IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
bathdoomgaz.store
malicious
studennotediw.store
malicious
clearancek.site
malicious
dissapoiznw.store
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
spirittunek.store
malicious
licendfilteo.site
malicious
eaglepawnoy.store
malicious
mobbipenju.store
malicious
https://steamcommunity.com/my/wishlist/
unknown
https://clearancek.site:443/apiapib
unknown
https://player.vimeo.com
unknown
https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC&
unknown
https://bathdoomgaz.store:443/api
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cbcfeb0e5371aba2
unknown
https://help.steampowered.com/en/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=ljhW-PbGuX
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://steamcommunity.com/discussions/
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
https://store.steampowered.com/stats/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0&amp
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
unknown
https://steamcommunity.com/G
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://steamcommunity.com:443/profiles/76561199724331900z
unknown
https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1
unknown
https://clearancek.site:443/api
unknown
https://s.ytimg.com;
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://steam.tv/
unknown
https://licendfilteo.site:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=tuNiaSwXwcYT&l=engl
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=GfSjbGKcNYaQ&l=
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
unknown
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
unknown
https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=pwVcIAtHNXwg&l=english&am
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=vh4BMeDcNiCU&l=engli
unknown
https://store.steampowered.com/points/shop/
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
unknown
https://steamcommunity.com
unknown
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
http://127.0.0.1:27060
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://spirittunek.store:443/api
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://help.steampowered.com/
unknown
https://api.steampowered.com/
unknown
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://store.steampowered.com/mobile
unknown
https://steamcommunity.com/
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://community.cloudflare.steamstatic.com/
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
eaglepawnoy.store
unknown
malicious
bathdoomgaz.store
unknown
malicious
spirittunek.store
unknown
malicious
licendfilteo.site
unknown
malicious
studennotediw.store
unknown
malicious
mobbipenju.store
unknown
malicious
clearancek.site
unknown
malicious
dissapoiznw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.102.49.254
steamcommunity.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8C1000
unkown
page execute and read and write
malicious
4CA1000
heap
page read and write
53DD000
stack
page read and write
2F6E000
stack
page read and write
2FD0000
heap
page read and write
415F000
stack
page read and write
B0E000
unkown
page execute and write copy
AB0000
unkown
page execute and write copy
11F0000
heap
page read and write
14B3000
heap
page read and write
B13000
unkown
page execute and read and write
149F000
heap
page read and write
4CA1000
heap
page read and write
1513000
heap
page read and write
52AD000
stack
page read and write
43DF000
stack
page read and write
58BD000
stack
page read and write
14E9000
heap
page read and write
3B5E000
stack
page read and write
4CA1000
heap
page read and write
1450000
heap
page read and write
1280000
heap
page read and write
38DE000
stack
page read and write
BBF000
unkown
page execute and read and write
141B000
stack
page read and write
4CA1000
heap
page read and write
92A000
unkown
page execute and write copy
14EB000
heap
page read and write
BB2000
unkown
page execute and write copy
3C9E000
stack
page read and write
2FB0000
direct allocation
page read and write
14D2000
heap
page read and write
13DE000
stack
page read and write
145E000
heap
page read and write
39DF000
stack
page read and write
52A0000
direct allocation
page execute and read and write
1285000
heap
page read and write
52A0000
direct allocation
page execute and read and write
52A0000
direct allocation
page execute and read and write
2FB0000
direct allocation
page read and write
441E000
stack
page read and write
3F1E000
stack
page read and write
14B3000
heap
page read and write
1524000
heap
page read and write
4CA1000
heap
page read and write
B14000
unkown
page execute and write copy
551E000
stack
page read and write
B58000
unkown
page execute and read and write
BAA000
unkown
page execute and write copy
2FB0000
direct allocation
page read and write
5280000
direct allocation
page execute and read and write
B38000
unkown
page execute and read and write
4CA1000
heap
page read and write
14DE000
heap
page read and write
4DA0000
trusted library allocation
page read and write
2FB0000
direct allocation
page read and write
1513000
heap
page read and write
14DB000
heap
page read and write
5120000
direct allocation
page read and write
419E000
stack
page read and write
14E9000
heap
page read and write
14BF000
heap
page read and write
14DB000
heap
page read and write
2FB0000
direct allocation
page read and write
559C000
trusted library allocation
page read and write
4CA1000
heap
page read and write
33DF000
stack
page read and write
149F000
heap
page read and write
5120000
direct allocation
page read and write
BBF000
unkown
page execute and write copy
2FB0000
direct allocation
page read and write
8C1000
unkown
page execute and write copy
1420000
heap
page read and write
3EDF000
stack
page read and write
8C0000
unkown
page read and write
B9B000
unkown
page execute and write copy
4C9F000
stack
page read and write
465F000
stack
page read and write
4CA1000
heap
page read and write
B40000
unkown
page execute and read and write
1430000
heap
page read and write
405E000
stack
page read and write
34DF000
stack
page read and write
525F000
stack
page read and write
14DB000
heap
page read and write
4CA1000
heap
page read and write
549A000
trusted library allocation
page read and write
174F000
stack
page read and write
B36000
unkown
page execute and write copy
A9B000
unkown
page execute and read and write
4CA1000
heap
page read and write
B2F000
unkown
page execute and read and write
4CA0000
heap
page read and write
48DF000
stack
page read and write
52D0000
direct allocation
page execute and read and write
2FB0000
direct allocation
page read and write
14D4000
heap
page read and write
592E000
stack
page read and write
4CA1000
heap
page read and write
47DE000
stack
page read and write
108C000
stack
page read and write
152B000
heap
page read and write
30DF000
stack
page read and write
92B000
unkown
page execute and read and write
4B5F000
stack
page read and write
139E000
stack
page read and write
42DE000
stack
page read and write
14EB000
heap
page read and write
4CA1000
heap
page read and write
3D9F000
stack
page read and write
14E4000
heap
page read and write
2FB0000
direct allocation
page read and write
B41000
unkown
page execute and write copy
920000
unkown
page execute and write copy
2FB0000
direct allocation
page read and write
4CA1000
heap
page read and write
14E9000
heap
page read and write
558D000
trusted library allocation
page read and write
54DE000
stack
page read and write
AB1000
unkown
page execute and read and write
32DF000
stack
page read and write
4CA1000
heap
page read and write
2F2E000
stack
page read and write
2FB0000
direct allocation
page read and write
2FB0000
direct allocation
page read and write
4CA1000
heap
page read and write
145A000
heap
page read and write
B18000
unkown
page execute and read and write
515E000
stack
page read and write
2FB0000
direct allocation
page read and write
BAB000
unkown
page execute and write copy
A89000
unkown
page execute and read and write
BC0000
unkown
page execute and write copy
55B0000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
164F000
stack
page read and write
55A4000
trusted library allocation
page read and write
11E0000
heap
page read and write
1513000
heap
page read and write
AA8000
unkown
page execute and write copy
4CB1000
heap
page read and write
1490000
heap
page read and write
451F000
stack
page read and write
351E000
stack
page read and write
4CA1000
heap
page read and write
3A1E000
stack
page read and write
429F000
stack
page read and write
1498000
heap
page read and write
AD6000
unkown
page execute and write copy
389F000
stack
page read and write
57BE000
stack
page read and write
4A5E000
stack
page read and write
ABB000
unkown
page execute and write copy
1495000
heap
page read and write
361F000
stack
page read and write
31DF000
stack
page read and write
B22000
unkown
page execute and read and write
2FAE000
stack
page read and write
B2A000
unkown
page execute and write copy
52B0000
direct allocation
page execute and read and write
365E000
stack
page read and write
149A000
heap
page read and write
2FD7000
heap
page read and write
14DE000
heap
page read and write
375F000
stack
page read and write
469E000
stack
page read and write
565E000
stack
page read and write
5120000
direct allocation
page read and write
14EB000
heap
page read and write
5770000
remote allocation
page read and write
8C0000
unkown
page readonly
920000
unkown
page execute and read and write
455E000
stack
page read and write
B42000
unkown
page execute and read and write
5770000
remote allocation
page read and write
14BF000
heap
page read and write
3DDE000
stack
page read and write
2FB0000
direct allocation
page read and write
14E9000
heap
page read and write
14D2000
heap
page read and write
BB2000
unkown
page execute and write copy
52EB000
trusted library allocation
page read and write
125E000
stack
page read and write
AE8000
unkown
page execute and read and write
52A0000
direct allocation
page execute and read and write
14E5000
heap
page read and write
14DE000
heap
page read and write
52A0000
direct allocation
page execute and read and write
B7D000
unkown
page execute and read and write
1513000
heap
page read and write
5270000
direct allocation
page execute and read and write
5770000
remote allocation
page read and write
575F000
stack
page read and write
3C5F000
stack
page read and write
AC0000
unkown
page execute and read and write
118D000
stack
page read and write
479F000
stack
page read and write
4CA1000
heap
page read and write
511D000
stack
page read and write
379E000
stack
page read and write
14EB000
heap
page read and write
561F000
stack
page read and write
B20000
unkown
page execute and write copy
5A2F000
stack
page read and write
B0D000
unkown
page execute and read and write
401F000
stack
page read and write
92C000
unkown
page execute and write copy
BAA000
unkown
page execute and read and write
4CA1000
heap
page read and write
A8B000
unkown
page execute and write copy
B09000
unkown
page execute and write copy
3B1F000
stack
page read and write
4A1F000
stack
page read and write
14D3000
heap
page read and write
AA8000
unkown
page execute and read and write
2FB0000
direct allocation
page read and write
4B9E000
stack
page read and write
491E000
stack
page read and write
B55000
unkown
page execute and write copy
1489000
heap
page read and write
B39000
unkown
page execute and write copy
52C0000
direct allocation
page execute and read and write
52A0000
direct allocation
page execute and read and write
There are 213 hidden memdumps, click here to show them.