IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
plaintediousidowsko.shop
malicious
acceptabledcooeprs.shop
malicious
zippyfinickysofwps.shop
malicious
obsceneclassyjuwks.shop
malicious
stiffraspyofkwsl.shop
malicious
holicisticscrarws.shop
malicious
boredimperissvieos.shop
malicious
sweetsquarediaslw.shop
malicious
miniaturefinerninewjs.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://stiffraspyofkwsl.shop/)
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://stiffraspyofkwsl.shop/
unknown
https://stiffraspyofkwsl.shop/api
172.67.189.159
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://stiffraspyofkwsl.shop/l
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://stiffraspyofkwsl.shop/-
unknown
https://www.ecosia.org/newtab/
unknown
https://stiffraspyofkwsl.shop/z
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://stiffraspyofkwsl.shop/G
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://stiffraspyofkwsl.shop/apibu4
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://stiffraspyofkwsl.shop/D
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://stiffraspyofkwsl.shop/O
unknown
https://imp.mt48.net/static?id=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://stiffraspyofkwsl.shop/U
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stiffraspyofkwsl.shop
172.67.189.159
malicious

IPs

IP
Domain
Country
Malicious
172.67.189.159
stiffraspyofkwsl.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C00027C000
direct allocation
page read and write
malicious
C00012A000
direct allocation
page read and write
C0004DB000
direct allocation
page read and write
88C000
heap
page read and write
907000
heap
page read and write
4B76000
trusted library allocation
page read and write
8A4000
heap
page read and write
C00011C000
direct allocation
page read and write
AE0000
remote allocation
page read and write
4B50000
trusted library allocation
page read and write
90F000
heap
page read and write
922000
heap
page read and write
4B49000
trusted library allocation
page read and write
4B29000
trusted library allocation
page read and write
4B28000
trusted library allocation
page read and write
C000122000
direct allocation
page read and write
8F0000
heap
page read and write
4B44000
trusted library allocation
page read and write
C00014C000
direct allocation
page read and write
C000504000
direct allocation
page read and write
8F0000
heap
page read and write
7FF6152FA000
unkown
page readonly
7FF6152B1000
unkown
page write copy
C00016C000
direct allocation
page read and write
4EAE000
stack
page read and write
3D0000
heap
page read and write
AE0000
remote allocation
page read and write
8F0000
heap
page read and write
8EE000
heap
page read and write
C000002000
direct allocation
page read and write
4B92000
trusted library allocation
page read and write
4CC2000
trusted library allocation
page read and write
882000
heap
page read and write
309000
stack
page read and write
4B1A000
trusted library allocation
page read and write
4B83000
trusted library allocation
page read and write
19546AE0000
direct allocation
page read and write
195017A0000
direct allocation
page read and write
4B39000
trusted library allocation
page read and write
C000146000
direct allocation
page read and write
4B11000
trusted library allocation
page read and write
8F4000
heap
page read and write
7FF615041000
unkown
page execute read
C000140000
direct allocation
page read and write
7FF615665000
unkown
page readonly
912000
heap
page read and write
C000068000
direct allocation
page read and write
C000094000
direct allocation
page read and write
4CEA000
trusted library allocation
page read and write
55AA7FF000
stack
page read and write
C000394000
direct allocation
page read and write
902000
heap
page read and write
C0004EC000
direct allocation
page read and write
904000
heap
page read and write
8EB000
heap
page read and write
C000004000
direct allocation
page read and write
4B61000
trusted library allocation
page read and write
5060000
heap
page read and write
918000
heap
page read and write
90A000
heap
page read and write
436E000
stack
page read and write
908000
heap
page read and write
C000043000
direct allocation
page read and write
7FF61564C000
unkown
page write copy
4B7F000
trusted library allocation
page read and write
C000045000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C000504000
direct allocation
page read and write
4B41000
trusted library allocation
page read and write
912000
heap
page read and write
91B000
heap
page read and write
7FF615665000
unkown
page readonly
3E0000
heap
page read and write
C00001A000
direct allocation
page read and write
912000
heap
page read and write
195018C0000
heap
page read and write
4B18000
trusted library allocation
page read and write
4B56000
trusted library allocation
page read and write
43C0000
heap
page read and write
4B49000
trusted library allocation
page read and write
903000
heap
page read and write
4CFA000
trusted library allocation
page read and write
4D4E000
stack
page read and write
4B18000
trusted library allocation
page read and write
C000500000
direct allocation
page read and write
340000
remote allocation
page execute and read and write
884000
heap
page read and write
4B18000
trusted library allocation
page read and write
C000128000
direct allocation
page read and write
8EA000
heap
page read and write
904000
heap
page read and write
4B49000
trusted library allocation
page read and write
8E6000
heap
page read and write
912000
heap
page read and write
903000
heap
page read and write
19501670000
heap
page read and write
8EB000
heap
page read and write
4B36000
trusted library allocation
page read and write
C000172000
direct allocation
page read and write
908000
heap
page read and write
8D9000
heap
page read and write
8EE000
heap
page read and write
4B5D000
trusted library allocation
page read and write
4B3F000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
912000
heap
page read and write
C0004FF000
direct allocation
page read and write
C0004D7000
direct allocation
page read and write
4B39000
trusted library allocation
page read and write
8EB000
heap
page read and write
4B58000
trusted library allocation
page read and write
4B47000
trusted library allocation
page read and write
19501840000
direct allocation
page read and write
19546C70000
direct allocation
page read and write
8EB000
heap
page read and write
912000
heap
page read and write
C0004F2000
direct allocation
page read and write
C0004F2000
direct allocation
page read and write
8F4000
heap
page read and write
7FF6152E6000
unkown
page read and write
4B18000
trusted library allocation
page read and write
4B5D000
trusted library allocation
page read and write
C000178000
direct allocation
page read and write
C0004D7000
direct allocation
page read and write
88C000
heap
page read and write
8EB000
heap
page read and write
8F0000
heap
page read and write
4B29000
trusted library allocation
page read and write
8D9000
heap
page read and write
7FF6152F8000
unkown
page read and write
912000
heap
page read and write
909000
heap
page read and write
908000
heap
page read and write
4B17000
trusted library allocation
page read and write
86C000
heap
page read and write
4B37000
trusted library allocation
page read and write
C0004EE000
direct allocation
page read and write
431D000
stack
page read and write
912000
heap
page read and write
4B7F000
trusted library allocation
page read and write
8F4000
heap
page read and write
C000092000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C00007C000
direct allocation
page read and write
900000
heap
page read and write
2CB000
stack
page read and write
4B3A000
trusted library allocation
page read and write
C000035000
direct allocation
page read and write
8EB000
heap
page read and write
19546AD3000
direct allocation
page read and write
7FF615650000
unkown
page write copy
C0004EE000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C00015E000
direct allocation
page read and write
4B49000
trusted library allocation
page read and write
902000
heap
page read and write
90A000
heap
page read and write
C000052000
direct allocation
page read and write
4B11000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
6E5000
heap
page read and write
8FD000
heap
page read and write
97E000
stack
page read and write
7FF615040000
unkown
page readonly
4B49000
trusted library allocation
page read and write
8E5000
heap
page read and write
8F0000
heap
page read and write
5A8C000
trusted library allocation
page read and write
908000
heap
page read and write
4B60000
trusted library allocation
page read and write
4B11000
trusted library allocation
page read and write
6E8000
heap
page read and write
912000
heap
page read and write
C000006000
direct allocation
page read and write
4B3D000
trusted library allocation
page read and write
4B47000
trusted library allocation
page read and write
8D9000
heap
page read and write
4B49000
trusted library allocation
page read and write
7FF6152FA000
unkown
page readonly
8E5000
heap
page read and write
C000126000
direct allocation
page read and write
4B36000
trusted library allocation
page read and write
4B29000
trusted library allocation
page read and write
918000
heap
page read and write
4B16000
trusted library allocation
page read and write
912000
heap
page read and write
4B47000
trusted library allocation
page read and write
1950188F000
direct allocation
page read and write
4B56000
trusted library allocation
page read and write
4B11000
trusted library allocation
page read and write
C000174000
direct allocation
page read and write
912000
heap
page read and write
195017A4000
direct allocation
page read and write
4E4E000
stack
page read and write
19501880000
direct allocation
page read and write
91C000
heap
page read and write
4B29000
trusted library allocation
page read and write
4B7F000
trusted library allocation
page read and write
5578000
trusted library allocation
page read and write
C00004E000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
4B15000
trusted library allocation
page read and write
397000
remote allocation
page execute and read and write
C0004F6000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
93E000
heap
page read and write
4B5E000
trusted library allocation
page read and write
8EE000
heap
page read and write
4B3F000
trusted library allocation
page read and write
7FF615040000
unkown
page readonly
8ED000
heap
page read and write
195017A9000
direct allocation
page read and write
19501570000
heap
page read and write
C00011E000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C000025000
direct allocation
page read and write
8FD000
heap
page read and write
C000168000
direct allocation
page read and write
4B29000
trusted library allocation
page read and write
4B44000
trusted library allocation
page read and write
7FF61560E000
unkown
page read and write
8E6000
heap
page read and write
4B5D000
trusted library allocation
page read and write
8F4000
heap
page read and write
4B12000
trusted library allocation
page read and write
195018C5000
heap
page read and write
4B5D000
trusted library allocation
page read and write
8EB000
heap
page read and write
8F4000
heap
page read and write
C00016E000
direct allocation
page read and write
4B12000
trusted library allocation
page read and write
C00009E000
direct allocation
page read and write
8E9000
heap
page read and write
907000
heap
page read and write
4B11000
trusted library allocation
page read and write
8F4000
heap
page read and write
C000030000
direct allocation
page read and write
6E8000
heap
page read and write
8FD000
heap
page read and write
C00011A000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
72E000
stack
page read and write
C000047000
direct allocation
page read and write
55A9BFC000
stack
page read and write
880000
heap
page read and write
C000016000
direct allocation
page read and write
931000
heap
page read and write
904000
heap
page read and write
4B49000
trusted library allocation
page read and write
8A3000
heap
page read and write
4C11000
heap
page read and write
8E5000
heap
page read and write
4B89000
trusted library allocation
page read and write
8F4000
heap
page read and write
8ED000
heap
page read and write
C000037000
direct allocation
page read and write
4C3A000
trusted library allocation
page read and write
C000090000
direct allocation
page read and write
912000
heap
page read and write
C0004DD000
direct allocation
page read and write
4B49000
trusted library allocation
page read and write
ADE000
stack
page read and write
C00003C000
direct allocation
page read and write
C000020000
direct allocation
page read and write
C00018E000
direct allocation
page read and write
55AA3FF000
stack
page read and write
19501804000
direct allocation
page read and write
8EB000
heap
page read and write
C000400000
direct allocation
page read and write
55A9DFE000
stack
page read and write
C000104000
direct allocation
page read and write
8F4000
heap
page read and write
C000041000
direct allocation
page read and write
C000027000
direct allocation
page read and write
4C10000
heap
page read and write
923000
heap
page read and write
86C000
heap
page read and write
8E9000
heap
page read and write
C000506000
direct allocation
page read and write
C0005BF000
direct allocation
page read and write
92F000
heap
page read and write
19501770000
heap
page read and write
19546C10000
direct allocation
page read and write
8E5000
heap
page read and write
C00010C000
direct allocation
page read and write
8F3000
heap
page read and write
C0004F6000
direct allocation
page read and write
7FF6152B6000
unkown
page read and write
909000
heap
page read and write
8E6000
heap
page read and write
914000
heap
page read and write
7FF61564C000
unkown
page read and write
C0000A8000
direct allocation
page read and write
7FF615650000
unkown
page write copy
C000158000
direct allocation
page read and write
8FD000
heap
page read and write
82F000
stack
page read and write
4B5E000
trusted library allocation
page read and write
924000
heap
page read and write
6E8000
heap
page read and write
4B17000
trusted library allocation
page read and write
55AA1FE000
stack
page read and write
906000
heap
page read and write
C00008C000
direct allocation
page read and write
4B52000
trusted library allocation
page read and write
903000
heap
page read and write
4B18000
trusted library allocation
page read and write
7FF6155E7000
unkown
page read and write
4B18000
trusted library allocation
page read and write
C000054000
direct allocation
page read and write
840000
heap
page read and write
4B4F000
trusted library allocation
page read and write
7FF6152F6000
unkown
page write copy
4B92000
trusted library allocation
page read and write
4B18000
trusted library allocation
page read and write
8EE000
heap
page read and write
8E2000
heap
page read and write
7FF61563C000
unkown
page read and write
918000
heap
page read and write
C00008E000
direct allocation
page read and write
19501800000
direct allocation
page read and write
8ED000
heap
page read and write
C0001C8000
direct allocation
page read and write
7FF6152B5000
unkown
page write copy
C0000A2000
direct allocation
page read and write
4B39000
trusted library allocation
page read and write
C00000A000
direct allocation
page read and write
912000
heap
page read and write
43AE000
stack
page read and write
4B29000
trusted library allocation
page read and write
8F9000
heap
page read and write
8FA000
heap
page read and write
C000084000
direct allocation
page read and write
8F4000
heap
page read and write
C00009A000
direct allocation
page read and write
908000
heap
page read and write
8F0000
heap
page read and write
8F3000
heap
page read and write
7FF615041000
unkown
page execute read
4A0F000
stack
page read and write
4F23000
trusted library allocation
page read and write
7FF6152E4000
unkown
page read and write
19546CB0000
direct allocation
page read and write
4EEF000
stack
page read and write
8FD000
heap
page read and write
7FF6152B7000
unkown
page write copy
C00012C000
direct allocation
page read and write
923000
heap
page read and write
C000150000
direct allocation
page read and write
913000
heap
page read and write
19546AF0000
direct allocation
page read and write
904000
heap
page read and write
19501810000
direct allocation
page read and write
912000
heap
page read and write
4B11000
trusted library allocation
page read and write
C00000C000
direct allocation
page read and write
4B29000
trusted library allocation
page read and write
C00013A000
direct allocation
page read and write
4B4A000
trusted library allocation
page read and write
8DE000
heap
page read and write
C000012000
direct allocation
page read and write
8F4000
heap
page read and write
44CC000
stack
page read and write
903000
heap
page read and write
8F3000
heap
page read and write
6E8000
heap
page read and write
4B0E000
stack
page read and write
6E8000
heap
page read and write
8FD000
heap
page read and write
7FF61564D000
unkown
page write copy
4B71000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
4B4B000
trusted library allocation
page read and write
4F26000
trusted library allocation
page read and write
7FF6152E5000
unkown
page write copy
8EA000
heap
page read and write
7FF6152B1000
unkown
page read and write
6E8000
heap
page read and write
848000
heap
page read and write
8E5000
heap
page read and write
C000144000
direct allocation
page read and write
C0004E4000
direct allocation
page read and write
19501650000
heap
page read and write
7FF6152F4000
unkown
page read and write
4B5E000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
912000
heap
page read and write
4B18000
trusted library allocation
page read and write
8F0000
heap
page read and write
8FD000
heap
page read and write
4CF2000
trusted library allocation
page read and write
8F4000
heap
page read and write
4B47000
trusted library allocation
page read and write
4B56000
trusted library allocation
page read and write
6E0000
heap
page read and write
4C52000
trusted library allocation
page read and write
C000078000
direct allocation
page read and write
8ED000
heap
page read and write
4B29000
trusted library allocation
page read and write
4B63000
trusted library allocation
page read and write
19546C67000
direct allocation
page read and write
8F4000
heap
page read and write
8D2000
heap
page read and write
19501678000
heap
page read and write
4B18000
trusted library allocation
page read and write
C00050A000
direct allocation
page read and write
929000
heap
page read and write
C0004DB000
direct allocation
page read and write
8EB000
heap
page read and write
88C000
heap
page read and write
5073000
trusted library allocation
page read and write
8F4000
heap
page read and write
913000
heap
page read and write
C000000000
direct allocation
page read and write
8EC000
heap
page read and write
45CD000
stack
page read and write
AE0000
remote allocation
page read and write
913000
heap
page read and write
4B2B000
trusted library allocation
page read and write
C0004EA000
direct allocation
page read and write
88C000
heap
page read and write
4C72000
trusted library allocation
page read and write
C000180000
direct allocation
page read and write
A80000
heap
page read and write
C000018000
direct allocation
page read and write
8EB000
heap
page read and write
19501820000
direct allocation
page read and write
8F4000
heap
page read and write
7FF615640000
unkown
page read and write
8E5000
heap
page read and write
912000
heap
page read and write
55AA5FE000
stack
page read and write
C00007E000
direct allocation
page read and write
4B3B000
trusted library allocation
page read and write
C0004DE000
direct allocation
page read and write
C000014000
direct allocation
page read and write
8F4000
heap
page read and write
4B3B000
trusted library allocation
page read and write
7FF615614000
unkown
page read and write
901000
heap
page read and write
C0000A6000
direct allocation
page read and write
C000506000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
8EE000
heap
page read and write
C00004C000
direct allocation
page read and write
908000
heap
page read and write
C0004DD000
direct allocation
page read and write
C000056000
direct allocation
page read and write
913000
heap
page read and write
4D8A000
trusted library allocation
page read and write
19501830000
direct allocation
page read and write
C000050000
direct allocation
page read and write
7FF6152F2000
unkown
page write copy
C0004EA000
direct allocation
page read and write
4B91000
trusted library allocation
page read and write
880000
heap
page read and write
4B1D000
trusted library allocation
page read and write
7FF6152B9000
unkown
page read and write
4B29000
trusted library allocation
page read and write
C00001C000
direct allocation
page read and write
4C1B000
trusted library allocation
page read and write
C00050A000
direct allocation
page read and write
4B11000
trusted library allocation
page read and write
C0004EC000
direct allocation
page read and write
8FD000
heap
page read and write
8F4000
heap
page read and write
8EF000
heap
page read and write
4B92000
trusted library allocation
page read and write
4B2E000
trusted library allocation
page read and write
91D000
heap
page read and write
19546C70000
direct allocation
page read and write
55A9FFE000
stack
page read and write
908000
heap
page read and write
883000
heap
page read and write
4B29000
trusted library allocation
page read and write
4B5D000
trusted library allocation
page read and write
C0004CC000
direct allocation
page read and write
4B2F000
trusted library allocation
page read and write
4C21000
trusted library allocation
page read and write
A7F000
stack
page read and write
909000
heap
page read and write
8EA000
heap
page read and write
865000
heap
page read and write
C000010000
direct allocation
page read and write
C000076000
direct allocation
page read and write
8DA000
heap
page read and write
C000008000
direct allocation
page read and write
4B14000
trusted library allocation
page read and write
7FF6152BA000
unkown
page write copy
1950188D000
direct allocation
page read and write
8EB000
heap
page read and write
There are 481 hidden memdumps, click here to show them.