IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
plaintediousidowsko.shop
malicious
acceptabledcooeprs.shop
malicious
zippyfinickysofwps.shop
malicious
obsceneclassyjuwks.shop
malicious
holicisticscrarws.shop
malicious
boredimperissvieos.shop
malicious
sweetsquarediaslw.shop
malicious
miniaturefinerninewjs.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://acceptabledcooeprs.shop/api
104.21.59.156
https://acceptabledcooeprs.shop/apij
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://acceptabledcooeprs.shop/3
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictMpohxHrXTsWUtcYRySvTtdvgYoOzPaTLHQkyDGHWUOSc
unknown
https://acceptabledcooeprs.shop/apiP
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://acceptabledcooeprs.shop/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
acceptabledcooeprs.shop
104.21.59.156
malicious

IPs

IP
Domain
Country
Malicious
104.21.59.156
acceptabledcooeprs.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C000268000
direct allocation
page read and write
malicious
C00009C000
direct allocation
page read and write
C00046E000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
4C3D000
trusted library allocation
page read and write
1B697F80000
heap
page read and write
8C8000
heap
page read and write
4C68000
trusted library allocation
page read and write
522C000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
8C4000
heap
page read and write
C000084000
direct allocation
page read and write
8B4000
heap
page read and write
8B9000
heap
page read and write
8B9000
heap
page read and write
1B6DD3E4000
direct allocation
page read and write
C000099000
direct allocation
page read and write
7FF6F6CF1000
unkown
page write copy
4C4C000
trusted library allocation
page read and write
C00000C000
direct allocation
page read and write
8B1000
heap
page read and write
4E4D000
stack
page read and write
C0003EE000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
7FF6F7064000
unkown
page read and write
8D7000
heap
page read and write
8D7000
heap
page read and write
4C11000
trusted library allocation
page read and write
4C12000
trusted library allocation
page read and write
502C000
trusted library allocation
page read and write
F20000
remote allocation
page read and write
C00011C000
direct allocation
page read and write
8AD000
heap
page read and write
4C37000
trusted library allocation
page read and write
8B4000
heap
page read and write
8A9000
heap
page read and write
C000010000
direct allocation
page read and write
C000002000
direct allocation
page read and write
4C29000
trusted library allocation
page read and write
8C4000
heap
page read and write
1B6980D4000
direct allocation
page read and write
8F3000
heap
page read and write
7FF6F6CF4000
unkown
page read and write
4C49000
trusted library allocation
page read and write
8BB000
heap
page read and write
4C4F000
trusted library allocation
page read and write
8C2000
heap
page read and write
4C89000
trusted library allocation
page read and write
4D18000
trusted library allocation
page read and write
8B6000
heap
page read and write
C000080000
direct allocation
page read and write
8C3000
heap
page read and write
4C1A000
trusted library allocation
page read and write
4C3F000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
1B698245000
heap
page read and write
4C60000
trusted library allocation
page read and write
C000144000
direct allocation
page read and write
C0004E2000
direct allocation
page read and write
C000006000
direct allocation
page read and write
63A000
stack
page read and write
4C3A000
trusted library allocation
page read and write
8B4000
heap
page read and write
C000016000
direct allocation
page read and write
3CB000
stack
page read and write
C000096000
direct allocation
page read and write
ACF000
stack
page read and write
4C91000
trusted library allocation
page read and write
8BB000
heap
page read and write
C000400000
direct allocation
page read and write
4C17000
trusted library allocation
page read and write
C00002F000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C000420000
direct allocation
page read and write
F30000
heap
page read and write
4C14000
trusted library allocation
page read and write
8B9000
heap
page read and write
1B6DD4F0000
direct allocation
page read and write
C000058000
direct allocation
page read and write
4C5E000
trusted library allocation
page read and write
1B6DD5A3000
direct allocation
page read and write
8A9000
heap
page read and write
C0000AC000
direct allocation
page read and write
8B4000
heap
page read and write
4C29000
trusted library allocation
page read and write
C000014000
direct allocation
page read and write
4C47000
trusted library allocation
page read and write
7ED000
stack
page read and write
8BB000
heap
page read and write
C000104000
direct allocation
page read and write
4C66000
trusted library allocation
page read and write
8B2000
heap
page read and write
8DE000
heap
page read and write
7FF6F70E7000
unkown
page readonly
4C11000
trusted library allocation
page read and write
8B4000
heap
page read and write
4C3B000
trusted library allocation
page read and write
4C44000
trusted library allocation
page read and write
9E257FF000
stack
page read and write
1B697EA0000
heap
page read and write
4FEF000
stack
page read and write
4D10000
heap
page read and write
8FE000
heap
page read and write
9E25FFE000
stack
page read and write
4C71000
trusted library allocation
page read and write
C0000C1000
direct allocation
page read and write
8DA000
heap
page read and write
8C3000
heap
page read and write
7FF6F70D8000
unkown
page write copy
8B0000
heap
page read and write
8BB000
heap
page read and write
4C61000
trusted library allocation
page read and write
C00000E000
direct allocation
page read and write
1B6DD3E0000
direct allocation
page read and write
8DE000
heap
page read and write
F20000
remote allocation
page read and write
4C11000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
8C8000
heap
page read and write
8B4000
heap
page read and write
8DB000
heap
page read and write
C000049000
direct allocation
page read and write
7FF6F6CAD000
unkown
page write copy
4C52000
trusted library allocation
page read and write
7FF6F6CA9000
unkown
page read and write
C0003A0000
direct allocation
page read and write
4C11000
trusted library allocation
page read and write
8E1000
heap
page read and write
F0D000
stack
page read and write
6D0000
heap
page read and write
8DE000
heap
page read and write
8B7000
heap
page read and write
4C41000
trusted library allocation
page read and write
7FF6F6A01000
unkown
page execute read
1B698230000
direct allocation
page read and write
C000134000
direct allocation
page read and write
8CA000
heap
page read and write
8D7000
heap
page read and write
8D7000
heap
page read and write
C00005A000
direct allocation
page read and write
1B6DD500000
direct allocation
page read and write
896000
heap
page read and write
9E25BFF000
stack
page read and write
8C3000
heap
page read and write
8DB000
heap
page read and write
896000
heap
page read and write
4C2F000
trusted library allocation
page read and write
4C49000
trusted library allocation
page read and write
7FF6F6CF0000
unkown
page read and write
85F000
heap
page read and write
4C2A000
trusted library allocation
page read and write
7FF6F6CB0000
unkown
page read and write
C000023000
direct allocation
page read and write
4C4B000
trusted library allocation
page read and write
8D7000
heap
page read and write
4FAE000
stack
page read and write
C0000B4000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
8B1000
heap
page read and write
7FF6F7032000
unkown
page readonly
C000122000
direct allocation
page read and write
4C1F000
trusted library allocation
page read and write
9E255FC000
stack
page read and write
824000
heap
page read and write
C00005C000
direct allocation
page read and write
4C5D000
trusted library allocation
page read and write
C000018000
direct allocation
page read and write
5729000
trusted library allocation
page read and write
8D7000
heap
page read and write
4C39000
trusted library allocation
page read and write
790000
heap
page read and write
8D7000
heap
page read and write
C0000B6000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C0001BA000
direct allocation
page read and write
5210000
heap
page read and write
8BB000
heap
page read and write
8DF000
heap
page read and write
4C64000
trusted library allocation
page read and write
7FF6F6CDD000
unkown
page read and write
8BB000
heap
page read and write
1B6980D0000
direct allocation
page read and write
720000
heap
page read and write
C000100000
direct allocation
page read and write
8E5000
heap
page read and write
4C1D000
trusted library allocation
page read and write
8E6000
heap
page read and write
7FF6F6A00000
unkown
page readonly
4DEF000
trusted library allocation
page read and write
8D7000
heap
page read and write
8E7000
heap
page read and write
840000
heap
page read and write
8BF000
heap
page read and write
1B6DD4B0000
direct allocation
page read and write
8B0000
heap
page read and write
745000
heap
page read and write
C000060000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
C000412000
direct allocation
page read and write
4C18000
trusted library allocation
page read and write
8B1000
heap
page read and write
C000072000
direct allocation
page read and write
4DBF000
trusted library allocation
page read and write
888000
heap
page read and write
8B9000
heap
page read and write
8DF000
heap
page read and write
1B6980A0000
heap
page read and write
8BC000
heap
page read and write
8B9000
heap
page read and write
4C18000
trusted library allocation
page read and write
4E87000
trusted library allocation
page read and write
843000
heap
page read and write
C000044000
direct allocation
page read and write
4D11000
heap
page read and write
8DE000
heap
page read and write
C000418000
direct allocation
page read and write
C00003D000
direct allocation
page read and write
7FF6F70D4000
unkown
page read and write
1B6DD363000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C000087000
direct allocation
page read and write
7FF6F6CEC000
unkown
page write copy
8E6000
heap
page read and write
C0001F4000
direct allocation
page read and write
896000
heap
page read and write
7FF6F6CAE000
unkown
page read and write
8D7000
heap
page read and write
8B9000
heap
page read and write
C00004B000
direct allocation
page read and write
8B4000
heap
page read and write
82A000
heap
page read and write
F20000
remote allocation
page read and write
800000
heap
page read and write
747000
heap
page read and write
C000042000
direct allocation
page read and write
8DE000
heap
page read and write
C00002A000
direct allocation
page read and write
4D4F000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
8A9000
heap
page read and write
8B1000
heap
page read and write
7FF6F6CB1000
unkown
page write copy
ECD000
stack
page read and write
C000000000
direct allocation
page read and write
8E1000
heap
page read and write
9E25DFE000
stack
page read and write
886000
heap
page read and write
7FF6F7044000
unkown
page read and write
4C18000
trusted library allocation
page read and write
8E8000
heap
page read and write
C000124000
direct allocation
page read and write
1B6980D8000
direct allocation
page read and write
C00012C000
direct allocation
page read and write
841000
heap
page read and write
8E7000
heap
page read and write
4C84000
trusted library allocation
page read and write
C000414000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
7FF6F6CDB000
unkown
page read and write
8DE000
heap
page read and write
4C50000
trusted library allocation
page read and write
4C12000
trusted library allocation
page read and write
C00041A000
direct allocation
page read and write
C00002D000
direct allocation
page read and write
4C29000
trusted library allocation
page read and write
8B0000
heap
page read and write
4C11000
trusted library allocation
page read and write
C00003F000
direct allocation
page read and write
C000012000
direct allocation
page read and write
7FF6F6CAF000
unkown
page write copy
8BB000
heap
page read and write
4ABF000
stack
page read and write
8BD000
heap
page read and write
C00004F000
direct allocation
page read and write
4C18000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4C17000
trusted library allocation
page read and write
71E000
stack
page read and write
49BE000
stack
page read and write
1B697F88000
heap
page read and write
8E1000
heap
page read and write
8AD000
heap
page read and write
7FF6F70D8000
unkown
page write copy
4C15000
trusted library allocation
page read and write
C0003F8000
direct allocation
page read and write
C00004D000
direct allocation
page read and write
825000
heap
page read and write
8E0000
heap
page read and write
C000008000
direct allocation
page read and write
8B1000
heap
page read and write
1B6DD3A1000
direct allocation
page read and write
693000
remote allocation
page execute and read and write
8B9000
heap
page read and write
8B4000
heap
page read and write
886000
heap
page read and write
8A9000
heap
page read and write
7FF6F6CF6000
unkown
page readonly
7FF6F6CDC000
unkown
page write copy
C000076000
direct allocation
page read and write
4C49000
trusted library allocation
page read and write
4C48000
trusted library allocation
page read and write
7FF6F6CA9000
unkown
page write copy
8E1000
heap
page read and write
C000056000
direct allocation
page read and write
8B8000
heap
page read and write
7FF6F6A00000
unkown
page readonly
8B9000
heap
page read and write
7FF6F70D4000
unkown
page write copy
8B4000
heap
page read and write
4C50000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
4C36000
trusted library allocation
page read and write
8DE000
heap
page read and write
8D7000
heap
page read and write
C000028000
direct allocation
page read and write
4C29000
trusted library allocation
page read and write
C000410000
direct allocation
page read and write
8E0000
heap
page read and write
4C18000
trusted library allocation
page read and write
78E000
stack
page read and write
8EE000
heap
page read and write
4C31000
trusted library allocation
page read and write
7FF6F7032000
unkown
page readonly
8C7000
heap
page read and write
8B7000
heap
page read and write
7FF6F70CF000
unkown
page read and write
5C31000
trusted library allocation
page read and write
C0003F0000
direct allocation
page read and write
7FF6F70D5000
unkown
page write copy
8DE000
heap
page read and write
4C7D000
trusted library allocation
page read and write
C00007C000
direct allocation
page read and write
C000112000
direct allocation
page read and write
4F4E000
stack
page read and write
4C40000
trusted library allocation
page read and write
8B9000
heap
page read and write
9E261FF000
stack
page read and write
8B4000
heap
page read and write
4C2E000
trusted library allocation
page read and write
C000140000
direct allocation
page read and write
C000108000
direct allocation
page read and write
8EC000
heap
page read and write
1B6DD350000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
7FF6F6CDF000
unkown
page read and write
C0003F4000
direct allocation
page read and write
8FE000
heap
page read and write
8D7000
heap
page read and write
4C39000
trusted library allocation
page read and write
7FF6F6A01000
unkown
page execute read
C0000A0000
direct allocation
page read and write
82A000
heap
page read and write
C000180000
direct allocation
page read and write
4D1E000
trusted library allocation
page read and write
C00041E000
direct allocation
page read and write
DCE000
stack
page read and write
4C3F000
trusted library allocation
page read and write
8E1000
heap
page read and write
8B8000
heap
page read and write
896000
heap
page read and write
8DE000
heap
page read and write
4D6F000
trusted library allocation
page read and write
8E5000
heap
page read and write
8B9000
heap
page read and write
8D7000
heap
page read and write
8F3000
heap
page read and write
8DA000
heap
page read and write
8E5000
heap
page read and write
8B4000
heap
page read and write
1B6DD550000
direct allocation
page read and write
8E1000
heap
page read and write
4BFE000
stack
page read and write
740000
heap
page read and write
4C49000
trusted library allocation
page read and write
461D000
stack
page read and write
8F6000
heap
page read and write
8B6000
heap
page read and write
4C53000
trusted library allocation
page read and write
4C3B000
trusted library allocation
page read and write
8F6000
heap
page read and write
7FF6F70E7000
unkown
page readonly
C000126000
direct allocation
page read and write
9E259FE000
stack
page read and write
7FF6F6CF6000
unkown
page readonly
1B6DD360000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
886000
heap
page read and write
C00005E000
direct allocation
page read and write
8E1000
heap
page read and write
860000
heap
page read and write
8BB000
heap
page read and write
7FF6F6CDE000
unkown
page write copy
4C18000
trusted library allocation
page read and write
8FE000
heap
page read and write
1B698080000
heap
page read and write
1B698240000
heap
page read and write
4C37000
trusted library allocation
page read and write
C000120000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C000641000
direct allocation
page read and write
7FF6F705D000
unkown
page read and write
8B1000
heap
page read and write
50B1000
trusted library allocation
page read and write
4DE7000
trusted library allocation
page read and write
4DF7000
trusted library allocation
page read and write
640000
remote allocation
page execute and read and write
7FF6F70CB000
unkown
page read and write
4AFE000
stack
page read and write
840000
heap
page read and write
C00008B000
direct allocation
page read and write
8DE000
heap
page read and write
C00011E000
direct allocation
page read and write
8D7000
heap
page read and write
8D7000
heap
page read and write
4C49000
trusted library allocation
page read and write
8C5000
heap
page read and write
C00010C000
direct allocation
page read and write
4C52000
trusted library allocation
page read and write
4D37000
trusted library allocation
page read and write
4C58000
trusted library allocation
page read and write
4C47000
trusted library allocation
page read and write
8BD000
heap
page read and write
There are 413 hidden memdumps, click here to show them.