IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/UW
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C0e3d185a3e106e7
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://recaptcha.net/recaptcha/;
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.steamstatic.com/
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://eaglepawnoy.store:443/api
unknown
https://steam.tv/
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://cdn.fastly
unknown
https://steamcommunity.c
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/header.css?v=pTvrRy1pm52p&l=english
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://recaptcha.ne
unknown
https://community.steamstatic.com/public/shared/javascript/shared_global.js?v=7glT1n_nkVCs&l=eng
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://mobbipenju.store:443/api
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://clearancek.site:443/apii
unknown
https://community.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&l=engl
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://dissapoiznw.store:443/apibcryptPrimitives.dllv
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=english
unknown
https://community.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunf
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR9MtmbWSZEp&l=engli
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
http://127.0.0
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 69 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B41000
unkown
page execute and read and write
malicious
4321000
heap
page read and write
3E5E000
stack
page read and write
4790000
remote allocation
page read and write
43C000
stack
page read and write
4321000
heap
page read and write
4321000
heap
page read and write
27B0000
direct allocation
page read and write
36DE000
stack
page read and write
D4A000
unkown
page execute and write copy
341F000
stack
page read and write
395E000
stack
page read and write
2CDF000
stack
page read and write
4940000
direct allocation
page execute and read and write
CFA000
unkown
page execute and read and write
90E000
stack
page read and write
27B0000
direct allocation
page read and write
D9A000
unkown
page execute and read and write
D97000
unkown
page execute and write copy
D25000
unkown
page execute and read and write
369F000
stack
page read and write
D4C000
unkown
page execute and write copy
D4D000
unkown
page execute and read and write
355F000
stack
page read and write
3D1E000
stack
page read and write
41DF000
stack
page read and write
DB8000
unkown
page execute and read and write
6F6000
heap
page read and write
4C22000
trusted library allocation
page read and write
654000
heap
page read and write
345E000
stack
page read and write
E40000
unkown
page execute and read and write
3B9F000
stack
page read and write
27B0000
direct allocation
page read and write
D95000
unkown
page execute and read and write
4A5E000
stack
page read and write
28DF000
stack
page read and write
27B0000
direct allocation
page read and write
D24000
unkown
page execute and write copy
654000
heap
page read and write
4920000
direct allocation
page execute and read and write
D8B000
unkown
page execute and read and write
E28000
unkown
page execute and write copy
725000
heap
page read and write
654000
heap
page read and write
654000
heap
page read and write
48F0000
direct allocation
page execute and read and write
4920000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
37DF000
stack
page read and write
B2E000
stack
page read and write
6D6000
heap
page read and write
7CE000
stack
page read and write
654000
heap
page read and write
68A000
heap
page read and write
4420000
trusted library allocation
page read and write
4321000
heap
page read and write
DAE000
unkown
page execute and write copy
654000
heap
page read and write
707000
heap
page read and write
431F000
stack
page read and write
D10000
unkown
page execute and read and write
409F000
stack
page read and write
D1C000
unkown
page execute and read and write
BAB000
unkown
page execute and read and write
6CF000
heap
page read and write
654000
heap
page read and write
654000
heap
page read and write
27D0000
heap
page read and write
319F000
stack
page read and write
E31000
unkown
page execute and write copy
D1C000
unkown
page execute and write copy
2ADF000
stack
page read and write
654000
heap
page read and write
654000
heap
page read and write
496A000
trusted library allocation
page read and write
27B0000
direct allocation
page read and write
DAF000
unkown
page execute and read and write
4920000
direct allocation
page execute and read and write
654000
heap
page read and write
B41000
unkown
page execute and write copy
4E7E000
stack
page read and write
DA6000
unkown
page execute and write copy
6D8000
heap
page read and write
DBA000
unkown
page execute and read and write
CFC000
unkown
page execute and write copy
2F5E000
stack
page read and write
DC0000
unkown
page execute and read and write
3E1F000
stack
page read and write
8CE000
stack
page read and write
32DF000
stack
page read and write
4790000
remote allocation
page read and write
492D000
stack
page read and write
DFC000
unkown
page execute and read and write
DDA000
unkown
page execute and write copy
DBB000
unkown
page execute and write copy
27B0000
direct allocation
page read and write
27B0000
direct allocation
page read and write
680000
heap
page read and write
4920000
direct allocation
page execute and read and write
654000
heap
page read and write
26EF000
stack
page read and write
2F1F000
stack
page read and write
E19000
unkown
page execute and write copy
40DE000
stack
page read and write
A6E000
stack
page read and write
D64000
unkown
page execute and read and write
E1C000
unkown
page execute and write copy
4920000
direct allocation
page execute and read and write
725000
heap
page read and write
4C0A000
trusted library allocation
page read and write
2DDF000
stack
page read and write
4BDE000
stack
page read and write
4321000
heap
page read and write
731000
heap
page read and write
654000
heap
page read and write
391F000
stack
page read and write
47A0000
direct allocation
page read and write
4A9E000
stack
page read and write
E31000
unkown
page execute and write copy
4D1E000
stack
page read and write
27B0000
direct allocation
page read and write
654000
heap
page read and write
4900000
direct allocation
page execute and read and write
359E000
stack
page read and write
A0F000
stack
page read and write
D56000
unkown
page execute and write copy
47DE000
stack
page read and write
B40000
unkown
page readonly
4B0D000
trusted library allocation
page read and write
654000
heap
page read and write
731000
heap
page read and write
68E000
heap
page read and write
748000
heap
page read and write
D4B000
unkown
page execute and read and write
50BF000
stack
page read and write
B40000
unkown
page read and write
BA0000
unkown
page execute and read and write
660000
heap
page read and write
4760000
heap
page read and write
4950000
direct allocation
page execute and read and write
6E6000
heap
page read and write
4321000
heap
page read and write
731000
heap
page read and write
4330000
heap
page read and write
BAC000
unkown
page execute and write copy
D8C000
unkown
page execute and write copy
6C1000
heap
page read and write
654000
heap
page read and write
654000
heap
page read and write
731000
heap
page read and write
BA0000
unkown
page execute and write copy
4320000
heap
page read and write
31DE000
stack
page read and write
27B0000
direct allocation
page read and write
4790000
remote allocation
page read and write
703000
heap
page read and write
3F9E000
stack
page read and write
4910000
direct allocation
page execute and read and write
654000
heap
page read and write
27B0000
direct allocation
page read and write
E40000
unkown
page execute and write copy
4B9D000
stack
page read and write
421E000
stack
page read and write
E41000
unkown
page execute and write copy
27B0000
direct allocation
page read and write
654000
heap
page read and write
B30000
heap
page read and write
6CA000
heap
page read and write
48DF000
stack
page read and write
27D7000
heap
page read and write
4321000
heap
page read and write
725000
heap
page read and write
4CDE000
stack
page read and write
654000
heap
page read and write
53D000
stack
page read and write
305F000
stack
page read and write
6D8000
heap
page read and write
3A9E000
stack
page read and write
BAA000
unkown
page execute and write copy
47A0000
direct allocation
page read and write
742000
heap
page read and write
DA8000
unkown
page execute and read and write
29DF000
stack
page read and write
654000
heap
page read and write
4930000
direct allocation
page execute and read and write
6D6000
heap
page read and write
2BDF000
stack
page read and write
654000
heap
page read and write
DA5000
unkown
page execute and read and write
725000
heap
page read and write
6C5000
heap
page read and write
276E000
stack
page read and write
27B0000
direct allocation
page read and write
E28000
unkown
page execute and write copy
3CDF000
stack
page read and write
27AE000
stack
page read and write
654000
heap
page read and write
654000
heap
page read and write
4E1F000
stack
page read and write
4321000
heap
page read and write
272E000
stack
page read and write
4FBE000
stack
page read and write
6F6000
heap
page read and write
6C9000
heap
page read and write
E2B000
unkown
page execute and write copy
707000
heap
page read and write
6F6000
heap
page read and write
DB1000
unkown
page execute and write copy
DA3000
unkown
page execute and write copy
DB9000
unkown
page execute and write copy
27B0000
direct allocation
page read and write
D84000
unkown
page execute and write copy
381E000
stack
page read and write
4321000
heap
page read and write
D36000
unkown
page execute and read and write
654000
heap
page read and write
E2A000
unkown
page execute and read and write
6E3000
heap
page read and write
6B9000
heap
page read and write
707000
heap
page read and write
331E000
stack
page read and write
4321000
heap
page read and write
6CF000
heap
page read and write
707000
heap
page read and write
570000
heap
page read and write
2E1E000
stack
page read and write
6E5000
heap
page read and write
702000
heap
page read and write
AEE000
stack
page read and write
AAC000
stack
page read and write
650000
heap
page read and write
27B0000
direct allocation
page read and write
4920000
direct allocation
page execute and read and write
3F5F000
stack
page read and write
D30000
unkown
page execute and write copy
3A5F000
stack
page read and write
4C0D000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
DE0000
unkown
page execute and read and write
4C19000
trusted library allocation
page read and write
4F7F000
stack
page read and write
6E3000
heap
page read and write
309E000
stack
page read and write
47A0000
direct allocation
page read and write
There are 235 hidden memdumps, click here to show them.