IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cb9e7f3651c38ac4
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://clearancek.site/api
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://clearancek.site/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CA1000
unkown
page execute and read and write
malicious
4CEF000
stack
page read and write
EFD000
unkown
page execute and write copy
990000
direct allocation
page read and write
FAA000
unkown
page execute and read and write
4731000
heap
page read and write
AA1000
heap
page read and write
9A4000
heap
page read and write
4FCA000
trusted library allocation
page read and write
545F000
stack
page read and write
9A4000
heap
page read and write
D0C000
unkown
page execute and write copy
4BEE000
stack
page read and write
4731000
heap
page read and write
F4B000
unkown
page execute and write copy
4730000
heap
page read and write
30AF000
stack
page read and write
990000
direct allocation
page read and write
3FAF000
stack
page read and write
C80000
direct allocation
page execute and read and write
9A4000
heap
page read and write
4EB1000
trusted library allocation
page read and write
9A4000
heap
page read and write
40EF000
stack
page read and write
990000
direct allocation
page read and write
CA0000
unkown
page readonly
3E6F000
stack
page read and write
3D2F000
stack
page read and write
F7B000
unkown
page execute and read and write
990000
direct allocation
page read and write
52ED000
stack
page read and write
2D6F000
stack
page read and write
EFA000
unkown
page execute and write copy
29AE000
stack
page read and write
F1A000
unkown
page execute and write copy
535E000
stack
page read and write
9A4000
heap
page read and write
F31000
unkown
page execute and write copy
E85000
unkown
page execute and read and write
30EE000
stack
page read and write
4FD2000
trusted library allocation
page read and write
A81000
heap
page read and write
34AE000
stack
page read and write
9A0000
heap
page read and write
2A30000
direct allocation
page execute and read and write
990000
direct allocation
page read and write
990000
direct allocation
page read and write
4731000
heap
page read and write
C90000
remote allocation
page read and write
C2E000
stack
page read and write
F1C000
unkown
page execute and write copy
A20000
heap
page read and write
422F000
stack
page read and write
990000
direct allocation
page read and write
336E000
stack
page read and write
4FBC000
trusted library allocation
page read and write
FC0000
unkown
page execute and read and write
E6F000
unkown
page execute and write copy
9A4000
heap
page read and write
E9E000
unkown
page execute and read and write
A9A000
heap
page read and write
C90000
direct allocation
page execute and read and write
4731000
heap
page read and write
35AF000
stack
page read and write
472F000
stack
page read and write
2F6F000
stack
page read and write
E97000
unkown
page execute and write copy
4731000
heap
page read and write
386E000
stack
page read and write
EFC000
unkown
page execute and read and write
29EE000
stack
page read and write
9A4000
heap
page read and write
990000
direct allocation
page read and write
4FBE000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
43AE000
stack
page read and write
A00000
direct allocation
page read and write
F39000
unkown
page execute and read and write
D00000
unkown
page execute and read and write
9A4000
heap
page read and write
AF1000
heap
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
A84000
heap
page read and write
A66000
heap
page read and write
E99000
unkown
page execute and read and write
51ED000
stack
page read and write
C90000
remote allocation
page read and write
A44000
heap
page read and write
9A4000
heap
page read and write
2A50000
direct allocation
page execute and read and write
F30000
unkown
page execute and read and write
FA9000
unkown
page execute and write copy
506F000
stack
page read and write
51AF000
stack
page read and write
C70000
direct allocation
page execute and read and write
4BB0000
direct allocation
page read and write
3BEF000
stack
page read and write
3EAE000
stack
page read and write
F10000
unkown
page execute and read and write
FC1000
unkown
page execute and write copy
EC5000
unkown
page execute and write copy
2FAE000
stack
page read and write
AA0000
heap
page read and write
9A4000
heap
page read and write
E91000
unkown
page execute and write copy
4F6E000
stack
page read and write
31EF000
stack
page read and write
AAD000
heap
page read and write
F0A000
unkown
page execute and write copy
FB2000
unkown
page execute and write copy
C70000
heap
page read and write
4731000
heap
page read and write
4731000
heap
page read and write
C6B000
stack
page read and write
CA0000
unkown
page read and write
E9C000
unkown
page execute and write copy
E9A000
unkown
page execute and write copy
C90000
direct allocation
page execute and read and write
2A40000
direct allocation
page execute and read and write
C90000
direct allocation
page execute and read and write
A00000
direct allocation
page read and write
FAB000
unkown
page execute and write copy
A61000
heap
page read and write
4731000
heap
page read and write
35EE000
stack
page read and write
990000
direct allocation
page read and write
50AE000
stack
page read and write
980000
heap
page read and write
FC0000
unkown
page execute and write copy
9A4000
heap
page read and write
E9B000
unkown
page execute and read and write
990000
direct allocation
page read and write
A58000
heap
page read and write
36EF000
stack
page read and write
3AEE000
stack
page read and write
ED8000
unkown
page execute and read and write
F04000
unkown
page execute and read and write
396F000
stack
page read and write
382F000
stack
page read and write
4731000
heap
page read and write
3D6E000
stack
page read and write
9A4000
heap
page read and write
4DED000
stack
page read and write
A6F000
heap
page read and write
5F0000
heap
page read and write
A10000
direct allocation
page execute and read and write
9EE000
stack
page read and write
3AAF000
stack
page read and write
990000
direct allocation
page read and write
C90000
direct allocation
page execute and read and write
426E000
stack
page read and write
412E000
stack
page read and write
F09000
unkown
page execute and read and write
2E6F000
stack
page read and write
8FD000
stack
page read and write
44AF000
stack
page read and write
9A4000
heap
page read and write
AAD000
heap
page read and write
9A4000
heap
page read and write
3FEE000
stack
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
E6C000
unkown
page execute and read and write
10CF000
stack
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
2A2E000
stack
page read and write
45EF000
stack
page read and write
F9C000
unkown
page execute and write copy
CA1000
unkown
page execute and write copy
296F000
stack
page read and write
4BAD000
stack
page read and write
F1B000
unkown
page execute and read and write
2B6F000
stack
page read and write
44EE000
stack
page read and write
2A60000
heap
page read and write
9A4000
heap
page read and write
39AE000
stack
page read and write
3C2E000
stack
page read and write
A2E000
heap
page read and write
9A4000
heap
page read and write
2A67000
heap
page read and write
F28000
unkown
page execute and write copy
C90000
direct allocation
page execute and read and write
462E000
stack
page read and write
FA9000
unkown
page execute and write copy
372E000
stack
page read and write
F4C000
unkown
page execute and read and write
322E000
stack
page read and write
F1E000
unkown
page execute and read and write
9A4000
heap
page read and write
436F000
stack
page read and write
2C6F000
stack
page read and write
95E000
stack
page read and write
A99000
heap
page read and write
F9E000
unkown
page execute and write copy
E88000
unkown
page execute and read and write
EAF000
unkown
page execute and read and write
9A4000
heap
page read and write
5E0000
heap
page read and write
332F000
stack
page read and write
AB6000
heap
page read and write
E87000
unkown
page execute and write copy
C90000
direct allocation
page execute and read and write
4F2E000
stack
page read and write
990000
direct allocation
page read and write
FB2000
unkown
page execute and write copy
990000
direct allocation
page read and write
58C000
stack
page read and write
AB5000
heap
page read and write
C90000
remote allocation
page read and write
EAE000
unkown
page execute and write copy
A2A000
heap
page read and write
9A4000
heap
page read and write
990000
direct allocation
page read and write
4E2D000
stack
page read and write
346F000
stack
page read and write
4FDF000
trusted library allocation
page read and write
4CF9000
trusted library allocation
page read and write
A77000
heap
page read and write
4740000
heap
page read and write
F05000
unkown
page execute and write copy
E91000
unkown
page execute and read and write
D00000
unkown
page execute and write copy
There are 215 hidden memdumps, click here to show them.