IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jsii-runtime.3122541536\bin\jsii-runtime.js
C++ source, ASCII text, with very long lines (324), with escape sequences
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.3122541536\bin\jsii-runtime.js.map
JSON data
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.3122541536\lib\program.js
ASCII text, with very long lines (489)
dropped
C:\Users\user\AppData\Local\Temp\jsii-runtime.3122541536\lib\program.js.map
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
enlargkiw.sbs
malicious
allocatinow.sbs
malicious
drawwyobstacw.sbs
malicious
mathcucom.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vennurviot.sbs/api
172.67.140.193
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
ehticsprocw.sbs
malicious
https://divewanntwj.biz/api
188.114.97.3
malicious
condifendteu.sbs
malicious
https://drawwyobstacw.sbs/api
188.114.96.3
malicious
https://resinedyw.sbs/api
104.21.77.78
malicious
https://mathcucom.sbs/api
188.114.97.3
malicious
resinedyw.sbs
malicious
vennurviot.sbs
malicious
https://condifendteu.sbs/api
104.21.79.35
malicious
divewanntwj.biz
malicious
https://enlargkiw.sbs/api
104.21.33.249
malicious
https://github.com/aws/jsii
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://sergei-esenin.com/
unknown
https://allocatinow.sbs/3l
unknown
https://vennurviot.sbs/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
https://aws.amazon.com
unknown
http://microsoft.co
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://enlargkiw.sbs/
unknown
https://jsperf.com/object-keys-vs-for-in-with-closure/3
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://github.com/aws/jsii.git
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://mathcucom.sbs/
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://github.com/aws/jsii/issues
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://mathcucom.sbs/apij
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
http://json-schema.org/schema
unknown
https://github.com/jprichardson/node-fs-extra/issues/269
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://allocatinow.sbs/api
unknown
https://allocatinow.sbs/api1
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#
unknown
http://json-schema.org/draft-07/schema
unknown
https://steamcommunity.com/discussions/
unknown
https://sergei-esenin.com/apiC
unknown
https://store.steampowered.com/stats/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://resinedyw.sbs/
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://allocatinow.sbs/pi
unknown
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
unknown
https://ehticsprocw.sbs/li3
unknown
https://steamcommunity.com/workshop/
unknown
https://store.steampowered.com/legal/
unknown
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
unknown
https://allocatinow.sbs/co
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
unknown
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
unknown
http://json-schema.org/draft-07/schema#
unknown
http://jsperf.com/1-vs-infinity
unknown
https://store.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://allocatinow.sbs/
unknown
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
unknown
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://store.steampowered.com/mobile
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
condifendteu.sbs
104.21.79.35
malicious
steamcommunity.com
104.102.49.254
malicious
vennurviot.sbs
172.67.140.193
malicious
drawwyobstacw.sbs
188.114.96.3
malicious
mathcucom.sbs
188.114.97.3
malicious
divewanntwj.biz
188.114.97.3
malicious
sergei-esenin.com
172.67.206.204
malicious
ehticsprocw.sbs
172.67.173.224
malicious
resinedyw.sbs
104.21.77.78
malicious
enlargkiw.sbs
104.21.33.249
malicious
allocatinow.sbs
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
188.114.97.3
mathcucom.sbs
European Union
malicious
104.21.33.249
enlargkiw.sbs
United States
malicious
172.67.173.224
ehticsprocw.sbs
United States
malicious
188.114.96.3
drawwyobstacw.sbs
European Union
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.140.193
vennurviot.sbs
United States
malicious
104.21.77.78
resinedyw.sbs
United States
malicious
104.21.79.35
condifendteu.sbs
United States
malicious
172.67.206.204
sergei-esenin.com
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4215000
direct allocation
page read and write
malicious
1D53000
unkown
page write copy
3CDA000
direct allocation
page read and write
4FC000
stack
page read and write
3220000
heap
page read and write
322E000
heap
page read and write
23F3D000
stack
page read and write
4C20000
remote allocation
page read and write
2F80000
heap
page read and write
4060000
direct allocation
page read and write
2E8B000
stack
page read and write
3B6E000
stack
page read and write
40FE000
direct allocation
page read and write
3D04000
direct allocation
page read and write
1FB5000
heap
page read and write
40C4000
direct allocation
page read and write
2100000
direct allocation
page read and write
3CD2000
direct allocation
page read and write
40EE000
direct allocation
page read and write
31C4000
heap
page read and write
3C04000
direct allocation
page read and write
4BFD000
stack
page read and write
571000
unkown
page execute read
3D06000
direct allocation
page read and write
3C72000
direct allocation
page read and write
40F8000
direct allocation
page read and write
2090000
direct allocation
page read and write
1D91000
unkown
page readonly
3CB2000
direct allocation
page read and write
3C98000
direct allocation
page read and write
1D13000
unkown
page read and write
40EC000
direct allocation
page read and write
F4C000
unkown
page readonly
3CEA000
direct allocation
page read and write
3BAD000
stack
page read and write
1D6F000
unkown
page read and write
1D0E000
unkown
page write copy
40B4000
direct allocation
page read and write
3CF2000
direct allocation
page read and write
3C86000
direct allocation
page read and write
31D3000
heap
page read and write
243C0000
heap
page read and write
3C55000
direct allocation
page read and write
1D0F000
unkown
page read and write
55CE000
stack
page read and write
550000
heap
page read and write
3D42000
direct allocation
page read and write
4064000
direct allocation
page read and write
32BE000
stack
page read and write
3D3E000
direct allocation
page read and write
3C4C000
direct allocation
page read and write
3C20000
direct allocation
page read and write
3D26000
direct allocation
page read and write
1D90000
unkown
page write copy
3D10000
direct allocation
page read and write
4D4D000
stack
page read and write
2436F000
direct allocation
page read and write
3DCE000
direct allocation
page read and write
3C94000
direct allocation
page read and write
40B6000
direct allocation
page read and write
3CA0000
direct allocation
page read and write
3222000
heap
page read and write
3C66000
direct allocation
page read and write
4C20000
remote allocation
page read and write
3E62000
direct allocation
page read and write
24180000
direct allocation
page read and write
3D7C000
direct allocation
page read and write
3C28000
direct allocation
page read and write
3C40000
direct allocation
page read and write
40F4000
direct allocation
page read and write
3D7A000
direct allocation
page read and write
14EB000
unkown
page readonly
531D000
stack
page read and write
1E9A000
heap
page read and write
3222000
heap
page read and write
40F4000
direct allocation
page read and write
3E1E000
direct allocation
page read and write
1503000
unkown
page readonly
1D87000
unkown
page read and write
1D60000
unkown
page read and write
31D3000
heap
page read and write
52DF000
stack
page read and write
3C68000
direct allocation
page read and write
1E33000
unkown
page readonly
2403F000
stack
page read and write
3D80000
direct allocation
page read and write
40F8000
direct allocation
page read and write
23CFF000
stack
page read and write
2451F000
stack
page read and write
31A7000
heap
page read and write
3224000
heap
page read and write
4215000
direct allocation
page read and write
31D3000
heap
page read and write
2441D000
stack
page read and write
40F6000
direct allocation
page read and write
14EF000
unkown
page readonly
1FB0000
heap
page read and write
560000
heap
page read and write
31C7000
heap
page read and write
40FE000
direct allocation
page read and write
2F30000
heap
page read and write
2F90000
heap
page read and write
4180000
direct allocation
page read and write
3D76000
direct allocation
page read and write
3D54000
direct allocation
page read and write
2ECB000
stack
page read and write
321F000
heap
page read and write
4B60000
heap
page read and write
31C6000
heap
page read and write
3D86000
direct allocation
page read and write
40FC000
direct allocation
page read and write
40B0000
direct allocation
page read and write
1EC000
stack
page read and write
316E000
stack
page read and write
4094000
direct allocation
page read and write
4066000
direct allocation
page read and write
14FB000
unkown
page readonly
3D6A000
direct allocation
page read and write
31D3000
heap
page read and write
38F0000
direct allocation
page read and write
3CAE000
direct allocation
page read and write
1D0A000
unkown
page write copy
436E000
direct allocation
page read and write
2110000
direct allocation
page read and write
3CD8000
direct allocation
page read and write
556E000
stack
page read and write
1D91000
unkown
page readonly
3D28000
direct allocation
page read and write
14EF000
unkown
page readonly
3C4E000
direct allocation
page read and write
409A000
direct allocation
page read and write
3D5A000
direct allocation
page read and write
1D0A000
unkown
page write copy
3D3C000
direct allocation
page read and write
1D14000
unkown
page write copy
1503000
unkown
page readonly
F4C000
unkown
page readonly
3C84000
direct allocation
page read and write
4C20000
remote allocation
page read and write
40F0000
direct allocation
page read and write
40F6000
direct allocation
page read and write
3E98000
direct allocation
page read and write
2098000
direct allocation
page read and write
3BED000
stack
page read and write
570000
unkown
page readonly
51DE000
stack
page read and write
3C60000
direct allocation
page read and write
1D51000
unkown
page read and write
156B000
unkown
page readonly
3D0A000
direct allocation
page read and write
1E90000
heap
page read and write
4172000
direct allocation
page read and write
560F000
stack
page read and write
3CA8000
direct allocation
page read and write
3C2A000
direct allocation
page read and write
3DB0000
direct allocation
page read and write
3D88000
direct allocation
page read and write
3C2C000
direct allocation
page read and write
541D000
stack
page read and write
4C40000
heap
page read and write
1D5F000
unkown
page write copy
1522000
unkown
page readonly
1522000
unkown
page readonly
319C000
heap
page read and write
2407D000
stack
page read and write
31AE000
heap
page read and write
1FA0000
direct allocation
page read and write
3DA0000
direct allocation
page read and write
156B000
unkown
page readonly
2F95000
heap
page read and write
2140000
heap
page read and write
4100000
direct allocation
page read and write
570000
unkown
page readonly
3CBC000
direct allocation
page read and write
45C000
remote allocation
page execute and read and write
323D000
heap
page read and write
33BF000
stack
page read and write
1D90000
unkown
page write copy
23EFF000
stack
page read and write
1D10000
unkown
page write copy
4081000
direct allocation
page read and write
2F7E000
stack
page read and write
3D8C000
direct allocation
page read and write
2120000
heap
page read and write
3D34000
direct allocation
page read and write
3D68000
direct allocation
page read and write
3C58000
direct allocation
page read and write
3F08000
direct allocation
page read and write
241C3000
direct allocation
page read and write
321F000
heap
page read and write
4100000
direct allocation
page read and write
1D56000
unkown
page read and write
3D4A000
direct allocation
page read and write
4E4D000
stack
page read and write
2417F000
stack
page read and write
3CFC000
direct allocation
page read and write
3CD4000
direct allocation
page read and write
24393000
direct allocation
page read and write
24189000
direct allocation
page read and write
31C7000
heap
page read and write
3D5E000
direct allocation
page read and write
3222000
heap
page read and write
3C8C000
direct allocation
page read and write
3E6C000
direct allocation
page read and write
14FB000
unkown
page readonly
3D3A000
direct allocation
page read and write
3D72000
direct allocation
page read and write
3D78000
direct allocation
page read and write
546E000
stack
page read and write
40FC000
direct allocation
page read and write
3CB8000
direct allocation
page read and write
3CBA000
direct allocation
page read and write
571000
unkown
page execute read
23DFF000
stack
page read and write
3C30000
direct allocation
page read and write
571000
unkown
page execute read
3180000
heap
page read and write
3CE4000
direct allocation
page read and write
3C00000
direct allocation
page read and write
14EB000
unkown
page readonly
24185000
direct allocation
page read and write
3DF8000
direct allocation
page read and write
436E000
direct allocation
page read and write
3227000
heap
page read and write
3EEC000
direct allocation
page read and write
1D0B000
unkown
page read and write
400000
remote allocation
page execute and read and write
56F0000
heap
page read and write
1E33000
unkown
page readonly
31A4000
heap
page read and write
31C6000
heap
page read and write
4BBD000
stack
page read and write
3C62000
direct allocation
page read and write
1D8C000
unkown
page read and write
3CD0000
direct allocation
page read and write
3188000
heap
page read and write
There are 226 hidden memdumps, click here to show them.