IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious

URLs

Name
IP
Malicious
fragnantbui.shop
malicious
gutterydhowi.shop
malicious
offensivedzvju.shop
malicious
https://gutterydhowi.shop/api
172.67.132.32
malicious
drawzhotdog.shop
malicious
ghostreedmnu.shop
malicious
pianoswimen.shop
malicious
reinforcenh.shop
malicious
stogeneratmns.shop
malicious
vozmeatillu.shop
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://gutterydhowi.shop/apisw
unknown
https://gutterydhowi.shop/apiC
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://gutterydhowi.shop/g
unknown
https://gutterydhowi.shop/
unknown
https://management.azure.compending
unknown
https://gutterydhowi.shop/api~
unknown
https://www.cloudflare.com/5xx-err
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gutterydhowi.shop
172.67.132.32
malicious
pianoswimen.shop
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.132.32
gutterydhowi.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2002000
direct allocation
page read and write
malicious
217D000
direct allocation
page read and write
malicious
A4E000
stack
page read and write
1AB3000
unkown
page write copy
1FE0000
direct allocation
page read and write
1C08000
direct allocation
page read and write
AA0000
direct allocation
page read and write
2C82000
heap
page read and write
2CA6000
heap
page read and write
D5E000
stack
page read and write
890000
heap
page read and write
1C18000
direct allocation
page read and write
1C1C000
direct allocation
page read and write
8AF000
heap
page read and write
228AE000
direct allocation
page read and write
1A2C000
unkown
page write copy
2D00000
heap
page read and write
1F0C000
direct allocation
page read and write
1C6C000
direct allocation
page read and write
4DC000
stack
page read and write
1D14000
direct allocation
page read and write
1F36000
direct allocation
page read and write
239A000
direct allocation
page read and write
1F42000
direct allocation
page read and write
13C7000
unkown
page readonly
221FF000
stack
page read and write
2CB1000
heap
page read and write
A6C000
direct allocation
page read and write
1E9A000
direct allocation
page read and write
22A2F000
stack
page read and write
1C74000
direct allocation
page read and write
1F02000
direct allocation
page read and write
22E6000
direct allocation
page read and write
1732000
unkown
page readonly
840000
heap
page read and write
1FEE000
direct allocation
page read and write
1FBA000
direct allocation
page read and write
2C68000
heap
page read and write
1A83000
unkown
page read and write
2C5C000
heap
page read and write
2C97000
heap
page read and write
1AB4000
unkown
page readonly
1FFE000
direct allocation
page read and write
1A2F000
unkown
page write copy
1F0A000
direct allocation
page read and write
1F08000
direct allocation
page read and write
1EEC000
direct allocation
page read and write
1D6E000
direct allocation
page read and write
1F16000
direct allocation
page read and write
850000
heap
page read and write
16E3000
unkown
page readonly
1FDA000
direct allocation
page read and write
1E92000
direct allocation
page read and write
1FD8000
direct allocation
page read and write
1B8D000
stack
page read and write
1CA4000
direct allocation
page read and write
1FBC000
direct allocation
page read and write
1AFF000
unkown
page readonly
1EFA000
direct allocation
page read and write
1C56000
direct allocation
page read and write
855000
heap
page read and write
1700000
unkown
page readonly
1F2A000
direct allocation
page read and write
47EE000
stack
page read and write
1C14000
direct allocation
page read and write
1C4B000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
1D18000
direct allocation
page read and write
D00000
direct allocation
page read and write
1FA0000
direct allocation
page read and write
4FDD000
stack
page read and write
E60000
heap
page read and write
2B8D000
stack
page read and write
1D1C000
direct allocation
page read and write
1C3E000
direct allocation
page read and write
1F82000
direct allocation
page read and write
8B8000
heap
page read and write
1D0C000
direct allocation
page read and write
1FF8000
direct allocation
page read and write
2F0F000
stack
page read and write
A9E000
stack
page read and write
1C12000
direct allocation
page read and write
2CA6000
heap
page read and write
1EF3000
direct allocation
page read and write
1AFF000
unkown
page readonly
1F5E000
direct allocation
page read and write
1F84000
direct allocation
page read and write
1FC6000
direct allocation
page read and write
1C80000
direct allocation
page read and write
8B0000
heap
page read and write
2C47000
heap
page read and write
488F000
stack
page read and write
1AB4000
unkown
page readonly
E91000
unkown
page execute read
1FFA000
direct allocation
page read and write
8AF000
heap
page read and write
51A0000
heap
page read and write
16CA000
unkown
page readonly
E90000
unkown
page readonly
1FC0000
direct allocation
page read and write
1AAA000
unkown
page read and write
222FE000
stack
page read and write
1BCD000
stack
page read and write
8AF000
heap
page read and write
1C9A000
direct allocation
page read and write
2000000
direct allocation
page read and write
1C54000
direct allocation
page read and write
2CB1000
heap
page read and write
1A92000
unkown
page read and write
1F34000
direct allocation
page read and write
4A9D000
stack
page read and write
172A000
unkown
page readonly
1C32000
direct allocation
page read and write
1C9E000
direct allocation
page read and write
1FF2000
direct allocation
page read and write
2CE7000
heap
page read and write
1F10000
direct allocation
page read and write
499E000
stack
page read and write
1CA2000
direct allocation
page read and write
2B4D000
stack
page read and write
1FF4000
direct allocation
page read and write
2233D000
stack
page read and write
213C000
direct allocation
page read and write
1FF0000
direct allocation
page read and write
2C6D000
heap
page read and write
1C9C000
direct allocation
page read and write
300E000
stack
page read and write
1C98000
direct allocation
page read and write
A60000
direct allocation
page read and write
1C6E000
direct allocation
page read and write
1FCE000
direct allocation
page read and write
50DF000
stack
page read and write
1EEA000
direct allocation
page read and write
22920000
heap
page read and write
1D10000
direct allocation
page read and write
A50000
heap
page read and write
1F44000
direct allocation
page read and write
1F92000
direct allocation
page read and write
E70000
heap
page read and write
460000
remote allocation
page execute and read and write
1D12000
direct allocation
page read and write
2BC0000
remote allocation
page read and write
1A82000
unkown
page write copy
1C20000
direct allocation
page read and write
1F24000
direct allocation
page read and write
1F96000
direct allocation
page read and write
1EB0000
direct allocation
page read and write
1F8C000
direct allocation
page read and write
1C40000
direct allocation
page read and write
A00000
heap
page read and write
1C1E000
direct allocation
page read and write
A68000
direct allocation
page read and write
D10000
direct allocation
page read and write
1EF8000
direct allocation
page read and write
1BD0000
direct allocation
page read and write
2D08000
heap
page read and write
1A27000
unkown
page read and write
1FC2000
direct allocation
page read and write
1F9E000
direct allocation
page read and write
75B000
stack
page read and write
1FA2000
direct allocation
page read and write
1F2C000
direct allocation
page read and write
484E000
stack
page read and write
2C0E000
stack
page read and write
1FA4000
direct allocation
page read and write
2289D000
direct allocation
page read and write
1FD6000
direct allocation
page read and write
1AB3000
unkown
page write copy
1F8E000
direct allocation
page read and write
1C22000
direct allocation
page read and write
2BC0000
remote allocation
page read and write
1CAA000
direct allocation
page read and write
2CB1000
heap
page read and write
1D65000
direct allocation
page read and write
16CA000
unkown
page readonly
1F04000
direct allocation
page read and write
1D3A000
direct allocation
page read and write
1FA8000
direct allocation
page read and write
4890000
heap
page read and write
1C66000
direct allocation
page read and write
2CA0000
heap
page read and write
1FE2000
direct allocation
page read and write
1DA0000
direct allocation
page read and write
2C97000
heap
page read and write
2AF0000
heap
page read and write
1FAA000
direct allocation
page read and write
2243F000
stack
page read and write
1FFC000
direct allocation
page read and write
22440000
direct allocation
page read and write
1E90000
direct allocation
page read and write
22456000
direct allocation
page read and write
1C7E000
direct allocation
page read and write
1FE4000
direct allocation
page read and write
1EE4000
direct allocation
page read and write
220FF000
stack
page read and write
1F40000
direct allocation
page read and write
1A2E000
unkown
page read and write
2287E000
stack
page read and write
172A000
unkown
page readonly
1EA0000
direct allocation
page read and write
1732000
unkown
page readonly
1FCC000
direct allocation
page read and write
1FC4000
direct allocation
page read and write
1F00000
direct allocation
page read and write
1D4C000
direct allocation
page read and write
13C7000
unkown
page readonly
1F22000
direct allocation
page read and write
1AAE000
unkown
page read and write
1FC8000
direct allocation
page read and write
1FDE000
direct allocation
page read and write
E91000
unkown
page execute read
1A76000
unkown
page read and write
1C64000
direct allocation
page read and write
79B000
stack
page read and write
1C5E000
direct allocation
page read and write
22448000
direct allocation
page read and write
2CA0000
heap
page read and write
2BA0000
heap
page read and write
16E3000
unkown
page readonly
1C00000
direct allocation
page read and write
1C78000
direct allocation
page read and write
1F80000
direct allocation
page read and write
1F06000
direct allocation
page read and write
2C84000
heap
page read and write
1B4D000
stack
page read and write
1F8A000
direct allocation
page read and write
1D00000
direct allocation
page read and write
2C97000
heap
page read and write
1F9A000
direct allocation
page read and write
E5F000
stack
page read and write
1C16000
direct allocation
page read and write
1F56000
direct allocation
page read and write
1A26000
unkown
page write copy
2C6D000
heap
page read and write
2D02000
heap
page read and write
2C82000
heap
page read and write
1F14000
direct allocation
page read and write
1700000
unkown
page readonly
1E8C000
direct allocation
page read and write
22451000
direct allocation
page read and write
2C40000
heap
page read and write
1F18000
direct allocation
page read and write
2CA0000
heap
page read and write
1FCA000
direct allocation
page read and write
89C000
heap
page read and write
5DD000
stack
page read and write
1A26000
unkown
page write copy
1C7A000
direct allocation
page read and write
E90000
unkown
page readonly
2BC0000
remote allocation
page read and write
2BA5000
heap
page read and write
4AA0000
heap
page read and write
1D2C000
direct allocation
page read and write
There are 244 hidden memdumps, click here to show them.