IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.stor
malicious
spirittunek.stor
malicious
eaglepawnoy.stor
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://steamcommunity.com/-
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://steamcommunity.com/z
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
steamcommunity.com
104.102.49.254
eaglepawnoy.store
unknown
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
dissapoiznw.store
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7B1000
unkown
page execute and read and write
malicious
DB0000
heap
page read and write
A93000
unkown
page execute and read and write
DB0000
heap
page read and write
E8E000
stack
page read and write
3F6E000
stack
page read and write
634000
heap
page read and write
4A00000
remote allocation
page read and write
49C0000
heap
page read and write
50DD000
stack
page read and write
D9A000
heap
page read and write
537E000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
D87000
heap
page read and write
634000
heap
page read and write
3DDF000
stack
page read and write
E17000
heap
page read and write
4B70000
direct allocation
page execute and read and write
A67000
unkown
page execute and read and write
4BA0000
direct allocation
page execute and read and write
DB0000
heap
page read and write
351F000
stack
page read and write
2F1E000
stack
page read and write
379F000
stack
page read and write
634000
heap
page read and write
634000
heap
page read and write
634000
heap
page read and write
D83000
heap
page read and write
4D0E000
stack
page read and write
4570000
direct allocation
page read and write
2B5F000
stack
page read and write
4570000
direct allocation
page read and write
E21000
heap
page read and write
4B90000
direct allocation
page execute and read and write
AAF000
unkown
page execute and read and write
D50000
heap
page read and write
4580000
heap
page read and write
341E000
stack
page read and write
AAF000
unkown
page execute and write copy
42EF000
stack
page read and write
446E000
stack
page read and write
4570000
direct allocation
page read and write
7AE000
stack
page read and write
27CB000
stack
page read and write
4B4F000
stack
page read and write
634000
heap
page read and write
634000
heap
page read and write
38DF000
stack
page read and write
989000
unkown
page execute and read and write
4BDD000
trusted library allocation
page read and write
4570000
direct allocation
page read and write
4570000
direct allocation
page read and write
4E4E000
stack
page read and write
284E000
stack
page read and write
AB0000
unkown
page execute and write copy
634000
heap
page read and write
D4F000
stack
page read and write
40AE000
stack
page read and write
41AF000
stack
page read and write
634000
heap
page read and write
406F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
634000
heap
page read and write
4570000
direct allocation
page read and write
391E000
stack
page read and write
4570000
direct allocation
page read and write
4570000
direct allocation
page read and write
634000
heap
page read and write
4581000
heap
page read and write
4570000
direct allocation
page read and write
319E000
stack
page read and write
4581000
heap
page read and write
634000
heap
page read and write
3B9D000
stack
page read and write
508F000
stack
page read and write
2C9E000
stack
page read and write
634000
heap
page read and write
41EE000
stack
page read and write
C49000
unkown
page execute and read and write
295F000
stack
page read and write
D5A000
heap
page read and write
521D000
stack
page read and write
3CDE000
stack
page read and write
7B0000
unkown
page readonly
C4A000
unkown
page execute and write copy
4B9D000
stack
page read and write
4B90000
direct allocation
page execute and read and write
810000
unkown
page execute and read and write
634000
heap
page read and write
E17000
heap
page read and write
E13000
heap
page read and write
315F000
stack
page read and write
4A10000
direct allocation
page read and write
3A5E000
stack
page read and write
32DE000
stack
page read and write
7B1000
unkown
page execute and write copy
3DE0000
heap
page read and write
2D9F000
stack
page read and write
4CCD000
stack
page read and write
D9E000
heap
page read and write
442F000
stack
page read and write
4581000
heap
page read and write
4581000
heap
page read and write
4B60000
direct allocation
page execute and read and write
365F000
stack
page read and write
634000
heap
page read and write
2C5F000
stack
page read and write
DC8000
heap
page read and write
4A4E000
stack
page read and write
D95000
heap
page read and write
4581000
heap
page read and write
4581000
heap
page read and write
3B5F000
stack
page read and write
3C9E000
stack
page read and write
531E000
stack
page read and write
634000
heap
page read and write
D9E000
heap
page read and write
D5E000
heap
page read and write
2857000
heap
page read and write
2FC000
stack
page read and write
305E000
stack
page read and write
4A10000
direct allocation
page read and write
37DE000
stack
page read and write
4590000
heap
page read and write
E17000
heap
page read and write
547F000
stack
page read and write
4570000
direct allocation
page read and write
4BC0000
direct allocation
page execute and read and write
4F8E000
stack
page read and write
4581000
heap
page read and write
4A00000
remote allocation
page read and write
DC8000
heap
page read and write
E18000
heap
page read and write
DC8000
heap
page read and write
4570000
direct allocation
page read and write
2A5F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
660000
heap
page read and write
456F000
stack
page read and write
432E000
stack
page read and write
634000
heap
page read and write
2DDE000
stack
page read and write
4B80000
direct allocation
page execute and read and write
740000
heap
page read and write
D98000
heap
page read and write
3A1F000
stack
page read and write
D87000
heap
page read and write
4680000
trusted library allocation
page read and write
634000
heap
page read and write
4A00000
remote allocation
page read and write
2EDF000
stack
page read and write
634000
heap
page read and write
33DF000
stack
page read and write
329F000
stack
page read and write
4581000
heap
page read and write
4570000
direct allocation
page read and write
634000
heap
page read and write
634000
heap
page read and write
301F000
stack
page read and write
F8F000
stack
page read and write
4A10000
direct allocation
page read and write
280E000
stack
page read and write
3FD000
stack
page read and write
355E000
stack
page read and write
7B0000
unkown
page read and write
634000
heap
page read and write
630000
heap
page read and write
D95000
heap
page read and write
4581000
heap
page read and write
634000
heap
page read and write
369E000
stack
page read and write
2850000
heap
page read and write
D9E000
heap
page read and write
4F4F000
stack
page read and write
634000
heap
page read and write
3F2F000
stack
page read and write
4581000
heap
page read and write
4B90000
direct allocation
page execute and read and write
AA1000
unkown
page execute and read and write
634000
heap
page read and write
4570000
direct allocation
page read and write
4570000
direct allocation
page read and write
278E000
stack
page read and write
51DD000
stack
page read and write
3E2E000
stack
page read and write
4E0D000
stack
page read and write
E17000
heap
page read and write
4B90000
direct allocation
page execute and read and write
E12000
heap
page read and write
There are 179 hidden memdumps, click here to show them.