IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://steamcommunity.com/(
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.steamstatic.com/public/javascript/applications/community/manifest.js?v=r7a4-LYcQOj
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://bathdoomgaz.store:443/apipg
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.steamstatic.com/
unknown
https://community.steamstatic.com/public/css/applications/community/main.css?v=DVae4t4RZiHA&l=en
unknown
https://clearancek.site:443/api
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://eaglepawnoy.store:443/api
unknown
https://store.steampowered.com/legal/
unknown
https://clearancek.site/api7
unknown
https://steam.tv/
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://steamcommunity.c
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/header.css?v=pTvrRy1pm52p&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://community.steamstatic.com/public/javascript/applications/community/main.js?v=4XouecKy8sZy&am
unknown
https://store.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/javascript/shared_global.js?v=7glT1n_nkVCs&l=eng
unknown
https://steamcommunity.com
unknown
https://sketchfab.com
unknown
https://steamcommunity.com/profiles/76561199724331900&&
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://clearancek.site:443/apii
unknown
https://community.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&l=engl
unknown
https://spirittunek.store:443/api
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://help.steampowered.com/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd883ccb3237fa39
unknown
https://api.steampowered.com/
unknown
https://community.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=english
unknown
https://community.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunf
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR9MtmbWSZEp&l=engli
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
There are 81 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B81000
unkown
page execute and read and write
malicious
D9C000
unkown
page execute and write copy
4680000
remote allocation
page read and write
DD0000
unkown
page execute and write copy
494D000
stack
page read and write
565000
heap
page read and write
4680000
remote allocation
page read and write
4201000
heap
page read and write
4A8D000
stack
page read and write
D9E000
unkown
page execute and write copy
3FBE000
stack
page read and write
4FBF000
stack
page read and write
47CF000
stack
page read and write
494000
heap
page read and write
4201000
heap
page read and write
494000
heap
page read and write
B70000
direct allocation
page read and write
59B000
heap
page read and write
293E000
stack
page read and write
545000
heap
page read and write
549000
heap
page read and write
494000
heap
page read and write
B70000
direct allocation
page read and write
4810000
direct allocation
page execute and read and write
357F000
stack
page read and write
4640000
trusted library allocation
page read and write
4BCE000
stack
page read and write
DDC000
unkown
page execute and read and write
B70000
direct allocation
page read and write
4852000
trusted library allocation
page read and write
2CBF000
stack
page read and write
E2B000
unkown
page execute and read and write
E69000
unkown
page execute and write copy
4201000
heap
page read and write
4B1B000
trusted library allocation
page read and write
31BF000
stack
page read and write
46CE000
stack
page read and write
5CC000
heap
page read and write
DFF000
unkown
page execute and read and write
3E3F000
stack
page read and write
494000
heap
page read and write
500000
heap
page read and write
E90000
unkown
page execute and read and write
4201000
heap
page read and write
3BFE000
stack
page read and write
563000
heap
page read and write
59B000
heap
page read and write
537000
heap
page read and write
FC000
stack
page read and write
494000
heap
page read and write
E78000
unkown
page execute and write copy
4800000
direct allocation
page execute and read and write
7CF000
stack
page read and write
561000
heap
page read and write
4C0E000
stack
page read and write
4640000
heap
page read and write
DDD000
unkown
page execute and write copy
597000
heap
page read and write
31FE000
stack
page read and write
B70000
direct allocation
page read and write
E06000
unkown
page execute and write copy
4690000
direct allocation
page read and write
494000
heap
page read and write
BE0000
unkown
page execute and write copy
B70000
direct allocation
page read and write
494000
heap
page read and write
450000
heap
page read and write
DAF000
unkown
page execute and read and write
4840000
direct allocation
page execute and read and write
3F7F000
stack
page read and write
3ABE000
stack
page read and write
4EBE000
stack
page read and write
333E000
stack
page read and write
B70000
direct allocation
page read and write
54A000
heap
page read and write
4201000
heap
page read and write
DEB000
unkown
page execute and write copy
4690000
direct allocation
page read and write
E09000
unkown
page execute and read and write
56E000
heap
page read and write
4D0F000
stack
page read and write
4810000
direct allocation
page execute and read and write
2DFF000
stack
page read and write
481E000
stack
page read and write
494000
heap
page read and write
28FF000
stack
page read and write
343F000
stack
page read and write
4E4D000
stack
page read and write
4201000
heap
page read and write
253F000
stack
page read and write
2F3F000
stack
page read and write
D81000
unkown
page execute and write copy
4810000
direct allocation
page execute and read and write
47E0000
direct allocation
page execute and read and write
4820000
direct allocation
page execute and read and write
DFB000
unkown
page execute and read and write
494000
heap
page read and write
B70000
direct allocation
page read and write
3A7F000
stack
page read and write
DD2000
unkown
page execute and write copy
59B000
heap
page read and write
40BF000
stack
page read and write
37FF000
stack
page read and write
597000
heap
page read and write
D78000
unkown
page execute and read and write
E7A000
unkown
page execute and write copy
B80000
unkown
page readonly
4830000
direct allocation
page execute and read and write
3BBF000
stack
page read and write
397E000
stack
page read and write
4DE000
stack
page read and write
460000
heap
page read and write
D88000
unkown
page execute and read and write
494000
heap
page read and write
2B7F000
stack
page read and write
494000
heap
page read and write
494000
heap
page read and write
B70000
direct allocation
page read and write
E28000
unkown
page execute and write copy
E78000
unkown
page execute and write copy
4201000
heap
page read and write
4ACE000
stack
page read and write
D9F000
unkown
page execute and read and write
3CFF000
stack
page read and write
D9D000
unkown
page execute and read and write
B70000
direct allocation
page read and write
E82000
unkown
page execute and write copy
267F000
stack
page read and write
4690000
direct allocation
page read and write
E91000
unkown
page execute and write copy
494000
heap
page read and write
4D4E000
stack
page read and write
4B02000
trusted library allocation
page read and write
4B28000
trusted library allocation
page read and write
B70000
direct allocation
page read and write
2F7E000
stack
page read and write
D61000
unkown
page execute and read and write
B70000
direct allocation
page read and write
4B04000
trusted library allocation
page read and write
D77000
unkown
page execute and write copy
393F000
stack
page read and write
494000
heap
page read and write
26BE000
stack
page read and write
4210000
heap
page read and write
307F000
stack
page read and write
2A7E000
stack
page read and write
4810000
direct allocation
page execute and read and write
B80000
unkown
page read and write
54E000
heap
page read and write
40FE000
stack
page read and write
D44000
unkown
page execute and read and write
540000
heap
page read and write
50A000
heap
page read and write
90E000
stack
page read and write
257C000
stack
page read and write
36FE000
stack
page read and write
583000
heap
page read and write
4B11000
trusted library allocation
page read and write
494000
heap
page read and write
3E7E000
stack
page read and write
4201000
heap
page read and write
1FD000
stack
page read and write
4A06000
trusted library allocation
page read and write
494000
heap
page read and write
41FF000
stack
page read and write
494000
heap
page read and write
D6D000
unkown
page execute and write copy
B70000
direct allocation
page read and write
494000
heap
page read and write
4810000
direct allocation
page execute and read and write
35BE000
stack
page read and write
2E3E000
stack
page read and write
BEC000
unkown
page execute and write copy
27FE000
stack
page read and write
2CFE000
stack
page read and write
56E000
heap
page read and write
80E000
stack
page read and write
30BE000
stack
page read and write
3D3E000
stack
page read and write
DE0000
unkown
page execute and read and write
B10000
heap
page read and write
B81000
unkown
page execute and write copy
2BBE000
stack
page read and write
494000
heap
page read and write
561000
heap
page read and write
BEB000
unkown
page execute and read and write
494000
heap
page read and write
D47000
unkown
page execute and write copy
494000
heap
page read and write
B27000
heap
page read and write
B20000
heap
page read and write
DF5000
unkown
page execute and write copy
DA7000
unkown
page execute and write copy
54E000
heap
page read and write
DFC000
unkown
page execute and write copy
E4A000
unkown
page execute and read and write
E79000
unkown
page execute and read and write
E6B000
unkown
page execute and write copy
DED000
unkown
page execute and read and write
BE0000
unkown
page execute and read and write
597000
heap
page read and write
347E000
stack
page read and write
D6D000
unkown
page execute and read and write
583000
heap
page read and write
494000
heap
page read and write
498D000
stack
page read and write
B70000
direct allocation
page read and write
32FF000
stack
page read and write
B6E000
stack
page read and write
50E000
heap
page read and write
490000
heap
page read and write
2A3F000
stack
page read and write
4201000
heap
page read and write
36BF000
stack
page read and write
4810000
direct allocation
page execute and read and write
494000
heap
page read and write
E90000
unkown
page execute and write copy
E82000
unkown
page execute and write copy
BEA000
unkown
page execute and write copy
383E000
stack
page read and write
4200000
heap
page read and write
B70000
direct allocation
page read and write
494000
heap
page read and write
494000
heap
page read and write
4680000
remote allocation
page read and write
27BF000
stack
page read and write
DD1000
unkown
page execute and read and write
47F0000
direct allocation
page execute and read and write
There are 218 hidden memdumps, click here to show them.