IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900t
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
23.192.247.89
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=Gu9gs5hf
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=M7aU
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://steamcommunity.com:443/profiles/76561199724331900L
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.192.247.89
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
23.192.247.89
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D41000
unkown
page execute and read and write
malicious
30E0000
direct allocation
page read and write
1530000
direct allocation
page read and write
1590000
heap
page read and write
566D000
stack
page read and write
443E000
stack
page read and write
4E01000
heap
page read and write
1540000
heap
page read and write
3CBE000
stack
page read and write
552D000
stack
page read and write
3A3E000
stack
page read and write
5280000
direct allocation
page read and write
D3E000
stack
page read and write
4E01000
heap
page read and write
FFF000
unkown
page execute and read and write
1688000
heap
page read and write
1530000
direct allocation
page read and write
52BE000
stack
page read and write
4E01000
heap
page read and write
C2D000
stack
page read and write
53F0000
direct allocation
page execute and read and write
53FD000
stack
page read and write
167F000
heap
page read and write
D40000
unkown
page read and write
590D000
stack
page read and write
3B3F000
stack
page read and write
4A7E000
stack
page read and write
42FE000
stack
page read and write
38FE000
stack
page read and write
1043000
unkown
page execute and write copy
1681000
heap
page read and write
3DBF000
stack
page read and write
57AE000
stack
page read and write
34FF000
stack
page read and write
1644000
heap
page read and write
32FF000
stack
page read and write
403F000
stack
page read and write
15F1000
heap
page read and write
53F0000
direct allocation
page execute and read and write
30CE000
stack
page read and write
5A7E000
stack
page read and write
4BBE000
stack
page read and write
5A0E000
stack
page read and write
F1E000
unkown
page execute and read and write
15FE000
heap
page read and write
457E000
stack
page read and write
527D000
stack
page read and write
5400000
direct allocation
page execute and read and write
11DF000
unkown
page execute and write copy
151E000
stack
page read and write
1644000
heap
page read and write
53F0000
direct allocation
page execute and read and write
15BE000
heap
page read and write
1530000
direct allocation
page read and write
562D000
stack
page read and write
53C0000
direct allocation
page execute and read and write
48FF000
stack
page read and write
4E01000
heap
page read and write
58C0000
remote allocation
page read and write
4E01000
heap
page read and write
453E000
stack
page read and write
1637000
heap
page read and write
4E01000
heap
page read and write
1649000
heap
page read and write
493E000
stack
page read and write
1644000
heap
page read and write
53F0000
direct allocation
page execute and read and write
4E01000
heap
page read and write
377F000
stack
page read and write
102A000
unkown
page execute and read and write
39FF000
stack
page read and write
17AF000
stack
page read and write
5B7F000
stack
page read and write
4CBF000
stack
page read and write
1614000
heap
page read and write
5420000
direct allocation
page execute and read and write
4E01000
heap
page read and write
164B000
heap
page read and write
353E000
stack
page read and write
467F000
stack
page read and write
58AF000
stack
page read and write
31FF000
stack
page read and write
38BF000
stack
page read and write
1639000
heap
page read and write
3F3E000
stack
page read and write
3DFE000
stack
page read and write
576E000
stack
page read and write
4CFE000
stack
page read and write
1638000
heap
page read and write
164B000
heap
page read and write
53F0000
direct allocation
page execute and read and write
33FF000
stack
page read and write
1530000
direct allocation
page read and write
4E01000
heap
page read and write
1033000
unkown
page execute and read and write
15FE000
heap
page read and write
1530000
direct allocation
page read and write
58C0000
remote allocation
page read and write
1545000
heap
page read and write
15E9000
heap
page read and write
5438000
trusted library allocation
page read and write
4E01000
heap
page read and write
158C000
stack
page read and write
15F7000
heap
page read and write
15B0000
heap
page read and write
41BE000
stack
page read and write
1530000
direct allocation
page read and write
11DF000
unkown
page execute and read and write
4E00000
heap
page read and write
1042000
unkown
page execute and write copy
1611000
heap
page read and write
53D0000
direct allocation
page execute and read and write
363F000
stack
page read and write
164F000
heap
page read and write
164F000
heap
page read and write
1530000
direct allocation
page read and write
164F000
heap
page read and write
D41000
unkown
page execute and write copy
C80000
heap
page read and write
47FE000
stack
page read and write
43FF000
stack
page read and write
11E0000
unkown
page execute and write copy
1530000
direct allocation
page read and write
4E01000
heap
page read and write
1530000
direct allocation
page read and write
1530000
direct allocation
page read and write
1644000
heap
page read and write
3C7F000
stack
page read and write
30E0000
direct allocation
page read and write
367E000
stack
page read and write
B2C000
stack
page read and write
1042000
unkown
page execute and read and write
4E01000
heap
page read and write
164B000
heap
page read and write
46BE000
stack
page read and write
1637000
heap
page read and write
4B7F000
stack
page read and write
161C000
heap
page read and write
161C000
heap
page read and write
4E01000
heap
page read and write
1530000
direct allocation
page read and write
1530000
direct allocation
page read and write
407E000
stack
page read and write
3EFF000
stack
page read and write
53BF000
stack
page read and write
58C0000
remote allocation
page read and write
1680000
heap
page read and write
308E000
stack
page read and write
4E01000
heap
page read and write
42BF000
stack
page read and write
1520000
heap
page read and write
4E01000
heap
page read and write
164F000
heap
page read and write
C90000
heap
page read and write
47BF000
stack
page read and write
4DFF000
stack
page read and write
37BE000
stack
page read and write
1613000
heap
page read and write
DA0000
unkown
page execute and read and write
30F0000
heap
page read and write
4E01000
heap
page read and write
1637000
heap
page read and write
15F5000
heap
page read and write
18AF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
417F000
stack
page read and write
30F7000
heap
page read and write
15F9000
heap
page read and write
1611000
heap
page read and write
161C000
heap
page read and write
4E01000
heap
page read and write
5240000
trusted library allocation
page read and write
CFE000
stack
page read and write
15BA000
heap
page read and write
D40000
unkown
page readonly
5410000
direct allocation
page execute and read and write
1530000
direct allocation
page read and write
4E01000
heap
page read and write
1530000
direct allocation
page read and write
4A3F000
stack
page read and write
3B7E000
stack
page read and write
164B000
heap
page read and write
53F0000
direct allocation
page execute and read and write
There are 173 hidden memdumps, click here to show them.