IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cbcfeb0e5371aba2
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://steamcommunity.com/N
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://eaglepawnoy.store/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 73 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A81000
unkown
page execute and read and write
malicious
CFA000
unkown
page execute and read and write
5F4000
heap
page read and write
445E000
stack
page read and write
FBB000
heap
page read and write
42DF000
stack
page read and write
C89000
unkown
page execute and write copy
4B40000
direct allocation
page read and write
2B5E000
stack
page read and write
FCE000
heap
page read and write
CCE000
unkown
page execute and write copy
46A0000
direct allocation
page read and write
3C9F000
stack
page read and write
455F000
stack
page read and write
C8F000
unkown
page execute and read and write
5F4000
heap
page read and write
3CDE000
stack
page read and write
D8B000
unkown
page execute and write copy
D83000
unkown
page execute and write copy
D84000
unkown
page execute and read and write
5F4000
heap
page read and write
D99000
unkown
page execute and read and write
4CF0000
direct allocation
page execute and read and write
4CE0000
direct allocation
page execute and read and write
5F4000
heap
page read and write
CDE000
unkown
page execute and read and write
FCE000
heap
page read and write
5AC000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
FBB000
heap
page read and write
4D03000
trusted library allocation
page read and write
5F4000
heap
page read and write
46A0000
direct allocation
page read and write
46B1000
heap
page read and write
46A0000
direct allocation
page read and write
F72000
heap
page read and write
55AF000
stack
page read and write
CA6000
unkown
page execute and write copy
2A0B000
stack
page read and write
C68000
unkown
page execute and read and write
D83000
unkown
page execute and write copy
D77000
unkown
page execute and write copy
46A0000
direct allocation
page read and write
112F000
stack
page read and write
FAD000
heap
page read and write
52FE000
stack
page read and write
5F4000
heap
page read and write
37DE000
stack
page read and write
32DE000
stack
page read and write
C79000
unkown
page execute and write copy
2EDF000
stack
page read and write
FC1000
heap
page read and write
3A5E000
stack
page read and write
C7F000
unkown
page execute and read and write
51FD000
stack
page read and write
46A0000
direct allocation
page read and write
46A0000
direct allocation
page read and write
3F5E000
stack
page read and write
D0D000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
F20000
heap
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
315F000
stack
page read and write
CB8000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
5F4000
heap
page read and write
4AF0000
heap
page read and write
FC5000
heap
page read and write
CFB000
unkown
page execute and write copy
CF5000
unkown
page execute and write copy
5F4000
heap
page read and write
46B0000
heap
page read and write
CD5000
unkown
page execute and read and write
4B40000
direct allocation
page read and write
46A0000
direct allocation
page read and write
FC1000
heap
page read and write
C4D000
unkown
page execute and read and write
EDE000
stack
page read and write
5F0000
heap
page read and write
9F0000
heap
page read and write
544D000
stack
page read and write
D99000
unkown
page execute and write copy
910000
heap
page read and write
E9E000
stack
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
A5E000
stack
page read and write
319E000
stack
page read and write
341E000
stack
page read and write
46B1000
heap
page read and write
46A0000
direct allocation
page read and write
4CC0000
direct allocation
page execute and read and write
F68000
heap
page read and write
A80000
unkown
page readonly
FC3000
heap
page read and write
CE8000
unkown
page execute and read and write
F7E000
heap
page read and write
D73000
unkown
page execute and write copy
F90000
heap
page read and write
3A1F000
stack
page read and write
46A0000
direct allocation
page read and write
A80000
unkown
page read and write
5F4000
heap
page read and write
2B1F000
stack
page read and write
CE7000
unkown
page execute and write copy
D0A000
unkown
page execute and write copy
507F000
stack
page read and write
4B40000
direct allocation
page read and write
46B1000
heap
page read and write
46B1000
heap
page read and write
46A0000
direct allocation
page read and write
D16000
unkown
page execute and read and write
CD6000
unkown
page execute and write copy
3DDE000
stack
page read and write
51BE000
stack
page read and write
D53000
unkown
page execute and read and write
AEC000
unkown
page execute and write copy
F7E000
heap
page read and write
4FC1000
trusted library allocation
page read and write
8FD000
stack
page read and write
5F4000
heap
page read and write
379F000
stack
page read and write
F7A000
heap
page read and write
3F1F000
stack
page read and write
100D000
heap
page read and write
46B1000
heap
page read and write
FAE000
heap
page read and write
A81000
unkown
page execute and write copy
4CC0000
direct allocation
page execute and read and write
4FCD000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
AE0000
unkown
page execute and write copy
405F000
stack
page read and write
F9F000
heap
page read and write
1005000
heap
page read and write
351F000
stack
page read and write
3E1E000
stack
page read and write
2C9E000
stack
page read and write
C73000
unkown
page execute and read and write
5F4000
heap
page read and write
29CF000
stack
page read and write
46B1000
heap
page read and write
FBB000
heap
page read and write
F3A000
heap
page read and write
46A0000
direct allocation
page read and write
AE0000
unkown
page execute and read and write
431E000
stack
page read and write
38DF000
stack
page read and write
33DF000
stack
page read and write
391E000
stack
page read and write
441F000
stack
page read and write
CFC000
unkown
page execute and read and write
2A17000
heap
page read and write
4FD5000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
5F4000
heap
page read and write
46B1000
heap
page read and write
F90000
heap
page read and write
D14000
unkown
page execute and write copy
4DFC000
stack
page read and write
CE9000
unkown
page execute and write copy
CEC000
unkown
page execute and read and write
CA8000
unkown
page execute and write copy
5F4000
heap
page read and write
469F000
stack
page read and write
4B30000
remote allocation
page read and write
365F000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
D9A000
unkown
page execute and write copy
D8B000
unkown
page execute and write copy
C4F000
unkown
page execute and write copy
5F4000
heap
page read and write
5F4000
heap
page read and write
5F4000
heap
page read and write
46A0000
direct allocation
page read and write
F1E000
stack
page read and write
3B5F000
stack
page read and write
F9F000
heap
page read and write
355E000
stack
page read and write
409E000
stack
page read and write
C76000
unkown
page execute and write copy
3B9E000
stack
page read and write
D02000
unkown
page execute and read and write
FCE000
heap
page read and write
329F000
stack
page read and write
4FE2000
trusted library allocation
page read and write
534D000
stack
page read and write
4E3D000
stack
page read and write
46C0000
heap
page read and write
5F4000
heap
page read and write
C73000
unkown
page execute and write copy
4F7E000
stack
page read and write
F30000
heap
page read and write
4CCD000
stack
page read and write
369E000
stack
page read and write
46A0000
direct allocation
page read and write
46B1000
heap
page read and write
4EBD000
trusted library allocation
page read and write
CA7000
unkown
page execute and read and write
2A10000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
C77000
unkown
page execute and read and write
2C5F000
stack
page read and write
2F1E000
stack
page read and write
4F3D000
stack
page read and write
46A0000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
FC1000
heap
page read and write
5F4000
heap
page read and write
F78000
heap
page read and write
46B1000
heap
page read and write
301F000
stack
page read and write
FC3000
heap
page read and write
41DE000
stack
page read and write
D85000
unkown
page execute and write copy
4B7E000
stack
page read and write
5F4000
heap
page read and write
F75000
heap
page read and write
2D9F000
stack
page read and write
CFD000
unkown
page execute and write copy
419F000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
FC3000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
2DDE000
stack
page read and write
5F4000
heap
page read and write
4C7F000
stack
page read and write
459E000
stack
page read and write
4B30000
remote allocation
page read and write
F3E000
heap
page read and write
54AE000
stack
page read and write
50BE000
stack
page read and write
4B30000
remote allocation
page read and write
305E000
stack
page read and write
There are 226 hidden memdumps, click here to show them.