IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://steamcommunity.com/profiles/76561199724331900#
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cbcfeb0e5371aba2
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://steamcommunity.com/)
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://spirittunek.store/api
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D91000
unkown
page execute and read and write
malicious
CBF000
heap
page read and write
D70000
direct allocation
page read and write
107F000
unkown
page execute and write copy
D70000
direct allocation
page read and write
37EF000
stack
page read and write
DF0000
unkown
page execute and read and write
4B6D000
stack
page read and write
46F1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
46F1000
heap
page read and write
C10000
heap
page read and write
C91000
heap
page read and write
C76000
heap
page read and write
CC2000
heap
page read and write
1056000
unkown
page execute and read and write
46F1000
heap
page read and write
CB7000
heap
page read and write
46F1000
heap
page read and write
D70000
direct allocation
page read and write
D70000
direct allocation
page read and write
1000000
unkown
page execute and write copy
46F1000
heap
page read and write
36AF000
stack
page read and write
4D10000
direct allocation
page execute and read and write
4F5D000
stack
page read and write
D70000
direct allocation
page read and write
FB7000
unkown
page execute and write copy
2BAE000
stack
page read and write
46F1000
heap
page read and write
D70000
direct allocation
page read and write
F92000
unkown
page execute and write copy
509E000
stack
page read and write
4CF0000
direct allocation
page execute and read and write
4CE0000
direct allocation
page execute and read and write
382E000
stack
page read and write
1018000
unkown
page execute and read and write
108D000
unkown
page execute and write copy
4FE2000
trusted library allocation
page read and write
46F1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
C72000
heap
page read and write
4FD6000
trusted library allocation
page read and write
3E6E000
stack
page read and write
10A3000
unkown
page execute and write copy
D70000
direct allocation
page read and write
4F1D000
stack
page read and write
D70000
direct allocation
page read and write
CC2000
heap
page read and write
D90000
unkown
page readonly
D90000
unkown
page read and write
3AAE000
stack
page read and write
1004000
unkown
page execute and write copy
F7B000
unkown
page execute and write copy
1010000
unkown
page execute and read and write
F70000
unkown
page execute and read and write
4CED000
stack
page read and write
2A67000
heap
page read and write
FAA000
unkown
page execute and write copy
F51000
unkown
page execute and read and write
51B0000
remote allocation
page read and write
2F6E000
stack
page read and write
3BEE000
stack
page read and write
505F000
stack
page read and write
4ED2000
trusted library allocation
page read and write
46F1000
heap
page read and write
D6C000
stack
page read and write
C7F000
heap
page read and write
1007000
unkown
page execute and read and write
32EF000
stack
page read and write
2CAF000
stack
page read and write
8FD000
stack
page read and write
4D20000
trusted library allocation
page read and write
46F1000
heap
page read and write
FA3000
unkown
page execute and read and write
2E2E000
stack
page read and write
446F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
2A50000
direct allocation
page read and write
CB7000
heap
page read and write
31EE000
stack
page read and write
46F0000
heap
page read and write
51B0000
remote allocation
page read and write
CF8000
heap
page read and write
CA7000
heap
page read and write
396E000
stack
page read and write
1033000
unkown
page execute and read and write
41EF000
stack
page read and write
4FF8000
trusted library allocation
page read and write
546F000
stack
page read and write
1002000
unkown
page execute and write copy
10A2000
unkown
page execute and write copy
DFC000
unkown
page execute and write copy
1054000
unkown
page execute and write copy
3D2E000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
F53000
unkown
page execute and write copy
1019000
unkown
page execute and write copy
4FEB000
trusted library allocation
page read and write
FAB000
unkown
page execute and read and write
A30000
heap
page read and write
4FD2000
trusted library allocation
page read and write
1001000
unkown
page execute and read and write
CAB000
heap
page read and write
FAF000
unkown
page execute and read and write
1003000
unkown
page execute and read and write
D70000
direct allocation
page read and write
3FAE000
stack
page read and write
D70000
direct allocation
page read and write
FDA000
unkown
page execute and write copy
FE3000
unkown
page execute and write copy
F95000
unkown
page execute and read and write
FE8000
unkown
page execute and read and write
CBF000
heap
page read and write
332E000
stack
page read and write
D70000
direct allocation
page read and write
A45000
heap
page read and write
46F1000
heap
page read and write
44AE000
stack
page read and write
D00000
heap
page read and write
FE2000
unkown
page execute and read and write
F8E000
unkown
page execute and write copy
F8F000
unkown
page execute and read and write
C3E000
heap
page read and write
422E000
stack
page read and write
D91000
unkown
page execute and write copy
4B70000
direct allocation
page read and write
46EF000
stack
page read and write
C0E000
stack
page read and write
31AF000
stack
page read and write
47F0000
trusted library allocation
page read and write
3CEF000
stack
page read and write
46F1000
heap
page read and write
CA8000
heap
page read and write
4700000
heap
page read and write
900000
heap
page read and write
1094000
unkown
page execute and write copy
30AE000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
519F000
stack
page read and write
46F1000
heap
page read and write
DF0000
unkown
page execute and write copy
2CEE000
stack
page read and write
4CAF000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
FA2000
unkown
page execute and write copy
11AF000
stack
page read and write
CBF000
heap
page read and write
392F000
stack
page read and write
35AE000
stack
page read and write
F6E000
unkown
page execute and read and write
2DEF000
stack
page read and write
3BAF000
stack
page read and write
46F1000
heap
page read and write
342F000
stack
page read and write
100E000
unkown
page execute and write copy
4BAE000
stack
page read and write
45AF000
stack
page read and write
B8F000
stack
page read and write
C3A000
heap
page read and write
F7B000
unkown
page execute and read and write
D70000
direct allocation
page read and write
CAC000
heap
page read and write
108B000
unkown
page execute and write copy
2B6F000
stack
page read and write
52FD000
stack
page read and write
356F000
stack
page read and write
436E000
stack
page read and write
CC2000
heap
page read and write
A40000
heap
page read and write
46F1000
heap
page read and write
1036000
unkown
page execute and read and write
46F1000
heap
page read and write
C30000
heap
page read and write
36EE000
stack
page read and write
46F1000
heap
page read and write
FAD000
unkown
page execute and write copy
4CE0000
direct allocation
page execute and read and write
5AC000
stack
page read and write
9E0000
heap
page read and write
306F000
stack
page read and write
2F2F000
stack
page read and write
F94000
unkown
page execute and write copy
107B000
unkown
page execute and write copy
A8E000
stack
page read and write
108B000
unkown
page execute and write copy
40AF000
stack
page read and write
2A50000
direct allocation
page read and write
3E2F000
stack
page read and write
51FE000
stack
page read and write
1094000
unkown
page execute and write copy
46F1000
heap
page read and write
1017000
unkown
page execute and write copy
4E1D000
stack
page read and write
C68000
heap
page read and write
F6F000
unkown
page execute and write copy
4CC0000
direct allocation
page execute and read and write
536E000
stack
page read and write
40EE000
stack
page read and write
1022000
unkown
page execute and read and write
346E000
stack
page read and write
C94000
heap
page read and write
D70000
direct allocation
page read and write
46F1000
heap
page read and write
108C000
unkown
page execute and read and write
2A60000
heap
page read and write
1034000
unkown
page execute and write copy
BCE000
stack
page read and write
F93000
unkown
page execute and read and write
D70000
direct allocation
page read and write
3A6F000
stack
page read and write
3F6F000
stack
page read and write
51B0000
remote allocation
page read and write
46F1000
heap
page read and write
432F000
stack
page read and write
1061000
unkown
page execute and read and write
45EE000
stack
page read and write
1032000
unkown
page execute and write copy
2A4F000
stack
page read and write
10A2000
unkown
page execute and read and write
FC6000
unkown
page execute and read and write
4D00000
direct allocation
page execute and read and write
There are 212 hidden memdumps, click here to show them.