IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://bathdoomgaz.store:443/api
unknown
malicious
https://studennotediw.store:443/api94
unknown
malicious
https://dissapoiznw.store:443/api
unknown
malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
https://clearancek.site:443/api5
unknown
malicious
https://eaglepawnoy.store:443/api
unknown
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
https://licendfilteo.site:443/apig5
unknown
malicious
https://spirittunek.store:443/api
unknown
malicious
mobbipenju.store
malicious
https://steamcommunity.com/profiles/76561199724331900F
unknown
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=engli
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steamcommunity.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 80 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
801000
unkown
page execute and read and write
malicious
5570000
remote allocation
page read and write
433E000
stack
page read and write
12CD000
heap
page read and write
50A0000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
A4F000
unkown
page execute and write copy
4A80000
direct allocation
page read and write
4A80000
direct allocation
page read and write
582F000
stack
page read and write
3E3E000
stack
page read and write
123E000
stack
page read and write
4A7F000
stack
page read and write
36BE000
stack
page read and write
A58000
unkown
page execute and write copy
10D0000
heap
page read and write
A73000
unkown
page execute and write copy
2E3F000
stack
page read and write
46BF000
stack
page read and write
5070000
direct allocation
page execute and read and write
42FF000
stack
page read and write
800000
unkown
page read and write
3B7F000
stack
page read and write
12DB000
heap
page read and write
147F000
stack
page read and write
407F000
stack
page read and write
12D5000
heap
page read and write
47FF000
stack
page read and write
800000
unkown
page readonly
4A90000
heap
page read and write
303F000
stack
page read and write
2D37000
heap
page read and write
AF6000
unkown
page execute and write copy
9C7000
unkown
page execute and read and write
5397000
trusted library allocation
page read and write
A7A000
unkown
page execute and read and write
2D00000
heap
page read and write
A2D000
unkown
page execute and read and write
9FA000
unkown
page execute and read and write
4A80000
direct allocation
page read and write
45BE000
stack
page read and write
38FF000
stack
page read and write
4A91000
heap
page read and write
497E000
stack
page read and write
9EB000
unkown
page execute and read and write
9E3000
unkown
page execute and write copy
4A91000
heap
page read and write
4A80000
direct allocation
page read and write
AC3000
unkown
page execute and read and write
1318000
heap
page read and write
50A0000
direct allocation
page execute and read and write
A98000
unkown
page execute and read and write
2CFE000
stack
page read and write
4A91000
heap
page read and write
4A80000
direct allocation
page read and write
9EA000
unkown
page execute and write copy
50A0000
direct allocation
page execute and read and write
4A91000
heap
page read and write
B05000
unkown
page execute and read and write
1286000
heap
page read and write
50A0000
direct allocation
page execute and read and write
12B6000
heap
page read and write
4F20000
direct allocation
page read and write
12DE000
heap
page read and write
128F000
heap
page read and write
46FE000
stack
page read and write
B06000
unkown
page execute and write copy
A52000
unkown
page execute and read and write
4A80000
direct allocation
page read and write
50AE000
stack
page read and write
801000
unkown
page execute and write copy
1311000
heap
page read and write
A84000
unkown
page execute and read and write
AF6000
unkown
page execute and write copy
393E000
stack
page read and write
A1B000
unkown
page execute and read and write
37BF000
stack
page read and write
55BD000
stack
page read and write
56BE000
stack
page read and write
AEE000
unkown
page execute and write copy
A6A000
unkown
page execute and read and write
50C0000
direct allocation
page execute and read and write
4A80000
direct allocation
page read and write
357E000
stack
page read and write
5090000
direct allocation
page execute and read and write
5299000
trusted library allocation
page read and write
32BF000
stack
page read and write
3F7E000
stack
page read and write
AF0000
unkown
page execute and read and write
4F20000
direct allocation
page read and write
A71000
unkown
page execute and write copy
A77000
unkown
page execute and write copy
1279000
heap
page read and write
41BF000
stack
page read and write
10C5000
heap
page read and write
483E000
stack
page read and write
A19000
unkown
page execute and write copy
ADE000
unkown
page execute and write copy
4A80000
direct allocation
page read and write
493F000
stack
page read and write
4A91000
heap
page read and write
447E000
stack
page read and write
A00000
unkown
page execute and read and write
A94000
unkown
page execute and write copy
9C9000
unkown
page execute and write copy
505F000
stack
page read and write
353F000
stack
page read and write
343E000
stack
page read and write
3CBF000
stack
page read and write
86C000
unkown
page execute and write copy
33FF000
stack
page read and write
53BA000
trusted library allocation
page read and write
4A91000
heap
page read and write
3CFE000
stack
page read and write
AA3000
unkown
page execute and read and write
A1C000
unkown
page execute and write copy
307E000
stack
page read and write
2C7E000
stack
page read and write
4A91000
heap
page read and write
31BE000
stack
page read and write
9FD000
unkown
page execute and write copy
4ED0000
trusted library allocation
page read and write
2D10000
heap
page read and write
1280000
heap
page read and write
1286000
heap
page read and write
12DA000
heap
page read and write
F8D000
stack
page read and write
4A91000
heap
page read and write
5570000
remote allocation
page read and write
12CD000
heap
page read and write
9E3000
unkown
page execute and read and write
FE0000
heap
page read and write
9D9000
unkown
page execute and read and write
9F9000
unkown
page execute and write copy
40BE000
stack
page read and write
4AA1000
heap
page read and write
4A91000
heap
page read and write
12D5000
heap
page read and write
4A91000
heap
page read and write
AA2000
unkown
page execute and write copy
10C0000
heap
page read and write
32FE000
stack
page read and write
50B0000
direct allocation
page execute and read and write
12A7000
heap
page read and write
37FE000
stack
page read and write
860000
unkown
page execute and read and write
4F0E000
stack
page read and write
1274000
heap
page read and write
12A4000
heap
page read and write
12A7000
heap
page read and write
4A80000
direct allocation
page read and write
572E000
stack
page read and write
3DFF000
stack
page read and write
457F000
stack
page read and write
4A91000
heap
page read and write
113E000
stack
page read and write
52DD000
stack
page read and write
860000
unkown
page execute and write copy
1280000
heap
page read and write
12B5000
heap
page read and write
50A0000
direct allocation
page execute and read and write
41FE000
stack
page read and write
E8C000
stack
page read and write
A72000
unkown
page execute and read and write
3A3F000
stack
page read and write
4A80000
direct allocation
page read and write
A53000
unkown
page execute and write copy
4A91000
heap
page read and write
124A000
heap
page read and write
541E000
stack
page read and write
12DE000
heap
page read and write
4A91000
heap
page read and write
AEE000
unkown
page execute and write copy
367F000
stack
page read and write
12A4000
heap
page read and write
4A80000
direct allocation
page read and write
AF1000
unkown
page execute and write copy
B05000
unkown
page execute and write copy
4F5E000
stack
page read and write
1318000
heap
page read and write
50A0000
direct allocation
page execute and read and write
A83000
unkown
page execute and write copy
4A91000
heap
page read and write
A76000
unkown
page execute and read and write
53AC000
trusted library allocation
page read and write
137E000
stack
page read and write
50EF000
trusted library allocation
page read and write
2CBC000
stack
page read and write
12DE000
heap
page read and write
12CE000
heap
page read and write
AE1000
unkown
page execute and write copy
12CF000
heap
page read and write
A5D000
unkown
page execute and read and write
2D30000
heap
page read and write
4A80000
direct allocation
page read and write
4A80000
direct allocation
page read and write
4A80000
direct allocation
page read and write
4A91000
heap
page read and write
1240000
heap
page read and write
4F20000
direct allocation
page read and write
5394000
trusted library allocation
page read and write
124E000
heap
page read and write
4A91000
heap
page read and write
3A7E000
stack
page read and write
443F000
stack
page read and write
531E000
stack
page read and write
545E000
stack
page read and write
128F000
heap
page read and write
A57000
unkown
page execute and read and write
3BBE000
stack
page read and write
5570000
remote allocation
page read and write
317F000
stack
page read and write
4A91000
heap
page read and write
3F3F000
stack
page read and write
5080000
direct allocation
page execute and read and write
555F000
stack
page read and write
2F3F000
stack
page read and write
1279000
heap
page read and write
51DD000
stack
page read and write
A68000
unkown
page execute and write copy
53A4000
trusted library allocation
page read and write
There are 212 hidden memdumps, click here to show them.