IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://community.steamstatic.com/public/javascript/promo/stickers.js?v=W8NP8aTVqtms&l=english
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://sergei-esenin.com/
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://community.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.steamstatic.com/public/javascript/applications/community/manifest.js?v=r7a4-LYcQOj
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.steamstatic.com/public/css/applications/community/main.css?v=DVae4t4RZiHA&l=en
unknown
https://steamcommunity.com/workshop/
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.steamstatic.com/public/javascript/profile.js?v=bbs9uq0gqJ-H&l=english
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/header.css?v=pTvrRy1pm52p&l=english
unknown
https://community.steamstatic.com/public/css/skin_1/profilev2.css?v=t9xiI4DlPpEB&l=english
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.steamstatic.com/public/javascript/applications/community/main.js?v=4XouecKy8sZy&am
unknown
https://store.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/javascript/shared_global.js?v=7glT1n_nkVCs&l=eng
unknown
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=english
unknown
https://mobbipenju.store/api
unknown
https://community.steamstatic.com/public/javascript/webui/clientcom.js?v=jq1jQyX1843y&l=english
unknown
https://community.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&l=engl
unknown
https://community.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://sergei-esenin.com/apibR
unknown
https://community.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunf
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR9MtmbWSZEp&l=engli
unknown
https://store.steampowered.com/mobile
unknown
https://sergei-esenin.com/apip
unknown
https://steamcommunity.com/
unknown
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
unknown
https://store.steampowered.com/about/
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
sergei-esenin.com
172.67.206.204
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
AB1000
unkown
page execute and read and write
malicious
155F000
heap
page read and write
2FEE000
stack
page read and write
376E000
stack
page read and write
55A6000
trusted library allocation
page read and write
573F000
stack
page read and write
1561000
heap
page read and write
3EEE000
stack
page read and write
4DB1000
heap
page read and write
1445000
heap
page read and write
D3B000
unkown
page execute and write copy
CC2000
unkown
page execute and write copy
39AF000
stack
page read and write
1542000
heap
page read and write
1569000
heap
page read and write
522D000
stack
page read and write
17DF000
stack
page read and write
C8E000
unkown
page execute and write copy
D24000
unkown
page execute and write copy
5240000
direct allocation
page read and write
14D0000
direct allocation
page read and write
D99000
unkown
page execute and write copy
D99000
unkown
page execute and write copy
4DB1000
heap
page read and write
336F000
stack
page read and write
1544000
heap
page read and write
5390000
direct allocation
page execute and read and write
53CD000
stack
page read and write
1566000
heap
page read and write
416E000
stack
page read and write
2F80000
heap
page read and write
5401000
trusted library allocation
page read and write
4DB1000
heap
page read and write
53E0000
direct allocation
page execute and read and write
D00000
unkown
page execute and read and write
53C0000
direct allocation
page execute and read and write
452E000
stack
page read and write
426F000
stack
page read and write
402E000
stack
page read and write
D04000
unkown
page execute and read and write
AB0000
unkown
page read and write
326E000
stack
page read and write
DB0000
unkown
page execute and read and write
33AE000
stack
page read and write
587F000
stack
page read and write
5A4E000
stack
page read and write
14D0000
direct allocation
page read and write
14EA000
heap
page read and write
466E000
stack
page read and write
1571000
heap
page read and write
CE9000
unkown
page execute and write copy
15C1000
heap
page read and write
3DAE000
stack
page read and write
4DB1000
heap
page read and write
4DB1000
heap
page read and write
56BA000
trusted library allocation
page read and write
D1A000
unkown
page execute and read and write
47AE000
stack
page read and write
56C7000
trusted library allocation
page read and write
1566000
heap
page read and write
C97000
unkown
page execute and write copy
44EF000
stack
page read and write
4DB1000
heap
page read and write
4A2E000
stack
page read and write
3AEF000
stack
page read and write
476F000
stack
page read and write
14D0000
direct allocation
page read and write
CFE000
unkown
page execute and write copy
1560000
heap
page read and write
14D0000
direct allocation
page read and write
B10000
unkown
page execute and write copy
54FD000
stack
page read and write
4DB1000
heap
page read and write
D48000
unkown
page execute and read and write
462F000
stack
page read and write
C8F000
unkown
page execute and read and write
372F000
stack
page read and write
13E0000
heap
page read and write
B10000
unkown
page execute and read and write
53F0000
direct allocation
page execute and read and write
C84000
unkown
page execute and write copy
4DB1000
heap
page read and write
D9A000
unkown
page execute and read and write
AB1000
unkown
page execute and write copy
12FD000
stack
page read and write
4DB1000
heap
page read and write
56B1000
trusted library allocation
page read and write
14CE000
stack
page read and write
C82000
unkown
page execute and read and write
1557000
heap
page read and write
5B4F000
stack
page read and write
CF2000
unkown
page execute and read and write
30EF000
stack
page read and write
3D6F000
stack
page read and write
3FEF000
stack
page read and write
AB0000
unkown
page readonly
D16000
unkown
page execute and write copy
59DD000
stack
page read and write
D9B000
unkown
page execute and write copy
4DB1000
heap
page read and write
1571000
heap
page read and write
1440000
heap
page read and write
362E000
stack
page read and write
D2C000
unkown
page execute and read and write
15B8000
heap
page read and write
14D0000
direct allocation
page read and write
34AF000
stack
page read and write
CEE000
unkown
page execute and write copy
1569000
heap
page read and write
C6D000
unkown
page execute and read and write
58DD000
stack
page read and write
2FA7000
heap
page read and write
48EE000
stack
page read and write
386F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
CD3000
unkown
page execute and read and write
CED000
unkown
page execute and read and write
14D0000
direct allocation
page read and write
DA2000
unkown
page execute and write copy
2FA0000
heap
page read and write
4B2F000
stack
page read and write
43EE000
stack
page read and write
DA2000
unkown
page execute and write copy
312B000
stack
page read and write
1569000
heap
page read and write
D3C000
unkown
page execute and read and write
1300000
heap
page read and write
4DB1000
heap
page read and write
14D0000
direct allocation
page read and write
527E000
stack
page read and write
4DB0000
heap
page read and write
4DB1000
heap
page read and write
16DE000
stack
page read and write
D0E000
unkown
page execute and read and write
53C0000
direct allocation
page execute and read and write
49EF000
stack
page read and write
1557000
heap
page read and write
14D0000
direct allocation
page read and write
5240000
direct allocation
page read and write
563E000
stack
page read and write
5890000
remote allocation
page read and write
14D0000
direct allocation
page read and write
C96000
unkown
page execute and read and write
4EB0000
trusted library allocation
page read and write
3EAF000
stack
page read and write
14E0000
heap
page read and write
4DB1000
heap
page read and write
43AF000
stack
page read and write
D45000
unkown
page execute and write copy
53D0000
direct allocation
page execute and read and write
537F000
stack
page read and write
14EE000
heap
page read and write
1571000
heap
page read and write
152F000
heap
page read and write
4DC0000
heap
page read and write
152A000
heap
page read and write
B1C000
unkown
page execute and write copy
4DB1000
heap
page read and write
42AE000
stack
page read and write
53B0000
direct allocation
page execute and read and write
4B6E000
stack
page read and write
14D0000
direct allocation
page read and write
CCB000
unkown
page execute and write copy
5890000
remote allocation
page read and write
577D000
stack
page read and write
1584000
heap
page read and write
412F000
stack
page read and write
D0C000
unkown
page execute and write copy
D43000
unkown
page execute and write copy
1584000
heap
page read and write
1430000
heap
page read and write
4DB1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4DB1000
heap
page read and write
FAC000
stack
page read and write
4DAF000
stack
page read and write
3C2F000
stack
page read and write
4C6F000
stack
page read and write
D6F000
unkown
page execute and read and write
1526000
heap
page read and write
14D0000
direct allocation
page read and write
4CAE000
stack
page read and write
35EF000
stack
page read and write
148E000
stack
page read and write
3C6E000
stack
page read and write
CC3000
unkown
page execute and read and write
5890000
remote allocation
page read and write
D8C000
unkown
page execute and write copy
155F000
heap
page read and write
1518000
heap
page read and write
14D0000
direct allocation
page read and write
48AF000
stack
page read and write
1522000
heap
page read and write
D44000
unkown
page execute and read and write
DB0000
unkown
page execute and write copy
55FD000
stack
page read and write
C85000
unkown
page execute and read and write
D21000
unkown
page execute and write copy
1566000
heap
page read and write
DB1000
unkown
page execute and write copy
39EE000
stack
page read and write
53C0000
direct allocation
page execute and read and write
14D0000
direct allocation
page read and write
D01000
unkown
page execute and write copy
C91000
unkown
page execute and write copy
3B2E000
stack
page read and write
322F000
stack
page read and write
5240000
direct allocation
page read and write
4DB1000
heap
page read and write
34EE000
stack
page read and write
53C0000
direct allocation
page execute and read and write
1584000
heap
page read and write
D23000
unkown
page execute and read and write
C70000
unkown
page execute and write copy
38AE000
stack
page read and write
53C0000
direct allocation
page execute and read and write
14D0000
direct allocation
page read and write
4DB1000
heap
page read and write
15CB000
heap
page read and write
1546000
heap
page read and write
C99000
unkown
page execute and read and write
4DB1000
heap
page read and write
There are 212 hidden memdumps, click here to show them.