IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.stor
malicious
spirittunek.stor
malicious
eaglepawnoy.stor
malicious
https://steamcommunity.com/profiles/76561199724331900p
unknown
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://steamcommunity.com/p
unknown
https://steamcommunity.com:443/profiles/76561199724331900_
unknown
https://steamcommunity.com/g
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://dissapoiznw.store:443/apiW
unknown
https://lv.queniujq.cn
unknown
https://mobbipenju.store:443/api
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://spirittunek.store:443/api
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://clearancek.site:443/apibcryptPrimitives.dll
unknown
There are 81 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
steamcommunity.com
104.102.49.254
eaglepawnoy.store
unknown
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
dissapoiznw.store
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
AB1000
unkown
page execute and read and write
malicious
78E000
stack
page read and write
4471000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
DB6000
unkown
page execute and read and write
408F000
stack
page read and write
4F60000
remote allocation
page read and write
A50000
direct allocation
page read and write
A50000
direct allocation
page read and write
290F000
stack
page read and write
3E4E000
stack
page read and write
A50000
direct allocation
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
3E0F000
stack
page read and write
5BD000
heap
page read and write
4AD2000
trusted library allocation
page read and write
358E000
stack
page read and write
4F60000
remote allocation
page read and write
2B4F000
stack
page read and write
64A000
heap
page read and write
9CF000
stack
page read and write
420E000
stack
page read and write
32CF000
stack
page read and write
642000
heap
page read and write
5CB000
heap
page read and write
48ED000
stack
page read and write
5E7000
heap
page read and write
4450000
heap
page read and write
368F000
stack
page read and write
4471000
heap
page read and write
4E0E000
stack
page read and write
D81000
unkown
page execute and read and write
4471000
heap
page read and write
2C8F000
stack
page read and write
4471000
heap
page read and write
4470000
heap
page read and write
5F5000
heap
page read and write
5CF000
heap
page read and write
A50000
direct allocation
page read and write
628000
heap
page read and write
4471000
heap
page read and write
344E000
stack
page read and write
4FD000
stack
page read and write
F69000
unkown
page execute and read and write
62A000
heap
page read and write
394E000
stack
page read and write
628000
heap
page read and write
2CCE000
stack
page read and write
4471000
heap
page read and write
318F000
stack
page read and write
A50000
direct allocation
page read and write
A50000
direct allocation
page read and write
4A80000
direct allocation
page execute and read and write
609000
heap
page read and write
88F000
stack
page read and write
4471000
heap
page read and write
A0E000
stack
page read and write
4471000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
DC5000
unkown
page execute and write copy
580000
heap
page read and write
2F4E000
stack
page read and write
4471000
heap
page read and write
36CE000
stack
page read and write
4E4E000
stack
page read and write
4A80000
direct allocation
page execute and read and write
AB0000
unkown
page readonly
2F0F000
stack
page read and write
4471000
heap
page read and write
3BCE000
stack
page read and write
A50000
direct allocation
page read and write
4A80000
direct allocation
page execute and read and write
3A8E000
stack
page read and write
4900000
direct allocation
page read and write
2DCF000
stack
page read and write
4471000
heap
page read and write
5F5000
heap
page read and write
4900000
direct allocation
page read and write
5C9000
heap
page read and write
380E000
stack
page read and write
8CE000
stack
page read and write
4471000
heap
page read and write
4471000
heap
page read and write
AB1000
unkown
page execute and write copy
DC4000
unkown
page execute and write copy
5C3000
heap
page read and write
605000
heap
page read and write
DC4000
unkown
page execute and read and write
570000
heap
page read and write
5E3000
heap
page read and write
DAD000
unkown
page execute and read and write
430F000
stack
page read and write
41CF000
stack
page read and write
2B8E000
stack
page read and write
A50000
direct allocation
page read and write
4CCD000
stack
page read and write
1E5000
heap
page read and write
58E000
heap
page read and write
C99000
unkown
page execute and read and write
A67000
heap
page read and write
AB0000
unkown
page read and write
5CF000
heap
page read and write
5C5000
heap
page read and write
510E000
stack
page read and write
A50000
direct allocation
page read and write
4F60000
remote allocation
page read and write
58A000
heap
page read and write
3B8F000
stack
page read and write
5E5000
heap
page read and write
31CE000
stack
page read and write
4A80000
direct allocation
page execute and read and write
434E000
stack
page read and write
3A4F000
stack
page read and write
1AC000
stack
page read and write
5E3000
heap
page read and write
4A90000
direct allocation
page execute and read and write
340F000
stack
page read and write
4AB0000
direct allocation
page execute and read and write
2A0F000
stack
page read and write
3F8E000
stack
page read and write
4471000
heap
page read and write
4FAD000
stack
page read and write
62A000
heap
page read and write
50AE000
stack
page read and write
609000
heap
page read and write
40CE000
stack
page read and write
444F000
stack
page read and write
A50000
direct allocation
page read and write
4A3F000
stack
page read and write
354F000
stack
page read and write
330E000
stack
page read and write
A4B000
stack
page read and write
B10000
unkown
page execute and read and write
520F000
stack
page read and write
2A4E000
stack
page read and write
390F000
stack
page read and write
520000
heap
page read and write
304F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
4A8E000
stack
page read and write
4D0E000
stack
page read and write
628000
heap
page read and write
4A60000
direct allocation
page execute and read and write
62A000
heap
page read and write
4A50000
direct allocation
page execute and read and write
4471000
heap
page read and write
4A80000
direct allocation
page execute and read and write
4471000
heap
page read and write
4F4F000
stack
page read and write
510000
heap
page read and write
1E0000
heap
page read and write
5B9000
heap
page read and write
A60000
heap
page read and write
4480000
heap
page read and write
64D000
heap
page read and write
609000
heap
page read and write
A50000
direct allocation
page read and write
3CCF000
stack
page read and write
4900000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
641000
heap
page read and write
A50000
direct allocation
page read and write
3D0E000
stack
page read and write
308E000
stack
page read and write
604000
heap
page read and write
2E0E000
stack
page read and write
4471000
heap
page read and write
A50000
direct allocation
page read and write
5C0000
heap
page read and write
4BCD000
stack
page read and write
4570000
trusted library allocation
page read and write
A50000
direct allocation
page read and write
493E000
stack
page read and write
AAE000
stack
page read and write
37CF000
stack
page read and write
280F000
stack
page read and write
3F4F000
stack
page read and write
There are 168 hidden memdumps, click here to show them.