IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.stor
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
spirittunek.stor
malicious
eaglepawnoy.stor
malicious
clearancek.site
malicious
licendfilteo.site
malicious
https://sensatinwu.buzz/api
188.114.96.3
malicious
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://eaglepawnoy.store:443/apij
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/Z
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://sensatinwu.buzz:443/apibcryptPrimitives.dll(
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://sensatinwu.buzz/pi
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=9yzMGndrVfY4&l=e
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://sensatinwu.buzz/
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://sensatinwu.buzz/api(Q
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://spirittunek.store:443/api
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://studennotediw.store:443/apiI
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://avatars.akamai.steamstatic.com/fF
unknown
https://steamcommunity.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sensatinwu.buzz
188.114.96.3
malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
steamcommunity.com
104.102.49.254
eaglepawnoy.store
unknown
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
dissapoiznw.store
unknown

IPs

IP
Domain
Country
Malicious
188.114.96.3
sensatinwu.buzz
European Union
malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1A1000
unkown
page execute and read and write
malicious
2FEE000
stack
page read and write
30EF000
stack
page read and write
2AEE000
stack
page read and write
39AF000
stack
page read and write
FC1000
heap
page read and write
3B2E000
stack
page read and write
48C0000
direct allocation
page read and write
416E000
stack
page read and write
E34000
heap
page read and write
498000
unkown
page execute and write copy
48A000
unkown
page execute and read and write
568F000
stack
page read and write
48C0000
direct allocation
page read and write
4EC0000
direct allocation
page execute and read and write
48D1000
heap
page read and write
4F25000
trusted library allocation
page read and write
F9F000
heap
page read and write
2BEF000
stack
page read and write
312E000
stack
page read and write
E34000
heap
page read and write
E34000
heap
page read and write
FB3000
heap
page read and write
E34000
heap
page read and write
3C2F000
stack
page read and write
E34000
heap
page read and write
4D60000
direct allocation
page read and write
4EE0000
direct allocation
page execute and read and write
E34000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
FE0000
heap
page read and write
2D6E000
stack
page read and write
467E000
stack
page read and write
519E000
stack
page read and write
109E000
stack
page read and write
3C6E000
stack
page read and write
BED000
stack
page read and write
E34000
heap
page read and write
42AE000
stack
page read and write
3AEF000
stack
page read and write
362E000
stack
page read and write
FB5000
heap
page read and write
102C000
heap
page read and write
FE5000
heap
page read and write
E34000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
E34000
heap
page read and write
501D000
stack
page read and write
12DF000
stack
page read and write
2D2F000
stack
page read and write
E34000
heap
page read and write
FE5000
heap
page read and write
AEC000
stack
page read and write
F84000
heap
page read and write
48BF000
stack
page read and write
FD7000
heap
page read and write
2EAE000
stack
page read and write
E34000
heap
page read and write
386F000
stack
page read and write
326E000
stack
page read and write
4D50000
remote allocation
page read and write
102C000
heap
page read and write
FE0000
heap
page read and write
E34000
heap
page read and write
62C000
unkown
page execute and read and write
FC1000
heap
page read and write
4EEE000
stack
page read and write
200000
unkown
page execute and read and write
1016000
heap
page read and write
FD7000
heap
page read and write
FE2000
heap
page read and write
48C0000
direct allocation
page read and write
FE5000
heap
page read and write
39EE000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
3D6F000
stack
page read and write
F95000
heap
page read and write
E34000
heap
page read and write
48D1000
heap
page read and write
FB6000
heap
page read and write
48C0000
direct allocation
page read and write
481000
unkown
page execute and read and write
463F000
stack
page read and write
376E000
stack
page read and write
426F000
stack
page read and write
E34000
heap
page read and write
48C0000
direct allocation
page read and write
102E000
heap
page read and write
F30000
heap
page read and write
FC1000
heap
page read and write
F95000
heap
page read and write
4D10000
heap
page read and write
FE5000
heap
page read and write
FE0000
heap
page read and write
48C0000
direct allocation
page read and write
E34000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
E34000
heap
page read and write
336F000
stack
page read and write
F89000
heap
page read and write
1026000
heap
page read and write
477F000
stack
page read and write
48C0000
direct allocation
page read and write
FD7000
heap
page read and write
2A97000
heap
page read and write
FE0000
heap
page read and write
FC1000
heap
page read and write
48D1000
heap
page read and write
2A90000
heap
page read and write
1016000
heap
page read and write
F5A000
heap
page read and write
F6F000
heap
page read and write
48D1000
heap
page read and write
4D60000
direct allocation
page read and write
3FEF000
stack
page read and write
F9F000
heap
page read and write
542E000
stack
page read and write
322F000
stack
page read and write
FB6000
heap
page read and write
E34000
heap
page read and write
11DE000
stack
page read and write
62D000
unkown
page execute and write copy
48D1000
heap
page read and write
48D1000
heap
page read and write
4F00000
direct allocation
page execute and read and write
FB6000
heap
page read and write
FD7000
heap
page read and write
48C0000
direct allocation
page read and write
2FAF000
stack
page read and write
1016000
heap
page read and write
33AE000
stack
page read and write
48C0000
direct allocation
page read and write
E34000
heap
page read and write
FC1000
heap
page read and write
E34000
heap
page read and write
1A0000
unkown
page readonly
48D0000
heap
page read and write
372F000
stack
page read and write
35EF000
stack
page read and write
4D60000
direct allocation
page read and write
48C0000
direct allocation
page read and write
E34000
heap
page read and write
4E9F000
stack
page read and write
4D9B000
stack
page read and write
E34000
heap
page read and write
1016000
heap
page read and write
43B0000
heap
page read and write
378000
unkown
page execute and read and write
48C0000
direct allocation
page read and write
499000
unkown
page execute and write copy
F9A000
heap
page read and write
34AF000
stack
page read and write
48D1000
heap
page read and write
53DE000
stack
page read and write
3DAE000
stack
page read and write
498000
unkown
page execute and read and write
49D0000
trusted library allocation
page read and write
402E000
stack
page read and write
1032000
heap
page read and write
48C0000
direct allocation
page read and write
FE0000
heap
page read and write
E34000
heap
page read and write
529F000
stack
page read and write
1A0000
unkown
page read and write
F5E000
heap
page read and write
4D50000
remote allocation
page read and write
FE2000
heap
page read and write
4D50000
remote allocation
page read and write
E30000
heap
page read and write
F89000
heap
page read and write
4F10000
direct allocation
page execute and read and write
F50000
heap
page read and write
38AE000
stack
page read and write
FB3000
heap
page read and write
48D1000
heap
page read and write
E34000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
453E000
stack
page read and write
43AF000
stack
page read and write
3EED000
stack
page read and write
E34000
heap
page read and write
505D000
stack
page read and write
FD7000
heap
page read and write
1A1000
unkown
page execute and write copy
E34000
heap
page read and write
552D000
stack
page read and write
1016000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
E50000
heap
page read and write
FE5000
heap
page read and write
103E000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
FE2000
heap
page read and write
3EAF000
stack
page read and write
F9F000
heap
page read and write
458000
unkown
page execute and read and write
48C0000
direct allocation
page read and write
4EE0000
direct allocation
page execute and read and write
119F000
stack
page read and write
F98000
heap
page read and write
FB3000
heap
page read and write
FE2000
heap
page read and write
52DE000
stack
page read and write
44FF000
stack
page read and write
FB6000
heap
page read and write
412F000
stack
page read and write
48C0000
direct allocation
page read and write
34EE000
stack
page read and write
558E000
stack
page read and write
43FE000
stack
page read and write
47BE000
stack
page read and write
515D000
stack
page read and write
2C2C000
stack
page read and write
2E6F000
stack
page read and write
48D1000
heap
page read and write
There are 205 hidden memdumps, click here to show them.