IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://studennotediw.store:443/apid
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://steamcommunity.com:443/profiles/76561199724331900s
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://mobbipenju.store:443/api
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C42cb6563c5fec81
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://clearancek.site:443/apii
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://spirittunek.store:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8D1000
unkown
page execute and read and write
malicious
2E2F000
stack
page read and write
4CB0000
heap
page read and write
4E70000
direct allocation
page execute and read and write
513E000
stack
page read and write
ABB000
unkown
page execute and write copy
F94000
heap
page read and write
B70000
unkown
page execute and write copy
2A40000
direct allocation
page read and write
552E000
stack
page read and write
930000
unkown
page execute and read and write
527E000
stack
page read and write
346F000
stack
page read and write
486F000
stack
page read and write
51A9000
trusted library allocation
page read and write
E49000
heap
page read and write
4E80000
direct allocation
page execute and read and write
B04000
unkown
page execute and read and write
E97000
heap
page read and write
2A40000
direct allocation
page read and write
4FBD000
stack
page read and write
BB8000
unkown
page execute and write copy
4EB0000
direct allocation
page execute and read and write
30AF000
stack
page read and write
E1A000
heap
page read and write
F90000
heap
page read and write
35AF000
stack
page read and write
2A40000
direct allocation
page read and write
4871000
heap
page read and write
4E70000
direct allocation
page execute and read and write
126F000
stack
page read and write
E97000
heap
page read and write
93B000
unkown
page execute and read and write
AFD000
unkown
page execute and write copy
F8E000
stack
page read and write
426E000
stack
page read and write
3D6E000
stack
page read and write
412E000
stack
page read and write
519C000
trusted library allocation
page read and write
F94000
heap
page read and write
B37000
unkown
page execute and read and write
386E000
stack
page read and write
75C000
stack
page read and write
F94000
heap
page read and write
F4E000
stack
page read and write
2A40000
direct allocation
page read and write
F94000
heap
page read and write
472F000
stack
page read and write
2BEB000
stack
page read and write
2A60000
heap
page read and write
45EF000
stack
page read and write
372E000
stack
page read and write
AB4000
unkown
page execute and read and write
F94000
heap
page read and write
F94000
heap
page read and write
E9B000
heap
page read and write
382F000
stack
page read and write
3C2E000
stack
page read and write
4870000
heap
page read and write
E9B000
heap
page read and write
116E000
stack
page read and write
4CF0000
direct allocation
page read and write
B61000
unkown
page execute and read and write
36EF000
stack
page read and write
AD0000
unkown
page execute and write copy
F94000
heap
page read and write
3FAF000
stack
page read and write
2A40000
direct allocation
page read and write
BE6000
unkown
page execute and read and write
E75000
heap
page read and write
A98000
unkown
page execute and write copy
507F000
trusted library allocation
page read and write
BD8000
unkown
page execute and write copy
462E000
stack
page read and write
AC6000
unkown
page execute and read and write
F94000
heap
page read and write
3AEE000
stack
page read and write
8D1000
unkown
page execute and write copy
4E2F000
stack
page read and write
B2C000
unkown
page execute and read and write
537F000
stack
page read and write
AC5000
unkown
page execute and write copy
E8A000
heap
page read and write
4871000
heap
page read and write
4D2E000
stack
page read and write
396F000
stack
page read and write
B1F000
unkown
page execute and read and write
F94000
heap
page read and write
3FEE000
stack
page read and write
F94000
heap
page read and write
30EE000
stack
page read and write
A95000
unkown
page execute and read and write
3EAE000
stack
page read and write
4880000
heap
page read and write
E58000
heap
page read and write
AE9000
unkown
page execute and read and write
4CE0000
remote allocation
page read and write
E74000
heap
page read and write
B58000
unkown
page execute and read and write
2CEF000
stack
page read and write
2A40000
direct allocation
page read and write
332F000
stack
page read and write
4E70000
direct allocation
page execute and read and write
AC1000
unkown
page execute and write copy
2A67000
heap
page read and write
4E7E000
stack
page read and write
E73000
heap
page read and write
E73000
heap
page read and write
523E000
stack
page read and write
2E6E000
stack
page read and write
B4F000
unkown
page execute and write copy
E8A000
heap
page read and write
5187000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
BB9000
unkown
page execute and read and write
B34000
unkown
page execute and write copy
4871000
heap
page read and write
8C0000
heap
page read and write
F94000
heap
page read and write
AE8000
unkown
page execute and write copy
476E000
stack
page read and write
E5F000
heap
page read and write
3BEF000
stack
page read and write
AF1000
unkown
page execute and write copy
3AAF000
stack
page read and write
8D0000
unkown
page read and write
ABC000
unkown
page execute and read and write
B46000
unkown
page execute and read and write
B59000
unkown
page execute and write copy
35EE000
stack
page read and write
F94000
heap
page read and write
2A40000
direct allocation
page read and write
E97000
heap
page read and write
336E000
stack
page read and write
322E000
stack
page read and write
AB0000
unkown
page execute and read and write
B1C000
unkown
page execute and write copy
8D0000
unkown
page readonly
93C000
unkown
page execute and write copy
4E60000
direct allocation
page execute and read and write
53BD000
stack
page read and write
44EE000
stack
page read and write
4E70000
direct allocation
page execute and read and write
F94000
heap
page read and write
BD0000
unkown
page execute and write copy
4EA0000
direct allocation
page execute and read and write
EAC000
heap
page read and write
B55000
unkown
page execute and read and write
2A30000
heap
page read and write
4CB0000
trusted library allocation
page read and write
8B0000
heap
page read and write
E1E000
heap
page read and write
BE6000
unkown
page execute and write copy
E10000
heap
page read and write
F94000
heap
page read and write
F94000
heap
page read and write
E9B000
heap
page read and write
E5A000
heap
page read and write
2BAF000
stack
page read and write
B52000
unkown
page execute and read and write
93A000
unkown
page execute and write copy
2F6F000
stack
page read and write
4CE0000
remote allocation
page read and write
4871000
heap
page read and write
562F000
stack
page read and write
2A40000
direct allocation
page read and write
54BE000
stack
page read and write
2A40000
direct allocation
page read and write
2AAE000
stack
page read and write
31EF000
stack
page read and write
F94000
heap
page read and write
B71000
unkown
page execute and read and write
BC0000
unkown
page execute and write copy
F94000
heap
page read and write
5184000
trusted library allocation
page read and write
4CE0000
remote allocation
page read and write
3E6F000
stack
page read and write
4871000
heap
page read and write
AEC000
unkown
page execute and write copy
B80000
unkown
page execute and read and write
4871000
heap
page read and write
F94000
heap
page read and write
F94000
heap
page read and write
B53000
unkown
page execute and write copy
BD1000
unkown
page execute and read and write
2A40000
direct allocation
page read and write
AC7000
unkown
page execute and write copy
F94000
heap
page read and write
2D2E000
stack
page read and write
5194000
trusted library allocation
page read and write
B56000
unkown
page execute and write copy
BD2000
unkown
page execute and write copy
F94000
heap
page read and write
AED000
unkown
page execute and read and write
2A40000
direct allocation
page read and write
85D000
stack
page read and write
4ECD000
trusted library allocation
page read and write
BE7000
unkown
page execute and write copy
B28000
unkown
page execute and write copy
436F000
stack
page read and write
4E50000
direct allocation
page execute and read and write
4CF0000
direct allocation
page read and write
AC4000
unkown
page execute and read and write
50FD000
stack
page read and write
F94000
heap
page read and write
B7D000
unkown
page execute and write copy
BC3000
unkown
page execute and write copy
AB3000
unkown
page execute and write copy
4E90000
direct allocation
page execute and read and write
AC8000
unkown
page execute and read and write
2FAE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
BD0000
unkown
page execute and write copy
EAC000
heap
page read and write
4871000
heap
page read and write
B44000
unkown
page execute and write copy
AFC000
unkown
page execute and read and write
34AE000
stack
page read and write
EEA000
heap
page read and write
E5F000
heap
page read and write
44AF000
stack
page read and write
E52000
heap
page read and write
40EF000
stack
page read and write
4871000
heap
page read and write
4CF0000
direct allocation
page read and write
3D2F000
stack
page read and write
AD8000
unkown
page execute and read and write
422F000
stack
page read and write
BA4000
unkown
page execute and read and write
E8A000
heap
page read and write
2A40000
direct allocation
page read and write
4E70000
direct allocation
page execute and read and write
930000
unkown
page execute and write copy
43AE000
stack
page read and write
2A40000
direct allocation
page read and write
BD8000
unkown
page execute and write copy
F94000
heap
page read and write
F94000
heap
page read and write
2A40000
direct allocation
page read and write
EE4000
heap
page read and write
4871000
heap
page read and write
4FFD000
stack
page read and write
39AE000
stack
page read and write
F94000
heap
page read and write
EAC000
heap
page read and write
There are 235 hidden memdumps, click here to show them.