IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C0e3d185a3e106e7
unknown
https://www.cloudflare.com/learning/acces
unknown
https://community.steamstatic.com/public/javascript/promo/stickers.js?v=W8NP8aTVqtms&l=english
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://mobbipenju.store:443/apibcryptPrimitives.dll%
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://sergei-esenin.com/
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.steamsta
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://sergei-esenin.com:443/api~
unknown
https://www.cloudflare.com/5
unknown
https://community.steamstu
unknown
https://s.ytimg.com;
unknown
https://eaglepawnoy.store:443/apiG
unknown
https://steam.tv/
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/profilev2.css?v=t9xiI4DlPpEB&l=english
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a619$e
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.steamstatic.com/public/javascript/applications/community/main.js?v=4XouecKy8sZy&am
unknown
https://community.steamstatic.com/public/shared/css/sh
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://sergei-esenin.com:443/api
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://store.steampowered.com/;
unknown
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://community.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.steamstatic.com/public/javascript/applications/community/manifest.js?v=r7a4-LYcQOj
unknown
https://sergei-esenin.com/apiU
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://sergei-esenin.com/5L
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.steamstatic.com/
unknown
https://community.steamstatic.com/public/css/applications/community/main.css?v=DVae4t4RZiHA&l=en
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.steam
unknown
https://community.steamstatic.
unknown
https://community.steamstatic.com/public/javascript/profile.js?v=bbs9uq0gqJ-H&l=english
unknown
https://community.steamstatic.com/public/css/skin_1/header.css?v=pTvrRy1pm52p&l=english
unknown
https://licendfilteo.site:443/api8
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/javascript/shared_global.js?v=7glT1n_nkVCs&l=eng
unknown
https://studennotediw.store:443/api
unknown
http://127.0.0.1:27060
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://clearancek.site:443/apif
unknown
https://community.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=english
unknown
https://sergei-esenin.com/apiin
unknown
https://community.steamstatic.com/public/javascript/webui/clientcom.js?v=jq1jQyX1843y&l=english
unknown
https://community.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&l=engl
unknown
https://community.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
551000
unkown
page execute and read and write
malicious
D14000
heap
page read and write
D02000
heap
page read and write
447F000
stack
page read and write
277B000
heap
page read and write
D1A000
heap
page read and write
30BE000
stack
page read and write
4A40000
direct allocation
page execute and read and write
4481000
heap
page read and write
774000
unkown
page execute and read and write
827000
unkown
page execute and write copy
829000
unkown
page execute and write copy
73D000
unkown
page execute and read and write
40BF000
stack
page read and write
837000
unkown
page execute and read and write
50DD000
stack
page read and write
4481000
heap
page read and write
273E000
stack
page read and write
2740000
direct allocation
page read and write
4D57000
trusted library allocation
page read and write
31FE000
stack
page read and write
48FD000
stack
page read and write
7BA000
unkown
page execute and write copy
CB1000
heap
page read and write
4DEE000
stack
page read and write
C66000
heap
page read and write
7C9000
unkown
page execute and write copy
2DFF000
stack
page read and write
795000
unkown
page execute and write copy
5B0000
unkown
page execute and write copy
48C0000
trusted library allocation
page read and write
2740000
direct allocation
page read and write
4481000
heap
page read and write
CB1000
heap
page read and write
2760000
direct allocation
page read and write
508E000
stack
page read and write
4A70000
direct allocation
page execute and read and write
C00000
heap
page read and write
4A7E000
stack
page read and write
31BF000
stack
page read and write
83F000
unkown
page execute and write copy
2740000
direct allocation
page read and write
4F8D000
stack
page read and write
4AB9000
trusted library allocation
page read and write
7E8000
unkown
page execute and read and write
73B000
unkown
page execute and write copy
780000
unkown
page execute and read and write
2A7F000
stack
page read and write
3F7F000
stack
page read and write
D19000
heap
page read and write
4C61000
trusted library allocation
page read and write
4481000
heap
page read and write
C6A000
heap
page read and write
4D5B000
trusted library allocation
page read and write
333E000
stack
page read and write
CAF000
heap
page read and write
4D66000
trusted library allocation
page read and write
716000
unkown
page execute and read and write
2740000
direct allocation
page read and write
4481000
heap
page read and write
7A3000
unkown
page execute and read and write
809000
unkown
page execute and read and write
D10000
heap
page read and write
4480000
heap
page read and write
CE1000
heap
page read and write
423E000
stack
page read and write
7AC000
unkown
page execute and write copy
357F000
stack
page read and write
539E000
stack
page read and write
84C000
unkown
page execute and read and write
960000
heap
page read and write
D02000
heap
page read and write
4481000
heap
page read and write
727000
unkown
page execute and read and write
C85000
heap
page read and write
4481000
heap
page read and write
2777000
heap
page read and write
7E4000
unkown
page execute and write copy
3D3E000
stack
page read and write
4481000
heap
page read and write
2740000
direct allocation
page read and write
307F000
stack
page read and write
84C000
unkown
page execute and write copy
2740000
direct allocation
page read and write
52E000
stack
page read and write
836000
unkown
page execute and write copy
3BFE000
stack
page read and write
4481000
heap
page read and write
798000
unkown
page execute and read and write
D0B000
heap
page read and write
C2E000
heap
page read and write
836000
unkown
page execute and write copy
523E000
stack
page read and write
40FE000
stack
page read and write
4F2F000
stack
page read and write
D15000
heap
page read and write
5560000
trusted library allocation
page read and write
2740000
direct allocation
page read and write
C6F000
heap
page read and write
C85000
heap
page read and write
4481000
heap
page read and write
3CFF000
stack
page read and write
CA8000
heap
page read and write
51DE000
stack
page read and write
2740000
direct allocation
page read and write
4CAD000
stack
page read and write
533F000
stack
page read and write
4CEE000
stack
page read and write
746000
unkown
page execute and write copy
74C000
unkown
page execute and read and write
397E000
stack
page read and write
CB6000
heap
page read and write
965000
heap
page read and write
9F0000
heap
page read and write
C6F000
heap
page read and write
4481000
heap
page read and write
838000
unkown
page execute and write copy
41FF000
stack
page read and write
CBA000
heap
page read and write
297F000
stack
page read and write
D04000
heap
page read and write
79F000
unkown
page execute and write copy
2E3E000
stack
page read and write
789000
unkown
page execute and write copy
4B0000
heap
page read and write
4E2E000
stack
page read and write
4A60000
direct allocation
page execute and read and write
E1E000
stack
page read and write
C60000
heap
page read and write
393F000
stack
page read and write
4A70000
direct allocation
page execute and read and write
37FF000
stack
page read and write
792000
unkown
page execute and write copy
762000
unkown
page execute and write copy
2B7F000
stack
page read and write
3FBE000
stack
page read and write
D0A000
heap
page read and write
C59000
heap
page read and write
9EB000
stack
page read and write
347E000
stack
page read and write
D0A000
heap
page read and write
95E000
stack
page read and write
4A70000
direct allocation
page execute and read and write
433F000
stack
page read and write
CB6000
heap
page read and write
CAF000
heap
page read and write
3BBF000
stack
page read and write
3A7F000
stack
page read and write
45B000
stack
page read and write
CE1000
heap
page read and write
550000
unkown
page readonly
3E3F000
stack
page read and write
9AE000
stack
page read and write
82B000
unkown
page execute and write copy
C59000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4C0000
heap
page read and write
C6A000
heap
page read and write
4A3F000
stack
page read and write
D19000
heap
page read and write
35BE000
stack
page read and write
383E000
stack
page read and write
4481000
heap
page read and write
32FF000
stack
page read and write
C2A000
heap
page read and write
731000
unkown
page execute and read and write
4481000
heap
page read and write
CA8000
heap
page read and write
2740000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
CBA000
heap
page read and write
CA8000
heap
page read and write
3ABE000
stack
page read and write
718000
unkown
page execute and write copy
7C2000
unkown
page execute and read and write
2CFE000
stack
page read and write
2F3F000
stack
page read and write
F1F000
stack
page read and write
4481000
heap
page read and write
7B2000
unkown
page execute and read and write
C54000
heap
page read and write
4481000
heap
page read and write
4481000
heap
page read and write
277D000
heap
page read and write
493C000
stack
page read and write
78B000
unkown
page execute and read and write
CBA000
heap
page read and write
794000
unkown
page execute and read and write
4A70000
direct allocation
page execute and read and write
84D000
unkown
page execute and write copy
4481000
heap
page read and write
D0A000
heap
page read and write
77F000
unkown
page execute and write copy
3E7E000
stack
page read and write
4F40000
remote allocation
page read and write
2740000
direct allocation
page read and write
731000
unkown
page execute and write copy
CB1000
heap
page read and write
5BA000
unkown
page execute and write copy
4F40000
remote allocation
page read and write
4F40000
remote allocation
page read and write
2740000
direct allocation
page read and write
2BBE000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
2CBF000
stack
page read and write
CE1000
heap
page read and write
2740000
direct allocation
page read and write
36FE000
stack
page read and write
CB6000
heap
page read and write
4A50000
direct allocation
page execute and read and write
5BC000
unkown
page execute and write copy
4D7B000
trusted library allocation
page read and write
C66000
heap
page read and write
555F000
stack
page read and write
5450000
heap
page read and write
2740000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
7CB000
unkown
page execute and read and write
551000
unkown
page execute and write copy
2F7E000
stack
page read and write
C87000
heap
page read and write
550000
unkown
page read and write
2770000
heap
page read and write
4D6F000
trusted library allocation
page read and write
2760000
direct allocation
page read and write
C60000
heap
page read and write
343F000
stack
page read and write
437E000
stack
page read and write
CAF000
heap
page read and write
26FE000
stack
page read and write
35B000
stack
page read and write
83F000
unkown
page execute and write copy
287F000
stack
page read and write
C20000
heap
page read and write
5568000
trusted library allocation
page read and write
D0A000
heap
page read and write
4900000
direct allocation
page read and write
4481000
heap
page read and write
C97000
heap
page read and write
4D59000
trusted library allocation
page read and write
2740000
direct allocation
page read and write
4A90000
direct allocation
page execute and read and write
36BF000
stack
page read and write
5BB000
unkown
page execute and read and write
4BAD000
stack
page read and write
5B0000
unkown
page execute and read and write
There are 236 hidden memdumps, click here to show them.