IOC Report
7wN7BF7WfX.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7wN7BF7WfX.exe
"C:\Users\user\Desktop\7wN7BF7WfX.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
abortinoiwiam.shop
malicious
defenddsouneuw.shop
malicious
priooozekw.shop
malicious
surroundeocw.shop
malicious
https://dividenntykw.shop/api
104.21.8.235
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
racedsuitreow.shop
malicious
covvercilverow.shop
malicious
pumpkinkwquo.shop
malicious
deallyharvenw.shop
malicious
https://gravvitywio.store/api
172.67.209.193
malicious
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7Cd7fb65801182a5f
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://racedsuitreow.shop/N7
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=w4s3
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=pvBDaFhF2LLJ&l=e
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://gravvitywio.store/
unknown
https://www.google.com
unknown
https://racedsuitreow.shop/V7
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
http://www.certum.pl/CPS0
unknown
https://steam.tv/
unknown
http://cevcsca2021.ocsp-certum.com07
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://defenddsouneuw.shop/pi3
unknown
https://deallyharvenw.shop/api
unknown
https://dividenntykw.shop/Y
unknown
https://steamcommunity.com/e
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://racedsuitreow.shop/api_
unknown
http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictnot
unknown
https://racedsuitreow.shop/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://racedsuitreow.shop/&7
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://racedsuitreow.shop/.7
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://surroundeocw.shop/api
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=8vRVyaZK
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://gravvitywio.store/~7
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
http://repository.certum.pl/cevcsca2021.cer0
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://gravvitywio.store:443/api
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://racedsuitreow.shop/api
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://subca.ocsp-certum.com02
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://gravvitywio.store/e
unknown
https://steamcommunity.com/workshop/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dividenntykw.shop
104.21.8.235
malicious
gravvitywio.store
172.67.209.193
malicious
priooozekw.shop
unknown
malicious
pumpkinkwquo.shop
unknown
malicious
abortinoiwiam.shop
unknown
malicious
deallyharvenw.shop
unknown
malicious
surroundeocw.shop
unknown
malicious
racedsuitreow.shop
unknown
malicious
defenddsouneuw.shop
unknown
malicious
covvercilverow.shop
unknown
malicious
steamcommunity.com
104.102.49.254
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.8.235
dividenntykw.shop
United States
malicious
172.67.209.193
gravvitywio.store
United States
malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
C0005B4000
direct allocation
page read and write
malicious
7FF7A234A000
unkown
page readonly
malicious
7FF7A234A000
unkown
page readonly
malicious
C000434000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
C000449000
direct allocation
page read and write
7FF7A22FB000
unkown
page readonly
C0001CB000
direct allocation
page read and write
182F7C20000
direct allocation
page read and write
C000016000
direct allocation
page read and write
2C0C000
heap
page read and write
C000018000
direct allocation
page read and write
7FF7A1D1B000
unkown
page write copy
C000860000
direct allocation
page read and write
C000130000
direct allocation
page read and write
2CAC000
heap
page read and write
C000058000
direct allocation
page read and write
2C24000
heap
page read and write
C0002EB000
direct allocation
page read and write
7FF7A1CE7000
unkown
page write copy
2C9A000
heap
page read and write
7FF7A2684000
unkown
page write copy
2C21000
heap
page read and write
2C88000
heap
page read and write
2A8C000
stack
page read and write
7FF7A231B000
unkown
page readonly
C000090000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C0002F9000
direct allocation
page read and write
182F7E00000
direct allocation
page read and write
2BE8000
heap
page read and write
C00042E000
direct allocation
page read and write
C000207000
direct allocation
page read and write
7FF7A2332000
unkown
page readonly
182F7E40000
direct allocation
page read and write
7FF7A1CE2000
unkown
page write copy
C000033000
direct allocation
page read and write
C000068000
direct allocation
page read and write
7FF7A22EB000
unkown
page readonly
474E000
stack
page read and write
7FF7A22D9000
unkown
page readonly
C0000A4000
direct allocation
page read and write
4F8E000
stack
page read and write
182B2B00000
direct allocation
page read and write
7FF7A25EA000
unkown
page read and write
C0000B7000
direct allocation
page read and write
C000028000
direct allocation
page read and write
37B2DFF000
stack
page read and write
7FF7A22C3000
unkown
page readonly
C0003C4000
direct allocation
page read and write
7FF7A1CE9000
unkown
page write copy
2C07000
heap
page read and write
2C47000
heap
page read and write
7FF7A1D33000
unkown
page write copy
C000140000
direct allocation
page read and write
2B5F000
remote allocation
page execute and read and write
50CE000
stack
page read and write
C0001F1000
direct allocation
page read and write
2BF6000
heap
page read and write
C0003CE000
direct allocation
page read and write
7FF7A22FB000
unkown
page readonly
C00026B000
direct allocation
page read and write
C00040C000
direct allocation
page read and write
182F7C8F000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
49FF000
stack
page read and write
C000098000
direct allocation
page read and write
C000406000
direct allocation
page read and write
182F7C6B000
direct allocation
page read and write
C00041C000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
7FF7A2604000
unkown
page read and write
2C21000
heap
page read and write
2ACC000
stack
page read and write
C0001C5000
direct allocation
page read and write
2C08000
heap
page read and write
182B29B0000
direct allocation
page read and write
4790000
remote allocation
page read and write
C0002A1000
direct allocation
page read and write
182B2790000
heap
page read and write
C000062000
direct allocation
page read and write
7FF7A22D5000
unkown
page readonly
C0001C9000
direct allocation
page read and write
7FF7A1CE8000
unkown
page read and write
7FF7A2334000
unkown
page readonly
7FF7A22D9000
unkown
page readonly
C000086000
direct allocation
page read and write
7FF7A2300000
unkown
page readonly
7FF7A2283000
unkown
page readonly
4F3E000
stack
page read and write
478E000
stack
page read and write
7FF7A2332000
unkown
page readonly
7FF7A2305000
unkown
page readonly
47DD000
stack
page read and write
C0001E9000
direct allocation
page read and write
C000438000
direct allocation
page read and write
2C2D000
heap
page read and write
37B29FE000
stack
page read and write
182F7CA0000
direct allocation
page read and write
182B2760000
heap
page read and write
C0003E0000
direct allocation
page read and write
7FF7A1881000
unkown
page execute read
C000164000
direct allocation
page read and write
C000299000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
7FF7A231B000
unkown
page readonly
C0003DE000
direct allocation
page read and write
2BFB000
heap
page read and write
7FF7A2672000
unkown
page read and write
7FF7A2314000
unkown
page readonly
508F000
stack
page read and write
C000800000
direct allocation
page read and write
C0002BD000
direct allocation
page read and write
2D1E000
stack
page read and write
C00040E000
direct allocation
page read and write
C00029B000
direct allocation
page read and write
48FD000
stack
page read and write
37B31FE000
stack
page read and write
C000668000
direct allocation
page read and write
C0003D8000
direct allocation
page read and write
C000323000
direct allocation
page read and write
7FF7A22E6000
unkown
page readonly
2BFB000
heap
page read and write
7FF7A268B000
unkown
page readonly
C00005E000
direct allocation
page read and write
470D000
stack
page read and write
7FF7A2683000
unkown
page write copy
182B29B4000
direct allocation
page read and write
C000398000
direct allocation
page read and write
7FF7A22E6000
unkown
page readonly
C000221000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
182F7C61000
direct allocation
page read and write
7FF7A1D37000
unkown
page readonly
C0002AF000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000255000
direct allocation
page read and write
182F7E60000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
2BE0000
heap
page read and write
C000285000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
C0002DB000
direct allocation
page read and write
C000160000
direct allocation
page read and write
7FF7A2330000
unkown
page readonly
C0002B1000
direct allocation
page read and write
C0003EE000
direct allocation
page read and write
2BA0000
heap
page read and write
7FF7A231E000
unkown
page readonly
C0003F4000
direct allocation
page read and write
7FF7A1D30000
unkown
page read and write
C0003D0000
direct allocation
page read and write
C000177000
direct allocation
page read and write
182F7C8A000
direct allocation
page read and write
7FF7A260B000
unkown
page read and write
C0003FE000
direct allocation
page read and write
C000454000
direct allocation
page read and write
7FF7A1880000
unkown
page readonly
C000275000
direct allocation
page read and write
4790000
remote allocation
page read and write
C0003F0000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
2C2D000
heap
page read and write
37B2BFC000
stack
page read and write
37B2FFE000
stack
page read and write
C00009E000
direct allocation
page read and write
182B2B10000
heap
page read and write
7FF7A1D19000
unkown
page read and write
C0002D5000
direct allocation
page read and write
7FF7A2676000
unkown
page read and write
C000179000
direct allocation
page read and write
C000004000
direct allocation
page read and write
7FF7A1D37000
unkown
page readonly
C00055A000
direct allocation
page read and write
C00029D000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
47F0000
heap
page read and write
7FF7A2687000
unkown
page write copy
C000094000
direct allocation
page read and write
2C3F000
heap
page read and write
7FF7A230F000
unkown
page readonly
C00003F000
direct allocation
page read and write
7FF7A1D35000
unkown
page read and write
7FF7A230C000
unkown
page readonly
C0001E5000
direct allocation
page read and write
7FF7A22F4000
unkown
page readonly
7FF7A2318000
unkown
page readonly
C0003EC000
direct allocation
page read and write
2D35000
heap
page read and write
C000279000
direct allocation
page read and write
7FF7A22F0000
unkown
page readonly
C000050000
direct allocation
page read and write
C00026F000
direct allocation
page read and write
4790000
remote allocation
page read and write
7FF7A231E000
unkown
page readonly
C0000B2000
direct allocation
page read and write
46B0000
heap
page read and write
C000436000
direct allocation
page read and write
182B27E0000
heap
page read and write
7FF7A2339000
unkown
page readonly
C000042000
direct allocation
page read and write
C0001FF000
direct allocation
page read and write
C000213000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C000100000
direct allocation
page read and write
4AFE000
stack
page read and write
2D30000
heap
page read and write
7FF7A230C000
unkown
page readonly
C00030F000
direct allocation
page read and write
37B25FD000
stack
page read and write
C0003FC000
direct allocation
page read and write
C0002EF000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C000054000
direct allocation
page read and write
2C88000
heap
page read and write
2B00000
remote allocation
page execute and read and write
C00045B000
direct allocation
page read and write
182B29B8000
direct allocation
page read and write
C000038000
direct allocation
page read and write
7FF7A22F4000
unkown
page readonly
C00060E000
direct allocation
page read and write
2C02000
heap
page read and write
C0000DA000
direct allocation
page read and write
C0002ED000
direct allocation
page read and write
2C02000
heap
page read and write
C000155000
direct allocation
page read and write
C0003DA000
direct allocation
page read and write
7FF7A1881000
unkown
page execute read
7FF7A2330000
unkown
page readonly
7FF7A22E0000
unkown
page readonly
C0006A2000
direct allocation
page read and write
C000076000
direct allocation
page read and write
C0003E4000
direct allocation
page read and write
2F0F000
stack
page read and write
C00011A000
direct allocation
page read and write
C0002D1000
direct allocation
page read and write
2C88000
heap
page read and write
7FF7A22F0000
unkown
page readonly
2C21000
heap
page read and write
182F7D4C000
direct allocation
page read and write
C0002E9000
direct allocation
page read and write
C000010000
direct allocation
page read and write
182B2AF0000
direct allocation
page read and write
2C07000
heap
page read and write
2C93000
heap
page read and write
C000223000
direct allocation
page read and write
2C2D000
heap
page read and write
C000128000
direct allocation
page read and write
C000317000
direct allocation
page read and write
7FF7A22D5000
unkown
page readonly
C0001D5000
direct allocation
page read and write
51CE000
stack
page read and write
7FF7A2687000
unkown
page write copy
37B33FF000
stack
page read and write
7FF7A22AE000
unkown
page readonly
2C83000
heap
page read and write
7FF7A2314000
unkown
page readonly
C000088000
direct allocation
page read and write
182F7EC0000
direct allocation
page read and write
C000400000
direct allocation
page read and write
C0002F3000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
2C88000
heap
page read and write
2C06000
heap
page read and write
C00028B000
direct allocation
page read and write
C0001E7000
direct allocation
page read and write
C000182000
direct allocation
page read and write
37B27FF000
stack
page read and write
C0001D1000
direct allocation
page read and write
182F7F1F000
direct allocation
page read and write
7FF7A1D2C000
unkown
page write copy
7FF7A2683000
unkown
page read and write
2C0C000
heap
page read and write
7FF7A2305000
unkown
page readonly
182F7DCF000
direct allocation
page read and write
7FF7A22F6000
unkown
page readonly
7FF7A22EB000
unkown
page readonly
C000239000
direct allocation
page read and write
182F7CE0000
direct allocation
page read and write
C000480000
direct allocation
page read and write
7FF7A1880000
unkown
page readonly
C000911000
direct allocation
page read and write
C00033B000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C000044000
direct allocation
page read and write
7FF7A2283000
unkown
page readonly
C000716000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
182B2B15000
heap
page read and write
C0000A2000
direct allocation
page read and write
2C95000
heap
page read and write
7FF7A1CE2000
unkown
page read and write
7FF7A22C3000
unkown
page readonly
2C2D000
heap
page read and write
7FF7A2339000
unkown
page readonly
182B27E8000
heap
page read and write
2C90000
heap
page read and write
7FF7A230F000
unkown
page readonly
2C88000
heap
page read and write
C000217000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C0002D3000
direct allocation
page read and write
C00014C000
direct allocation
page read and write
C000297000
direct allocation
page read and write
C0003E2000
direct allocation
page read and write
C0001ED000
direct allocation
page read and write
C00028D000
direct allocation
page read and write
C00024B000
direct allocation
page read and write
C000114000
direct allocation
page read and write
C0000B4000
direct allocation
page read and write
7FF7A2318000
unkown
page readonly
2C23000
heap
page read and write
7FF7A268B000
unkown
page readonly
7FF7A22E0000
unkown
page readonly
C000000000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
182F7D58000
direct allocation
page read and write
182B2770000
heap
page read and write
C0000E9000
direct allocation
page read and write
C000211000
direct allocation
page read and write
2CA3000
heap
page read and write
7FF7A22DB000
unkown
page readonly
C000084000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
7FF7A1CEB000
unkown
page read and write
C0003AD000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C00040A000
direct allocation
page read and write
C000049000
direct allocation
page read and write
7FF7A22DB000
unkown
page readonly
2BB0000
heap
page read and write
7FF7A22F6000
unkown
page readonly
7FF7A2300000
unkown
page readonly
2C88000
heap
page read and write
C00031B000
direct allocation
page read and write
C0003C2000
direct allocation
page read and write
2C0C000
heap
page read and write
C000066000
direct allocation
page read and write
C0002C9000
direct allocation
page read and write
7FF7A1CEC000
unkown
page write copy
C00006C000
direct allocation
page read and write
182F7C78000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000070000
direct allocation
page read and write
2C21000
heap
page read and write
2C0C000
heap
page read and write
7FF7A1D1C000
unkown
page read and write
C000349000
direct allocation
page read and write
7FF7A22AE000
unkown
page readonly
2C2D000
heap
page read and write
C00042C000
direct allocation
page read and write
2CAC000
heap
page read and write
7FF7A2334000
unkown
page readonly
There are 346 hidden memdumps, click here to show them.