IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
https://steamcommunity.com:443/profiles/76561199724331900
unknown
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
https://dissapoiznw.store:443/api
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://mobbipenju.store:443/api
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://spirittunek.store:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://studennotediw.store:443/api6
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://clearancek.site:443/apip
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
791000
unkown
page execute and read and write
malicious
5020000
remote allocation
page read and write
1361000
heap
page read and write
5030000
direct allocation
page read and write
4FE0000
heap
page read and write
790000
unkown
page readonly
51B0000
direct allocation
page execute and read and write
1224000
heap
page read and write
4B90000
direct allocation
page read and write
1355000
heap
page read and write
4B90000
direct allocation
page read and write
556F000
stack
page read and write
4BA1000
heap
page read and write
51F4000
trusted library allocation
page read and write
4B90000
direct allocation
page read and write
1356000
heap
page read and write
367E000
stack
page read and write
32BE000
stack
page read and write
2DAE000
stack
page read and write
13A6000
heap
page read and write
4A8E000
stack
page read and write
468F000
stack
page read and write
A6A000
unkown
page execute and write copy
1224000
heap
page read and write
4B90000
direct allocation
page read and write
42C0000
heap
page read and write
46CE000
stack
page read and write
4B90000
direct allocation
page read and write
430E000
stack
page read and write
51B0000
direct allocation
page execute and read and write
4BB0000
heap
page read and write
1224000
heap
page read and write
1224000
heap
page read and write
DBC000
stack
page read and write
34FF000
stack
page read and write
56ED000
stack
page read and write
5A9F000
stack
page read and write
440F000
stack
page read and write
38BF000
stack
page read and write
5020000
remote allocation
page read and write
407E000
stack
page read and write
1358000
heap
page read and write
1319000
heap
page read and write
12AE000
stack
page read and write
47CF000
stack
page read and write
13A2000
heap
page read and write
4B90000
direct allocation
page read and write
9F0000
unkown
page execute and read and write
4B90000
direct allocation
page read and write
317E000
stack
page read and write
A81000
unkown
page execute and write copy
3F3E000
stack
page read and write
1334000
heap
page read and write
1224000
heap
page read and write
A2C000
unkown
page execute and write copy
1224000
heap
page read and write
1224000
heap
page read and write
1224000
heap
page read and write
583D000
stack
page read and write
3DBF000
stack
page read and write
403F000
stack
page read and write
5499000
trusted library allocation
page read and write
959000
unkown
page execute and read and write
1110000
heap
page read and write
14CE000
stack
page read and write
12D0000
heap
page read and write
790000
unkown
page read and write
2EEB000
stack
page read and write
1224000
heap
page read and write
11F0000
heap
page read and write
4B90000
direct allocation
page read and write
1358000
heap
page read and write
A7A000
unkown
page execute and read and write
4BA1000
heap
page read and write
1224000
heap
page read and write
1369000
heap
page read and write
38FE000
stack
page read and write
516F000
stack
page read and write
1224000
heap
page read and write
13A7000
heap
page read and write
417F000
stack
page read and write
51A0000
direct allocation
page execute and read and write
9EA000
unkown
page execute and write copy
12DE000
heap
page read and write
33FE000
stack
page read and write
1224000
heap
page read and write
2F2E000
stack
page read and write
A4F000
unkown
page execute and read and write
546E000
stack
page read and write
A91000
unkown
page execute and write copy
15CE000
stack
page read and write
51B0000
direct allocation
page execute and read and write
7F0000
unkown
page execute and write copy
1313000
heap
page read and write
96F000
unkown
page execute and read and write
A7B000
unkown
page execute and write copy
51B0000
direct allocation
page execute and read and write
4FE0000
trusted library allocation
page read and write
4BA1000
heap
page read and write
13A1000
heap
page read and write
41BE000
stack
page read and write
327F000
stack
page read and write
4BA1000
heap
page read and write
7FC000
unkown
page execute and write copy
1224000
heap
page read and write
96B000
unkown
page execute and write copy
9ED000
unkown
page execute and read and write
458E000
stack
page read and write
1307000
heap
page read and write
5180000
direct allocation
page execute and read and write
3B3F000
stack
page read and write
9F1000
unkown
page execute and write copy
A0E000
unkown
page execute and read and write
4B90000
direct allocation
page read and write
9EE000
unkown
page execute and write copy
51B0000
direct allocation
page execute and read and write
494E000
stack
page read and write
55AE000
stack
page read and write
3CBE000
stack
page read and write
9F8000
unkown
page execute and read and write
981000
unkown
page execute and read and write
97B000
unkown
page execute and write copy
4BA1000
heap
page read and write
542D000
stack
page read and write
56AE000
stack
page read and write
3DFE000
stack
page read and write
10FD000
stack
page read and write
965000
unkown
page execute and read and write
131E000
heap
page read and write
9DB000
unkown
page execute and read and write
593E000
stack
page read and write
A7A000
unkown
page execute and write copy
A2F000
unkown
page execute and read and write
7F0000
unkown
page execute and read and write
2F30000
heap
page read and write
4BA1000
heap
page read and write
A04000
unkown
page execute and read and write
42BF000
stack
page read and write
947000
unkown
page execute and read and write
51C0000
direct allocation
page execute and read and write
1220000
heap
page read and write
3A3E000
stack
page read and write
303F000
stack
page read and write
1224000
heap
page read and write
1224000
heap
page read and write
A05000
unkown
page execute and write copy
1224000
heap
page read and write
A90000
unkown
page execute and read and write
1224000
heap
page read and write
363F000
stack
page read and write
5030000
direct allocation
page read and write
1369000
heap
page read and write
4A4F000
stack
page read and write
9D2000
unkown
page execute and read and write
39FF000
stack
page read and write
1224000
heap
page read and write
2EAF000
stack
page read and write
A0C000
unkown
page execute and read and write
454F000
stack
page read and write
33BF000
stack
page read and write
A6E000
unkown
page execute and write copy
4BA0000
heap
page read and write
4BA1000
heap
page read and write
130F000
heap
page read and write
490F000
stack
page read and write
1224000
heap
page read and write
998000
unkown
page execute and write copy
1331000
heap
page read and write
4B90000
direct allocation
page read and write
791000
unkown
page execute and write copy
313F000
stack
page read and write
5390000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
51BD000
stack
page read and write
4B90000
direct allocation
page read and write
4B90000
direct allocation
page read and write
9D3000
unkown
page execute and write copy
9CC000
unkown
page execute and write copy
1224000
heap
page read and write
5190000
direct allocation
page execute and read and write
54A5000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
1224000
heap
page read and write
54AC000
trusted library allocation
page read and write
444E000
stack
page read and write
1224000
heap
page read and write
965000
unkown
page execute and write copy
A81000
unkown
page execute and write copy
5020000
remote allocation
page read and write
5495000
trusted library allocation
page read and write
13A6000
heap
page read and write
12DA000
heap
page read and write
37BE000
stack
page read and write
52ED000
stack
page read and write
532D000
stack
page read and write
353E000
stack
page read and write
3C7F000
stack
page read and write
57EE000
stack
page read and write
9AB000
unkown
page execute and read and write
A90000
unkown
page execute and write copy
51D0000
direct allocation
page execute and read and write
1224000
heap
page read and write
5030000
direct allocation
page read and write
377F000
stack
page read and write
506E000
stack
page read and write
4BA1000
heap
page read and write
4B90000
direct allocation
page read and write
9FF000
unkown
page execute and write copy
1224000
heap
page read and write
599E000
stack
page read and write
13A6000
heap
page read and write
3EFF000
stack
page read and write
949000
unkown
page execute and write copy
480E000
stack
page read and write
4BA1000
heap
page read and write
126E000
stack
page read and write
A0D000
unkown
page execute and write copy
4B90000
direct allocation
page read and write
1361000
heap
page read and write
1224000
heap
page read and write
3B7E000
stack
page read and write
54BB000
trusted library allocation
page read and write
4B8F000
stack
page read and write
2F37000
heap
page read and write
There are 214 hidden memdumps, click here to show them.