IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
104.21.53.8
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://player.vimeo.com
unknown
https://community.steamstatic.com/public/javascript/promo/stickers.js?v=W8NP8aTVqtms&l=english
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://sergei-esenin.com/
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://s.ytimg.com;
unknown
https://eaglepawnoy.store:443/api
unknown
https://steam.tv/
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://lv.queniujq~
unknown
https://licendfilteo.site:443/api
unknown
https://api.st
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/profilev2.css?v=t9xiI4DlPpEB&l=english
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.steamstatic.com/public/javascript/applications/community/main.js?v=4XouecKy8sZy&am
unknown
https://clearancek.site/api
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://sergei-esenin.com:443/api
unknown
https://steamcommunity.com/profiles/76561199724331900h6DG
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://store.steampowered.com/;
unknown
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://sergei-esenin.com/apii
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://community.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.steamstatic.com/public/javascript/applications/community/manifest.js?v=r7a4-LYcQOj
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a61
unknown
https://community.steamstatic.com/
unknown
https://community.steamstatic.com/public/css/applications/community/main.css?v=DVae4t4RZiHA&l=en
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.steamstatic.com/public/javascript/profile.js?v=bbs9uq0gqJ-H&l=english
unknown
https://community.steamstatic.com/public/css/skin_1/header.css?v=pTvrRy1pm52p&l=english
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/javascript/shared_global.js?v=7glT1n_nkVCs&l=eng
unknown
http://127.0.0.1:27060
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=english
unknown
https://community.steamstatic.com/public/javascript/webui/clientcom.js?v=jq1jQyX1843y&l=english
unknown
https://community.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&l=engl
unknown
https://spirittunek.store:443/api
unknown
https://clearancek.site:443/apiapi
unknown
https://community.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunf
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR9MtmbWSZEp&l=engli
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
There are 87 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
104.21.53.8
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B71000
unkown
page execute and read and write
malicious
4A11000
heap
page read and write
D3C000
unkown
page execute and write copy
DD4000
unkown
page execute and write copy
DBD000
unkown
page execute and read and write
E5B000
unkown
page execute and write copy
3C8E000
stack
page read and write
526E000
stack
page read and write
4E8D000
stack
page read and write
D5D000
unkown
page execute and write copy
1357000
heap
page read and write
13F4000
heap
page read and write
D8D000
unkown
page execute and write copy
47CE000
stack
page read and write
D8E000
unkown
page execute and read and write
B60000
heap
page read and write
1510000
direct allocation
page execute and read and write
15B3000
heap
page read and write
D77000
unkown
page execute and write copy
DF8000
unkown
page execute and write copy
3B0F000
stack
page read and write
400F000
stack
page read and write
1569000
heap
page read and write
374F000
stack
page read and write
4A11000
heap
page read and write
13F4000
heap
page read and write
BDC000
unkown
page execute and write copy
13F4000
heap
page read and write
DD3000
unkown
page execute and read and write
350E000
stack
page read and write
FD0000
direct allocation
page read and write
4A11000
heap
page read and write
13F4000
heap
page read and write
15F0000
heap
page read and write
4B10000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
E74000
unkown
page execute and read and write
1340000
direct allocation
page execute and read and write
54FD000
stack
page read and write
4E90000
direct allocation
page read and write
D71000
unkown
page execute and write copy
BD0000
unkown
page execute and write copy
3DCE000
stack
page read and write
FD0000
direct allocation
page read and write
3D8F000
stack
page read and write
1500000
heap
page read and write
43CF000
stack
page read and write
E5D000
unkown
page execute and read and write
E04000
unkown
page execute and write copy
153E000
heap
page read and write
2FCF000
stack
page read and write
414F000
stack
page read and write
13F0000
heap
page read and write
D65000
unkown
page execute and write copy
1604000
heap
page read and write
E7C000
unkown
page execute and write copy
13F4000
heap
page read and write
3C4F000
stack
page read and write
DE4000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
E60000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
565E000
stack
page read and write
490E000
stack
page read and write
338F000
stack
page read and write
440E000
stack
page read and write
13F4000
heap
page read and write
D90000
unkown
page execute and write copy
E8B000
unkown
page execute and write copy
AD0000
heap
page read and write
4A0F000
stack
page read and write
DC9000
unkown
page execute and read and write
575F000
stack
page read and write
3B4E000
stack
page read and write
DA3000
unkown
page execute and read and write
13E0000
remote allocation
page read and write
157F000
heap
page read and write
FD0000
direct allocation
page read and write
DD0000
unkown
page execute and write copy
E17000
unkown
page execute and write copy
133E000
stack
page read and write
E06000
unkown
page execute and read and write
4FD0000
direct allocation
page execute and read and write
4A11000
heap
page read and write
DE5000
unkown
page execute and write copy
15F0000
heap
page read and write
3F0E000
stack
page read and write
FCE000
stack
page read and write
159C000
heap
page read and write
15BC000
heap
page read and write
B70000
unkown
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
364E000
stack
page read and write
FD0000
direct allocation
page read and write
DF2000
unkown
page execute and write copy
B70000
unkown
page readonly
E75000
unkown
page execute and write copy
4A20000
heap
page read and write
DEA000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
E18000
unkown
page execute and read and write
15B8000
heap
page read and write
E5E000
unkown
page execute and write copy
4A11000
heap
page read and write
DD9000
unkown
page execute and read and write
4A11000
heap
page read and write
DC4000
unkown
page execute and write copy
D98000
unkown
page execute and write copy
D68000
unkown
page execute and read and write
FF0000
direct allocation
page read and write
1571000
heap
page read and write
1618000
heap
page read and write
D5D000
unkown
page execute and read and write
468E000
stack
page read and write
3ECF000
stack
page read and write
310F000
stack
page read and write
FF0000
direct allocation
page read and write
D3A000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
4A11000
heap
page read and write
D76000
unkown
page execute and read and write
D50000
unkown
page execute and read and write
DBB000
unkown
page execute and write copy
38CE000
stack
page read and write
E66000
unkown
page execute and write copy
DFC000
unkown
page execute and read and write
159F000
heap
page read and write
1520000
direct allocation
page execute and read and write
89C000
stack
page read and write
13F4000
heap
page read and write
9F0000
heap
page read and write
536E000
stack
page read and write
4A11000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4FFA000
trusted library allocation
page read and write
159F000
heap
page read and write
54AF000
stack
page read and write
B71000
unkown
page execute and write copy
1510000
direct allocation
page execute and read and write
13F4000
heap
page read and write
512E000
stack
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
324F000
stack
page read and write
1510000
direct allocation
page execute and read and write
360F000
stack
page read and write
15B7000
heap
page read and write
300E000
stack
page read and write
F8F000
stack
page read and write
153A000
heap
page read and write
52C5000
trusted library allocation
page read and write
48CF000
stack
page read and write
13F4000
heap
page read and write
4A11000
heap
page read and write
159B000
heap
page read and write
464F000
stack
page read and write
50EE000
stack
page read and write
55FD000
stack
page read and write
160E000
heap
page read and write
522D000
stack
page read and write
13E0000
remote allocation
page read and write
13F4000
heap
page read and write
E7C000
unkown
page execute and write copy
1500000
direct allocation
page execute and read and write
1593000
heap
page read and write
378E000
stack
page read and write
328E000
stack
page read and write
478F000
stack
page read and write
13E0000
remote allocation
page read and write
13E0000
direct allocation
page execute and read and write
52B7000
trusted library allocation
page read and write
2ECF000
stack
page read and write
4FCF000
stack
page read and write
13F4000
heap
page read and write
42CE000
stack
page read and write
FD0000
direct allocation
page read and write
FD0000
direct allocation
page read and write
13F4000
heap
page read and write
1530000
heap
page read and write
E8A000
unkown
page execute and read and write
B3E000
stack
page read and write
DE2000
unkown
page execute and write copy
450F000
stack
page read and write
39CF000
stack
page read and write
52CD000
trusted library allocation
page read and write
FD0000
direct allocation
page read and write
14FF000
stack
page read and write
1350000
heap
page read and write
1510000
direct allocation
page execute and read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
388F000
stack
page read and write
13F4000
heap
page read and write
D73000
unkown
page execute and read and write
D91000
unkown
page execute and read and write
BD0000
unkown
page execute and read and write
139B000
stack
page read and write
13F4000
heap
page read and write
D78000
unkown
page execute and read and write
D9B000
unkown
page execute and read and write
FD0000
direct allocation
page read and write
428F000
stack
page read and write
13F4000
heap
page read and write
DF7000
unkown
page execute and read and write
314E000
stack
page read and write
1510000
direct allocation
page execute and read and write
13DE000
stack
page read and write
53AE000
stack
page read and write
FD0000
direct allocation
page read and write
D75000
unkown
page execute and write copy
4A10000
heap
page read and write
15B3000
heap
page read and write
33CE000
stack
page read and write
404E000
stack
page read and write
12FF000
stack
page read and write
1510000
direct allocation
page execute and read and write
3A0E000
stack
page read and write
454E000
stack
page read and write
E44000
unkown
page execute and read and write
4A11000
heap
page read and write
15BC000
heap
page read and write
13F4000
heap
page read and write
13F4000
heap
page read and write
34CF000
stack
page read and write
4ECE000
stack
page read and write
51AE000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
13F4000
heap
page read and write
E8A000
unkown
page execute and write copy
E74000
unkown
page execute and write copy
13F4000
heap
page read and write
1618000
heap
page read and write
99D000
stack
page read and write
D9D000
unkown
page execute and write copy
418E000
stack
page read and write
There are 226 hidden memdumps, click here to show them.