IOC Report
BW4pTs1x3V.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BW4pTs1x3V.exe
"C:\Users\user\Desktop\BW4pTs1x3V.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
reinforcenh.shop
malicious
stogeneratmns.shop
malicious
ghostreedmnu.shop
malicious
https://dividenntykw.shop/api
172.67.188.210
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
fragnantbui.shop
malicious
offensivedzvju.shop
malicious
drawzhotdog.shop
malicious
vozmeatillu.shop
malicious
https://player.vimeo.com
unknown
https://cdn.discordapp.com/icons/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://cdn.discordapp.com/banners/
unknown
https://cdn.discordapp.com/guilds/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://discord.com/api/v9/oauth2/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://discord.com/api/v9/gateway/bot
unknown
https://discord.com/api/v9/guilds/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=w4s3
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=pvBDaFhF2LLJ&l=e
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://gravvitywio.store/
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://discord.com/MESSAGE_REACTION_ADDTHREAD_MEMBER_UPDATEunmarshall
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://discord.com/api/v9/users/
unknown
https://cdn.discordapp.com/attachments/
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
https://discord.com/api/v9/stage-instances
unknown
http://www.certum.pl/CPS0
unknown
https://steam.tv/
unknown
https://discord.com/api/v9//voice/regions
unknown
http://cevcsca2021.ocsp-certum.com07
unknown
https://status.discord.com/api/v2/scheduled-maintenances/upcoming.json
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
unknown
https://discord.com/api/v9/applications
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://cdn.discordapp.com/role-icons/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://vozmeatillu.shop/apix
unknown
https://discord.com/api/v9/
unknown
https://discord.com/api/v9/09Az~~
unknown
https://dividenntykw.shop/t
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://gravvitywio.store:443/apifiles/76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://discord.com/api/v9/guilds/https://discord.com/api/v9/channels/https://discord.com/api/v9/use
unknown
https://discord.com/api/v9//sticker-packs
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://discord.com/api/v9/oauth2/applications
unknown
https://drawzhotdog.shop/api
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://reinforcenh.shop/apii
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=8vRVyaZK
unknown
https://discord.com/api/v9/gateway
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
http://repository.certum.pl/cevcsca2021.cer0
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://offensivedzvju.shop/
unknown
https://cdn.discordapp.com/splashes/
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dividenntykw.shop
172.67.188.210
malicious
gravvitywio.store
172.67.209.193
malicious
fragnantbui.shop
unknown
malicious
gutterydhowi.shop
unknown
malicious
offensivedzvju.shop
unknown
malicious
stogeneratmns.shop
unknown
malicious
reinforcenh.shop
unknown
malicious
drawzhotdog.shop
unknown
malicious
ghostreedmnu.shop
unknown
malicious
vozmeatillu.shop
unknown
malicious
steamcommunity.com
104.102.49.254
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
172.67.209.193
gravvitywio.store
United States
malicious
172.67.188.210
dividenntykw.shop
United States
malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF67D7C0000
unkown
page readonly
malicious
7FF67D7C0000
unkown
page readonly
malicious
2CD0000
remote allocation
page execute and read and write
malicious
C000237000
direct allocation
page read and write
23FE0A58000
direct allocation
page read and write
C000277000
direct allocation
page read and write
7FF67D3F7000
unkown
page readonly
C0003B6000
direct allocation
page read and write
7FF67D74C000
unkown
page readonly
C000006000
direct allocation
page read and write
4CED000
stack
page read and write
7FF67D77B000
unkown
page readonly
C000506000
direct allocation
page read and write
93613FE000
stack
page read and write
C000394000
direct allocation
page read and write
7FF67D3D7000
unkown
page write copy
7FF67CE61000
unkown
page execute read
2D70000
heap
page read and write
7FF67D3F7000
unkown
page readonly
23FBB5F0000
direct allocation
page read and write
93617FE000
stack
page read and write
C0003C4000
direct allocation
page read and write
7FF67DB18000
unkown
page read and write
23FBB5B4000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
7FF67D7A6000
unkown
page readonly
23FE0A40000
direct allocation
page read and write
7FF67D77B000
unkown
page readonly
7FF67DB50000
unkown
page read and write
C00014F000
direct allocation
page read and write
2FCC000
heap
page read and write
4A60000
remote allocation
page read and write
C000229000
direct allocation
page read and write
C000080000
direct allocation
page read and write
7FF67DB56000
unkown
page write copy
9361FFC000
stack
page read and write
7FF67D3EA000
unkown
page write copy
C0003D9000
direct allocation
page read and write
4AE0000
heap
page read and write
C000279000
direct allocation
page read and write
C0001BB000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
7FF67DB54000
unkown
page write copy
C00040C000
direct allocation
page read and write
7FF67D75D000
unkown
page readonly
7FF67D3A7000
unkown
page read and write
23FE0A69000
direct allocation
page read and write
C00019F000
direct allocation
page read and write
C000404000
direct allocation
page read and write
C0003B4000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
C0004AC000
direct allocation
page read and write
C000434000
direct allocation
page read and write
7FF67D78E000
unkown
page readonly
C000760000
direct allocation
page read and write
C000082000
direct allocation
page read and write
C0003C6000
direct allocation
page read and write
C0001A9000
direct allocation
page read and write
C000241000
direct allocation
page read and write
C000070000
direct allocation
page read and write
C000106000
direct allocation
page read and write
23FE0D3D000
direct allocation
page read and write
C0003B8000
direct allocation
page read and write
7FF67DB85000
unkown
page write copy
C000159000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
C000251000
direct allocation
page read and write
C000022000
direct allocation
page read and write
3063000
heap
page read and write
C000215000
direct allocation
page read and write
C000440000
direct allocation
page read and write
C000410000
direct allocation
page read and write
23FE0A3C000
direct allocation
page read and write
3050000
heap
page read and write
C7C000
stack
page read and write
C000131000
direct allocation
page read and write
C000408000
direct allocation
page read and write
7FF67DB88000
unkown
page readonly
7FF67D75D000
unkown
page readonly
C00079A000
direct allocation
page read and write
7FF67D762000
unkown
page readonly
C00001A000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C0002F7000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
7FF67D3A0000
unkown
page write copy
C0000DE000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
23FBB600000
heap
page read and write
C000496000
direct allocation
page read and write
C000446000
direct allocation
page read and write
23FE0C80000
direct allocation
page read and write
C000402000
direct allocation
page read and write
305E000
heap
page read and write
C000414000
direct allocation
page read and write
C00044E000
direct allocation
page read and write
C000231000
direct allocation
page read and write
7FF67D751000
unkown
page readonly
23FBB5B8000
direct allocation
page read and write
512F000
stack
page read and write
C0000D4000
direct allocation
page read and write
7FF67D783000
unkown
page readonly
C000492000
direct allocation
page read and write
C000118000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
7FF67D729000
unkown
page readonly
C00005D000
direct allocation
page read and write
C000239000
direct allocation
page read and write
C0001AD000
direct allocation
page read and write
C0003CE000
direct allocation
page read and write
C000800000
direct allocation
page read and write
C00025F000
direct allocation
page read and write
C3C000
stack
page read and write
7FF67D3A0000
unkown
page read and write
C00004F000
direct allocation
page read and write
C000020000
direct allocation
page read and write
7FF67D6F3000
unkown
page readonly
C000400000
direct allocation
page read and write
C000145000
direct allocation
page read and write
3053000
heap
page read and write
23FBB580000
heap
page read and write
C0006B0000
direct allocation
page read and write
C0001EB000
direct allocation
page read and write
C0001F7000
direct allocation
page read and write
23FE0A86000
direct allocation
page read and write
23FE0B35000
direct allocation
page read and write
526E000
stack
page read and write
2FDD000
heap
page read and write
2FB7000
heap
page read and write
7FF67D3AA000
unkown
page read and write
C0000FC000
direct allocation
page read and write
C0002C3000
direct allocation
page read and write
7FF67D767000
unkown
page readonly
C000141000
direct allocation
page read and write
C0004A8000
direct allocation
page read and write
C000167000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
7FF67DB88000
unkown
page readonly
4A3D000
stack
page read and write
23FBB5BC000
direct allocation
page read and write
C00002A000
direct allocation
page read and write
93621FF000
stack
page read and write
C000076000
direct allocation
page read and write
C000380000
direct allocation
page read and write
C0003A6000
direct allocation
page read and write
C000031000
direct allocation
page read and write
C000392000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000171000
direct allocation
page read and write
C000108000
direct allocation
page read and write
7FF67D77F000
unkown
page readonly
C000935000
direct allocation
page read and write
C000026000
direct allocation
page read and write
7FF67D78E000
unkown
page readonly
7FF67D3A8000
unkown
page write copy
C000068000
direct allocation
page read and write
C00016D000
direct allocation
page read and write
23FE0A2E000
direct allocation
page read and write
C00042C000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
7FF67D751000
unkown
page readonly
7FF67DB51000
unkown
page write copy
7FF67D787000
unkown
page readonly
23FBB550000
heap
page read and write
C000412000
direct allocation
page read and write
7FF67D3D9000
unkown
page read and write
4A60000
remote allocation
page read and write
7FF67D739000
unkown
page readonly
C0001DD000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
C000436000
direct allocation
page read and write
C0002B7000
direct allocation
page read and write
C0003CC000
direct allocation
page read and write
7FF67DB1F000
unkown
page read and write
C00048F000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
23FE0C20000
direct allocation
page read and write
23FBB555000
heap
page read and write
C00042E000
direct allocation
page read and write
7FF67D760000
unkown
page readonly
C0000C0000
direct allocation
page read and write
C00080E000
direct allocation
page read and write
7FF67D729000
unkown
page readonly
7FF67DAFD000
unkown
page read and write
C0003AC000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
3080000
heap
page read and write
C000247000
direct allocation
page read and write
2E8E000
stack
page read and write
3048000
heap
page read and write
C0001A5000
direct allocation
page read and write
C0000FA000
direct allocation
page read and write
7FF67D77F000
unkown
page readonly
93623FE000
stack
page read and write
C000061000
direct allocation
page read and write
C000291000
direct allocation
page read and write
C00048B000
direct allocation
page read and write
7FF67DB46000
unkown
page read and write
C0000CA000
direct allocation
page read and write
7FF67D762000
unkown
page readonly
C000364000
direct allocation
page read and write
7FF67D7A6000
unkown
page readonly
23FE0A80000
direct allocation
page read and write
7FF67DB56000
unkown
page write copy
23FE0CE0000
direct allocation
page read and write
7FF67D76D000
unkown
page readonly
C00040A000
direct allocation
page read and write
7FF67D3A5000
unkown
page write copy
7FF67D760000
unkown
page readonly
C000002000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
23FE0A48000
direct allocation
page read and write
93611FD000
stack
page read and write
C00022F000
direct allocation
page read and write
C000269000
direct allocation
page read and write
7FF67D78A000
unkown
page readonly
2EA0000
heap
page read and write
C000428000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
2E90000
heap
page read and write
C000054000
direct allocation
page read and write
23FBB560000
heap
page read and write
C00042A000
direct allocation
page read and write
23FE09F0000
direct allocation
page read and write
7FF67D787000
unkown
page readonly
7FF67D757000
unkown
page readonly
7FF67D3AB000
unkown
page write copy
4A60000
remote allocation
page read and write
C000293000
direct allocation
page read and write
C000424000
direct allocation
page read and write
7FF67D767000
unkown
page readonly
C00012F000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
30EE000
stack
page read and write
C00038C000
direct allocation
page read and write
23FBB5B0000
direct allocation
page read and write
7FF67CE60000
unkown
page readonly
C000008000
direct allocation
page read and write
2FAF000
stack
page read and write
C00048D000
direct allocation
page read and write
7FF67D78A000
unkown
page readonly
C00020F000
direct allocation
page read and write
2FF2000
heap
page read and write
516E000
stack
page read and write
7FF67DB50000
unkown
page write copy
C00006A000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
23FE0C60000
direct allocation
page read and write
304C000
heap
page read and write
C000179000
direct allocation
page read and write
C0003C0000
direct allocation
page read and write
C000024000
direct allocation
page read and write
7FF67D724000
unkown
page readonly
C000100000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
3012000
heap
page read and write
7FF67CE60000
unkown
page readonly
7FF67D792000
unkown
page readonly
C000289000
direct allocation
page read and write
C00033E000
direct allocation
page read and write
7FF67D3EE000
unkown
page read and write
C000000000
direct allocation
page read and write
C0001B5000
direct allocation
page read and write
C000426000
direct allocation
page read and write
C0003BE000
direct allocation
page read and write
7FF67D757000
unkown
page readonly
7FF67D7AF000
unkown
page readonly
9361DFF000
stack
page read and write
7FF67D776000
unkown
page readonly
C00039A000
direct allocation
page read and write
7FF67D3F4000
unkown
page write copy
C000096000
direct allocation
page read and write
7FF67D6F3000
unkown
page readonly
C00010C000
direct allocation
page read and write
7FF67D739000
unkown
page readonly
7FF67D783000
unkown
page readonly
3077000
heap
page read and write
304D000
heap
page read and write
C0002B3000
direct allocation
page read and write
49FD000
stack
page read and write
23FBB540000
heap
page read and write
7FF67D7AF000
unkown
page readonly
2FB0000
heap
page read and write
C0000E6000
direct allocation
page read and write
C000406000
direct allocation
page read and write
7FF67D772000
unkown
page readonly
C00005F000
direct allocation
page read and write
9361BFE000
stack
page read and write
7FF67CE61000
unkown
page execute read
2EA5000
heap
page read and write
93619FF000
stack
page read and write
7FF67DB4B000
unkown
page read and write
C000442000
direct allocation
page read and write
C000064000
direct allocation
page read and write
7FF67D792000
unkown
page readonly
7FF67D74C000
unkown
page readonly
C000085000
direct allocation
page read and write
C000257000
direct allocation
page read and write
31EF000
stack
page read and write
C0002ED000
direct allocation
page read and write
7FF67D724000
unkown
page readonly
23FE0BBE000
direct allocation
page read and write
C000708000
direct allocation
page read and write
C000177000
direct allocation
page read and write
7FF67D76D000
unkown
page readonly
C000213000
direct allocation
page read and write
7FF67D772000
unkown
page readonly
C00001E000
direct allocation
page read and write
C00027B000
direct allocation
page read and write
C000048000
direct allocation
page read and write
C00018B000
direct allocation
page read and write
C0003CA000
direct allocation
page read and write
C00028B000
direct allocation
page read and write
3061000
heap
page read and write
C000004000
direct allocation
page read and write
23FE0AC0000
direct allocation
page read and write
C0003A0000
direct allocation
page read and write
C0000F6000
direct allocation
page read and write
C00023F000
direct allocation
page read and write
23FE0A84000
direct allocation
page read and write
7FF67D3D4000
unkown
page read and write
C000157000
direct allocation
page read and write
C000275000
direct allocation
page read and write
C000432000
direct allocation
page read and write
306A000
heap
page read and write
C00044C000
direct allocation
page read and write
23FBB607000
heap
page read and write
4BED000
stack
page read and write
4ACE000
stack
page read and write
7FF67D776000
unkown
page readonly
C00002C000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
C000452000
direct allocation
page read and write
7FF67DB85000
unkown
page write copy
C0003C8000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C0002FF000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C000494000
direct allocation
page read and write
C0002DF000
direct allocation
page read and write
C000658000
direct allocation
page read and write
C0001C5000
direct allocation
page read and write
C0001B7000
direct allocation
page read and write
49A0000
heap
page read and write
2D2D000
remote allocation
page execute and read and write
C0002BF000
direct allocation
page read and write
C0002D8000
direct allocation
page read and write
7FF67DB54000
unkown
page write copy
C000165000
direct allocation
page read and write
C0002CA000
direct allocation
page read and write
C00029F000
direct allocation
page read and write
7FF67D3F5000
unkown
page read and write
C000149000
direct allocation
page read and write
There are 349 hidden memdumps, click here to show them.