IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
https://clearancek.site:443/api
unknown
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://licendfilteo.site:443/api
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
701000
unkown
page execute and read and write
malicious
13E4000
heap
page read and write
406E000
stack
page read and write
13DE000
stack
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
53C0000
remote allocation
page read and write
4B6F000
stack
page read and write
47AF000
stack
page read and write
5405000
trusted library allocation
page read and write
9CE000
unkown
page execute and read and write
14F0000
direct allocation
page read and write
366E000
stack
page read and write
456E000
stack
page read and write
4E00000
heap
page read and write
14F0000
direct allocation
page read and write
4A2F000
stack
page read and write
53D0000
direct allocation
page execute and read and write
553D000
stack
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
466F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
4DF0000
heap
page read and write
452E000
stack
page read and write
701000
unkown
page execute and write copy
48EF000
stack
page read and write
4A6E000
stack
page read and write
A0D000
unkown
page execute and write copy
53C0000
direct allocation
page execute and read and write
53C0000
direct allocation
page execute and read and write
15A4000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
30F0000
direct allocation
page read and write
32AE000
stack
page read and write
13E4000
heap
page read and write
53C0000
direct allocation
page execute and read and write
47EE000
stack
page read and write
316C000
stack
page read and write
14F0000
direct allocation
page read and write
402F000
stack
page read and write
8EE000
unkown
page execute and read and write
151A000
heap
page read and write
1330000
heap
page read and write
3CAE000
stack
page read and write
3B2F000
stack
page read and write
3120000
heap
page read and write
3100000
heap
page read and write
4DF1000
heap
page read and write
30F0000
direct allocation
page read and write
156F000
heap
page read and write
526D000
stack
page read and write
4DEF000
stack
page read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
1510000
heap
page read and write
700000
unkown
page readonly
13E4000
heap
page read and write
13E4000
heap
page read and write
34EF000
stack
page read and write
13E4000
heap
page read and write
39EF000
stack
page read and write
326F000
stack
page read and write
14F0000
direct allocation
page read and write
158E000
heap
page read and write
15D8000
heap
page read and write
53F0000
direct allocation
page execute and read and write
14F0000
direct allocation
page read and write
4CEE000
stack
page read and write
33EE000
stack
page read and write
53C0000
remote allocation
page read and write
14F0000
direct allocation
page read and write
A0D000
unkown
page execute and read and write
13E4000
heap
page read and write
170F000
stack
page read and write
577F000
stack
page read and write
139E000
stack
page read and write
38AF000
stack
page read and write
4DF1000
heap
page read and write
4DF1000
heap
page read and write
3B6E000
stack
page read and write
14F0000
direct allocation
page read and write
13E4000
heap
page read and write
15DC000
heap
page read and write
5A6E000
stack
page read and write
590D000
stack
page read and write
15DC000
heap
page read and write
442D000
stack
page read and write
42AF000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4DF1000
heap
page read and write
52AE000
stack
page read and write
14F0000
direct allocation
page read and write
FCC000
stack
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
5A0D000
stack
page read and write
53C0000
remote allocation
page read and write
14E0000
heap
page read and write
1548000
heap
page read and write
13E4000
heap
page read and write
9F7000
unkown
page execute and read and write
14F0000
direct allocation
page read and write
13E4000
heap
page read and write
1320000
heap
page read and write
3127000
heap
page read and write
1555000
heap
page read and write
5B6F000
stack
page read and write
14F0000
direct allocation
page read and write
30EF000
stack
page read and write
3A2E000
stack
page read and write
14F0000
direct allocation
page read and write
3DEE000
stack
page read and write
4CAF000
stack
page read and write
362F000
stack
page read and write
13E4000
heap
page read and write
492E000
stack
page read and write
1555000
heap
page read and write
15A4000
heap
page read and write
1543000
heap
page read and write
41AE000
stack
page read and write
700000
unkown
page read and write
53C0000
direct allocation
page execute and read and write
57BE000
stack
page read and write
15DD000
heap
page read and write
158E000
heap
page read and write
13E4000
heap
page read and write
13E4000
heap
page read and write
3100000
direct allocation
page execute and read and write
760000
unkown
page execute and read and write
155E000
heap
page read and write
15DC000
heap
page read and write
13E4000
heap
page read and write
567E000
stack
page read and write
3F2E000
stack
page read and write
9FF000
unkown
page execute and read and write
38EE000
stack
page read and write
3EEF000
stack
page read and write
14F0000
direct allocation
page read and write
A0E000
unkown
page execute and write copy
156F000
heap
page read and write
3110000
direct allocation
page execute and read and write
54FE000
stack
page read and write
BAB000
unkown
page execute and read and write
3C6F000
stack
page read and write
416F000
stack
page read and write
13E0000
heap
page read and write
155E000
heap
page read and write
42EE000
stack
page read and write
33AF000
stack
page read and write
2FEE000
stack
page read and write
5270000
direct allocation
page read and write
53C0000
direct allocation
page execute and read and write
43EF000
stack
page read and write
37AE000
stack
page read and write
58BF000
stack
page read and write
180F000
stack
page read and write
53AF000
stack
page read and write
13E4000
heap
page read and write
BAC000
unkown
page execute and write copy
352E000
stack
page read and write
53B0000
direct allocation
page execute and read and write
4EF0000
trusted library allocation
page read and write
12FD000
stack
page read and write
1548000
heap
page read and write
15D7000
heap
page read and write
4DF1000
heap
page read and write
14F0000
direct allocation
page read and write
3DAF000
stack
page read and write
376F000
stack
page read and write
46AE000
stack
page read and write
14F0000
direct allocation
page read and write
563D000
stack
page read and write
4DF1000
heap
page read and write
4BAE000
stack
page read and write
13E4000
heap
page read and write
4DF1000
heap
page read and write
151E000
heap
page read and write
13E4000
heap
page read and write
There are 172 hidden memdumps, click here to show them.