IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
studennotediw.stor
malicious
spirittunek.stor
malicious
eaglepawnoy.stor
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://steamcommunity.com/I
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
steamcommunity.com
104.102.49.254
eaglepawnoy.store
unknown
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
dissapoiznw.store
unknown

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
D21000
unkown
page execute and read and write
malicious
5030000
direct allocation
page execute and read and write
BB0000
heap
page read and write
F0F000
unkown
page execute and read and write
38DE000
stack
page read and write
4FEF000
stack
page read and write
1380000
direct allocation
page read and write
47DE000
stack
page read and write
1380000
direct allocation
page read and write
13C8000
heap
page read and write
57BF000
stack
page read and write
7D0000
heap
page read and write
13EB000
heap
page read and write
13F1000
heap
page read and write
3F1E000
stack
page read and write
146E000
heap
page read and write
33DE000
stack
page read and write
100E000
unkown
page execute and read and write
4A21000
heap
page read and write
1015000
unkown
page execute and read and write
1417000
heap
page read and write
3C5F000
stack
page read and write
142C000
heap
page read and write
39DF000
stack
page read and write
419E000
stack
page read and write
140B000
heap
page read and write
13D4000
heap
page read and write
329F000
stack
page read and write
3A1E000
stack
page read and write
4EB0000
direct allocation
page read and write
11BA000
unkown
page execute and read and write
309F000
stack
page read and write
139E000
heap
page read and write
401F000
stack
page read and write
4A21000
heap
page read and write
2E70000
heap
page read and write
5050000
direct allocation
page execute and read and write
53EE000
stack
page read and write
13DF000
heap
page read and write
1461000
heap
page read and write
140D000
heap
page read and write
415F000
stack
page read and write
465F000
stack
page read and write
339F000
stack
page read and write
1417000
heap
page read and write
361F000
stack
page read and write
4A20000
heap
page read and write
3B1F000
stack
page read and write
4A21000
heap
page read and write
1380000
direct allocation
page read and write
142C000
heap
page read and write
4E60000
trusted library allocation
page read and write
140D000
heap
page read and write
3DDE000
stack
page read and write
1380000
direct allocation
page read and write
1462000
heap
page read and write
4EB0000
direct allocation
page read and write
CCE000
stack
page read and write
5030000
direct allocation
page execute and read and write
4A21000
heap
page read and write
516D000
stack
page read and write
2E90000
heap
page read and write
12BF000
stack
page read and write
1390000
heap
page read and write
B4E000
stack
page read and write
1024000
unkown
page execute and read and write
455E000
stack
page read and write
491E000
stack
page read and write
13F4000
heap
page read and write
375F000
stack
page read and write
5500000
remote allocation
page read and write
429F000
stack
page read and write
4A21000
heap
page read and write
1380000
direct allocation
page read and write
133E000
stack
page read and write
4A21000
heap
page read and write
13D9000
heap
page read and write
141C000
heap
page read and write
405E000
stack
page read and write
1380000
direct allocation
page read and write
4A21000
heap
page read and write
2E97000
heap
page read and write
13F1000
heap
page read and write
1425000
heap
page read and write
1024000
unkown
page execute and write copy
351E000
stack
page read and write
48DF000
stack
page read and write
142C000
heap
page read and write
5020000
direct allocation
page execute and read and write
141C000
heap
page read and write
4EEE000
stack
page read and write
142C000
heap
page read and write
4A21000
heap
page read and write
13D6000
heap
page read and write
142E000
heap
page read and write
141C000
heap
page read and write
BB5000
heap
page read and write
2E2F000
stack
page read and write
140D000
heap
page read and write
53AE000
stack
page read and write
13F4000
heap
page read and write
5030000
direct allocation
page execute and read and write
34DF000
stack
page read and write
11BB000
unkown
page execute and write copy
13DF000
heap
page read and write
469E000
stack
page read and write
D10000
heap
page read and write
142E000
heap
page read and write
4A21000
heap
page read and write
1025000
unkown
page execute and write copy
B9E000
stack
page read and write
4A21000
heap
page read and write
4E9D000
stack
page read and write
4A21000
heap
page read and write
52AE000
stack
page read and write
5060000
direct allocation
page execute and read and write
1425000
heap
page read and write
5030000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
441E000
stack
page read and write
2E6E000
stack
page read and write
365E000
stack
page read and write
4EB0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
526D000
stack
page read and write
5030000
direct allocation
page execute and read and write
D0C000
stack
page read and write
43DF000
stack
page read and write
1425000
heap
page read and write
1380000
direct allocation
page read and write
1380000
direct allocation
page read and write
4A21000
heap
page read and write
146A000
heap
page read and write
4A30000
heap
page read and write
56BE000
stack
page read and write
5500000
remote allocation
page read and write
1464000
heap
page read and write
3C9E000
stack
page read and write
FE4000
unkown
page execute and read and write
3B5E000
stack
page read and write
7E0000
heap
page read and write
2D2F000
stack
page read and write
142E000
heap
page read and write
1425000
heap
page read and write
5500000
remote allocation
page read and write
42DE000
stack
page read and write
389F000
stack
page read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
D20000
unkown
page readonly
319F000
stack
page read and write
D20000
unkown
page read and write
5040000
direct allocation
page execute and read and write
4A1F000
stack
page read and write
4A21000
heap
page read and write
1409000
heap
page read and write
142C000
heap
page read and write
1380000
direct allocation
page read and write
142E000
heap
page read and write
4A21000
heap
page read and write
1380000
direct allocation
page read and write
479F000
stack
page read and write
1380000
direct allocation
page read and write
1412000
heap
page read and write
1417000
heap
page read and write
12FE000
stack
page read and write
4A21000
heap
page read and write
141C000
heap
page read and write
1380000
direct allocation
page read and write
564E000
stack
page read and write
3D9F000
stack
page read and write
4A21000
heap
page read and write
77C000
stack
page read and write
137E000
stack
page read and write
503D000
stack
page read and write
142E000
heap
page read and write
379E000
stack
page read and write
5079000
trusted library allocation
page read and write
13DA000
heap
page read and write
5010000
direct allocation
page execute and read and write
1413000
heap
page read and write
54EF000
stack
page read and write
AFD000
stack
page read and write
2F9F000
stack
page read and write
D21000
unkown
page execute and write copy
451F000
stack
page read and write
D80000
unkown
page execute and read and write
139A000
heap
page read and write
3EDF000
stack
page read and write
1417000
heap
page read and write
4A21000
heap
page read and write
1380000
direct allocation
page read and write
554D000
stack
page read and write
13EB000
heap
page read and write
1380000
direct allocation
page read and write
There are 185 hidden memdumps, click here to show them.