IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://steamcommunity.com/6
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cb9e7f3651c38ac4
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://steamcommunity.com/zI9
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://steamcommunity.com/profiles/765611997243319002
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1A1000
unkown
page execute and read and write
malicious
37C000
unkown
page execute and read and write
1370000
heap
page read and write
487E000
stack
page read and write
343F000
stack
page read and write
40E000
unkown
page execute and read and write
1264000
heap
page read and write
1A0000
unkown
page readonly
2EF0000
heap
page read and write
13B9000
heap
page read and write
3E4000
unkown
page execute and write copy
4AFE000
stack
page read and write
2EDE000
stack
page read and write
423000
unkown
page execute and read and write
1264000
heap
page read and write
139C000
heap
page read and write
4ABF000
stack
page read and write
4C00000
direct allocation
page read and write
468000
unkown
page execute and read and write
1264000
heap
page read and write
5090000
remote allocation
page read and write
484000
unkown
page execute and write copy
3EC000
unkown
page execute and read and write
1264000
heap
page read and write
45BF000
stack
page read and write
1264000
heap
page read and write
1264000
heap
page read and write
3E3F000
stack
page read and write
5090000
remote allocation
page read and write
433E000
stack
page read and write
4C11000
heap
page read and write
40B000
unkown
page execute and write copy
50DE000
stack
page read and write
1264000
heap
page read and write
3FD000
unkown
page execute and write copy
13C3000
heap
page read and write
415000
unkown
page execute and write copy
4C00000
direct allocation
page read and write
4C00000
direct allocation
page read and write
1264000
heap
page read and write
5240000
direct allocation
page execute and read and write
4C11000
heap
page read and write
1A1000
unkown
page execute and write copy
13BE000
heap
page read and write
5220000
direct allocation
page execute and read and write
1264000
heap
page read and write
1180000
heap
page read and write
1264000
heap
page read and write
1264000
heap
page read and write
13B1000
heap
page read and write
46FF000
stack
page read and write
4C00000
direct allocation
page read and write
422000
unkown
page execute and write copy
397E000
stack
page read and write
2EF7000
heap
page read and write
51F0000
direct allocation
page execute and read and write
418000
unkown
page execute and read and write
552B000
trusted library allocation
page read and write
1379000
heap
page read and write
497000
unkown
page execute and read and write
357F000
stack
page read and write
1264000
heap
page read and write
1390000
heap
page read and write
1264000
heap
page read and write
495000
unkown
page execute and write copy
4C11000
heap
page read and write
49D000
unkown
page execute and write copy
13D1000
heap
page read and write
535D000
stack
page read and write
419000
unkown
page execute and write copy
3BBF000
stack
page read and write
1264000
heap
page read and write
421000
unkown
page execute and read and write
3ABE000
stack
page read and write
4C00000
direct allocation
page read and write
2E9E000
stack
page read and write
13C3000
heap
page read and write
5220000
direct allocation
page execute and read and write
55DF000
stack
page read and write
498000
unkown
page execute and write copy
5533000
trusted library allocation
page read and write
54DE000
stack
page read and write
13C1000
heap
page read and write
5220000
direct allocation
page execute and read and write
333E000
stack
page read and write
561E000
stack
page read and write
495000
unkown
page execute and write copy
3ED000
unkown
page execute and write copy
36FE000
stack
page read and write
44BE000
stack
page read and write
4AC000
unkown
page execute and read and write
40BF000
stack
page read and write
4AD000
unkown
page execute and write copy
5090000
remote allocation
page read and write
4C00000
direct allocation
page read and write
5050000
trusted library allocation
page read and write
2EE0000
heap
page read and write
5230000
direct allocation
page execute and read and write
51DF000
stack
page read and write
539D000
stack
page read and write
139C000
heap
page read and write
2E5B000
stack
page read and write
140F000
heap
page read and write
50A0000
direct allocation
page read and write
40FE000
stack
page read and write
526F000
trusted library allocation
page read and write
3B9000
unkown
page execute and read and write
4C00000
direct allocation
page read and write
473E000
stack
page read and write
50A0000
direct allocation
page read and write
32FF000
stack
page read and write
137E000
heap
page read and write
1264000
heap
page read and write
571F000
stack
page read and write
133A000
heap
page read and write
1264000
heap
page read and write
3D3E000
stack
page read and write
5220000
direct allocation
page execute and read and write
1270000
heap
page read and write
347E000
stack
page read and write
58CE000
stack
page read and write
1264000
heap
page read and write
575E000
stack
page read and write
13C1000
heap
page read and write
4C00000
direct allocation
page read and write
13C1000
heap
page read and write
3B8000
unkown
page execute and write copy
13C5000
heap
page read and write
113D000
stack
page read and write
4BFF000
stack
page read and write
200000
unkown
page execute and write copy
13D1000
heap
page read and write
38A000
unkown
page execute and write copy
39D000
unkown
page execute and write copy
3E7E000
stack
page read and write
497F000
stack
page read and write
131E000
stack
page read and write
200000
unkown
page execute and read and write
3E6000
unkown
page execute and read and write
483F000
stack
page read and write
152F000
stack
page read and write
4C00000
direct allocation
page read and write
3F5000
unkown
page execute and read and write
4C11000
heap
page read and write
5250000
direct allocation
page execute and read and write
13B9000
heap
page read and write
4C00000
direct allocation
page read and write
368000
unkown
page execute and read and write
4C11000
heap
page read and write
42D000
unkown
page execute and read and write
13C5000
heap
page read and write
4C10000
heap
page read and write
3CE000
unkown
page execute and read and write
20C000
unkown
page execute and write copy
40A000
unkown
page execute and read and write
1390000
heap
page read and write
4C00000
direct allocation
page read and write
4C11000
heap
page read and write
1264000
heap
page read and write
13C3000
heap
page read and write
4C11000
heap
page read and write
42B000
unkown
page execute and write copy
13B9000
heap
page read and write
3C5000
unkown
page execute and write copy
31FF000
stack
page read and write
3A7F000
stack
page read and write
437E000
stack
page read and write
3F7F000
stack
page read and write
551A000
trusted library allocation
page read and write
1264000
heap
page read and write
5542000
trusted library allocation
page read and write
2FFF000
stack
page read and write
551E000
trusted library allocation
page read and write
407000
unkown
page execute and write copy
1330000
heap
page read and write
3CFF000
stack
page read and write
5220000
direct allocation
page execute and read and write
1368000
heap
page read and write
103C000
stack
page read and write
1378000
heap
page read and write
5420000
trusted library allocation
page read and write
5050000
heap
page read and write
3FBE000
stack
page read and write
5220000
direct allocation
page execute and read and write
585D000
stack
page read and write
1264000
heap
page read and write
1373000
heap
page read and write
200000
unkown
page execute and write copy
12DE000
stack
page read and write
3A3000
unkown
page execute and read and write
30FF000
stack
page read and write
5210000
direct allocation
page execute and read and write
13B0000
heap
page read and write
45FE000
stack
page read and write
447F000
stack
page read and write
4AC000
unkown
page execute and write copy
1A0000
unkown
page read and write
522D000
stack
page read and write
423E000
stack
page read and write
13C5000
heap
page read and write
393F000
stack
page read and write
50A0000
direct allocation
page read and write
4C00000
direct allocation
page read and write
41FF000
stack
page read and write
4C00000
direct allocation
page read and write
49BE000
stack
page read and write
1264000
heap
page read and write
3E7000
unkown
page execute and write copy
13BE000
heap
page read and write
2E1E000
stack
page read and write
488000
unkown
page execute and write copy
549E000
stack
page read and write
49D000
unkown
page execute and write copy
5200000
direct allocation
page execute and read and write
1260000
heap
page read and write
35BE000
stack
page read and write
162F000
stack
page read and write
36BF000
stack
page read and write
3FF000
unkown
page execute and read and write
133E000
heap
page read and write
1264000
heap
page read and write
3BFE000
stack
page read and write
38A000
unkown
page execute and read and write
36A000
unkown
page execute and write copy
13BE000
heap
page read and write
1264000
heap
page read and write
4C11000
heap
page read and write
4C00000
direct allocation
page read and write
59CF000
stack
page read and write
1264000
heap
page read and write
1409000
heap
page read and write
13D1000
heap
page read and write
137E000
heap
page read and write
383E000
stack
page read and write
37FF000
stack
page read and write
1264000
heap
page read and write
There are 226 hidden memdumps, click here to show them.