IOC Report
rwsNDpQSKZ.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rwsNDpQSKZ.exe
"C:\Users\user\Desktop\rwsNDpQSKZ.exe"
malicious

URLs

Name
IP
Malicious
https://outpointsozp.shop:443/apij
unknown
malicious
https://outpointsozp.shop/api
188.114.97.3
malicious
https://outpointsozp.shop/J
unknown
malicious
shepherdlyopzc.shop
malicious
lariatedzugspd.shop
malicious
upknittsoappz.shop
malicious
callosallsaospz.shop
malicious
outpointsozp.shop
malicious
https://outpointsozp.shop/apib
unknown
malicious
https://outpointsozp.shop/j
unknown
malicious
https://outpointsozp.shop:443/api
unknown
malicious
https://outpointsozp.shop/m
unknown
malicious
https://outpointsozp.shop/api)
unknown
malicious
unseaffarignsk.shop
malicious
https://outpointsozp.shop/
unknown
malicious
https://outpointsozp.shop/P_;
unknown
malicious
liernessfornicsa.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://zoom.us/privacy/support
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
outpointsozp.shop
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
outpointsozp.shop
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4F10000
direct allocation
page read and write
malicious
30DE000
heap
page read and write
5AEC000
trusted library allocation
page read and write
54E0000
remote allocation
page read and write
5B19000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
30B2000
heap
page read and write
304C000
heap
page read and write
5AEF000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
7DC000
stack
page read and write
5B0F000
trusted library allocation
page read and write
54E0000
remote allocation
page read and write
5B56000
trusted library allocation
page read and write
30DE000
heap
page read and write
54E0000
remote allocation
page read and write
5AE0000
trusted library allocation
page read and write
30BA000
heap
page read and write
5B31000
trusted library allocation
page read and write
30DE000
heap
page read and write
5B79000
trusted library allocation
page read and write
30DE000
heap
page read and write
B54000
heap
page read and write
30B2000
heap
page read and write
5B45000
trusted library allocation
page read and write
30B6000
heap
page read and write
5AE6000
trusted library allocation
page read and write
DEE000
unkown
page write copy
3079000
heap
page read and write
5AEB000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
B54000
heap
page read and write
5CCE000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
53DE000
stack
page read and write
5AFB000
trusted library allocation
page read and write
30DD000
heap
page read and write
5B1C000
trusted library allocation
page read and write
30DE000
heap
page read and write
B54000
heap
page read and write
30E5000
heap
page read and write
3046000
heap
page read and write
5AF7000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
4B71000
heap
page read and write
30B3000
heap
page read and write
30C6000
heap
page read and write
5B1D000
trusted library allocation
page read and write
5B63000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
30D1000
heap
page read and write
30CE000
heap
page read and write
5C96000
trusted library allocation
page read and write
30F7000
heap
page read and write
E1F000
unkown
page readonly
30DD000
heap
page read and write
4B70000
heap
page read and write
B54000
heap
page read and write
5B43000
trusted library allocation
page read and write
304C000
heap
page read and write
B54000
heap
page read and write
30B3000
heap
page read and write
5E4E000
trusted library allocation
page read and write
30DE000
heap
page read and write
5AEF000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
30DE000
heap
page read and write
5AFC000
trusted library allocation
page read and write
5B32000
trusted library allocation
page read and write
5B35000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
302E000
heap
page read and write
5B02000
trusted library allocation
page read and write
5B76000
trusted library allocation
page read and write
3000000
heap
page read and write
30DE000
heap
page read and write
DEE000
unkown
page read and write
5B0F000
trusted library allocation
page read and write
30DD000
heap
page read and write
30C6000
heap
page read and write
30B9000
heap
page read and write
5B19000
trusted library allocation
page read and write
B54000
heap
page read and write
30DD000
heap
page read and write
300A000
heap
page read and write
5C3E000
stack
page read and write
5B2E000
trusted library allocation
page read and write
30D0000
heap
page read and write
30C6000
heap
page read and write
5AEC000
trusted library allocation
page read and write
3078000
heap
page read and write
5D5E000
trusted library allocation
page read and write
5B15000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
4B71000
heap
page read and write
30DE000
heap
page read and write
5B04000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
54DF000
stack
page read and write
503D000
stack
page read and write
5AF2000
trusted library allocation
page read and write
5B3D000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
3079000
heap
page read and write
4FFD000
stack
page read and write
30B5000
heap
page read and write
302B000
heap
page read and write
304C000
heap
page read and write
D1D000
unkown
page readonly
529D000
stack
page read and write
C50000
unkown
page readonly
30CE000
heap
page read and write
5B41000
trusted library allocation
page read and write
5AF7000
trusted library allocation
page read and write
598E000
stack
page read and write
5C0E000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5B36000
trusted library allocation
page read and write
30B4000
heap
page read and write
5B34000
trusted library allocation
page read and write
304C000
heap
page read and write
5CC6000
trusted library allocation
page read and write
30D4000
heap
page read and write
B40000
heap
page read and write
5B18000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
3079000
heap
page read and write
AFC000
stack
page read and write
D1D000
unkown
page readonly
507E000
stack
page read and write
337F000
stack
page read and write
5CBE000
trusted library allocation
page read and write
C51000
unkown
page execute read
5B6E000
trusted library allocation
page read and write
30DD000
heap
page read and write
5AE8000
trusted library allocation
page read and write
4B80000
heap
page read and write
5AEF000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
5B1F000
trusted library allocation
page read and write
DFE000
unkown
page read and write
5B35000
trusted library allocation
page read and write
3063000
heap
page read and write
3062000
heap
page read and write
30DE000
heap
page read and write
5AFE000
trusted library allocation
page read and write
4B71000
heap
page read and write
B54000
heap
page read and write
5B2D000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
4FA0000
unclassified section
page write copy
30DE000
heap
page read and write
5090000
heap
page read and write
5B2E000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
4F61000
unclassified section
page execute read
30DE000
heap
page read and write
30DE000
heap
page read and write
5AEE000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
30B2000
heap
page read and write
5B26000
trusted library allocation
page read and write
B54000
heap
page read and write
4B71000
heap
page read and write
30DE000
heap
page read and write
4F9D000
unclassified section
page readonly
3063000
heap
page read and write
30B2000
heap
page read and write
5B34000
trusted library allocation
page read and write
3060000
heap
page read and write
3063000
heap
page read and write
30B2000
heap
page read and write
4FB0000
unclassified section
page readonly
30DE000
heap
page read and write
B54000
heap
page read and write
5AF6000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
30CF000
heap
page read and write
DF1000
unkown
page write copy
C30000
heap
page read and write
30CE000
heap
page read and write
5AE4000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
30D3000
heap
page read and write
5B26000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5B54000
trusted library allocation
page read and write
30D0000
heap
page read and write
30FE000
heap
page read and write
B54000
heap
page read and write
5B01000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
30DD000
heap
page read and write
588E000
stack
page read and write
B54000
heap
page read and write
30B7000
heap
page read and write
5BF5000
trusted library allocation
page read and write
3060000
heap
page read and write
5B35000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
2ECE000
stack
page read and write
5DAF000
trusted library allocation
page read and write
5D3E000
stack
page read and write
300E000
heap
page read and write
30D0000
heap
page read and write
5AFC000
trusted library allocation
page read and write
5B43000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
59CD000
stack
page read and write
5B4D000
trusted library allocation
page read and write
5AFA000
trusted library allocation
page read and write
5AFA000
trusted library allocation
page read and write
30D0000
heap
page read and write
30DD000
heap
page read and write
539E000
stack
page read and write
5AFC000
trusted library allocation
page read and write
C50000
unkown
page readonly
3063000
heap
page read and write
30D4000
heap
page read and write
4CAE000
stack
page read and write
30B4000
heap
page read and write
5B62000
trusted library allocation
page read and write
30DE000
heap
page read and write
30DD000
heap
page read and write
5B3D000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
3060000
heap
page read and write
4B20000
direct allocation
page execute and read and write
526D000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
30DD000
heap
page read and write
5AE1000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
B54000
heap
page read and write
30D4000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
B54000
heap
page read and write
323F000
stack
page read and write
5B3D000
trusted library allocation
page read and write
30B9000
heap
page read and write
5240000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
30D4000
heap
page read and write
5AFC000
trusted library allocation
page read and write
5B35000
trusted library allocation
page read and write
DF1000
unkown
page write copy
5B44000
trusted library allocation
page read and write
30C7000
heap
page read and write
30DD000
heap
page read and write
30DD000
heap
page read and write
304C000
heap
page read and write
30B7000
heap
page read and write
30DE000
heap
page read and write
5AEC000
trusted library allocation
page read and write
3079000
heap
page read and write
5B34000
trusted library allocation
page read and write
30DD000
heap
page read and write
3047000
heap
page read and write
3045000
heap
page read and write
5B14000
trusted library allocation
page read and write
3034000
heap
page read and write
5AF6000
trusted library allocation
page read and write
30BD000
heap
page read and write
5AEC000
trusted library allocation
page read and write
B54000
heap
page read and write
30DE000
heap
page read and write
5AFA000
trusted library allocation
page read and write
30D4000
heap
page read and write
5AEB000
trusted library allocation
page read and write
4B71000
heap
page read and write
5AE1000
trusted library allocation
page read and write
4B71000
heap
page read and write
B54000
heap
page read and write
5AE9000
trusted library allocation
page read and write
30B9000
heap
page read and write
30D0000
heap
page read and write
4B71000
heap
page read and write
5B2B000
trusted library allocation
page read and write
DEF000
unkown
page write copy
519E000
stack
page read and write
B54000
heap
page read and write
5B43000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
3034000
heap
page read and write
5B2C000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
C51000
unkown
page execute read
4B71000
heap
page read and write
5B42000
trusted library allocation
page read and write
5B12000
trusted library allocation
page read and write
B54000
heap
page read and write
5B2C000
trusted library allocation
page read and write
3078000
heap
page read and write
5B48000
trusted library allocation
page read and write
67B8000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
30D3000
heap
page read and write
5B59000
trusted library allocation
page read and write
B50000
heap
page read and write
B54000
heap
page read and write
5B0E000
trusted library allocation
page read and write
B54000
heap
page read and write
3064000
heap
page read and write
30DD000
heap
page read and write
B54000
heap
page read and write
313E000
stack
page read and write
4F09000
stack
page read and write
5AEF000
trusted library allocation
page read and write
30DE000
heap
page read and write
E01000
unkown
page readonly
5B2D000
trusted library allocation
page read and write
30DE000
heap
page read and write
2FE0000
heap
page read and write
5B08000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
5B1F000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
3062000
heap
page read and write
E01000
unkown
page readonly
5AEE000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
30B4000
heap
page read and write
5B34000
trusted library allocation
page read and write
30DE000
heap
page read and write
5B04000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
5D90000
heap
page read and write
5B0E000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
30DE000
heap
page read and write
5B3D000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
B54000
heap
page read and write
5B43000
trusted library allocation
page read and write
30C6000
heap
page read and write
30B4000
heap
page read and write
30DD000
heap
page read and write
4CEB000
stack
page read and write
5B2E000
trusted library allocation
page read and write
5ACE000
stack
page read and write
5AFF000
trusted library allocation
page read and write
30B4000
heap
page read and write
327E000
stack
page read and write
30DE000
heap
page read and write
2FCF000
stack
page read and write
3060000
heap
page read and write
5AFE000
trusted library allocation
page read and write
30B9000
heap
page read and write
50A1000
trusted library allocation
page read and write
30DE000
heap
page read and write
30DE000
heap
page read and write
5B08000
trusted library allocation
page read and write
3030000
heap
page read and write
30CE000
heap
page read and write
5B59000
trusted library allocation
page read and write
4FA6000
unclassified section
page read and write
4D00000
heap
page read and write
5B1F000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
4E0F000
stack
page read and write
30DD000
heap
page read and write
30E5000
heap
page read and write
5B2D000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
62AA000
trusted library allocation
page read and write
E1F000
unkown
page readonly
5B42000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
306A000
heap
page read and write
3060000
heap
page read and write
5BEF000
trusted library allocation
page read and write
There are 387 hidden memdumps, click here to show them.