IOC Report
N65c8rwdal.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\N65c8rwdal.exe
"C:\Users\user\Desktop\N65c8rwdal.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
relaxatinownio.shop
malicious
keennylrwmqlw.shop
malicious
tendencctywop.shop
malicious
tryyudjasudqo.shop
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
tesecuuweqo.shop
malicious
eemmbryequo.shop
malicious
reggwardssdqw.shop
malicious
licenseodqwmqn.shop
malicious
https://gravvitywio.store/api
172.67.209.193
malicious
https://player.vimeo.com
unknown
https://golang.org/doc/faq#nil_errorx509:
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://tendencctywop.shop/
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=w4s3
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=pvBDaFhF2LLJ&l=e
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://gravvitywio.store/
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://s.ytimg.com;
unknown
http://www.certum.pl/CPS0
unknown
https://steam.tv/
unknown
http://cevcsca2021.ocsp-certum.com07
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://gravvitywio.store/)
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
http://cevcsca2021.crl.certum.pl/cevcsca2021.crl0w
unknown
https://sketchfab.com
unknown
https://gravvitywio.store/7
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://gravvitywio.store:443/apifiles/76561199724331900
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://management.azure.cominvalid
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/3y
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://community.akamai.steamstatic.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=8vRVyaZK
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
http://repository.certum.pl/cevcsca2021.cer0
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://gravvitywio.store/G
unknown
http://subca.ocsp-certum.com02
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://steamcommunity.com/workshop/
unknown
https://login.steampowered.com/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
https://recaptcha.net
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://www.certum.pl/CPS0
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gravvitywio.store
172.67.209.193
malicious
tryyudjasudqo.shop
unknown
malicious
keennylrwmqlw.shop
unknown
malicious
reggwardssdqw.shop
unknown
malicious
tesecuuweqo.shop
unknown
malicious
tendencctywop.shop
unknown
malicious
eemmbryequo.shop
unknown
malicious
licenseodqwmqn.shop
unknown
malicious
relaxatinownio.shop
unknown
malicious
steamcommunity.com
104.102.49.254

IPs

IP
Domain
Country
Malicious
172.67.209.193
gravvitywio.store
United States
malicious
104.102.49.254
steamcommunity.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
C000554000
direct allocation
page read and write
malicious
7FF730241000
unkown
page readonly
malicious
7FF730241000
unkown
page readonly
malicious
C0006B8000
direct allocation
page read and write
7FF72FB66000
unkown
page write copy
7FF730205000
unkown
page readonly
C0000DA000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
7FF72FB13000
unkown
page write copy
7FF7306F9000
unkown
page write copy
C000275000
direct allocation
page read and write
C0002F1000
direct allocation
page read and write
C000084000
direct allocation
page read and write
1CA7F487000
direct allocation
page read and write
4C80000
remote allocation
page read and write
C00015D000
direct allocation
page read and write
3346000
heap
page read and write
1CA7E164000
direct allocation
page read and write
7FF730202000
unkown
page readonly
7FF7306FB000
unkown
page readonly
7FF72FB71000
unkown
page write copy
32CB000
heap
page read and write
1CA7E168000
direct allocation
page read and write
C0002C1000
direct allocation
page read and write
C0002FA000
direct allocation
page read and write
C000132000
direct allocation
page read and write
550E000
stack
page read and write
7FF7306F6000
unkown
page write copy
1CA7F5E0000
direct allocation
page read and write
7FF7301E7000
unkown
page readonly
7FF7301D1000
unkown
page readonly
C0001CB000
direct allocation
page read and write
7FF7301CF000
unkown
page readonly
7FF73019E000
unkown
page readonly
C0002C5000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
7FF73019E000
unkown
page readonly
C0003B0000
direct allocation
page read and write
1CA7E1D9000
direct allocation
page read and write
1CA7E16D000
direct allocation
page read and write
C000064000
direct allocation
page read and write
1CA7E050000
direct allocation
page read and write
C000126000
direct allocation
page read and write
32DD000
heap
page read and write
C0000CE000
direct allocation
page read and write
C000207000
direct allocation
page read and write
7FF73020A000
unkown
page readonly
C0003DC000
direct allocation
page read and write
7FF7301CB000
unkown
page readonly
3310000
heap
page read and write
3398000
heap
page read and write
C0000C4000
direct allocation
page read and write
7FF7301A2000
unkown
page readonly
C000058000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
3364000
heap
page read and write
4C80000
remote allocation
page read and write
C0001C9000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
7FF72F4B1000
unkown
page execute read
C0000D8000
direct allocation
page read and write
2D0C000
stack
page read and write
32FA000
heap
page read and write
C00029B000
direct allocation
page read and write
C00030C000
direct allocation
page read and write
C000261000
direct allocation
page read and write
7FF72F4B1000
unkown
page execute read
C00011C000
direct allocation
page read and write
C000143000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
3010000
heap
page read and write
7FF7301D7000
unkown
page readonly
32CB000
heap
page read and write
7FF73020E000
unkown
page readonly
7FF7301FB000
unkown
page readonly
C000293000
direct allocation
page read and write
C000096000
direct allocation
page read and write
7FF7301D1000
unkown
page readonly
C00017F000
direct allocation
page read and write
4F40000
heap
page read and write
3319000
heap
page read and write
1CA7DF00000
heap
page read and write
7FF7301B9000
unkown
page readonly
32B8000
heap
page read and write
7FF730228000
unkown
page readonly
7FF730228000
unkown
page readonly
C00004A000
direct allocation
page read and write
C000480000
direct allocation
page read and write
4CED000
stack
page read and write
C0003C6000
direct allocation
page read and write
1CA7F630000
direct allocation
page read and write
7FF7301A8000
unkown
page readonly
C000032000
direct allocation
page read and write
C000000000
direct allocation
page read and write
32FA000
heap
page read and write
C000412000
direct allocation
page read and write
C000120000
direct allocation
page read and write
4C50000
heap
page read and write
C00041A000
direct allocation
page read and write
C000082000
direct allocation
page read and write
757D5FD000
stack
page read and write
C0001E9000
direct allocation
page read and write
7FF72FB06000
unkown
page write copy
7FF7301A8000
unkown
page readonly
C000036000
direct allocation
page read and write
1CA7E1B0000
direct allocation
page read and write
C0002D1000
direct allocation
page read and write
C0001DF000
direct allocation
page read and write
C000279000
direct allocation
page read and write
1CA7DFE0000
heap
page read and write
C000043000
direct allocation
page read and write
7FF72FB6D000
unkown
page write copy
757DDFE000
stack
page read and write
C00026D000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
C0002C3000
direct allocation
page read and write
54AD000
stack
page read and write
7FF72FB53000
unkown
page read and write
C000273000
direct allocation
page read and write
7FF7301D7000
unkown
page readonly
1CA7F410000
direct allocation
page read and write
4F2D000
stack
page read and write
C0001DD000
direct allocation
page read and write
4CA0000
heap
page read and write
C0000EC000
direct allocation
page read and write
7FF7301F6000
unkown
page readonly
757E1FF000
stack
page read and write
53AD000
stack
page read and write
3364000
heap
page read and write
C000124000
direct allocation
page read and write
32B0000
heap
page read and write
C00040C000
direct allocation
page read and write
7FF7301CF000
unkown
page readonly
C00001A000
direct allocation
page read and write
C0002F5000
direct allocation
page read and write
C0002AB000
direct allocation
page read and write
1CA7E1F0000
direct allocation
page read and write
757DBFE000
stack
page read and write
C0003D2000
direct allocation
page read and write
7FF72FB72000
unkown
page readonly
C000552000
direct allocation
page read and write
3319000
heap
page read and write
C0001E7000
direct allocation
page read and write
3130000
heap
page read and write
C000173000
direct allocation
page read and write
1CA7F5B4000
direct allocation
page read and write
C00028B000
direct allocation
page read and write
7FF7301EC000
unkown
page readonly
1CA7F475000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
7FF72FB68000
unkown
page read and write
C000030000
direct allocation
page read and write
7FF7301F6000
unkown
page readonly
7FF730658000
unkown
page read and write
C0001C5000
direct allocation
page read and write
C000323000
direct allocation
page read and write
1CA7F6D6000
direct allocation
page read and write
34AE000
stack
page read and write
C0000DC000
direct allocation
page read and write
4DED000
stack
page read and write
1CA7E000000
heap
page read and write
C0003A2000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C00080E000
direct allocation
page read and write
757D7FF000
stack
page read and write
7FF73016E000
unkown
page readonly
C0003FC000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
C000145000
direct allocation
page read and write
32F1000
heap
page read and write
C000418000
direct allocation
page read and write
7FF7301E7000
unkown
page readonly
1CA7E205000
heap
page read and write
C000263000
direct allocation
page read and write
C000931000
direct allocation
page read and write
C0001C1000
direct allocation
page read and write
7FF7301DC000
unkown
page readonly
7FF7301DC000
unkown
page readonly
C0003C2000
direct allocation
page read and write
312E000
stack
page read and write
7FF72FB0F000
unkown
page write copy
1CA7F680000
direct allocation
page read and write
C0003C4000
direct allocation
page read and write
7FF7301CB000
unkown
page readonly
3310000
heap
page read and write
7FF7306EB000
unkown
page read and write
C000245000
direct allocation
page read and write
C00026B000
direct allocation
page read and write
C000080000
direct allocation
page read and write
1CA7E1B8000
direct allocation
page read and write
1CA7F620000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
C0005DE000
direct allocation
page read and write
C0002B9000
direct allocation
page read and write
7FF7301E1000
unkown
page readonly
C000241000
direct allocation
page read and write
7FF7301E1000
unkown
page readonly
3383000
heap
page read and write
C000400000
direct allocation
page read and write
7FF72F4B0000
unkown
page readonly
7FF72FB51000
unkown
page write copy
C000034000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C0003E0000
direct allocation
page read and write
C000038000
direct allocation
page read and write
7FF72FB72000
unkown
page readonly
7FF7301F1000
unkown
page readonly
C0000EA000
direct allocation
page read and write
2DD6000
remote allocation
page execute and read and write
7FF72FB12000
unkown
page read and write
C000167000
direct allocation
page read and write
7FF72FB06000
unkown
page read and write
C0000BE000
direct allocation
page read and write
3380000
heap
page read and write
1CA7E1E0000
direct allocation
page read and write
1CA7F413000
direct allocation
page read and write
7FF72FB4C000
unkown
page read and write
C000329000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000183000
direct allocation
page read and write
757D9FE000
stack
page read and write
C0001ED000
direct allocation
page read and write
7FF73016E000
unkown
page readonly
7FF7301DA000
unkown
page readonly
C000420000
direct allocation
page read and write
C00008B000
direct allocation
page read and write
7FF73020A000
unkown
page readonly
C0001B8000
direct allocation
page read and write
C000116000
direct allocation
page read and write
C0002A9000
direct allocation
page read and write
560F000
stack
page read and write
C000078000
direct allocation
page read and write
C000414000
direct allocation
page read and write
1CA7E160000
direct allocation
page read and write
3135000
heap
page read and write
327E000
stack
page read and write
C0003BC000
direct allocation
page read and write
7FF73067D000
unkown
page read and write
C0000F6000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
C000118000
direct allocation
page read and write
7FF72FB0C000
unkown
page write copy
1CA7E200000
heap
page read and write
7FF730205000
unkown
page readonly
4F30000
heap
page read and write
7FF7306F5000
unkown
page read and write
757E3FD000
stack
page read and write
332E000
heap
page read and write
7FF730231000
unkown
page readonly
C00022D000
direct allocation
page read and write
1CA7E068000
heap
page read and write
C000051000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C0003FA000
direct allocation
page read and write
3312000
heap
page read and write
C00000A000
direct allocation
page read and write
7FF7301EC000
unkown
page readonly
C00002C000
direct allocation
page read and write
332E000
heap
page read and write
7FF73020E000
unkown
page readonly
C000311000
direct allocation
page read and write
C0002A7000
direct allocation
page read and write
7FF7306F5000
unkown
page write copy
C000247000
direct allocation
page read and write
C0003DE000
direct allocation
page read and write
C000048000
direct allocation
page read and write
32C6000
heap
page read and write
C00009E000
direct allocation
page read and write
32F1000
heap
page read and write
7FF7301DA000
unkown
page readonly
C00020B000
direct allocation
page read and write
C000155000
direct allocation
page read and write
C000287000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
3312000
heap
page read and write
C0000F8000
direct allocation
page read and write
757DFFC000
stack
page read and write
7FF730684000
unkown
page read and write
32DD000
heap
page read and write
3381000
heap
page read and write
7FF72FB0E000
unkown
page read and write
1CA7E1C8000
direct allocation
page read and write
338F000
heap
page read and write
4C80000
remote allocation
page read and write
C0002ED000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C0002AD000
direct allocation
page read and write
7FF7301F1000
unkown
page readonly
7FF7301EA000
unkown
page readonly
C00002E000
direct allocation
page read and write
3381000
heap
page read and write
2D80000
remote allocation
page execute and read and write
C000404000
direct allocation
page read and write
C0002E5000
direct allocation
page read and write
1CA7E060000
heap
page read and write
7FF730202000
unkown
page readonly
4E2D000
stack
page read and write
7FF7306F9000
unkown
page write copy
7FF730231000
unkown
page readonly
C0001F9000
direct allocation
page read and write
C000255000
direct allocation
page read and write
323F000
stack
page read and write
2D4C000
stack
page read and write
7FF72FB70000
unkown
page read and write
C0003CC000
direct allocation
page read and write
C0003EA000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
3364000
heap
page read and write
1CA7E1A0000
direct allocation
page read and write
1CA7F47A000
direct allocation
page read and write
C0001D9000
direct allocation
page read and write
7FF7301EA000
unkown
page readonly
C0000CB000
direct allocation
page read and write
3381000
heap
page read and write
C000331000
direct allocation
page read and write
7FF72F4B0000
unkown
page readonly
C0003E8000
direct allocation
page read and write
C000171000
direct allocation
page read and write
C000091000
direct allocation
page read and write
7FF7301B9000
unkown
page readonly
C00041C000
direct allocation
page read and write
C00008F000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C000223000
direct allocation
page read and write
7FF7306F0000
unkown
page read and write
C000169000
direct allocation
page read and write
C000800000
direct allocation
page read and write
7FF7301A2000
unkown
page readonly
3280000
heap
page read and write
7FF7306FB000
unkown
page readonly
7FF7301FB000
unkown
page readonly
C0000EE000
direct allocation
page read and write
There are 325 hidden memdumps, click here to show them.