Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pushjellysingeywus.shop
|
|||
bordersoarmanusjuw.shop
|
|||
economicscreateojsu.shop
|
|||
wifeplasterbakewis.shop
|
|||
greetclassifytalk.shop
|
|||
suitcaseacanehalk.shop
|
|||
entitlementappwo.shop
|
|||
mealplayerpreceodsju.shop
|
|||
absentconvicsjawun.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://greetclassifytalk.shop/api
|
104.21.51.78
|
||
https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://greetclassifytalk.shop/#
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
|
unknown
|
||
https://greetclassifytalk.shop/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://greetclassifytalk.shop/apiTv
|
unknown
|
||
https://greetclassifytalk.shop/apion
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
|
unknown
|
||
https://greetclassifytalk.shop/S
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://greetclassifytalk.shop/J
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://greetclassifytalk.shop/api-
|
unknown
|
||
https://greetclassifytalk.shop/~
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 31 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
greetclassifytalk.shop
|
104.21.51.78
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.51.78
|
greetclassifytalk.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D6C000
|
unkown
|
page readonly
|
||
3CA0000
|
remote allocation
|
page read and write
|
||
42E5000
|
trusted library allocation
|
page read and write
|
||
161D000
|
unkown
|
page readonly
|
||
1B61000
|
heap
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
1B5F000
|
heap
|
page read and write
|
||
1B5B000
|
heap
|
page read and write
|
||
434C000
|
trusted library allocation
|
page read and write
|
||
42CA000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
1AC6000
|
heap
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
42E1000
|
trusted library allocation
|
page read and write
|
||
1A10000
|
heap
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
43A8000
|
trusted library allocation
|
page read and write
|
||
42DC000
|
trusted library allocation
|
page read and write
|
||
1B5F000
|
heap
|
page read and write
|
||
1B41000
|
heap
|
page read and write
|
||
42DD000
|
trusted library allocation
|
page read and write
|
||
42D6000
|
trusted library allocation
|
page read and write
|
||
42D4000
|
trusted library allocation
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
1B01000
|
heap
|
page read and write
|
||
42D6000
|
trusted library allocation
|
page read and write
|
||
1B63000
|
heap
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
448C000
|
trusted library allocation
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
1DAF000
|
stack
|
page read and write
|
||
1AC2000
|
heap
|
page read and write
|
||
1B58000
|
heap
|
page read and write
|
||
1B57000
|
heap
|
page read and write
|
||
DA5000
|
unkown
|
page execute read
|
||
4350000
|
trusted library allocation
|
page read and write
|
||
1AC6000
|
heap
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
4350000
|
trusted library allocation
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
1B3A000
|
heap
|
page read and write
|
||
42E3000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
42C4000
|
trusted library allocation
|
page read and write
|
||
1B5D000
|
heap
|
page read and write
|
||
1B62000
|
heap
|
page read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
4484000
|
trusted library allocation
|
page read and write
|
||
43B3000
|
trusted library allocation
|
page read and write
|
||
1B5D000
|
heap
|
page read and write
|
||
1B46000
|
heap
|
page read and write
|
||
D30000
|
unkown
|
page readonly
|
||
1BCE000
|
stack
|
page read and write
|
||
43A0000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
D6F000
|
unkown
|
page read and write
|
||
1B38000
|
heap
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
1B58000
|
heap
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
1B3A000
|
heap
|
page read and write
|
||
1A9A000
|
heap
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
1B63000
|
heap
|
page read and write
|
||
1B3A000
|
heap
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
4454000
|
trusted library allocation
|
page read and write
|
||
42E7000
|
trusted library allocation
|
page read and write
|
||
1AEC000
|
heap
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
4334000
|
trusted library allocation
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
42E1000
|
trusted library allocation
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
3761000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
4334000
|
trusted library allocation
|
page read and write
|
||
1B5E000
|
heap
|
page read and write
|
||
1A80000
|
heap
|
page read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
43D8000
|
trusted library allocation
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
42DD000
|
trusted library allocation
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
1A9E000
|
heap
|
page read and write
|
||
433B000
|
trusted library allocation
|
page read and write
|
||
42D7000
|
trusted library allocation
|
page read and write
|
||
42BD000
|
trusted library allocation
|
page read and write
|
||
433B000
|
trusted library allocation
|
page read and write
|
||
42E3000
|
trusted library allocation
|
page read and write
|
||
4414000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1B37000
|
heap
|
page read and write
|
||
4334000
|
trusted library allocation
|
page read and write
|
||
42E8000
|
trusted library allocation
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
431E000
|
trusted library allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
1B41000
|
heap
|
page read and write
|
||
3A4D000
|
stack
|
page read and write
|
||
1BD0000
|
heap
|
page read and write
|
||
51E9000
|
trusted library allocation
|
page read and write
|
||
1AD2000
|
heap
|
page read and write
|
||
42BF000
|
trusted library allocation
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
436C000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
42F5000
|
trusted library allocation
|
page read and write
|
||
43B6000
|
trusted library allocation
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
42AF000
|
trusted library allocation
|
page read and write
|
||
43E4000
|
trusted library allocation
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
42BD000
|
trusted library allocation
|
page read and write
|
||
42BD000
|
trusted library allocation
|
page read and write
|
||
1B38000
|
heap
|
page read and write
|
||
42E4000
|
trusted library allocation
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
42B2000
|
trusted library allocation
|
page read and write
|
||
42E0000
|
trusted library allocation
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
42C4000
|
trusted library allocation
|
page read and write
|
||
4414000
|
trusted library allocation
|
page read and write
|
||
43D9000
|
trusted library allocation
|
page read and write
|
||
D30000
|
unkown
|
page readonly
|
||
434C000
|
trusted library allocation
|
page read and write
|
||
4338000
|
trusted library allocation
|
page read and write
|
||
1B38000
|
heap
|
page read and write
|
||
1B5B000
|
heap
|
page read and write
|
||
1AEC000
|
heap
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
1EAE000
|
stack
|
page read and write
|
||
10A9000
|
unkown
|
page execute read
|
||
451C000
|
trusted library allocation
|
page read and write
|
||
435F000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
1B63000
|
heap
|
page read and write
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
1ADF000
|
heap
|
page read and write
|
||
1B3A000
|
heap
|
page read and write
|
||
3CA0000
|
remote allocation
|
page read and write
|
||
42AF000
|
trusted library allocation
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
1B41000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
1B64000
|
heap
|
page read and write
|
||
1B5D000
|
heap
|
page read and write
|
||
42FE000
|
trusted library allocation
|
page read and write
|
||
42F7000
|
trusted library allocation
|
page read and write
|
||
1ACE000
|
heap
|
page read and write
|
||
42BD000
|
trusted library allocation
|
page read and write
|
||
42AD000
|
trusted library allocation
|
page read and write
|
||
42D6000
|
trusted library allocation
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
trusted library allocation
|
page read and write
|
||
1B62000
|
heap
|
page read and write
|
||
1B5F000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
4458000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
43A1000
|
trusted library allocation
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
1B55000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1AE1000
|
heap
|
page read and write
|
||
3854000
|
trusted library allocation
|
page read and write
|
||
1A5E000
|
stack
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
47C0000
|
heap
|
page read and write
|
||
42AD000
|
trusted library allocation
|
page read and write
|
||
1B37000
|
heap
|
page read and write
|
||
433B000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
1B5B000
|
heap
|
page read and write
|
||
4359000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
4369000
|
trusted library allocation
|
page read and write
|
||
1ADF000
|
heap
|
page read and write
|
||
43AD000
|
trusted library allocation
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
433A000
|
trusted library allocation
|
page read and write
|
||
1B45000
|
heap
|
page read and write
|
||
4372000
|
trusted library allocation
|
page read and write
|
||
16AB000
|
stack
|
page read and write
|
||
36ED000
|
stack
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
434D000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
42CE000
|
trusted library allocation
|
page read and write
|
||
1B5E000
|
heap
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
43D9000
|
trusted library allocation
|
page read and write
|
||
1B5B000
|
heap
|
page read and write
|
||
4334000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
433B000
|
trusted library allocation
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page read and write
|
||
1B43000
|
heap
|
page read and write
|
||
4414000
|
trusted library allocation
|
page read and write
|
||
3CA0000
|
remote allocation
|
page read and write
|
||
4364000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
trusted library allocation
|
page read and write
|
||
1B59000
|
heap
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
42CA000
|
trusted library allocation
|
page read and write
|
||
4341000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
1B41000
|
heap
|
page read and write
|
||
43A8000
|
trusted library allocation
|
page read and write
|
||
436C000
|
trusted library allocation
|
page read and write
|
||
4356000
|
trusted library allocation
|
page read and write
|
||
1B5D000
|
heap
|
page read and write
|
||
42D6000
|
trusted library allocation
|
page read and write
|
||
4871000
|
trusted library allocation
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
D31000
|
unkown
|
page execute read
|
||
D7A000
|
unkown
|
page execute read
|
||
47DF000
|
trusted library allocation
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
3650000
|
heap
|
page read and write
|
||
1B55000
|
heap
|
page read and write
|
||
43D1000
|
trusted library allocation
|
page read and write
|
||
1B41000
|
heap
|
page read and write
|
||
435D000
|
trusted library allocation
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
1B5B000
|
heap
|
page read and write
|
||
433B000
|
trusted library allocation
|
page read and write
|
||
4370000
|
trusted library allocation
|
page read and write
|
||
435C000
|
trusted library allocation
|
page read and write
|
||
4404000
|
trusted library allocation
|
page read and write
|
||
1AEC000
|
heap
|
page read and write
|
||
42D9000
|
trusted library allocation
|
page read and write
|
||
1A00000
|
heap
|
page read and write
|
||
1B5F000
|
heap
|
page read and write
|
||
161D000
|
unkown
|
page readonly
|
||
43CC000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
436A000
|
trusted library allocation
|
page read and write
|
||
434C000
|
trusted library allocation
|
page read and write
|
||
1B5B000
|
heap
|
page read and write
|
||
4414000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
trusted library allocation
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
42DD000
|
trusted library allocation
|
page read and write
|
||
17A8000
|
stack
|
page read and write
|
||
447C000
|
trusted library allocation
|
page read and write
|
||
1B63000
|
heap
|
page read and write
|
||
1B4B000
|
heap
|
page read and write
|
||
D9F000
|
unkown
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
1B5F000
|
heap
|
page read and write
|
||
43B9000
|
trusted library allocation
|
page read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
4387000
|
trusted library allocation
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
trusted library allocation
|
page read and write
|
||
42CE000
|
trusted library allocation
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
42DD000
|
trusted library allocation
|
page read and write
|
||
4CD1000
|
trusted library allocation
|
page read and write
|
||
1B63000
|
heap
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
unkown
|
page execute read
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
36AD000
|
stack
|
page read and write
|
||
1B1A000
|
heap
|
page read and write
|
||
431C000
|
trusted library allocation
|
page read and write
|
||
47D4000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
42DD000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
1B5F000
|
heap
|
page read and write
|
||
1BD4000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
1AD2000
|
heap
|
page read and write
|
||
43B9000
|
trusted library allocation
|
page read and write
|
||
42A9000
|
trusted library allocation
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
42C4000
|
trusted library allocation
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
42E9000
|
trusted library allocation
|
page read and write
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
42A7000
|
trusted library allocation
|
page read and write
|
||
1B63000
|
heap
|
page read and write
|
||
4346000
|
trusted library allocation
|
page read and write
|
||
3751000
|
heap
|
page read and write
|
||
42EE000
|
trusted library allocation
|
page read and write
|
||
42AD000
|
trusted library allocation
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
1B5F000
|
heap
|
page read and write
|
||
43CA000
|
trusted library allocation
|
page read and write
|
||
1B63000
|
heap
|
page read and write
|
||
42A0000
|
trusted library allocation
|
page read and write
|
There are 314 hidden memdumps, click here to show them.