IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199724331900$
unknown
malicious
dissapoiznw.storec
malicious
studennotediw.storec
malicious
https://clearancek.site:443/api
unknown
malicious
licendfilteo.sitec
malicious
clearancek.site
malicious
https://licendfilteo.site:443/api
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
bathdoomgaz.storec
malicious
https://steamcommunity.com/profiles/76561199724331900n%w
unknown
malicious
eaglepawnoy.storec
malicious
https://spirittunek.store:443/api
unknown
malicious
mobbipenju.store
malicious
spirittunek.storec
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=cdfm
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://steamcommunity.com:443/profiles/765611997243319007nP
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 77 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
steamcommunity.com
104.102.49.254

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
A11000
unkown
page execute and read and write
malicious
373F000
stack
page read and write
146B000
heap
page read and write
1450000
heap
page read and write
4B3F000
stack
page read and write
13D0000
direct allocation
page read and write
4B60000
heap
page read and write
1446000
heap
page read and write
3AFF000
stack
page read and write
146A000
heap
page read and write
313E000
stack
page read and write
13D0000
direct allocation
page read and write
133E000
stack
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
467E000
stack
page read and write
512F000
stack
page read and write
4B61000
heap
page read and write
58FF000
stack
page read and write
13EA000
heap
page read and write
44FF000
stack
page read and write
4B61000
heap
page read and write
49FF000
stack
page read and write
5170000
direct allocation
page execute and read and write
13D0000
direct allocation
page read and write
42BE000
stack
page read and write
4B40000
heap
page read and write
13D0000
direct allocation
page read and write
323F000
stack
page read and write
5170000
direct allocation
page execute and read and write
9F0000
heap
page read and write
4B61000
heap
page read and write
FFE000
stack
page read and write
13D0000
direct allocation
page read and write
13D0000
direct allocation
page read and write
142B000
heap
page read and write
39FE000
stack
page read and write
453E000
stack
page read and write
D1E000
unkown
page execute and read and write
52AD000
stack
page read and write
4B61000
heap
page read and write
33BE000
stack
page read and write
5640000
remote allocation
page read and write
377E000
stack
page read and write
3EBF000
stack
page read and write
4FF0000
direct allocation
page read and write
477F000
stack
page read and write
D0F000
unkown
page execute and read and write
3FFF000
stack
page read and write
CD7000
unkown
page execute and read and write
4B61000
heap
page read and write
A11000
unkown
page execute and write copy
3C3F000
stack
page read and write
51A0000
direct allocation
page execute and read and write
13D0000
direct allocation
page read and write
4B61000
heap
page read and write
A00000
heap
page read and write
34FE000
stack
page read and write
1444000
heap
page read and write
5170000
direct allocation
page execute and read and write
51B7000
trusted library allocation
page read and write
568D000
stack
page read and write
463F000
stack
page read and write
2E7F000
stack
page read and write
13BE000
stack
page read and write
13EE000
heap
page read and write
146C000
heap
page read and write
47BE000
stack
page read and write
4FA0000
trusted library allocation
page read and write
146A000
heap
page read and write
99D000
stack
page read and write
5170000
direct allocation
page execute and read and write
EBD000
unkown
page execute and read and write
35FF000
stack
page read and write
14B5000
heap
page read and write
43BF000
stack
page read and write
146A000
heap
page read and write
13D0000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
39BF000
stack
page read and write
5170000
direct allocation
page execute and read and write
15DF000
stack
page read and write
4B61000
heap
page read and write
1442000
heap
page read and write
2FFE000
stack
page read and write
53AD000
stack
page read and write
48FE000
stack
page read and write
417E000
stack
page read and write
3DBE000
stack
page read and write
D1F000
unkown
page execute and write copy
4B61000
heap
page read and write
1442000
heap
page read and write
4B61000
heap
page read and write
4B61000
heap
page read and write
5180000
direct allocation
page execute and read and write
4B61000
heap
page read and write
1472000
heap
page read and write
1426000
heap
page read and write
13D0000
direct allocation
page read and write
142F000
heap
page read and write
53EE000
stack
page read and write
578E000
stack
page read and write
337F000
stack
page read and write
427E000
stack
page read and write
5140000
direct allocation
page execute and read and write
4FF0000
direct allocation
page read and write
4FF0000
direct allocation
page read and write
1360000
heap
page read and write
4B61000
heap
page read and write
A10000
unkown
page readonly
12FE000
stack
page read and write
562F000
stack
page read and write
142F000
heap
page read and write
3EFE000
stack
page read and write
2EBC000
stack
page read and write
A10000
unkown
page read and write
A70000
unkown
page execute and read and write
1418000
heap
page read and write
3C7E000
stack
page read and write
13D0000
direct allocation
page read and write
1365000
heap
page read and write
D1E000
unkown
page execute and write copy
13C0000
heap
page read and write
4B61000
heap
page read and write
34BF000
stack
page read and write
43FE000
stack
page read and write
13E0000
heap
page read and write
142B000
heap
page read and write
4A3E000
stack
page read and write
4B61000
heap
page read and write
13D0000
direct allocation
page read and write
1442000
heap
page read and write
38BE000
stack
page read and write
1450000
heap
page read and write
5640000
remote allocation
page read and write
1471000
heap
page read and write
2FBF000
stack
page read and write
1450000
heap
page read and write
517E000
stack
page read and write
1350000
heap
page read and write
D04000
unkown
page execute and read and write
502E000
stack
page read and write
48BF000
stack
page read and write
13D0000
direct allocation
page read and write
552E000
stack
page read and write
327E000
stack
page read and write
EBE000
unkown
page execute and write copy
3D7F000
stack
page read and write
13D0000
direct allocation
page read and write
1357000
heap
page read and write
30FF000
stack
page read and write
387F000
stack
page read and write
BF9000
unkown
page execute and read and write
14AB000
heap
page read and write
5170000
direct allocation
page execute and read and write
1450000
heap
page read and write
363E000
stack
page read and write
5640000
remote allocation
page read and write
5160000
direct allocation
page execute and read and write
413F000
stack
page read and write
54EE000
stack
page read and write
4B61000
heap
page read and write
89C000
stack
page read and write
4B61000
heap
page read and write
5190000
direct allocation
page execute and read and write
57FE000
stack
page read and write
1429000
heap
page read and write
3B3E000
stack
page read and write
403E000
stack
page read and write
4FDD000
stack
page read and write
146A000
heap
page read and write
142F000
heap
page read and write
14B5000
heap
page read and write
13D0000
direct allocation
page read and write
There are 164 hidden memdumps, click here to show them.