IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C0e3d185a3e106e7
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.steamstatic.com/
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://steam.tv/
unknown
https://steamcommunity.com/:
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://steamcommunity.com/p
unknown
https://steamcommunity.c
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/header.css?v=pTvrRy1pm52p&l=english
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/javascript/shared_global.js?v=7glT1n_nkVCs&l=eng
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&l=engl
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=english
unknown
https://community.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunf
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR9MtmbWSZEp&l=engli
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 62 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9D1000
unkown
page execute and read and write
malicious
A3C000
unkown
page execute and write copy
41DE000
stack
page read and write
455F000
stack
page read and write
4E41000
heap
page read and write
14B5000
heap
page read and write
52BD000
stack
page read and write
4E20000
heap
page read and write
C48000
unkown
page execute and read and write
52D0000
direct allocation
page read and write
580E000
stack
page read and write
1661000
heap
page read and write
162E000
heap
page read and write
14FE000
stack
page read and write
1620000
heap
page read and write
5470000
direct allocation
page execute and read and write
30C0000
direct allocation
page read and write
1470000
heap
page read and write
4E41000
heap
page read and write
16B3000
heap
page read and write
47DF000
stack
page read and write
30C0000
direct allocation
page read and write
9D0000
unkown
page readonly
1664000
heap
page read and write
169D000
heap
page read and write
16D6000
heap
page read and write
355E000
stack
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
365F000
stack
page read and write
123C000
stack
page read and write
C00000
unkown
page execute and read and write
491F000
stack
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
5480000
direct allocation
page execute and read and write
4F40000
trusted library allocation
page read and write
C41000
unkown
page execute and write copy
16E5000
heap
page read and write
4D1E000
stack
page read and write
52D0000
direct allocation
page read and write
166E000
heap
page read and write
CDC000
unkown
page execute and write copy
42DF000
stack
page read and write
B90000
unkown
page execute and write copy
CCC000
unkown
page execute and write copy
4E41000
heap
page read and write
30C0000
direct allocation
page read and write
405F000
stack
page read and write
1658000
heap
page read and write
4E41000
heap
page read and write
481E000
stack
page read and write
30C0000
direct allocation
page read and write
5440000
direct allocation
page execute and read and write
16B3000
heap
page read and write
459E000
stack
page read and write
5420000
direct allocation
page execute and read and write
57CF000
stack
page read and write
5761000
trusted library allocation
page read and write
16B3000
heap
page read and write
C4A000
unkown
page execute and read and write
CC5000
unkown
page execute and write copy
574C000
trusted library allocation
page read and write
4E40000
heap
page read and write
4E41000
heap
page read and write
5460000
direct allocation
page execute and read and write
30C0000
direct allocation
page read and write
4A5F000
stack
page read and write
16D6000
heap
page read and write
307B000
stack
page read and write
166E000
heap
page read and write
5490000
trusted library allocation
page read and write
14B0000
heap
page read and write
C44000
unkown
page execute and write copy
30C0000
direct allocation
page read and write
5450000
direct allocation
page execute and read and write
4E41000
heap
page read and write
30C0000
direct allocation
page read and write
185F000
stack
page read and write
5920000
remote allocation
page read and write
568D000
stack
page read and write
C23000
unkown
page execute and read and write
C24000
unkown
page execute and write copy
C54000
unkown
page execute and write copy
33DF000
stack
page read and write
469F000
stack
page read and write
A3B000
unkown
page execute and read and write
16A1000
heap
page read and write
303E000
stack
page read and write
52D0000
direct allocation
page read and write
3DDF000
stack
page read and write
133D000
stack
page read and write
530E000
stack
page read and write
431E000
stack
page read and write
1610000
heap
page read and write
5A7E000
stack
page read and write
15FF000
stack
page read and write
30C0000
direct allocation
page read and write
3E1E000
stack
page read and write
BE8000
unkown
page execute and write copy
BCB000
unkown
page execute and write copy
495E000
stack
page read and write
16D6000
heap
page read and write
CC6000
unkown
page execute and read and write
3A1F000
stack
page read and write
BB8000
unkown
page execute and write copy
5450000
direct allocation
page execute and read and write
4A9E000
stack
page read and write
1680000
heap
page read and write
169C000
heap
page read and write
5920000
remote allocation
page read and write
573D000
trusted library allocation
page read and write
545D000
stack
page read and write
56CD000
stack
page read and write
341E000
stack
page read and write
CB9000
unkown
page execute and write copy
391E000
stack
page read and write
419F000
stack
page read and write
1390000
heap
page read and write
BB8000
unkown
page execute and read and write
4E41000
heap
page read and write
16A1000
heap
page read and write
1668000
heap
page read and write
CB6000
unkown
page execute and write copy
A30000
unkown
page execute and read and write
441F000
stack
page read and write
1680000
heap
page read and write
C53000
unkown
page execute and read and write
C1F000
unkown
page execute and write copy
C52000
unkown
page execute and write copy
3B9E000
stack
page read and write
5450000
direct allocation
page execute and read and write
30C0000
direct allocation
page read and write
4E41000
heap
page read and write
C7A000
unkown
page execute and write copy
5920000
remote allocation
page read and write
C49000
unkown
page execute and write copy
5450000
direct allocation
page execute and read and write
30C0000
direct allocation
page read and write
166A000
heap
page read and write
175E000
stack
page read and write
563F000
trusted library allocation
page read and write
CAE000
unkown
page execute and write copy
BC0000
unkown
page execute and read and write
C2E000
unkown
page execute and read and write
4B9F000
stack
page read and write
351F000
stack
page read and write
16B3000
heap
page read and write
C46000
unkown
page execute and read and write
590F000
stack
page read and write
B8E000
unkown
page execute and read and write
BBA000
unkown
page execute and write copy
4E41000
heap
page read and write
30BE000
stack
page read and write
445D000
stack
page read and write
30D7000
heap
page read and write
4E50000
heap
page read and write
4E41000
heap
page read and write
162A000
heap
page read and write
4BDE000
stack
page read and write
46DE000
stack
page read and write
5ADE000
stack
page read and write
CDB000
unkown
page execute and read and write
5BDF000
stack
page read and write
168F000
heap
page read and write
BBD000
unkown
page execute and read and write
9D1000
unkown
page execute and write copy
558D000
stack
page read and write
5450000
direct allocation
page execute and read and write
A30000
unkown
page execute and write copy
CC5000
unkown
page execute and write copy
3F1F000
stack
page read and write
C98000
unkown
page execute and read and write
379F000
stack
page read and write
4E41000
heap
page read and write
9D0000
unkown
page read and write
CAF000
unkown
page execute and read and write
38DF000
stack
page read and write
BBE000
unkown
page execute and write copy
C5B000
unkown
page execute and read and write
5450000
direct allocation
page execute and read and write
3B5F000
stack
page read and write
3C9F000
stack
page read and write
30C0000
direct allocation
page read and write
30C0000
direct allocation
page read and write
3A5E000
stack
page read and write
4E1F000
stack
page read and write
C7B000
unkown
page execute and read and write
A3A000
unkown
page execute and write copy
C47000
unkown
page execute and write copy
4E41000
heap
page read and write
BAB000
unkown
page execute and read and write
16A1000
heap
page read and write
30C0000
direct allocation
page read and write
5753000
trusted library allocation
page read and write
16EB000
heap
page read and write
3CDE000
stack
page read and write
30D0000
heap
page read and write
30C0000
direct allocation
page read and write
32DF000
stack
page read and write
540F000
stack
page read and write
5430000
direct allocation
page execute and read and write
BD1000
unkown
page execute and read and write
31DF000
stack
page read and write
16EB000
heap
page read and write
597D000
stack
page read and write
37DE000
stack
page read and write
4E41000
heap
page read and write
369E000
stack
page read and write
CCC000
unkown
page execute and write copy
4E41000
heap
page read and write
16D6000
heap
page read and write
C43000
unkown
page execute and read and write
168F000
heap
page read and write
CDB000
unkown
page execute and write copy
5740000
trusted library allocation
page read and write
3F5E000
stack
page read and write
CC7000
unkown
page execute and write copy
409E000
stack
page read and write
4CDF000
stack
page read and write
There are 211 hidden memdumps, click here to show them.