IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
pushjellysingeywus.shop
malicious
bordersoarmanusjuw.shop
malicious
economicscreateojsu.shop
malicious
wifeplasterbakewis.shop
malicious
greetclassifytalk.shop
malicious
suitcaseacanehalk.shop
malicious
entitlementappwo.shop
malicious
mealplayerpreceodsju.shop
malicious
absentconvicsjawun.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://greetclassifytalk.shop/api
104.21.51.78
https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://greetclassifytalk.shop/#
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
unknown
https://greetclassifytalk.shop/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://greetclassifytalk.shop/apiTv
unknown
https://greetclassifytalk.shop/apion
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
unknown
https://greetclassifytalk.shop/S
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://greetclassifytalk.shop/J
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://greetclassifytalk.shop/api-
unknown
https://greetclassifytalk.shop/~
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
greetclassifytalk.shop
104.21.51.78
malicious

IPs

IP
Domain
Country
Malicious
104.21.51.78
greetclassifytalk.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D6C000
unkown
page readonly
malicious
3CA0000
remote allocation
page read and write
42E5000
trusted library allocation
page read and write
161D000
unkown
page readonly
1B61000
heap
page read and write
42F2000
trusted library allocation
page read and write
1B5F000
heap
page read and write
1B5B000
heap
page read and write
434C000
trusted library allocation
page read and write
42CA000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
1BD4000
heap
page read and write
1B3E000
heap
page read and write
1AC6000
heap
page read and write
1B54000
heap
page read and write
42E1000
trusted library allocation
page read and write
1A10000
heap
page read and write
3B8E000
stack
page read and write
42A5000
trusted library allocation
page read and write
43A8000
trusted library allocation
page read and write
42DC000
trusted library allocation
page read and write
1B5F000
heap
page read and write
1B41000
heap
page read and write
42DD000
trusted library allocation
page read and write
42D6000
trusted library allocation
page read and write
42D4000
trusted library allocation
page read and write
1BD4000
heap
page read and write
1B01000
heap
page read and write
42D6000
trusted library allocation
page read and write
1B63000
heap
page read and write
1BD4000
heap
page read and write
448C000
trusted library allocation
page read and write
1B3E000
heap
page read and write
1B1A000
heap
page read and write
1DAF000
stack
page read and write
1AC2000
heap
page read and write
1B58000
heap
page read and write
1B57000
heap
page read and write
DA5000
unkown
page execute read
4350000
trusted library allocation
page read and write
1AC6000
heap
page read and write
1A90000
heap
page read and write
4350000
trusted library allocation
page read and write
1BD4000
heap
page read and write
1B1A000
heap
page read and write
1B1A000
heap
page read and write
46FF000
stack
page read and write
42A9000
trusted library allocation
page read and write
1B3A000
heap
page read and write
42E3000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
1B64000
heap
page read and write
42A9000
trusted library allocation
page read and write
42D2000
trusted library allocation
page read and write
428E000
stack
page read and write
1B3E000
heap
page read and write
42C4000
trusted library allocation
page read and write
1B5D000
heap
page read and write
1B62000
heap
page read and write
42C7000
trusted library allocation
page read and write
4484000
trusted library allocation
page read and write
43B3000
trusted library allocation
page read and write
1B5D000
heap
page read and write
1B46000
heap
page read and write
D30000
unkown
page readonly
1BCE000
stack
page read and write
43A0000
trusted library allocation
page read and write
4340000
trusted library allocation
page read and write
D6F000
unkown
page read and write
1B38000
heap
page read and write
42D9000
trusted library allocation
page read and write
1B58000
heap
page read and write
42D5000
trusted library allocation
page read and write
3751000
heap
page read and write
1B3A000
heap
page read and write
1A9A000
heap
page read and write
43A1000
trusted library allocation
page read and write
3751000
heap
page read and write
1B63000
heap
page read and write
1B3A000
heap
page read and write
42A5000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
4454000
trusted library allocation
page read and write
42E7000
trusted library allocation
page read and write
1AEC000
heap
page read and write
1BD4000
heap
page read and write
4334000
trusted library allocation
page read and write
42A5000
trusted library allocation
page read and write
42E1000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
3751000
heap
page read and write
4333000
trusted library allocation
page read and write
3761000
heap
page read and write
404E000
stack
page read and write
4333000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
4334000
trusted library allocation
page read and write
1B5E000
heap
page read and write
1A80000
heap
page read and write
44E0000
trusted library allocation
page read and write
43D8000
trusted library allocation
page read and write
1B64000
heap
page read and write
418E000
stack
page read and write
42DD000
trusted library allocation
page read and write
1BD4000
heap
page read and write
1A9E000
heap
page read and write
433B000
trusted library allocation
page read and write
42D7000
trusted library allocation
page read and write
42BD000
trusted library allocation
page read and write
433B000
trusted library allocation
page read and write
42E3000
trusted library allocation
page read and write
4414000
trusted library allocation
page read and write
1B02000
heap
page read and write
1B37000
heap
page read and write
4334000
trusted library allocation
page read and write
42E8000
trusted library allocation
page read and write
1B3E000
heap
page read and write
431E000
trusted library allocation
page read and write
45FE000
stack
page read and write
1B41000
heap
page read and write
3A4D000
stack
page read and write
1BD0000
heap
page read and write
51E9000
trusted library allocation
page read and write
1AD2000
heap
page read and write
42BF000
trusted library allocation
page read and write
4333000
trusted library allocation
page read and write
436C000
trusted library allocation
page read and write
3751000
heap
page read and write
42F5000
trusted library allocation
page read and write
43B6000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
1BD4000
heap
page read and write
42AF000
trusted library allocation
page read and write
43E4000
trusted library allocation
page read and write
1B1A000
heap
page read and write
42BD000
trusted library allocation
page read and write
42BD000
trusted library allocation
page read and write
1B38000
heap
page read and write
42E4000
trusted library allocation
page read and write
42A5000
trusted library allocation
page read and write
42B2000
trusted library allocation
page read and write
42E0000
trusted library allocation
page read and write
42D2000
trusted library allocation
page read and write
42C4000
trusted library allocation
page read and write
4414000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
D30000
unkown
page readonly
434C000
trusted library allocation
page read and write
4338000
trusted library allocation
page read and write
1B38000
heap
page read and write
1B5B000
heap
page read and write
1AEC000
heap
page read and write
42F2000
trusted library allocation
page read and write
1EAE000
stack
page read and write
10A9000
unkown
page execute read
451C000
trusted library allocation
page read and write
435F000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
1B63000
heap
page read and write
42A7000
trusted library allocation
page read and write
1ADF000
heap
page read and write
1B3A000
heap
page read and write
3CA0000
remote allocation
page read and write
42AF000
trusted library allocation
page read and write
1BD4000
heap
page read and write
1B41000
heap
page read and write
3750000
heap
page read and write
1B64000
heap
page read and write
1B5D000
heap
page read and write
42FE000
trusted library allocation
page read and write
42F7000
trusted library allocation
page read and write
1ACE000
heap
page read and write
42BD000
trusted library allocation
page read and write
42AD000
trusted library allocation
page read and write
42D6000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
42AE000
trusted library allocation
page read and write
1B62000
heap
page read and write
1B5F000
heap
page read and write
43AD000
trusted library allocation
page read and write
4458000
trusted library allocation
page read and write
42D5000
trusted library allocation
page read and write
43A1000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
1B55000
heap
page read and write
42A1000
trusted library allocation
page read and write
1AE1000
heap
page read and write
3854000
trusted library allocation
page read and write
1A5E000
stack
page read and write
1BD4000
heap
page read and write
47C0000
heap
page read and write
42AD000
trusted library allocation
page read and write
1B37000
heap
page read and write
433B000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
1B5B000
heap
page read and write
4359000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
4369000
trusted library allocation
page read and write
1ADF000
heap
page read and write
43AD000
trusted library allocation
page read and write
42C0000
trusted library allocation
page read and write
1BD4000
heap
page read and write
433A000
trusted library allocation
page read and write
1B45000
heap
page read and write
4372000
trusted library allocation
page read and write
16AB000
stack
page read and write
36ED000
stack
page read and write
42DB000
trusted library allocation
page read and write
434D000
trusted library allocation
page read and write
372E000
stack
page read and write
42CE000
trusted library allocation
page read and write
1B5E000
heap
page read and write
1BD4000
heap
page read and write
3740000
heap
page read and write
43D9000
trusted library allocation
page read and write
1B5B000
heap
page read and write
4334000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
433B000
trusted library allocation
page read and write
42C0000
trusted library allocation
page read and write
1B43000
heap
page read and write
4414000
trusted library allocation
page read and write
3CA0000
remote allocation
page read and write
4364000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
1B59000
heap
page read and write
1B54000
heap
page read and write
42D1000
trusted library allocation
page read and write
42CA000
trusted library allocation
page read and write
4341000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
1B41000
heap
page read and write
43A8000
trusted library allocation
page read and write
436C000
trusted library allocation
page read and write
4356000
trusted library allocation
page read and write
1B5D000
heap
page read and write
42D6000
trusted library allocation
page read and write
4871000
trusted library allocation
page read and write
42D3000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
D31000
unkown
page execute read
D7A000
unkown
page execute read
47DF000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
3650000
heap
page read and write
1B55000
heap
page read and write
43D1000
trusted library allocation
page read and write
1B41000
heap
page read and write
435D000
trusted library allocation
page read and write
42D1000
trusted library allocation
page read and write
1B5B000
heap
page read and write
433B000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
435C000
trusted library allocation
page read and write
4404000
trusted library allocation
page read and write
1AEC000
heap
page read and write
42D9000
trusted library allocation
page read and write
1A00000
heap
page read and write
1B5F000
heap
page read and write
161D000
unkown
page readonly
43CC000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
436A000
trusted library allocation
page read and write
434C000
trusted library allocation
page read and write
1B5B000
heap
page read and write
4414000
trusted library allocation
page read and write
42CE000
trusted library allocation
page read and write
4333000
trusted library allocation
page read and write
42DD000
trusted library allocation
page read and write
17A8000
stack
page read and write
447C000
trusted library allocation
page read and write
1B63000
heap
page read and write
1B4B000
heap
page read and write
D9F000
unkown
page read and write
42A9000
trusted library allocation
page read and write
1B5F000
heap
page read and write
43B9000
trusted library allocation
page read and write
42CC000
trusted library allocation
page read and write
4387000
trusted library allocation
page read and write
4333000
trusted library allocation
page read and write
42CF000
trusted library allocation
page read and write
42CE000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
42DD000
trusted library allocation
page read and write
4CD1000
trusted library allocation
page read and write
1B63000
heap
page read and write
42A9000
trusted library allocation
page read and write
10E2000
unkown
page execute read
42A5000
trusted library allocation
page read and write
3751000
heap
page read and write
36AD000
stack
page read and write
1B1A000
heap
page read and write
431C000
trusted library allocation
page read and write
47D4000
trusted library allocation
page read and write
3751000
heap
page read and write
42DD000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
1B3E000
heap
page read and write
1B5F000
heap
page read and write
1BD4000
heap
page read and write
414F000
stack
page read and write
1AD2000
heap
page read and write
43B9000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
42C2000
trusted library allocation
page read and write
42C4000
trusted library allocation
page read and write
394E000
stack
page read and write
3C8F000
stack
page read and write
42E9000
trusted library allocation
page read and write
42BB000
trusted library allocation
page read and write
42A7000
trusted library allocation
page read and write
1B63000
heap
page read and write
4346000
trusted library allocation
page read and write
3751000
heap
page read and write
42EE000
trusted library allocation
page read and write
42AD000
trusted library allocation
page read and write
4333000
trusted library allocation
page read and write
3B4F000
stack
page read and write
1B5F000
heap
page read and write
43CA000
trusted library allocation
page read and write
1B63000
heap
page read and write
42A0000
trusted library allocation
page read and write
There are 314 hidden memdumps, click here to show them.