IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
eaglepawnoy.store
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://player.vimeo.com
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4B
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://steambroadcast-test.akama
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://eaglepawnoy.store/
unknown
https://dissapoiznw.store/apih8
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://sketchfab.com
unknown
https://dissapoiznw.store/api
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://clearancek.site/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://sergei-esenin.com/r
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://dissapoiznw.store/
unknown
https://store.steampowered.com/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://eaglepawnoy.store/g?
unknown
https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8d
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/profiles/76561199724331900/
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://eaglepawnoy.store/W?
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://dissapoiznw.store/O?1
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://dissapoiznw.store/W?
unknown
https://recaptcha.net/recaptcha/;
unknown
https://eaglepawnoy.store/_?
unknown
https://steamcommunity.com/discussions/
unknown
https://sergei-esenin.com/apiA
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://sergei-esenin.com/api2
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://mobbipenju.store/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geona
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
sergei-esenin.com
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
F61000
unkown
page execute and read and write
malicious
BE4000
heap
page read and write
1350000
direct allocation
page read and write
55AB000
trusted library allocation
page read and write
2FFC000
stack
page read and write
BE4000
heap
page read and write
1243000
unkown
page execute and write copy
BE4000
heap
page read and write
4B6F000
stack
page read and write
1257000
unkown
page execute and read and write
5130000
direct allocation
page read and write
142A000
heap
page read and write
11AE000
unkown
page execute and read and write
13DD000
heap
page read and write
1431000
heap
page read and write
BE4000
heap
page read and write
13DD000
heap
page read and write
4CAF000
stack
page read and write
4A2F000
stack
page read and write
1420000
heap
page read and write
48EF000
stack
page read and write
5A3F000
stack
page read and write
13AA000
heap
page read and write
5585000
trusted library allocation
page read and write
BE4000
heap
page read and write
52AD000
stack
page read and write
526F000
stack
page read and write
113B000
unkown
page execute and read and write
362F000
stack
page read and write
2EBE000
stack
page read and write
BE4000
heap
page read and write
4CB1000
heap
page read and write
52A0000
direct allocation
page execute and read and write
13C0000
heap
page read and write
141F000
heap
page read and write
52EE000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
13DD000
heap
page read and write
1235000
unkown
page execute and write copy
1350000
direct allocation
page read and write
569D000
stack
page read and write
1248000
unkown
page execute and write copy
13D7000
heap
page read and write
113B000
unkown
page execute and write copy
565F000
stack
page read and write
492E000
stack
page read and write
13C4000
heap
page read and write
1242000
unkown
page execute and read and write
BE4000
heap
page read and write
52A0000
direct allocation
page execute and read and write
F60000
unkown
page read and write
5290000
direct allocation
page execute and read and write
452F000
stack
page read and write
50F0000
trusted library allocation
page read and write
13E9000
heap
page read and write
BE0000
heap
page read and write
3B6E000
stack
page read and write
116F000
unkown
page execute and write copy
1350000
direct allocation
page read and write
149E000
stack
page read and write
4CB1000
heap
page read and write
3050000
direct allocation
page read and write
BE4000
heap
page read and write
5120000
remote allocation
page read and write
BE4000
heap
page read and write
5120000
remote allocation
page read and write
1420000
heap
page read and write
F20000
heap
page read and write
402F000
stack
page read and write
58DE000
stack
page read and write
1350000
direct allocation
page read and write
BE4000
heap
page read and write
41AE000
stack
page read and write
516E000
stack
page read and write
2FBF000
stack
page read and write
4CB1000
heap
page read and write
5596000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
1174000
unkown
page execute and write copy
53DD000
stack
page read and write
13E9000
heap
page read and write
47EE000
stack
page read and write
11D2000
unkown
page execute and read and write
13C2000
heap
page read and write
13AA000
heap
page read and write
11CF000
unkown
page execute and write copy
1350000
direct allocation
page read and write
F10000
heap
page read and write
1257000
unkown
page execute and write copy
4CB1000
heap
page read and write
1340000
heap
page read and write
52A0000
direct allocation
page execute and read and write
1199000
unkown
page execute and write copy
4CC0000
heap
page read and write
4CB1000
heap
page read and write
1130000
unkown
page execute and read and write
555E000
stack
page read and write
39EF000
stack
page read and write
13A4000
heap
page read and write
1215000
unkown
page execute and read and write
1350000
direct allocation
page read and write
559D000
trusted library allocation
page read and write
13DD000
heap
page read and write
47AF000
stack
page read and write
3EEF000
stack
page read and write
33AF000
stack
page read and write
13D6000
heap
page read and write
33EE000
stack
page read and write
13E9000
heap
page read and write
BE4000
heap
page read and write
1350000
direct allocation
page read and write
38AF000
stack
page read and write
50F0000
heap
page read and write
11DC000
unkown
page execute and read and write
4CB1000
heap
page read and write
BE4000
heap
page read and write
5280000
direct allocation
page execute and read and write
3CAE000
stack
page read and write
159F000
stack
page read and write
352E000
stack
page read and write
141A000
heap
page read and write
BE4000
heap
page read and write
116E000
unkown
page execute and read and write
1241000
unkown
page execute and write copy
141F000
heap
page read and write
11CB000
unkown
page execute and write copy
13DA000
heap
page read and write
4CB1000
heap
page read and write
1181000
unkown
page execute and read and write
1350000
direct allocation
page read and write
1172000
unkown
page execute and read and write
1350000
direct allocation
page read and write
11A7000
unkown
page execute and write copy
326F000
stack
page read and write
5120000
remote allocation
page read and write
13D6000
heap
page read and write
456E000
stack
page read and write
38EE000
stack
page read and write
1148000
unkown
page execute and read and write
BE4000
heap
page read and write
11F1000
unkown
page execute and write copy
BE4000
heap
page read and write
13DB000
heap
page read and write
141D000
heap
page read and write
16DF000
stack
page read and write
11A6000
unkown
page execute and read and write
4A6E000
stack
page read and write
541E000
stack
page read and write
BE4000
heap
page read and write
3B2F000
stack
page read and write
FC0000
unkown
page execute and read and write
13C4000
heap
page read and write
406E000
stack
page read and write
11CE000
unkown
page execute and read and write
5490000
trusted library allocation
page read and write
13D6000
heap
page read and write
551D000
stack
page read and write
46AE000
stack
page read and write
1350000
direct allocation
page read and write
1431000
heap
page read and write
119C000
unkown
page execute and read and write
37AE000
stack
page read and write
579E000
stack
page read and write
15DE000
stack
page read and write
11F2000
unkown
page execute and read and write
BE4000
heap
page read and write
3DAF000
stack
page read and write
BE4000
heap
page read and write
11BD000
unkown
page execute and read and write
4CB1000
heap
page read and write
11A4000
unkown
page execute and write copy
141F000
heap
page read and write
376F000
stack
page read and write
466F000
stack
page read and write
13D8000
heap
page read and write
11BB000
unkown
page execute and write copy
3C6F000
stack
page read and write
13DD000
heap
page read and write
4CB0000
heap
page read and write
1248000
unkown
page execute and write copy
13AE000
heap
page read and write
13C0000
heap
page read and write
F61000
unkown
page execute and write copy
43EF000
stack
page read and write
1350000
direct allocation
page read and write
416F000
stack
page read and write
116D000
unkown
page execute and write copy
316F000
stack
page read and write
141D000
heap
page read and write
558A000
trusted library allocation
page read and write
303E000
stack
page read and write
3DEE000
stack
page read and write
13C4000
heap
page read and write
BE4000
heap
page read and write
13DD000
heap
page read and write
1258000
unkown
page execute and write copy
52A0000
direct allocation
page execute and read and write
42AF000
stack
page read and write
13AE000
heap
page read and write
4BAE000
stack
page read and write
FCC000
unkown
page execute and write copy
F60000
unkown
page readonly
111D000
unkown
page execute and write copy
141D000
heap
page read and write
1230000
unkown
page execute and write copy
13AE000
heap
page read and write
136A000
heap
page read and write
3060000
heap
page read and write
BE4000
heap
page read and write
1429000
heap
page read and write
1360000
heap
page read and write
42EE000
stack
page read and write
366E000
stack
page read and write
1350000
direct allocation
page read and write
4CB1000
heap
page read and write
11DB000
unkown
page execute and write copy
BE4000
heap
page read and write
1350000
direct allocation
page read and write
3050000
direct allocation
page read and write
52C0000
direct allocation
page execute and read and write
1397000
heap
page read and write
32AE000
stack
page read and write
BE4000
heap
page read and write
593E000
stack
page read and write
34EF000
stack
page read and write
52A0000
direct allocation
page execute and read and write
52D0000
direct allocation
page execute and read and write
13C2000
heap
page read and write
BE4000
heap
page read and write
136E000
heap
page read and write
1147000
unkown
page execute and write copy
FC0000
unkown
page execute and write copy
13AA000
heap
page read and write
BAC000
stack
page read and write
111B000
unkown
page execute and read and write
3067000
heap
page read and write
BE4000
heap
page read and write
1350000
direct allocation
page read and write
13C0000
heap
page read and write
442E000
stack
page read and write
1241000
unkown
page execute and write copy
52B0000
direct allocation
page execute and read and write
13AE000
heap
page read and write
3F2E000
stack
page read and write
EFD000
stack
page read and write
13C0000
heap
page read and write
57DD000
stack
page read and write
BE4000
heap
page read and write
3A2E000
stack
page read and write
There are 239 hidden memdumps, click here to show them.