IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.store
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
bathdoomgaz.store
malicious
clearancek.site
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
mobbipenju.store
malicious
https://player.vimeo.com
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
unknown
https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=GfA42_x2_aub&
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://eaglepawnoy.store:443/apiS
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://store.steampowered.com/points/shop/
unknown
https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=bZKSp7oNwVPK
unknown
https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://sergei-esenin.com/t
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&amp
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://sergei-esenin.com:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
unknown
https://store.steampowered.com/about/
unknown
https://bathdoomgaz.store:443/apiz
unknown
https://community.cloudflare.steamstatic.com/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8d
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://clearancek.site:443/api
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://studennotediw.store:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C42cb6563c5fec81
unknown
http://127.0.0.1:27060
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://avatars.cloudflare.s
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
sergei-esenin.com
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
EF1000
unkown
page execute and read and write
malicious
730000
heap
page read and write
289F000
stack
page read and write
325E000
stack
page read and write
AAC000
heap
page read and write
44E0000
direct allocation
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
44E0000
direct allocation
page read and write
44F1000
heap
page read and write
10D3000
unkown
page execute and write copy
44F1000
heap
page read and write
4E7F000
stack
page read and write
4EBE000
stack
page read and write
3EDE000
stack
page read and write
11E5000
unkown
page execute and write copy
810000
heap
page read and write
AC0000
heap
page read and write
1189000
unkown
page execute and write copy
B09000
heap
page read and write
299F000
stack
page read and write
F50000
unkown
page execute and read and write
44E0000
direct allocation
page read and write
1108000
unkown
page execute and write copy
2D5E000
stack
page read and write
512E000
stack
page read and write
4B00000
direct allocation
page execute and read and write
10DE000
unkown
page execute and write copy
3C5E000
stack
page read and write
44E0000
direct allocation
page read and write
49BE000
stack
page read and write
87E000
stack
page read and write
371F000
stack
page read and write
44F1000
heap
page read and write
A10000
heap
page read and write
117D000
unkown
page execute and write copy
10D2000
unkown
page execute and read and write
389E000
stack
page read and write
4930000
trusted library allocation
page read and write
44F1000
heap
page read and write
10D5000
unkown
page execute and write copy
385F000
stack
page read and write
44F1000
heap
page read and write
10FD000
unkown
page execute and write copy
4B00000
direct allocation
page execute and read and write
2E9E000
stack
page read and write
3C1E000
stack
page read and write
B01000
heap
page read and write
11DC000
unkown
page execute and write copy
44F1000
heap
page read and write
AC0000
heap
page read and write
EF1000
unkown
page execute and write copy
44F1000
heap
page read and write
F5B000
unkown
page execute and read and write
1111000
unkown
page execute and read and write
401E000
stack
page read and write
10D1000
unkown
page execute and write copy
A70000
heap
page read and write
8E5000
heap
page read and write
518E000
stack
page read and write
EAC000
stack
page read and write
11DD000
unkown
page execute and read and write
A7E000
heap
page read and write
4D7E000
stack
page read and write
1156000
unkown
page execute and write copy
2D1F000
stack
page read and write
4D3D000
stack
page read and write
112A000
unkown
page execute and read and write
30DF000
stack
page read and write
4B00000
direct allocation
page execute and read and write
44E0000
direct allocation
page read and write
E6E000
stack
page read and write
375E000
stack
page read and write
A30000
heap
page read and write
8E0000
heap
page read and write
116C000
unkown
page execute and read and write
44F1000
heap
page read and write
1130000
unkown
page execute and read and write
39DE000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
A90000
heap
page read and write
4B00000
direct allocation
page execute and read and write
44E0000
direct allocation
page read and write
A79000
heap
page read and write
44E0000
direct allocation
page read and write
F5C000
unkown
page execute and write copy
ABC000
heap
page read and write
11F4000
unkown
page execute and write copy
F50000
unkown
page execute and write copy
10BD000
unkown
page execute and read and write
1124000
unkown
page execute and write copy
A67000
heap
page read and write
4500000
heap
page read and write
10D4000
unkown
page execute and read and write
4FD0000
remote allocation
page read and write
44F0000
heap
page read and write
43DE000
stack
page read and write
4B42000
trusted library allocation
page read and write
44E0000
direct allocation
page read and write
114A000
unkown
page execute and write copy
4B10000
direct allocation
page execute and read and write
2FDE000
stack
page read and write
4B0E000
stack
page read and write
EEE000
stack
page read and write
A7E000
heap
page read and write
429E000
stack
page read and write
2A9F000
stack
page read and write
117E000
unkown
page execute and read and write
EF0000
unkown
page readonly
4DE7000
trusted library allocation
page read and write
A9E000
heap
page read and write
6FD000
stack
page read and write
311E000
stack
page read and write
8D7000
heap
page read and write
44E0000
direct allocation
page read and write
AC0000
heap
page read and write
44F1000
heap
page read and write
528F000
stack
page read and write
3E9F000
stack
page read and write
112B000
unkown
page execute and write copy
4CE1000
trusted library allocation
page read and write
339E000
stack
page read and write
44E0000
direct allocation
page read and write
ABB000
heap
page read and write
44E0000
direct allocation
page read and write
8BE000
stack
page read and write
502E000
stack
page read and write
415E000
stack
page read and write
44E0000
direct allocation
page read and write
4FD0000
remote allocation
page read and write
EF0000
unkown
page read and write
1164000
unkown
page execute and write copy
A3A000
heap
page read and write
AC0000
heap
page read and write
2ADE000
stack
page read and write
2E5F000
stack
page read and write
3D5F000
stack
page read and write
4980000
direct allocation
page read and write
399F000
stack
page read and write
ABD000
heap
page read and write
44F1000
heap
page read and write
C2E000
stack
page read and write
4B30000
direct allocation
page execute and read and write
4DFE000
trusted library allocation
page read and write
4C3D000
stack
page read and write
10E5000
unkown
page execute and read and write
321F000
stack
page read and write
34DE000
stack
page read and write
1100000
unkown
page execute and read and write
349F000
stack
page read and write
1138000
unkown
page execute and write copy
A3E000
heap
page read and write
A00000
heap
page read and write
3FDF000
stack
page read and write
1159000
unkown
page execute and read and write
2BDF000
stack
page read and write
11AD000
unkown
page execute and read and write
4B20000
direct allocation
page execute and read and write
AAD000
heap
page read and write
AF1000
heap
page read and write
10D6000
unkown
page execute and read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
A75000
heap
page read and write
1163000
unkown
page execute and read and write
411F000
stack
page read and write
118E000
unkown
page execute and read and write
4AD0000
direct allocation
page execute and read and write
4B00000
direct allocation
page execute and read and write
44DF000
stack
page read and write
44F1000
heap
page read and write
44F1000
heap
page read and write
113D000
unkown
page execute and read and write
4AF0000
direct allocation
page execute and read and write
3B1E000
stack
page read and write
A78000
heap
page read and write
114E000
unkown
page execute and read and write
4980000
direct allocation
page read and write
4FBF000
stack
page read and write
4ABF000
stack
page read and write
3ADF000
stack
page read and write
8D0000
heap
page read and write
A9E000
heap
page read and write
44F1000
heap
page read and write
11F3000
unkown
page execute and read and write
10AB000
unkown
page execute and read and write
361E000
stack
page read and write
10C8000
unkown
page execute and write copy
11E5000
unkown
page execute and write copy
335F000
stack
page read and write
44E0000
direct allocation
page read and write
10AD000
unkown
page execute and write copy
4B00000
direct allocation
page execute and read and write
9EF000
stack
page read and write
3DC000
stack
page read and write
11CE000
unkown
page execute and write copy
11F3000
unkown
page execute and write copy
4E0B000
trusted library allocation
page read and write
F5A000
unkown
page execute and write copy
35DF000
stack
page read and write
44F1000
heap
page read and write
11DE000
unkown
page execute and write copy
A90000
heap
page read and write
439F000
stack
page read and write
425F000
stack
page read and write
496D000
stack
page read and write
4980000
direct allocation
page read and write
2C1E000
stack
page read and write
4AE0000
direct allocation
page execute and read and write
3D9E000
stack
page read and write
11DC000
unkown
page execute and write copy
4FD0000
remote allocation
page read and write
10C8000
unkown
page execute and read and write
1161000
unkown
page execute and write copy
2F9F000
stack
page read and write
4DF5000
trusted library allocation
page read and write
There are 207 hidden memdumps, click here to show them.