IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://steamcommunity.com/profiles/76561199724331900F_
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
unknown
malicious
bathdoomgaz.store
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
studennotediw.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://clearancek.site/api
unknown
malicious
https://clearancek.site/N
unknown
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://licendfilteo.site/api
unknown
malicious
https://steamcommunity.com/
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
steamcommunity.com
104.102.49.254

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
F11000
unkown
page execute and read and write
malicious
DE0000
direct allocation
page read and write
C44000
heap
page read and write
518E000
stack
page read and write
DE0000
direct allocation
page read and write
389F000
stack
page read and write
361F000
stack
page read and write
1212000
unkown
page execute and read and write
2FDF000
stack
page read and write
4FDF000
stack
page read and write
415E000
stack
page read and write
E96000
heap
page read and write
77C000
stack
page read and write
C44000
heap
page read and write
E4E000
heap
page read and write
E0E000
heap
page read and write
DE0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
4FE0000
direct allocation
page execute and read and write
E8F000
heap
page read and write
1212000
unkown
page execute and write copy
4E90000
remote allocation
page read and write
DE0000
direct allocation
page read and write
E96000
heap
page read and write
501D000
stack
page read and write
14AE000
stack
page read and write
11D0000
unkown
page execute and read and write
F00000
direct allocation
page read and write
7D0000
heap
page read and write
505B000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
429F000
stack
page read and write
365E000
stack
page read and write
5010000
direct allocation
page execute and read and write
E33000
heap
page read and write
C44000
heap
page read and write
E63000
heap
page read and write
514E000
stack
page read and write
10F2000
unkown
page execute and read and write
528D000
stack
page read and write
3B5E000
stack
page read and write
4E60000
heap
page read and write
375F000
stack
page read and write
E96000
heap
page read and write
351E000
stack
page read and write
441E000
stack
page read and write
E8F000
heap
page read and write
D4F000
stack
page read and write
E49000
heap
page read and write
3DDE000
stack
page read and write
E7C000
heap
page read and write
E45000
heap
page read and write
C44000
heap
page read and write
C40000
heap
page read and write
3B1F000
stack
page read and write
4A21000
heap
page read and write
E8F000
heap
page read and write
3F1E000
stack
page read and write
4A21000
heap
page read and write
DE0000
direct allocation
page read and write
2DD7000
heap
page read and write
5010000
direct allocation
page execute and read and write
53CF000
stack
page read and write
5010000
direct allocation
page execute and read and write
4A20000
heap
page read and write
5010000
direct allocation
page execute and read and write
1213000
unkown
page execute and write copy
E8F000
heap
page read and write
4A21000
heap
page read and write
2DD0000
heap
page read and write
401F000
stack
page read and write
451F000
stack
page read and write
4E90000
remote allocation
page read and write
DE0000
direct allocation
page read and write
DE0000
direct allocation
page read and write
419E000
stack
page read and write
F70000
unkown
page execute and read and write
C44000
heap
page read and write
43DF000
stack
page read and write
C1E000
stack
page read and write
E91000
heap
page read and write
3A1E000
stack
page read and write
2D4F000
stack
page read and write
405E000
stack
page read and write
E60000
heap
page read and write
4A21000
heap
page read and write
491E000
stack
page read and write
C44000
heap
page read and write
E45000
heap
page read and write
4EA0000
direct allocation
page read and write
52CE000
stack
page read and write
E63000
heap
page read and write
C44000
heap
page read and write
5000000
direct allocation
page execute and read and write
C44000
heap
page read and write
E91000
heap
page read and write
554E000
stack
page read and write
34DF000
stack
page read and write
1204000
unkown
page execute and read and write
DE0000
direct allocation
page read and write
4A21000
heap
page read and write
301E000
stack
page read and write
33DE000
stack
page read and write
E49000
heap
page read and write
E37000
heap
page read and write
564D000
stack
page read and write
DCE000
stack
page read and write
AFD000
stack
page read and write
C44000
heap
page read and write
E49000
heap
page read and write
D8E000
stack
page read and write
540E000
stack
page read and write
C44000
heap
page read and write
5010000
direct allocation
page execute and read and write
379E000
stack
page read and write
4E90000
remote allocation
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
E7C000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
47DE000
stack
page read and write
5010000
direct allocation
page execute and read and write
F10000
unkown
page readonly
C44000
heap
page read and write
3EDF000
stack
page read and write
E88000
heap
page read and write
42DE000
stack
page read and write
469E000
stack
page read and write
3D9F000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
C44000
heap
page read and write
455E000
stack
page read and write
4A21000
heap
page read and write
C44000
heap
page read and write
E00000
heap
page read and write
329E000
stack
page read and write
4A21000
heap
page read and write
C44000
heap
page read and write
DE0000
direct allocation
page read and write
DE0000
direct allocation
page read and write
311F000
stack
page read and write
5020000
direct allocation
page execute and read and write
DE0000
direct allocation
page read and write
DE0000
direct allocation
page read and write
2D8E000
stack
page read and write
DD0000
heap
page read and write
4B20000
trusted library allocation
page read and write
38DE000
stack
page read and write
13AB000
unkown
page execute and write copy
325F000
stack
page read and write
3C9E000
stack
page read and write
E60000
heap
page read and write
C44000
heap
page read and write
339F000
stack
page read and write
4A1F000
stack
page read and write
C44000
heap
page read and write
E7C000
heap
page read and write
465F000
stack
page read and write
C44000
heap
page read and write
E87000
heap
page read and write
E37000
heap
page read and write
F10000
unkown
page read and write
C44000
heap
page read and write
E91000
heap
page read and write
4EDE000
stack
page read and write
479F000
stack
page read and write
7E0000
heap
page read and write
E96000
heap
page read and write
11FB000
unkown
page execute and read and write
F11000
unkown
page execute and write copy
E4E000
heap
page read and write
3C5F000
stack
page read and write
550E000
stack
page read and write
E0A000
heap
page read and write
315E000
stack
page read and write
E60000
heap
page read and write
2EDF000
stack
page read and write
E63000
heap
page read and write
C44000
heap
page read and write
E4E000
heap
page read and write
C44000
heap
page read and write
C44000
heap
page read and write
DE0000
direct allocation
page read and write
13AA000
unkown
page execute and read and write
4A21000
heap
page read and write
4A21000
heap
page read and write
F00000
direct allocation
page read and write
48DF000
stack
page read and write
39DF000
stack
page read and write
2DCE000
stack
page read and write
DE0000
direct allocation
page read and write
There are 182 hidden memdumps, click here to show them.