IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.stor
malicious
spirittunek.stor
malicious
eaglepawnoy.stor
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://login.steampowere
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://clearancek.site:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://eaglepawnoy.store:443/api
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://studennotediw.store:443/api
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://steamcommunity.com/lA
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://clearancek.site:443/apii%Vu
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://steamcommunity.com/&&4
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
steamcommunity.com
104.102.49.254
eaglepawnoy.store
unknown
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
dissapoiznw.store
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
871000
unkown
page execute and read and write
malicious
13D0000
direct allocation
page read and write
306F000
stack
page read and write
35BE000
stack
page read and write
14DA000
heap
page read and write
3E7E000
stack
page read and write
530F000
stack
page read and write
30AC000
stack
page read and write
32FF000
stack
page read and write
5820000
remote allocation
page read and write
13D0000
direct allocation
page read and write
49BE000
stack
page read and write
3E3F000
stack
page read and write
4D41000
heap
page read and write
423E000
stack
page read and write
FF0000
heap
page read and write
51D0000
direct allocation
page read and write
5320000
direct allocation
page execute and read and write
3BFE000
stack
page read and write
13D0000
direct allocation
page read and write
37FF000
stack
page read and write
3BBF000
stack
page read and write
31FE000
stack
page read and write
13D0000
direct allocation
page read and write
14E9000
heap
page read and write
333E000
stack
page read and write
FA0000
heap
page read and write
40FE000
stack
page read and write
3ABE000
stack
page read and write
13D0000
direct allocation
page read and write
4D41000
heap
page read and write
168E000
stack
page read and write
5350000
direct allocation
page execute and read and write
4D41000
heap
page read and write
1496000
heap
page read and write
4D41000
heap
page read and write
548E000
stack
page read and write
45FE000
stack
page read and write
1526000
heap
page read and write
14D6000
heap
page read and write
870000
unkown
page readonly
31BF000
stack
page read and write
36BF000
stack
page read and write
4D41000
heap
page read and write
B6C000
unkown
page execute and write copy
14E9000
heap
page read and write
5330000
direct allocation
page execute and read and write
3D3E000
stack
page read and write
14CB000
heap
page read and write
30B7000
heap
page read and write
5820000
remote allocation
page read and write
393F000
stack
page read and write
13D0000
direct allocation
page read and write
145A000
heap
page read and write
4AFE000
stack
page read and write
30B0000
heap
page read and write
5340000
direct allocation
page execute and read and write
347E000
stack
page read and write
4D41000
heap
page read and write
343F000
stack
page read and write
357F000
stack
page read and write
4D41000
heap
page read and write
36FE000
stack
page read and write
14B4000
heap
page read and write
871000
unkown
page execute and write copy
13D0000
direct allocation
page read and write
4D41000
heap
page read and write
5350000
direct allocation
page execute and read and write
5370000
direct allocation
page execute and read and write
F90000
heap
page read and write
4D41000
heap
page read and write
4BFF000
stack
page read and write
55CE000
stack
page read and write
13E0000
heap
page read and write
1498000
heap
page read and write
14E5000
heap
page read and write
520E000
stack
page read and write
14BF000
heap
page read and write
13D0000
direct allocation
page read and write
570E000
stack
page read and write
2F6E000
stack
page read and write
5820000
remote allocation
page read and write
497F000
stack
page read and write
45BF000
stack
page read and write
14E5000
heap
page read and write
1489000
heap
page read and write
433F000
stack
page read and write
14E5000
heap
page read and write
580F000
stack
page read and write
56CF000
stack
page read and write
1430000
heap
page read and write
5360000
direct allocation
page execute and read and write
51D0000
direct allocation
page read and write
5ADF000
stack
page read and write
5180000
trusted library allocation
page read and write
447F000
stack
page read and write
14E9000
heap
page read and write
51BD000
stack
page read and write
B55000
unkown
page execute and read and write
4C3E000
stack
page read and write
3FBE000
stack
page read and write
558D000
stack
page read and write
A50000
unkown
page execute and read and write
3A7F000
stack
page read and write
142E000
stack
page read and write
D02000
unkown
page execute and write copy
870000
unkown
page read and write
13D0000
direct allocation
page read and write
13D0000
direct allocation
page read and write
59DE000
stack
page read and write
473E000
stack
page read and write
3F7F000
stack
page read and write
383E000
stack
page read and write
13D0000
direct allocation
page read and write
13D0000
direct allocation
page read and write
4D41000
heap
page read and write
5350000
direct allocation
page execute and read and write
4D3F000
stack
page read and write
4ABF000
stack
page read and write
4D41000
heap
page read and write
4D40000
heap
page read and write
164E000
stack
page read and write
4D41000
heap
page read and write
B6C000
unkown
page execute and read and write
14D6000
heap
page read and write
46FF000
stack
page read and write
151F000
heap
page read and write
13D0000
direct allocation
page read and write
F3C000
stack
page read and write
4D41000
heap
page read and write
B5E000
unkown
page execute and read and write
8D0000
unkown
page execute and read and write
487E000
stack
page read and write
5350000
direct allocation
page execute and read and write
14B4000
heap
page read and write
12FD000
stack
page read and write
B29000
unkown
page execute and read and write
149A000
heap
page read and write
4D41000
heap
page read and write
149F000
heap
page read and write
3CFF000
stack
page read and write
5350000
direct allocation
page execute and read and write
4D51000
heap
page read and write
51D0000
direct allocation
page read and write
145E000
heap
page read and write
4D41000
heap
page read and write
596D000
stack
page read and write
397E000
stack
page read and write
B6D000
unkown
page execute and write copy
4D41000
heap
page read and write
1450000
heap
page read and write
40BF000
stack
page read and write
483F000
stack
page read and write
5380000
direct allocation
page execute and read and write
1492000
heap
page read and write
D01000
unkown
page execute and read and write
14CA000
heap
page read and write
4D41000
heap
page read and write
539F000
trusted library allocation
page read and write
14BF000
heap
page read and write
13E5000
heap
page read and write
5350000
direct allocation
page execute and read and write
14E0000
heap
page read and write
4D41000
heap
page read and write
41FF000
stack
page read and write
437D000
stack
page read and write
535E000
stack
page read and write
178F000
stack
page read and write
149F000
heap
page read and write
586E000
stack
page read and write
14E1000
heap
page read and write
13D0000
direct allocation
page read and write
44BE000
stack
page read and write
There are 163 hidden memdumps, click here to show them.