IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
23.192.247.89
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com/profiles/76561199724331900n
unknown
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Gu9gs5hf
unknown
https://steamcommunity.com/o
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=M7aU
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.192.247.89
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.57.34
s-part-0032.t-0009.t-msedge.net
13.107.246.60
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
23.192.247.89
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CC1000
unkown
page execute and read and write
malicious
397E000
stack
page read and write
3A7F000
stack
page read and write
CB0000
heap
page read and write
4CC0000
direct allocation
page read and write
4E50000
direct allocation
page execute and read and write
AF2000
heap
page read and write
A97000
heap
page read and write
4E20000
direct allocation
page execute and read and write
2BBC000
stack
page read and write
4C80000
heap
page read and write
A04000
heap
page read and write
37FF000
stack
page read and write
A04000
heap
page read and write
437E000
stack
page read and write
357F000
stack
page read and write
F85000
unkown
page execute and read and write
40FE000
stack
page read and write
41FF000
stack
page read and write
2A50000
direct allocation
page read and write
A04000
heap
page read and write
4FCD000
stack
page read and write
A04000
heap
page read and write
2A77000
heap
page read and write
4CFE000
stack
page read and write
3FBE000
stack
page read and write
2A50000
direct allocation
page read and write
4850000
heap
page read and write
2A50000
direct allocation
page read and write
4E40000
direct allocation
page execute and read and write
3E3F000
stack
page read and write
4E60000
direct allocation
page execute and read and write
A04000
heap
page read and write
B34000
heap
page read and write
4E10000
direct allocation
page execute and read and write
2F7E000
stack
page read and write
4CB0000
remote allocation
page read and write
45FE000
stack
page read and write
126F000
stack
page read and write
3ABE000
stack
page read and write
A04000
heap
page read and write
4E40000
direct allocation
page execute and read and write
A04000
heap
page read and write
8FD000
stack
page read and write
2CFE000
stack
page read and write
4841000
heap
page read and write
46FF000
stack
page read and write
2A70000
heap
page read and write
343F000
stack
page read and write
2A4E000
stack
page read and write
40BF000
stack
page read and write
ACD000
heap
page read and write
4E40000
direct allocation
page execute and read and write
AC0000
heap
page read and write
EA7000
unkown
page execute and read and write
4E70000
direct allocation
page execute and read and write
A6A000
heap
page read and write
4DFF000
stack
page read and write
393F000
stack
page read and write
4841000
heap
page read and write
ADE000
heap
page read and write
116C000
unkown
page execute and read and write
A04000
heap
page read and write
C9E000
stack
page read and write
AF2000
heap
page read and write
AA3000
heap
page read and write
A93000
heap
page read and write
AAE000
heap
page read and write
A04000
heap
page read and write
2A50000
direct allocation
page read and write
433F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
3CFF000
stack
page read and write
548D000
stack
page read and write
5F0000
heap
page read and write
4841000
heap
page read and write
4841000
heap
page read and write
4840000
heap
page read and write
4841000
heap
page read and write
4E92000
trusted library allocation
page read and write
50CD000
stack
page read and write
520F000
stack
page read and write
FAF000
unkown
page execute and read and write
3D3E000
stack
page read and write
4841000
heap
page read and write
A6E000
heap
page read and write
2A50000
direct allocation
page read and write
2B7F000
stack
page read and write
4841000
heap
page read and write
45BF000
stack
page read and write
4E4D000
stack
page read and write
333E000
stack
page read and write
FCC000
unkown
page execute and read and write
AC0000
heap
page read and write
A97000
heap
page read and write
483F000
stack
page read and write
347E000
stack
page read and write
A60000
heap
page read and write
A04000
heap
page read and write
36BF000
stack
page read and write
59C000
stack
page read and write
423E000
stack
page read and write
A04000
heap
page read and write
4CC0000
direct allocation
page read and write
A04000
heap
page read and write
ADE000
heap
page read and write
3F7F000
stack
page read and write
AEE000
heap
page read and write
2CBF000
stack
page read and write
FBE000
unkown
page execute and read and write
4CB0000
remote allocation
page read and write
534F000
stack
page read and write
A00000
heap
page read and write
4CB0000
remote allocation
page read and write
2A50000
direct allocation
page read and write
44BE000
stack
page read and write
31BF000
stack
page read and write
3BBF000
stack
page read and write
2F3F000
stack
page read and write
AA3000
heap
page read and write
4E40000
direct allocation
page execute and read and write
A04000
heap
page read and write
55FF000
stack
page read and write
36FE000
stack
page read and write
307F000
stack
page read and write
4841000
heap
page read and write
ACD000
heap
page read and write
35BE000
stack
page read and write
54FE000
stack
page read and write
AAE000
heap
page read and write
FCC000
unkown
page execute and write copy
2A50000
direct allocation
page read and write
A04000
heap
page read and write
524E000
stack
page read and write
A4E000
stack
page read and write
A04000
heap
page read and write
2DFF000
stack
page read and write
CC1000
unkown
page execute and write copy
C5F000
stack
page read and write
116D000
unkown
page execute and write copy
A04000
heap
page read and write
30BE000
stack
page read and write
2A50000
direct allocation
page read and write
A04000
heap
page read and write
CC0000
unkown
page read and write
4E80000
direct allocation
page execute and read and write
473E000
stack
page read and write
A04000
heap
page read and write
A04000
heap
page read and write
4940000
trusted library allocation
page read and write
2A50000
direct allocation
page read and write
A04000
heap
page read and write
4F8E000
stack
page read and write
2A50000
direct allocation
page read and write
4CC0000
direct allocation
page read and write
A04000
heap
page read and write
A04000
heap
page read and write
2A50000
direct allocation
page read and write
AEE000
heap
page read and write
9D0000
heap
page read and write
3E7E000
stack
page read and write
CC0000
unkown
page readonly
A04000
heap
page read and write
4E40000
direct allocation
page execute and read and write
2A50000
direct allocation
page read and write
32FF000
stack
page read and write
4841000
heap
page read and write
2A50000
direct allocation
page read and write
510E000
stack
page read and write
A04000
heap
page read and write
3BFE000
stack
page read and write
B3B000
heap
page read and write
D20000
unkown
page execute and read and write
A04000
heap
page read and write
447F000
stack
page read and write
FCD000
unkown
page execute and write copy
31FE000
stack
page read and write
2A50000
direct allocation
page read and write
2E3E000
stack
page read and write
383E000
stack
page read and write
4841000
heap
page read and write
538E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
There are 173 hidden memdumps, click here to show them.