IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
https://studennotediw.store/api
unknown
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://bathdoomgaz.st
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Gu9gs5hf
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=M7aU
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
5C1000
unkown
page execute and read and write
malicious
B60000
direct allocation
page read and write
DDD000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
DC3000
heap
page read and write
44C1000
heap
page read and write
3D3F000
stack
page read and write
8D4000
unkown
page execute and write copy
2A7F000
stack
page read and write
E3F000
heap
page read and write
D60000
heap
page read and write
DA2000
heap
page read and write
323E000
stack
page read and write
E3B000
heap
page read and write
DEB000
heap
page read and write
4C2E000
stack
page read and write
A7A000
unkown
page execute and read and write
4E6F000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
DE7000
heap
page read and write
297E000
stack
page read and write
2BBF000
stack
page read and write
2CFF000
stack
page read and write
B60000
direct allocation
page read and write
520000
heap
page read and write
34BE000
stack
page read and write
44C1000
heap
page read and write
397F000
stack
page read and write
DC0000
heap
page read and write
337E000
stack
page read and write
44C1000
heap
page read and write
59E000
stack
page read and write
50EE000
stack
page read and write
3AFD000
stack
page read and write
44C1000
heap
page read and write
C7F000
stack
page read and write
44D0000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
D50000
direct allocation
page execute and read and write
8B9000
unkown
page execute and read and write
DE7000
heap
page read and write
4FD000
stack
page read and write
3FBF000
stack
page read and write
B75000
heap
page read and write
383F000
stack
page read and write
8D5000
unkown
page execute and write copy
3EBE000
stack
page read and write
4FAF000
stack
page read and write
36FF000
stack
page read and write
373E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
F5F000
stack
page read and write
DF4000
heap
page read and write
44C1000
heap
page read and write
39BE000
stack
page read and write
B60000
direct allocation
page read and write
5C0000
unkown
page readonly
44C1000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
CC0000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
D40000
direct allocation
page read and write
44C1000
heap
page read and write
4900000
trusted library allocation
page read and write
423F000
stack
page read and write
437F000
stack
page read and write
293F000
stack
page read and write
497E000
stack
page read and write
B60000
direct allocation
page read and write
DA9000
heap
page read and write
35BF000
stack
page read and write
D6E000
heap
page read and write
DAE000
heap
page read and write
DA5000
heap
page read and write
B60000
direct allocation
page read and write
523F000
stack
page read and write
DA8000
heap
page read and write
B60000
direct allocation
page read and write
44C1000
heap
page read and write
387E000
stack
page read and write
DEB000
heap
page read and write
D40000
direct allocation
page read and write
3ABF000
stack
page read and write
DC0000
heap
page read and write
2FBE000
stack
page read and write
B60000
direct allocation
page read and write
D6A000
heap
page read and write
4D2D000
stack
page read and write
E33000
heap
page read and write
1CC000
stack
page read and write
30FE000
stack
page read and write
31FF000
stack
page read and write
530000
heap
page read and write
4EAE000
stack
page read and write
DEB000
heap
page read and write
B60000
direct allocation
page read and write
4AF1000
trusted library allocation
page read and write
2ABE000
stack
page read and write
333F000
stack
page read and write
CF7000
heap
page read and write
DDB000
heap
page read and write
27FF000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
CBE000
stack
page read and write
44C1000
heap
page read and write
283C000
stack
page read and write
E01000
heap
page read and write
347F000
stack
page read and write
88D000
unkown
page execute and read and write
3D7E000
stack
page read and write
B60000
direct allocation
page read and write
40FF000
stack
page read and write
2E3F000
stack
page read and write
E01000
heap
page read and write
7AE000
unkown
page execute and read and write
E01000
heap
page read and write
2F7F000
stack
page read and write
4A80000
remote allocation
page read and write
DDB000
heap
page read and write
E01000
heap
page read and write
44C1000
heap
page read and write
B60000
direct allocation
page read and write
413E000
stack
page read and write
3BFF000
stack
page read and write
B50000
heap
page read and write
3E7F000
stack
page read and write
DC3000
heap
page read and write
3FFE000
stack
page read and write
2E7E000
stack
page read and write
B60000
direct allocation
page read and write
DAE000
heap
page read and write
5C1000
unkown
page execute and write copy
44BF000
stack
page read and write
5C0000
unkown
page read and write
D98000
heap
page read and write
B60000
direct allocation
page read and write
4D6E000
stack
page read and write
2BFE000
stack
page read and write
44C1000
heap
page read and write
620000
unkown
page execute and read and write
513E000
stack
page read and write
4A80000
direct allocation
page execute and read and write
E32000
heap
page read and write
4A7F000
stack
page read and write
44C0000
heap
page read and write
4A90000
direct allocation
page execute and read and write
4BED000
stack
page read and write
30BF000
stack
page read and write
B70000
heap
page read and write
43BE000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
D3E000
stack
page read and write
8D4000
unkown
page execute and read and write
44C1000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
35FE000
stack
page read and write
4A80000
remote allocation
page read and write
4AC0000
direct allocation
page execute and read and write
44C1000
heap
page read and write
CF0000
heap
page read and write
44C1000
heap
page read and write
427E000
stack
page read and write
B60000
direct allocation
page read and write
44C1000
heap
page read and write
44C1000
heap
page read and write
2D3E000
stack
page read and write
493D000
stack
page read and write
E35000
heap
page read and write
4A80000
remote allocation
page read and write
DF5000
heap
page read and write
8C4000
unkown
page execute and read and write
B60000
direct allocation
page read and write
44C1000
heap
page read and write
DE7000
heap
page read and write
44C1000
heap
page read and write
4FED000
stack
page read and write
44C1000
heap
page read and write
DDF000
heap
page read and write
4940000
direct allocation
page read and write
3C3E000
stack
page read and write
There are 170 hidden memdumps, click here to show them.