IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cbcfeb0e5371aba2
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://eaglepawnoy.store:443/apii
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
https://dissapoiznw.store:443/api
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://steamcommunity.com/q
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://studennotediw.store:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://mobbipenju.store:443/api
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://steamcommunity.com/profiles/765611997243319002
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8E1000
unkown
page execute and read and write
malicious
14BE000
stack
page read and write
37DF000
stack
page read and write
5385000
trusted library allocation
page read and write
AB5000
unkown
page execute and write copy
2C97000
heap
page read and write
138B000
heap
page read and write
8E1000
unkown
page execute and write copy
481F000
stack
page read and write
12B0000
direct allocation
page read and write
B69000
unkown
page execute and write copy
3A5F000
stack
page read and write
539D000
trusted library allocation
page read and write
435E000
stack
page read and write
B4A000
unkown
page execute and read and write
50FD000
stack
page read and write
50A0000
direct allocation
page execute and read and write
32DF000
stack
page read and write
2DDF000
stack
page read and write
B6D000
unkown
page execute and write copy
1134000
heap
page read and write
B68000
unkown
page execute and read and write
1134000
heap
page read and write
AEF000
unkown
page execute and read and write
1134000
heap
page read and write
355F000
stack
page read and write
1134000
heap
page read and write
12B0000
direct allocation
page read and write
AC7000
unkown
page execute and write copy
369F000
stack
page read and write
134A000
heap
page read and write
319F000
stack
page read and write
499E000
stack
page read and write
5080000
direct allocation
page execute and read and write
BF5000
unkown
page execute and write copy
BDC000
unkown
page execute and write copy
1134000
heap
page read and write
B4B000
unkown
page execute and write copy
12CA000
heap
page read and write
4F00000
remote allocation
page read and write
505F000
stack
page read and write
4AA1000
heap
page read and write
1134000
heap
page read and write
12B0000
direct allocation
page read and write
495F000
stack
page read and write
B44000
unkown
page execute and write copy
1326000
heap
page read and write
1134000
heap
page read and write
395E000
stack
page read and write
4AA1000
heap
page read and write
3CDF000
stack
page read and write
2F5E000
stack
page read and write
1308000
heap
page read and write
1134000
heap
page read and write
573E000
stack
page read and write
BF5000
unkown
page execute and read and write
4AB0000
heap
page read and write
134A000
heap
page read and write
3B9F000
stack
page read and write
BE7000
unkown
page execute and write copy
4AA1000
heap
page read and write
5060000
direct allocation
page execute and read and write
B37000
unkown
page execute and read and write
1134000
heap
page read and write
40DD000
stack
page read and write
B64000
unkown
page execute and write copy
134E000
heap
page read and write
AB2000
unkown
page execute and read and write
134E000
heap
page read and write
2F1F000
stack
page read and write
130F000
heap
page read and write
5070000
direct allocation
page execute and read and write
12CE000
heap
page read and write
4EE0000
heap
page read and write
F8D000
stack
page read and write
AD7000
unkown
page execute and write copy
421E000
stack
page read and write
36DE000
stack
page read and write
56FD000
stack
page read and write
ADE000
unkown
page execute and read and write
527C000
trusted library allocation
page read and write
94B000
unkown
page execute and read and write
8E0000
unkown
page read and write
130F000
heap
page read and write
E8C000
stack
page read and write
1134000
heap
page read and write
4AA1000
heap
page read and write
5379000
trusted library allocation
page read and write
AD4000
unkown
page execute and read and write
1134000
heap
page read and write
B82000
unkown
page execute and write copy
5080000
direct allocation
page execute and read and write
46DF000
stack
page read and write
3E5E000
stack
page read and write
459F000
stack
page read and write
1326000
heap
page read and write
12B0000
direct allocation
page read and write
5080000
direct allocation
page execute and read and write
94C000
unkown
page execute and write copy
BB0000
unkown
page execute and read and write
12B0000
direct allocation
page read and write
B55000
unkown
page execute and write copy
AD9000
unkown
page execute and read and write
1134000
heap
page read and write
112E000
stack
page read and write
1134000
heap
page read and write
523D000
stack
page read and write
FE0000
heap
page read and write
445F000
stack
page read and write
134A000
heap
page read and write
341F000
stack
page read and write
BD0000
unkown
page execute and write copy
BDE000
unkown
page execute and write copy
5080000
direct allocation
page execute and read and write
94A000
unkown
page execute and write copy
B75000
unkown
page execute and read and write
12B0000
direct allocation
page read and write
547F000
stack
page read and write
2C80000
direct allocation
page execute and read and write
54BE000
stack
page read and write
1134000
heap
page read and write
BE7000
unkown
page execute and write copy
BDC000
unkown
page execute and write copy
ADD000
unkown
page execute and write copy
45DE000
stack
page read and write
3A9E000
stack
page read and write
1134000
heap
page read and write
130A000
heap
page read and write
4AA1000
heap
page read and write
B57000
unkown
page execute and read and write
4F00000
remote allocation
page read and write
B6C000
unkown
page execute and read and write
3F9E000
stack
page read and write
1134000
heap
page read and write
50C2000
trusted library allocation
page read and write
449E000
stack
page read and write
537E000
stack
page read and write
55FE000
stack
page read and write
41DE000
stack
page read and write
4A9F000
stack
page read and write
5080000
direct allocation
page execute and read and write
1323000
heap
page read and write
4EE0000
trusted library allocation
page read and write
1134000
heap
page read and write
583F000
stack
page read and write
345E000
stack
page read and write
BDD000
unkown
page execute and read and write
4AA1000
heap
page read and write
B4E000
unkown
page execute and read and write
409F000
stack
page read and write
1134000
heap
page read and write
331E000
stack
page read and write
1134000
heap
page read and write
ACA000
unkown
page execute and read and write
B10000
unkown
page execute and write copy
4AA1000
heap
page read and write
12B0000
direct allocation
page read and write
485E000
stack
page read and write
12C0000
heap
page read and write
12B0000
direct allocation
page read and write
3D1E000
stack
page read and write
533D000
stack
page read and write
31DE000
stack
page read and write
AEE000
unkown
page execute and write copy
10C0000
heap
page read and write
3BDE000
stack
page read and write
4AA1000
heap
page read and write
12B0000
direct allocation
page read and write
4F20000
direct allocation
page read and write
1134000
heap
page read and write
127E000
stack
page read and write
431F000
stack
page read and write
134E000
heap
page read and write
1304000
heap
page read and write
134E000
heap
page read and write
AD3000
unkown
page execute and write copy
B84000
unkown
page execute and read and write
B1B000
unkown
page execute and read and write
50B0000
direct allocation
page execute and read and write
12B0000
direct allocation
page read and write
1134000
heap
page read and write
359E000
stack
page read and write
3F5F000
stack
page read and write
381E000
stack
page read and write
1335000
heap
page read and write
12B0000
direct allocation
page read and write
2E1C000
stack
page read and write
1130000
heap
page read and write
940000
unkown
page execute and write copy
2C70000
direct allocation
page read and write
4F00000
remote allocation
page read and write
4F5E000
stack
page read and write
2C90000
heap
page read and write
12B0000
direct allocation
page read and write
1323000
heap
page read and write
55BE000
stack
page read and write
1385000
heap
page read and write
391F000
stack
page read and write
12F9000
heap
page read and write
3E1F000
stack
page read and write
309E000
stack
page read and write
2C70000
direct allocation
page read and write
4AA1000
heap
page read and write
5390000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
BF6000
unkown
page execute and write copy
1336000
heap
page read and write
5080000
direct allocation
page execute and read and write
1134000
heap
page read and write
305F000
stack
page read and write
1134000
heap
page read and write
471E000
stack
page read and write
4AA0000
heap
page read and write
51FE000
stack
page read and write
B34000
unkown
page execute and write copy
12B0000
direct allocation
page read and write
134A000
heap
page read and write
1134000
heap
page read and write
940000
unkown
page execute and read and write
8E0000
unkown
page readonly
2CDE000
stack
page read and write
1134000
heap
page read and write
5090000
direct allocation
page execute and read and write
AC6000
unkown
page execute and read and write
123E000
stack
page read and write
12A0000
heap
page read and write
There are 216 hidden memdumps, click here to show them.