IOC Report
613vKYuY2S.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\613vKYuY2S.exe
"C:\Users\user\Desktop\613vKYuY2S.exe"
malicious

URLs

Name
IP
Malicious
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://player.vimeo.com
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://rapeflowwj.lat/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
aspecteirs.lat
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
sweepyribs.lat
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
crosshuaht.lat
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://store.steampowered.com/legal/
unknown
https://community.fastly.steamstatic.com/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli
unknown
https://steam.tv/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://steamcommunity.com
unknown
energyaffai.lat
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://store.steampowered.com/points/shop
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
grannyejh.lat
https://steamcommunity.com/
unknown
discokeyus.lat
https://steambroadcast.aka
unknown
https://steamcommunity.com/profiles/765611997243319002
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
unknown
There are 76 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
ax-0001.ax-msedge.net
150.171.28.10
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
sweepyribs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
necklacebudi.lat
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5180000
direct allocation
page read and write
malicious
12C0000
heap
page read and write
3C7000
unkown
page execute and read and write
402000
unkown
page execute and write copy
3E1E000
stack
page read and write
44B000
unkown
page execute and write copy
567F000
stack
page read and write
31F000
unkown
page execute and read and write
592E000
stack
page read and write
4CF1000
heap
page read and write
379000
unkown
page execute and write copy
12F7000
heap
page read and write
1352000
heap
page read and write
133B000
heap
page read and write
329F000
stack
page read and write
EEC000
stack
page read and write
469F000
stack
page read and write
1313000
heap
page read and write
4CE0000
direct allocation
page read and write
5300000
direct allocation
page execute and read and write
3F5000
unkown
page execute and read and write
1306000
heap
page read and write
4CE0000
direct allocation
page read and write
51BB000
stack
page read and write
5A9F000
stack
page read and write
4CF1000
heap
page read and write
44D000
unkown
page execute and read and write
46DE000
stack
page read and write
3B9E000
stack
page read and write
131C000
heap
page read and write
405F000
stack
page read and write
4CE0000
direct allocation
page read and write
464000
unkown
page execute and write copy
4CF1000
heap
page read and write
1309000
heap
page read and write
530D000
stack
page read and write
12CA000
heap
page read and write
1250000
heap
page read and write
3AE000
unkown
page execute and read and write
3CD000
unkown
page execute and read and write
52D0000
direct allocation
page execute and read and write
1387000
heap
page read and write
4CF1000
heap
page read and write
4CE0000
direct allocation
page read and write
4CE0000
direct allocation
page read and write
2F57000
heap
page read and write
12F3000
heap
page read and write
4CF1000
heap
page read and write
355E000
stack
page read and write
422000
unkown
page execute and read and write
44E000
unkown
page execute and write copy
459E000
stack
page read and write
15CE000
stack
page read and write
5609000
trusted library allocation
page read and write
409E000
stack
page read and write
57E0000
remote allocation
page read and write
2F2B000
stack
page read and write
1309000
heap
page read and write
1329000
heap
page read and write
4CF1000
heap
page read and write
3CDE000
stack
page read and write
4CF1000
heap
page read and write
131F000
heap
page read and write
55FF000
trusted library allocation
page read and write
4CF1000
heap
page read and write
454000
unkown
page execute and write copy
132B000
heap
page read and write
FED000
stack
page read and write
3DDF000
stack
page read and write
455E000
stack
page read and write
334000
unkown
page execute and write copy
305F000
stack
page read and write
130D000
heap
page read and write
52BF000
stack
page read and write
441F000
stack
page read and write
3CF000
unkown
page execute and read and write
1303000
heap
page read and write
404000
unkown
page execute and read and write
517D000
stack
page read and write
384000
unkown
page execute and read and write
4A9E000
stack
page read and write
369E000
stack
page read and write
44B000
unkown
page execute and write copy
1303000
heap
page read and write
3E2000
unkown
page execute and read and write
4CF1000
heap
page read and write
349000
unkown
page execute and write copy
5180000
direct allocation
page read and write
132C000
heap
page read and write
133F000
heap
page read and write
54FB000
trusted library allocation
page read and write
3C5000
unkown
page execute and write copy
3CE000
unkown
page execute and write copy
1260000
heap
page read and write
130F000
heap
page read and write
3A5E000
stack
page read and write
3B5000
unkown
page execute and write copy
38DF000
stack
page read and write
131C000
heap
page read and write
161000
unkown
page execute and read and write
133B000
heap
page read and write
553D000
stack
page read and write
3C9F000
stack
page read and write
33D000
unkown
page execute and write copy
133E000
heap
page read and write
4CE0000
direct allocation
page read and write
5310000
direct allocation
page execute and read and write
1225000
heap
page read and write
4CE0000
direct allocation
page read and write
1381000
heap
page read and write
35D000
unkown
page execute and read and write
5601000
trusted library allocation
page read and write
4CF0000
heap
page read and write
4CF1000
heap
page read and write
4CDF000
stack
page read and write
3C8000
unkown
page execute and write copy
341E000
stack
page read and write
4B9F000
stack
page read and write
4CF1000
heap
page read and write
12F9000
heap
page read and write
161000
unkown
page execute and write copy
42DF000
stack
page read and write
4CE0000
direct allocation
page read and write
3B9000
unkown
page execute and read and write
1352000
heap
page read and write
454000
unkown
page execute and write copy
138B000
heap
page read and write
1306000
heap
page read and write
365F000
stack
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
14CE000
stack
page read and write
133B000
heap
page read and write
131F000
heap
page read and write
431E000
stack
page read and write
319E000
stack
page read and write
321000
unkown
page execute and write copy
4CF1000
heap
page read and write
5300000
direct allocation
page execute and read and write
35C000
unkown
page execute and write copy
1329000
heap
page read and write
463000
unkown
page execute and write copy
481E000
stack
page read and write
333000
unkown
page execute and read and write
5130000
trusted library allocation
page read and write
391E000
stack
page read and write
2EEE000
stack
page read and write
4CE0000
direct allocation
page read and write
557E000
stack
page read and write
4CE0000
direct allocation
page read and write
4CE0000
direct allocation
page read and write
534C000
trusted library allocation
page read and write
160000
unkown
page readonly
315F000
stack
page read and write
3F3000
unkown
page execute and write copy
379F000
stack
page read and write
1313000
heap
page read and write
3B5F000
stack
page read and write
12CE000
heap
page read and write
495E000
stack
page read and write
2F50000
heap
page read and write
419F000
stack
page read and write
463000
unkown
page execute and read and write
3D9000
unkown
page execute and read and write
1B4000
unkown
page execute and read and write
599E000
stack
page read and write
582E000
stack
page read and write
170E000
stack
page read and write
5300000
direct allocation
page execute and read and write
3B4000
unkown
page execute and read and write
1B4000
unkown
page execute and write copy
52E0000
direct allocation
page execute and read and write
3F1F000
stack
page read and write
1C0000
unkown
page execute and write copy
5620000
trusted library allocation
page read and write
32DE000
stack
page read and write
5180000
direct allocation
page read and write
33DF000
stack
page read and write
491F000
stack
page read and write
37DE000
stack
page read and write
543D000
stack
page read and write
57BF000
stack
page read and write
5300000
direct allocation
page execute and read and write
57E0000
remote allocation
page read and write
442000
unkown
page execute and write copy
4CE0000
direct allocation
page read and write
1220000
heap
page read and write
335000
unkown
page execute and read and write
47DF000
stack
page read and write
4CF1000
heap
page read and write
4CF1000
heap
page read and write
160000
unkown
page read and write
2F30000
heap
page read and write
4CF1000
heap
page read and write
160E000
stack
page read and write
5330000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
5611000
trusted library allocation
page read and write
4CF1000
heap
page read and write
445E000
stack
page read and write
57E0000
remote allocation
page read and write
5300000
direct allocation
page execute and read and write
4CE0000
direct allocation
page read and write
12B0000
heap
page read and write
1352000
heap
page read and write
3AF000
unkown
page execute and write copy
1A3000
unkown
page execute and read and write
56BE000
stack
page read and write
52F0000
direct allocation
page execute and read and write
4CE0000
direct allocation
page read and write
4A5F000
stack
page read and write
4BDE000
stack
page read and write
4CF1000
heap
page read and write
33E000
unkown
page execute and read and write
3A1F000
stack
page read and write
3F5E000
stack
page read and write
3DA000
unkown
page execute and write copy
1B4000
unkown
page execute and write copy
41DE000
stack
page read and write
34A000
unkown
page execute and read and write
3A9000
unkown
page execute and write copy
4CF1000
heap
page read and write
51C2000
direct allocation
page read and write
351F000
stack
page read and write
3D7000
unkown
page execute and write copy
5300000
direct allocation
page execute and read and write
4CF1000
heap
page read and write
There are 218 hidden memdumps, click here to show them.