
B2C000
heap
page read and write
984000
heap
page read and write
22C000
unkown
page execute and write copy
8FB000
stack
page read and write
3D1000
unkown
page execute and write copy
4950000
direct allocation
page execute and read and write
401000
unkown
page execute and read and write
984000
heap
page read and write
220000
unkown
page execute and write copy
2CBF000
stack
page read and write
28FF000
stack
page read and write
4C65000
trusted library allocation
page read and write
AEA000
heap
page read and write
B4C000
heap
page read and write
39E000
unkown
page execute and write copy
3ABE000
stack
page read and write
B20000
heap
page read and write
47D0000
direct allocation
page read and write
4341000
heap
page read and write
40E000
unkown
page execute and read and write
383E000
stack
page read and write
3BC000
unkown
page execute and write copy
529E000
stack
page read and write
984000
heap
page read and write
984000
heap
page read and write
4341000
heap
page read and write
25A0000
direct allocation
page read and write
47D0000
direct allocation
page read and write
44C000
unkown
page execute and read and write
32FF000
stack
page read and write
424000
unkown
page execute and read and write
47C0000
remote allocation
page read and write
4D4E000
stack
page read and write
984000
heap
page read and write
4C4000
unkown
page execute and read and write
2BBE000
stack
page read and write
B28000
heap
page read and write
31BF000
stack
page read and write
B3B000
heap
page read and write
3E3F000
stack
page read and write
984000
heap
page read and write
4FDE000
stack
page read and write
A60000
heap
page read and write
984000
heap
page read and write
4780000
heap
page read and write
37FF000
stack
page read and write
984000
heap
page read and write
704A0000
unkown
page readonly
4E8E000
stack
page read and write
B2C000
heap
page read and write
25A0000
direct allocation
page read and write
2E3E000
stack
page read and write
480C000
stack
page read and write
4B4000
unkown
page execute and write copy
2590000
heap
page read and write
27FE000
stack
page read and write
4340000
heap
page read and write
4ACD000
stack
page read and write
393F000
stack
page read and write
39E000
unkown
page execute and read and write
220000
unkown
page execute and read and write
47D000
unkown
page execute and read and write
4950000
direct allocation
page execute and read and write
3F7F000
stack
page read and write
4341000
heap
page read and write
25A0000
direct allocation
page read and write
433F000
stack
page read and write
3D5000
unkown
page execute and write copy
4C4E000
trusted library allocation
page read and write
3BFE000
stack
page read and write
3FC000
unkown
page execute and write copy
4C56000
trusted library allocation
page read and write
25A0000
direct allocation
page read and write
984000
heap
page read and write
984000
heap
page read and write
460000
unkown
page execute and read and write
41FF000
stack
page read and write
421000
unkown
page execute and write copy
25A0000
direct allocation
page read and write
4D0F000
stack
page read and write
25A0000
direct allocation
page read and write
704A1000
unkown
page execute read
42C000
unkown
page execute and read and write
31FE000
stack
page read and write
984000
heap
page read and write
4A0000
unkown
page execute and write copy
4AC000
unkown
page execute and write copy
40BF000
stack
page read and write
1C1000
unkown
page execute and write copy
1C0000
unkown
page readonly
4341000
heap
page read and write
984000
heap
page read and write
45A000
unkown
page execute and write copy
4950000
direct allocation
page execute and read and write
704BF000
unkown
page readonly
3A7F000
stack
page read and write
2F7E000
stack
page read and write
2B7F000
stack
page read and write
4930000
direct allocation
page execute and read and write
984000
heap
page read and write
4341000
heap
page read and write
4C42000
trusted library allocation
page read and write
393000
unkown
page execute and read and write
25A0000
direct allocation
page read and write
AC0000
heap
page read and write
4AC000
unkown
page execute and write copy
984000
heap
page read and write
2CFE000
stack
page read and write
4440000
trusted library allocation
page read and write
44B000
unkown
page execute and write copy
3D4000
unkown
page execute and read and write
B4C000
heap
page read and write
2F3F000
stack
page read and write
3E5000
unkown
page execute and read and write
984000
heap
page read and write
25A0000
direct allocation
page read and write
704BD000
unkown
page read and write
B2D000
heap
page read and write
425000
unkown
page execute and write copy
97E000
stack
page read and write
3FB000
unkown
page execute and read and write
3D3E000
stack
page read and write
D5E000
stack
page read and write
4C4000
unkown
page execute and write copy
4350000
heap
page read and write
4C3F000
trusted library allocation
page read and write
4940000
direct allocation
page execute and read and write
2A7E000
stack
page read and write
B3E000
heap
page read and write
397000
unkown
page execute and write copy
43D000
unkown
page execute and write copy
25BD000
heap
page read and write
25A0000
direct allocation
page read and write
42A000
unkown
page execute and write copy
25B0000
heap
page read and write
ADC000
heap
page read and write
704B6000
unkown
page readonly
43F000
unkown
page execute and read and write
490F000
stack
page read and write
25A0000
direct allocation
page read and write
35BE000
stack
page read and write
293E000
stack
page read and write
984000
heap
page read and write
B28000
heap
page read and write
4950000
direct allocation
page execute and read and write
423E000
stack
page read and write
4F8E000
stack
page read and write
984000
heap
page read and write
25A0000
direct allocation
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
B24000
heap
page read and write
984000
heap
page read and write
3BA000
unkown
page execute and write copy
25A0000
direct allocation
page read and write
3AA000
unkown
page execute and read and write
A97000
heap
page read and write
220000
unkown
page execute and write copy
3CFF000
stack
page read and write
ACC000
heap
page read and write
53A0000
heap
page read and write
4980000
direct allocation
page execute and read and write
347E000
stack
page read and write
343F000
stack
page read and write
333E000
stack
page read and write
435000
unkown
page execute and read and write
984000
heap
page read and write
379000
unkown
page execute and write copy
397E000
stack
page read and write
50DD000
stack
page read and write
49D000
unkown
page execute and write copy
B4C000
heap
page read and write
25A0000
direct allocation
page read and write
499B000
trusted library allocation
page read and write
980000
heap
page read and write
1C0000
unkown
page read and write
3AC000
unkown
page execute and read and write
539F000
stack
page read and write
4960000
direct allocation
page execute and read and write
4341000
heap
page read and write
A9F000
heap
page read and write
40FE000
stack
page read and write
5C0000
heap
page read and write
3BD000
unkown
page execute and read and write
A6A000
heap
page read and write
4E4F000
stack
page read and write
93E000
stack
page read and write
307F000
stack
page read and write
27BF000
stack
page read and write
357F000
stack
page read and write
4970000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
26BF000
stack
page read and write
There are 239 hidden memdumps, click here to show them.