IOC Report
iq2HxA0SLw.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\iq2HxA0SLw.exe
"C:\Users\user\Desktop\iq2HxA0SLw.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
priooozekw.shop
malicious
https://racedsuitreow.shop/api
104.21.37.97
malicious
surroundeocw.shop
malicious
racedsuitreow.shop
malicious
pianoswimen.shop
malicious
covvercilverow.shop
malicious
pumpkinkwquo.shop
malicious
abortinoiwiam.shop
malicious
deallyharvenw.shop
malicious
defenddsouneuw.shop
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://racedsuitreow.shop/xy
unknown
http://crl.m
unknown
https://racedsuitreow.shop/api$&
unknown
http://www.microsoft.co
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://racedsuitreow.shop/api=
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
racedsuitreow.shop
104.21.37.97
malicious
pianoswimen.shop
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.37.97
racedsuitreow.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C000800000
direct allocation
page read and write
malicious
7FF6A99C7000
unkown
page readonly
malicious
7FF6A99C7000
unkown
page readonly
malicious
2F09000
heap
page read and write
C0005A6000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
7FF6A9966000
unkown
page readonly
C0001CB000
direct allocation
page read and write
C000316000
direct allocation
page read and write
245386E0000
direct allocation
page read and write
7FF6A8BF0000
unkown
page readonly
24538670000
direct allocation
page read and write
7FF6A99AF000
unkown
page readonly
C000038000
direct allocation
page read and write
C00052C000
direct allocation
page read and write
C000562000
direct allocation
page read and write
7FF6A9921000
unkown
page readonly
7FF6A9990000
unkown
page readonly
94281FE000
stack
page read and write
C0005D0000
direct allocation
page read and write
2F25000
heap
page read and write
C00048A000
direct allocation
page read and write
50FF000
stack
page read and write
C000184000
direct allocation
page read and write
C000194000
direct allocation
page read and write
2F4C000
heap
page read and write
7FF6A9968000
unkown
page readonly
C00006B000
direct allocation
page read and write
2F25000
heap
page read and write
2F36000
heap
page read and write
C000000000
direct allocation
page read and write
2DC0000
heap
page read and write
C000502000
direct allocation
page read and write
24538730000
heap
page read and write
C0000A2000
direct allocation
page read and write
C0002E1000
direct allocation
page read and write
2457F370000
direct allocation
page read and write
C000380000
direct allocation
page read and write
C00033B000
direct allocation
page read and write
C00055C000
direct allocation
page read and write
2457F3D0000
direct allocation
page read and write
7FF6A8BF0000
unkown
page readonly
7FF6A9977000
unkown
page readonly
C000330000
direct allocation
page read and write
C00017E000
direct allocation
page read and write
2F08000
heap
page read and write
C000032000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C000002000
direct allocation
page read and write
C000A56000
direct allocation
page read and write
C0001B9000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
2F4C000
heap
page read and write
C00030C000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
7FF6A9926000
unkown
page readonly
C000534000
direct allocation
page read and write
2DE0000
heap
page read and write
C000506000
direct allocation
page read and write
7FF6A924F000
unkown
page write copy
C0003E7000
direct allocation
page read and write
C000A1C000
direct allocation
page read and write
C000072000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
C0007EA000
direct allocation
page read and write
C00010C000
direct allocation
page read and write
C000595000
direct allocation
page read and write
7FF6A998C000
unkown
page readonly
C000300000
direct allocation
page read and write
2EE8000
heap
page read and write
245386F8000
direct allocation
page read and write
2457D940000
direct allocation
page read and write
C000320000
direct allocation
page read and write
C0004D0000
direct allocation
page read and write
7FF6A9255000
unkown
page write copy
C0000EE000
direct allocation
page read and write
94277FE000
stack
page read and write
2E6D000
stack
page read and write
7FF6A99AB000
unkown
page readonly
C000397000
direct allocation
page read and write
C000400000
direct allocation
page read and write
C000058000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
C00032E000
direct allocation
page read and write
7FF6A9988000
unkown
page readonly
24538520000
heap
page read and write
C000084000
direct allocation
page read and write
7FF6A992B000
unkown
page readonly
C0001B3000
direct allocation
page read and write
C0005AA000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C0005CE000
direct allocation
page read and write
7FF6A9952000
unkown
page readonly
7FF6A9EA1000
unkown
page read and write
2F4C000
heap
page read and write
C0003AB000
direct allocation
page read and write
C000A90000
direct allocation
page read and write
7FF6A9EAB000
unkown
page write copy
C0004CE000
direct allocation
page read and write
7FF6A92C2000
unkown
page readonly
7FF6A92B1000
unkown
page write copy
7FF6A9961000
unkown
page readonly
C0002F6000
direct allocation
page read and write
7FF6A925B000
unkown
page read and write
2C00000
heap
page read and write
C000790000
direct allocation
page read and write
C00048C000
direct allocation
page read and write
7FF6A9950000
unkown
page readonly
C000332000
direct allocation
page read and write
C000243000
direct allocation
page read and write
7FF6A99B4000
unkown
page readonly
2457D9A3000
direct allocation
page read and write
C000261000
direct allocation
page read and write
4FBE000
stack
page read and write
C00041D000
direct allocation
page read and write
7FF6A993D000
unkown
page readonly
C0003C5000
direct allocation
page read and write
C000122000
direct allocation
page read and write
7FF6A9E17000
unkown
page read and write
C000192000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C0000C5000
direct allocation
page read and write
C0003A1000
direct allocation
page read and write
7FF6A9966000
unkown
page readonly
C00056E000
direct allocation
page read and write
2D1E000
stack
page read and write
C000094000
direct allocation
page read and write
C000844000
direct allocation
page read and write
7FF6A994A000
unkown
page readonly
C000550000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
C00055A000
direct allocation
page read and write
94279FE000
stack
page read and write
4B7D000
stack
page read and write
519F000
stack
page read and write
7FF6A996D000
unkown
page readonly
C0002DB000
direct allocation
page read and write
94275FE000
stack
page read and write
C0003C9000
direct allocation
page read and write
C000036000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
C0001BB000
direct allocation
page read and write
7FF6A9EAC000
unkown
page write copy
C000114000
direct allocation
page read and write
7FF6A9256000
unkown
page read and write
C0003AF000
direct allocation
page read and write
7FF6A9952000
unkown
page readonly
7FF6A999B000
unkown
page readonly
24538735000
heap
page read and write
C00033E000
direct allocation
page read and write
7FF6A9EBE000
unkown
page readonly
7FF6A9997000
unkown
page readonly
C0002DF000
direct allocation
page read and write
C0005CA000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
C0000E4000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C00057C000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
2457D9C0000
direct allocation
page read and write
C00011E000
direct allocation
page read and write
C000098000
direct allocation
page read and write
7FF6A929C000
unkown
page write copy
7FF6A9988000
unkown
page readonly
7FF6A9950000
unkown
page readonly
C0005AC000
direct allocation
page read and write
245386D0000
direct allocation
page read and write
C0004A9000
direct allocation
page read and write
C000512000
direct allocation
page read and write
7FF6A9968000
unkown
page readonly
7FF6A9973000
unkown
page readonly
7FF6A9997000
unkown
page readonly
7FF6A995D000
unkown
page readonly
7FF6A99AB000
unkown
page readonly
2DD0000
remote allocation
page read and write
2F27000
heap
page read and write
C000156000
direct allocation
page read and write
7FF6A9EA6000
unkown
page read and write
7FF6A9993000
unkown
page readonly
5250000
heap
page read and write
C00055E000
direct allocation
page read and write
C0006DC000
direct allocation
page read and write
24538440000
heap
page read and write
2457D951000
direct allocation
page read and write
C00040A000
direct allocation
page read and write
C000160000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
24538678000
direct allocation
page read and write
C0002EE000
direct allocation
page read and write
C000568000
direct allocation
page read and write
7FF6A9EAF000
unkown
page write copy
C00029D000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
C000510000
direct allocation
page read and write
C000716000
direct allocation
page read and write
C000158000
direct allocation
page read and write
30DF000
stack
page read and write
C000342000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C000404000
direct allocation
page read and write
C000576000
direct allocation
page read and write
C0002DD000
direct allocation
page read and write
C00029B000
direct allocation
page read and write
245386F0000
direct allocation
page read and write
2457F310000
direct allocation
page read and write
C00017C000
direct allocation
page read and write
2E2D000
stack
page read and write
C0003E9000
direct allocation
page read and write
C0001E7000
direct allocation
page read and write
C000008000
direct allocation
page read and write
7FF6A92B8000
unkown
page write copy
C0000A6000
direct allocation
page read and write
7FF6A99AF000
unkown
page readonly
C000574000
direct allocation
page read and write
94283FF000
stack
page read and write
C0000A4000
direct allocation
page read and write
24538714000
direct allocation
page read and write
C000203000
direct allocation
page read and write
9427DFD000
stack
page read and write
9427FFF000
stack
page read and write
C000490000
direct allocation
page read and write
C0004AB000
direct allocation
page read and write
C0001A2000
direct allocation
page read and write
C000419000
direct allocation
page read and write
C0005C8000
direct allocation
page read and write
7FF6A9980000
unkown
page readonly
C000326000
direct allocation
page read and write
C00032C000
direct allocation
page read and write
C000034000
direct allocation
page read and write
C0001D9000
direct allocation
page read and write
7FF6A99B4000
unkown
page readonly
C0002CD000
direct allocation
page read and write
C000556000
direct allocation
page read and write
C00017A000
direct allocation
page read and write
7FF6A9973000
unkown
page readonly
C000069000
direct allocation
page read and write
7FF6A9EAB000
unkown
page read and write
7FF6A9958000
unkown
page readonly
7FF6A994D000
unkown
page readonly
2EE0000
heap
page read and write
C0003FB000
direct allocation
page read and write
24538558000
heap
page read and write
C0001F1000
direct allocation
page read and write
2960000
remote allocation
page execute and read and write
515E000
stack
page read and write
C0000FC000
direct allocation
page read and write
C00004A000
direct allocation
page read and write
C000508000
direct allocation
page read and write
C000307000
direct allocation
page read and write
7FF6A92C2000
unkown
page readonly
C000088000
direct allocation
page read and write
2DD0000
remote allocation
page read and write
7FF6A9993000
unkown
page readonly
7FF6A9921000
unkown
page readonly
C00001A000
direct allocation
page read and write
C000548000
direct allocation
page read and write
C000074000
direct allocation
page read and write
C0001E5000
direct allocation
page read and write
7FF6A9990000
unkown
page readonly
C0001CF000
direct allocation
page read and write
7FF6A9EAF000
unkown
page write copy
7FF6A994D000
unkown
page readonly
C000500000
direct allocation
page read and write
C0003CF000
direct allocation
page read and write
C0002E3000
direct allocation
page read and write
2F0A000
heap
page read and write
C0005C0000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
C000498000
direct allocation
page read and write
C00047A000
direct allocation
page read and write
C000408000
direct allocation
page read and write
7FF6A8BF1000
unkown
page execute read
4A7D000
stack
page read and write
7FF6A92B5000
unkown
page read and write
C0003E5000
direct allocation
page read and write
C000413000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C00024B000
direct allocation
page read and write
C0003C2000
direct allocation
page read and write
C0005C2000
direct allocation
page read and write
C0009C2000
direct allocation
page read and write
C00050A000
direct allocation
page read and write
7FF6A9961000
unkown
page readonly
C0000C2000
direct allocation
page read and write
C00049E000
direct allocation
page read and write
C000536000
direct allocation
page read and write
2EAD000
stack
page read and write
7FF6A98EF000
unkown
page readonly
C00011C000
direct allocation
page read and write
C000532000
direct allocation
page read and write
C0003ED000
direct allocation
page read and write
C00052E000
direct allocation
page read and write
C000064000
direct allocation
page read and write
2457D980000
direct allocation
page read and write
7FF6A98EF000
unkown
page readonly
C00015C000
direct allocation
page read and write
292B000
stack
page read and write
31DE000
stack
page read and write
2F36000
heap
page read and write
C000004000
direct allocation
page read and write
C000309000
direct allocation
page read and write
2D5E000
stack
page read and write
2457D983000
direct allocation
page read and write
7FF6A994A000
unkown
page readonly
7FF6A9926000
unkown
page readonly
C0002E9000
direct allocation
page read and write
7FF6A992B000
unkown
page readonly
C000076000
direct allocation
page read and write
7FF6A999B000
unkown
page readonly
C00005F000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
C0004A4000
direct allocation
page read and write
94273FC000
stack
page read and write
7FF6A929D000
unkown
page read and write
7FF6A925C000
unkown
page write copy
29C0000
remote allocation
page execute and read and write
C0001C5000
direct allocation
page read and write
C0003AD000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
C0001A6000
direct allocation
page read and write
C0005B2000
direct allocation
page read and write
C0005AE000
direct allocation
page read and write
7FF6A9977000
unkown
page readonly
C000180000
direct allocation
page read and write
C0001F3000
direct allocation
page read and write
9427BFE000
stack
page read and write
C00000C000
direct allocation
page read and write
7FF6A998C000
unkown
page readonly
4FFE000
stack
page read and write
2457D98E000
direct allocation
page read and write
C000285000
direct allocation
page read and write
2457F350000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
C0002E5000
direct allocation
page read and write
C000314000
direct allocation
page read and write
C00027D000
direct allocation
page read and write
24538550000
heap
page read and write
7FF6A9258000
unkown
page write copy
2DD0000
remote allocation
page read and write
C00030E000
direct allocation
page read and write
2F81000
heap
page read and write
2457D985000
direct allocation
page read and write
7FF6A9EBE000
unkown
page readonly
C000520000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C00056C000
direct allocation
page read and write
7FF6A9963000
unkown
page readonly
2D80000
heap
page read and write
7FF6A995D000
unkown
page readonly
C00009C000
direct allocation
page read and write
C0002C7000
direct allocation
page read and write
2457D944000
direct allocation
page read and write
C00040F000
direct allocation
page read and write
7FF6A9298000
unkown
page read and write
C000048000
direct allocation
page read and write
28EB000
stack
page read and write
2457F430000
direct allocation
page read and write
C000124000
direct allocation
page read and write
C0005B0000
direct allocation
page read and write
C000488000
direct allocation
page read and write
C0004E0000
direct allocation
page read and write
C000530000
direct allocation
page read and write
C00028B000
direct allocation
page read and write
7FF6A8BF1000
unkown
page execute read
7FF6A9980000
unkown
page readonly
7FF6A993D000
unkown
page readonly
C000170000
direct allocation
page read and write
C000312000
direct allocation
page read and write
C0001C1000
direct allocation
page read and write
24538674000
direct allocation
page read and write
2D60000
heap
page read and write
C00057A000
direct allocation
page read and write
C00048E000
direct allocation
page read and write
C000112000
direct allocation
page read and write
C000528000
direct allocation
page read and write
24538706000
direct allocation
page read and write
C000516000
direct allocation
page read and write
2EFB000
heap
page read and write
C00000A000
direct allocation
page read and write
7FF6A996D000
unkown
page readonly
7FF6A9963000
unkown
page readonly
2F0F000
heap
page read and write
24538650000
heap
page read and write
C0001FD000
direct allocation
page read and write
C0001A8000
direct allocation
page read and write
C000514000
direct allocation
page read and write
C000116000
direct allocation
page read and write
2F36000
heap
page read and write
C00003A000
direct allocation
page read and write
7FF6A9958000
unkown
page readonly
C000092000
direct allocation
page read and write
C0005CC000
direct allocation
page read and write
2DE5000
heap
page read and write
7FF6A92C0000
unkown
page read and write
7FF6A924F000
unkown
page read and write
2F0F000
heap
page read and write
C000322000
direct allocation
page read and write
C0002B9000
direct allocation
page read and write
C000542000
direct allocation
page read and write
7FF6A9E33000
unkown
page read and write
C00025F000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
There are 393 hidden memdumps, click here to show them.