IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://steamcommunity.com/Q
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://clearancek.site:443/api
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/profiles/76561199724331900q
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://steamcommunity.com/p
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C42cb6563c5fec81
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 77 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9B1000
unkown
page execute and read and write
malicious
4C30000
direct allocation
page read and write
4C30000
direct allocation
page read and write
5730000
remote allocation
page read and write
A1C000
unkown
page execute and write copy
4C41000
heap
page read and write
44CE000
stack
page read and write
9B1000
unkown
page execute and write copy
3F8F000
stack
page read and write
C2F000
unkown
page execute and write copy
4C30000
direct allocation
page read and write
5250000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
3E8E000
stack
page read and write
488E000
stack
page read and write
36CF000
stack
page read and write
358F000
stack
page read and write
35CE000
stack
page read and write
5250000
direct allocation
page execute and read and write
A1A000
unkown
page execute and write copy
1290000
heap
page read and write
571F000
stack
page read and write
520F000
stack
page read and write
BB3000
unkown
page execute and read and write
4C30000
direct allocation
page read and write
C20000
unkown
page execute and write copy
539D000
stack
page read and write
5730000
remote allocation
page read and write
50D0000
direct allocation
page read and write
1295000
heap
page read and write
4C30000
direct allocation
page read and write
334E000
stack
page read and write
5290000
direct allocation
page execute and read and write
113D000
stack
page read and write
BB1000
unkown
page execute and read and write
4B0E000
stack
page read and write
5572000
trusted library allocation
page read and write
4C50000
heap
page read and write
C4C000
unkown
page execute and write copy
B8F000
unkown
page execute and write copy
5250000
direct allocation
page execute and read and write
4C30000
direct allocation
page read and write
C27000
unkown
page execute and read and write
460E000
stack
page read and write
4C30000
direct allocation
page read and write
BA0000
unkown
page execute and read and write
B9A000
unkown
page execute and read and write
9B0000
unkown
page readonly
4C41000
heap
page read and write
5220000
direct allocation
page execute and read and write
4ACF000
stack
page read and write
C3B000
unkown
page execute and read and write
A1B000
unkown
page execute and read and write
4C30000
direct allocation
page read and write
370E000
stack
page read and write
BAD000
unkown
page execute and write copy
380F000
stack
page read and write
2EC0000
heap
page read and write
4C41000
heap
page read and write
C96000
unkown
page execute and write copy
1346000
heap
page read and write
C98000
unkown
page execute and write copy
BD9000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
B8D000
unkown
page execute and write copy
C0A000
unkown
page execute and read and write
CBE000
unkown
page execute and write copy
13CC000
heap
page read and write
470F000
stack
page read and write
5260000
direct allocation
page execute and read and write
3D4E000
stack
page read and write
C10000
unkown
page execute and read and write
130A000
heap
page read and write
B75000
unkown
page execute and read and write
1390000
heap
page read and write
13C4000
heap
page read and write
C31000
unkown
page execute and read and write
484F000
stack
page read and write
4C41000
heap
page read and write
3ACE000
stack
page read and write
5581000
trusted library allocation
page read and write
3FCE000
stack
page read and write
CA4000
unkown
page execute and write copy
398E000
stack
page read and write
438E000
stack
page read and write
5080000
trusted library allocation
page read and write
4C41000
heap
page read and write
50D0000
direct allocation
page read and write
B8E000
unkown
page execute and read and write
320E000
stack
page read and write
45CF000
stack
page read and write
2EB0000
heap
page read and write
CBD000
unkown
page execute and read and write
4C41000
heap
page read and write
9B0000
unkown
page read and write
5250000
direct allocation
page execute and read and write
5270000
direct allocation
page execute and read and write
555C000
trusted library allocation
page read and write
C19000
unkown
page execute and write copy
B77000
unkown
page execute and write copy
BDA000
unkown
page execute and write copy
4C41000
heap
page read and write
59CD000
stack
page read and write
4C41000
heap
page read and write
14FF000
stack
page read and write
384E000
stack
page read and write
4C30000
direct allocation
page read and write
1190000
heap
page read and write
394F000
stack
page read and write
5230000
direct allocation
page execute and read and write
555A000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
588E000
stack
page read and write
4C41000
heap
page read and write
52AD000
trusted library allocation
page read and write
3C0E000
stack
page read and write
C02000
unkown
page execute and write copy
A10000
unkown
page execute and read and write
344F000
stack
page read and write
CA7000
unkown
page execute and write copy
134E000
heap
page read and write
55DF000
stack
page read and write
CA4000
unkown
page execute and write copy
CAE000
unkown
page execute and write copy
4C30000
direct allocation
page read and write
C05000
unkown
page execute and read and write
30CF000
stack
page read and write
424E000
stack
page read and write
C1E000
unkown
page execute and read and write
474E000
stack
page read and write
3D0F000
stack
page read and write
4C10000
heap
page read and write
5B2F000
stack
page read and write
13CB000
heap
page read and write
5A2E000
stack
page read and write
420F000
stack
page read and write
130E000
heap
page read and write
2E6B000
stack
page read and write
B9C000
unkown
page execute and write copy
1390000
heap
page read and write
4C41000
heap
page read and write
1364000
heap
page read and write
2E2E000
stack
page read and write
1338000
heap
page read and write
5280000
direct allocation
page execute and read and write
CAE000
unkown
page execute and write copy
525E000
stack
page read and write
2FCF000
stack
page read and write
3A8F000
stack
page read and write
5568000
trusted library allocation
page read and write
561E000
stack
page read and write
4C41000
heap
page read and write
163F000
stack
page read and write
C7A000
unkown
page execute and read and write
510E000
stack
page read and write
5240000
direct allocation
page execute and read and write
545E000
trusted library allocation
page read and write
40CF000
stack
page read and write
1378000
heap
page read and write
578D000
stack
page read and write
B9A000
unkown
page execute and write copy
410E000
stack
page read and write
BE0000
unkown
page execute and read and write
B90000
unkown
page execute and read and write
103C000
stack
page read and write
1270000
heap
page read and write
5730000
remote allocation
page read and write
50BD000
stack
page read and write
13CB000
heap
page read and write
BB2000
unkown
page execute and write copy
4C41000
heap
page read and write
4C41000
heap
page read and write
2EC7000
heap
page read and write
54DE000
stack
page read and write
4C30000
direct allocation
page read and write
1300000
heap
page read and write
CBD000
unkown
page execute and write copy
C4F000
unkown
page execute and read and write
4C41000
heap
page read and write
4C30000
direct allocation
page read and write
4C30000
direct allocation
page read and write
3E4F000
stack
page read and write
1361000
heap
page read and write
2EAE000
stack
page read and write
4C41000
heap
page read and write
C06000
unkown
page execute and write copy
448F000
stack
page read and write
4C41000
heap
page read and write
13C7000
heap
page read and write
549C000
stack
page read and write
4C41000
heap
page read and write
348E000
stack
page read and write
153E000
stack
page read and write
50D0000
direct allocation
page read and write
4C30000
direct allocation
page read and write
4C0F000
stack
page read and write
1376000
heap
page read and write
B8C000
unkown
page execute and read and write
A10000
unkown
page execute and write copy
4C41000
heap
page read and write
12EE000
stack
page read and write
31CF000
stack
page read and write
49CE000
stack
page read and write
1341000
heap
page read and write
4C40000
heap
page read and write
C0B000
unkown
page execute and write copy
4C41000
heap
page read and write
498F000
stack
page read and write
C32000
unkown
page execute and write copy
330F000
stack
page read and write
BD5000
unkown
page execute and write copy
434F000
stack
page read and write
58CE000
stack
page read and write
CA6000
unkown
page execute and read and write
There are 204 hidden memdumps, click here to show them.