IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cbcfeb0e5371aba2
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/6
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://clearancek.site/api
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
s-part-0039.t-0009.t-msedge.net
13.107.246.67

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
131000
unkown
page execute and read and write
malicious
2A50000
direct allocation
page read and write
437000
unkown
page execute and read and write
368F000
stack
page read and write
382000
unkown
page execute and write copy
3B5000
unkown
page execute and read and write
DFE000
heap
page read and write
E5D000
heap
page read and write
51ED000
stack
page read and write
46CF000
stack
page read and write
130000
unkown
page read and write
2A0B000
stack
page read and write
3F4F000
stack
page read and write
46D1000
heap
page read and write
3CC000
unkown
page execute and write copy
2E0E000
stack
page read and write
E84000
heap
page read and write
3B8F000
stack
page read and write
31CE000
stack
page read and write
46D1000
heap
page read and write
C90000
heap
page read and write
2A87000
heap
page read and write
DD0000
heap
page read and write
428000
unkown
page execute and write copy
394E000
stack
page read and write
2F0F000
stack
page read and write
46D1000
heap
page read and write
2A50000
direct allocation
page read and write
377000
unkown
page execute and read and write
4FBF000
trusted library allocation
page read and write
E5D000
heap
page read and write
2A70000
direct allocation
page read and write
434E000
stack
page read and write
2A50000
direct allocation
page read and write
E5B000
heap
page read and write
2C8F000
stack
page read and write
E3A000
heap
page read and write
3BCE000
stack
page read and write
E3E000
heap
page read and write
3E4E000
stack
page read and write
412000
unkown
page execute and write copy
380E000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
40CE000
stack
page read and write
46D1000
heap
page read and write
DFA000
heap
page read and write
420000
unkown
page execute and write copy
30F000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
3A4F000
stack
page read and write
31A000
unkown
page execute and read and write
448E000
stack
page read and write
E50000
heap
page read and write
46D1000
heap
page read and write
8AC000
stack
page read and write
E38000
heap
page read and write
E89000
heap
page read and write
E27000
heap
page read and write
10EF000
stack
page read and write
2A70000
direct allocation
page read and write
2B8F000
stack
page read and write
330E000
stack
page read and write
EBE000
heap
page read and write
46D1000
heap
page read and write
4EFD000
stack
page read and write
2A50000
direct allocation
page read and write
430F000
stack
page read and write
DAE000
stack
page read and write
437000
unkown
page execute and write copy
4F3E000
stack
page read and write
517F000
stack
page read and write
E53000
heap
page read and write
32F000
unkown
page execute and write copy
190000
unkown
page execute and write copy
2FB000
unkown
page execute and read and write
32CF000
stack
page read and write
438000
unkown
page execute and write copy
37CF000
stack
page read and write
4C8F000
stack
page read and write
37C000
unkown
page execute and read and write
46D1000
heap
page read and write
DF0000
heap
page read and write
2DCF000
stack
page read and write
C10000
heap
page read and write
31A000
unkown
page execute and write copy
3F8E000
stack
page read and write
46D1000
heap
page read and write
FEF000
stack
page read and write
131000
unkown
page execute and write copy
E5D000
heap
page read and write
4B10000
trusted library allocation
page read and write
2CCE000
stack
page read and write
3B1000
unkown
page execute and write copy
46D1000
heap
page read and write
2A50000
direct allocation
page read and write
E89000
heap
page read and write
3AC000
unkown
page execute and read and write
4CB0000
direct allocation
page execute and read and write
C95000
heap
page read and write
E79000
heap
page read and write
E3E000
heap
page read and write
444F000
stack
page read and write
41CF000
stack
page read and write
4FC7000
trusted library allocation
page read and write
423000
unkown
page execute and write copy
130000
unkown
page readonly
E84000
heap
page read and write
3B0000
unkown
page execute and read and write
29CF000
stack
page read and write
378000
unkown
page execute and write copy
46D1000
heap
page read and write
304F000
stack
page read and write
4FB1000
trusted library allocation
page read and write
2A50000
direct allocation
page read and write
46D1000
heap
page read and write
3CE000
unkown
page execute and read and write
E50000
heap
page read and write
2A80000
heap
page read and write
386000
unkown
page execute and read and write
2A50000
direct allocation
page read and write
4B8E000
stack
page read and write
DC0000
heap
page read and write
46D1000
heap
page read and write
4FAE000
trusted library allocation
page read and write
28CE000
stack
page read and write
E34000
heap
page read and write
420000
unkown
page execute and write copy
308E000
stack
page read and write
5190000
remote allocation
page read and write
3F3000
unkown
page execute and read and write
534E000
stack
page read and write
52EE000
stack
page read and write
4CCD000
stack
page read and write
40F000
unkown
page execute and write copy
381000
unkown
page execute and read and write
E79000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
2A50000
direct allocation
page read and write
3AD000
unkown
page execute and write copy
2A50000
direct allocation
page read and write
4CC0000
direct allocation
page execute and read and write
46D1000
heap
page read and write
34C000
unkown
page execute and write copy
324000
unkown
page execute and write copy
37D000
unkown
page execute and write copy
2F4E000
stack
page read and write
19C000
unkown
page execute and write copy
4FD5000
trusted library allocation
page read and write
46D1000
heap
page read and write
422000
unkown
page execute and read and write
4EB9000
trusted library allocation
page read and write
2A50000
direct allocation
page read and write
3D0E000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
E52000
heap
page read and write
35D000
unkown
page execute and read and write
318F000
stack
page read and write
46D1000
heap
page read and write
428000
unkown
page execute and write copy
46D1000
heap
page read and write
190000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
EC5000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
4CC0000
direct allocation
page execute and read and write
5190000
remote allocation
page read and write
4CA0000
direct allocation
page execute and read and write
4DFD000
stack
page read and write
39C000
unkown
page execute and write copy
507E000
stack
page read and write
420E000
stack
page read and write
2FD000
unkown
page execute and write copy
458F000
stack
page read and write
544F000
stack
page read and write
4B4D000
stack
page read and write
C7E000
stack
page read and write
408F000
stack
page read and write
190000
unkown
page execute and write copy
2A4E000
stack
page read and write
46D0000
heap
page read and write
2A50000
direct allocation
page read and write
E79000
heap
page read and write
3B9000
unkown
page execute and read and write
344E000
stack
page read and write
336000
unkown
page execute and read and write
3A8E000
stack
page read and write
C00000
heap
page read and write
2A50000
direct allocation
page read and write
E84000
heap
page read and write
4C90000
direct allocation
page execute and read and write
46D1000
heap
page read and write
2A50000
direct allocation
page read and write
9AD000
stack
page read and write
45CE000
stack
page read and write
390F000
stack
page read and write
5190000
remote allocation
page read and write
3CCF000
stack
page read and write
39F000
unkown
page execute and read and write
4D08000
trusted library allocation
page read and write
E89000
heap
page read and write
340F000
stack
page read and write
3B6000
unkown
page execute and write copy
327000
unkown
page execute and read and write
374000
unkown
page execute and write copy
3A8000
unkown
page execute and write copy
503F000
stack
page read and write
2A50000
direct allocation
page read and write
36CE000
stack
page read and write
354F000
stack
page read and write
46D1000
heap
page read and write
4B50000
direct allocation
page read and write
3E0E000
stack
page read and write
358E000
stack
page read and write
There are 204 hidden memdumps, click here to show them.