IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.steamstatic.com/public/shared/css/motiva_sans.css?v=v7XTmVzbLV33&l=english
unknown
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
unknown
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.steamstatic.com/public/javascript/applications/community/manifest.js?v=r7a4-LYcQOj
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
unknown
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
https://clearancek.site:443/api4
unknown
https://community.steamstatic.com/
unknown
https://community.steamstatic.com/public/css/applications/community/main.css?v=DVae4t4RZiHA&l=en
unknown
https://clearancek.site:443/api
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://licendfilteo.site:443/api
unknown
https://steamcommunity.com/profiles/76561199724331900
95.100.48.249
https://steamcommunity.c
unknown
https://community.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://community.steamstatic.com/public/css/skin_1/header.css?v=pTvrRy1pm52p&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://steamcommunity.com:443/profiles/76561199724331900v
unknown
https://community.steamstatic.com/public/javascript/applications/community/main.js?v=4XouecKy8sZy&am
unknown
https://store.steampowered.com/
unknown
https://community.steamstatic.com/public/shared/javascript/shared_global.js?v=7glT1n_nkVCs&l=eng
unknown
https://steamcommunity.com
unknown
https://studennotediw.store:443/api
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://community.steamstatic.com/public/shared/css/shared_global.css?v=uF6G1wyNU-4c&l=english
unknown
https://community.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&l=engl
unknown
https://spirittunek.store:443/api
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://help.steampowered.com/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd883ccb3237fa39
unknown
https://api.steampowered.com/
unknown
https://community.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=english
unknown
https://community.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvIAKtunf
unknown
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR9MtmbWSZEp&l=engli
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://steamcommunity.com/profiles/765611997243319004
unknown
https://store.steampowered.com/about/
unknown
There are 79 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious
steamcommunity.com
95.100.48.249

IPs

IP
Domain
Country
Malicious
95.100.48.249
steamcommunity.com
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
611000
unkown
page execute and read and write
malicious
8F3000
unkown
page execute and write copy
916000
unkown
page execute and read and write
43B1000
heap
page read and write
BC0000
direct allocation
page read and write
502E000
stack
page read and write
2D2F000
stack
page read and write
43B1000
heap
page read and write
30EE000
stack
page read and write
3DAE000
stack
page read and write
49A0000
direct allocation
page execute and read and write
2D6E000
stack
page read and write
7F5000
unkown
page execute and write copy
402E000
stack
page read and write
4EBD000
stack
page read and write
3EAF000
stack
page read and write
BDA000
heap
page read and write
866000
unkown
page execute and read and write
8AF000
unkown
page execute and write copy
29AE000
stack
page read and write
39AF000
stack
page read and write
8D3000
unkown
page execute and read and write
3EEE000
stack
page read and write
49B0000
direct allocation
page execute and read and write
4C98000
trusted library allocation
page read and write
482D000
stack
page read and write
C15000
heap
page read and write
4E70000
remote allocation
page read and write
8A3000
unkown
page execute and write copy
49A0000
direct allocation
page execute and read and write
38AE000
stack
page read and write
496F000
stack
page read and write
C19000
heap
page read and write
4830000
direct allocation
page read and write
886000
unkown
page execute and read and write
917000
unkown
page execute and write copy
ECE000
stack
page read and write
7E0000
unkown
page execute and write copy
336F000
stack
page read and write
2AEE000
stack
page read and write
7DF000
unkown
page execute and read and write
ACE000
stack
page read and write
49A0000
direct allocation
page execute and read and write
C41000
heap
page read and write
809000
unkown
page execute and read and write
412F000
stack
page read and write
901000
unkown
page execute and write copy
C60000
heap
page read and write
3D6F000
stack
page read and write
4B8E000
trusted library allocation
page read and write
610000
unkown
page readonly
43B1000
heap
page read and write
3B2E000
stack
page read and write
611000
unkown
page execute and write copy
888000
unkown
page execute and write copy
857000
unkown
page execute and write copy
BA0000
direct allocation
page read and write
8FF000
unkown
page execute and write copy
286F000
stack
page read and write
49AD000
stack
page read and write
C60000
heap
page read and write
BA0000
direct allocation
page read and write
893000
unkown
page execute and read and write
BA0000
direct allocation
page read and write
4980000
direct allocation
page execute and read and write
C3D000
heap
page read and write
7E9000
unkown
page execute and write copy
2E6F000
stack
page read and write
5E0000
heap
page read and write
4E5F000
stack
page read and write
8A5000
unkown
page execute and read and write
2BEF000
stack
page read and write
43B1000
heap
page read and write
43B1000
heap
page read and write
47C000
stack
page read and write
B1C000
stack
page read and write
43B0000
heap
page read and write
4D1E000
stack
page read and write
BA0000
direct allocation
page read and write
3AEF000
stack
page read and write
808000
unkown
page execute and write copy
43B1000
heap
page read and write
33AE000
stack
page read and write
82E000
unkown
page execute and read and write
BA0000
direct allocation
page read and write
512F000
stack
page read and write
A6E000
stack
page read and write
49C0000
direct allocation
page execute and read and write
276F000
stack
page read and write
49A0000
direct allocation
page execute and read and write
C6E000
heap
page read and write
43B1000
heap
page read and write
8EF000
unkown
page execute and write copy
57D000
stack
page read and write
889000
unkown
page execute and read and write
AD5000
heap
page read and write
610000
unkown
page read and write
BA0000
direct allocation
page read and write
863000
unkown
page execute and write copy
43B1000
heap
page read and write
BA0000
direct allocation
page read and write
3C6E000
stack
page read and write
7F7000
unkown
page execute and read and write
2FAF000
stack
page read and write
43AF000
stack
page read and write
4BDD000
stack
page read and write
4CA4000
trusted library allocation
page read and write
4FBE000
stack
page read and write
C6F000
heap
page read and write
87C000
unkown
page execute and write copy
43B1000
heap
page read and write
BA0000
direct allocation
page read and write
34AF000
stack
page read and write
C18000
heap
page read and write
43B1000
heap
page read and write
376E000
stack
page read and write
C5A000
heap
page read and write
2FEE000
stack
page read and write
C31000
heap
page read and write
7CF000
unkown
page execute and read and write
4CBA000
trusted library allocation
page read and write
BA0000
direct allocation
page read and write
84F000
unkown
page execute and read and write
4D5E000
stack
page read and write
C6E000
heap
page read and write
49EE000
trusted library allocation
page read and write
3C2F000
stack
page read and write
43B1000
heap
page read and write
43B1000
heap
page read and write
43B1000
heap
page read and write
B50000
heap
page read and write
86F000
unkown
page execute and write copy
4CAB000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
43B1000
heap
page read and write
862000
unkown
page execute and read and write
875000
unkown
page execute and read and write
BD0000
heap
page read and write
670000
unkown
page execute and read and write
900000
unkown
page execute and read and write
C5A000
heap
page read and write
416E000
stack
page read and write
B30000
heap
page read and write
82F000
unkown
page execute and write copy
2EAE000
stack
page read and write
C60000
heap
page read and write
43B1000
heap
page read and write
BA0000
direct allocation
page read and write
C1E000
heap
page read and write
4E70000
remote allocation
page read and write
4970000
direct allocation
page execute and read and write
43B1000
heap
page read and write
C31000
heap
page read and write
3FEF000
stack
page read and write
43B1000
heap
page read and write
C41000
heap
page read and write
B9E000
stack
page read and write
CB2000
heap
page read and write
827000
unkown
page execute and write copy
849000
unkown
page execute and write copy
7E2000
unkown
page execute and write copy
326E000
stack
page read and write
42AE000
stack
page read and write
8FF000
unkown
page execute and write copy
49A0000
direct allocation
page execute and read and write
43B1000
heap
page read and write
8B3000
unkown
page execute and read and write
43C1000
heap
page read and write
322F000
stack
page read and write
35EF000
stack
page read and write
44B0000
trusted library allocation
page read and write
812000
unkown
page execute and write copy
4C94000
trusted library allocation
page read and write
DCE000
stack
page read and write
4990000
direct allocation
page execute and read and write
AD0000
heap
page read and write
C3C000
heap
page read and write
C41000
heap
page read and write
4E70000
remote allocation
page read and write
B20000
heap
page read and write
906000
unkown
page execute and write copy
BA0000
direct allocation
page read and write
BA0000
direct allocation
page read and write
C5A000
heap
page read and write
386F000
stack
page read and write
BA0000
direct allocation
page read and write
362E000
stack
page read and write
85A000
unkown
page execute and write copy
34EE000
stack
page read and write
4ADD000
stack
page read and write
870000
unkown
page execute and read and write
A2E000
stack
page read and write
2AAF000
stack
page read and write
BA0000
direct allocation
page read and write
7D1000
unkown
page execute and write copy
7E3000
unkown
page execute and read and write
859000
unkown
page execute and read and write
836000
unkown
page execute and read and write
7EA000
unkown
page execute and read and write
CA2000
heap
page read and write
BDE000
heap
page read and write
882000
unkown
page execute and write copy
906000
unkown
page execute and write copy
67C000
unkown
page execute and write copy
881000
unkown
page execute and read and write
49A0000
direct allocation
page execute and read and write
5D0000
heap
page read and write
871000
unkown
page execute and write copy
296F000
stack
page read and write
BC0000
direct allocation
page read and write
372F000
stack
page read and write
426F000
stack
page read and write
916000
unkown
page execute and write copy
670000
unkown
page execute and write copy
2C2E000
stack
page read and write
486E000
stack
page read and write
C1E000
heap
page read and write
C08000
heap
page read and write
88A000
unkown
page execute and write copy
39ED000
stack
page read and write
813000
unkown
page execute and read and write
7E1000
unkown
page execute and read and write
CB2000
heap
page read and write
C6E000
heap
page read and write
B57000
heap
page read and write
312E000
stack
page read and write
4C1E000
stack
page read and write
There are 217 hidden memdumps, click here to show them.