Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
https://greetclassifytalk.shop/api
|
172.67.177.98
|
||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
greetclassifytalk.shop
|
|||
productivelookewr.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://greetclassifytalk.shop/nt
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://greetclassifytalk.shop/%D
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://greetclassifytalk.shop/$Q
|
unknown
|
||
https://greetclassifytalk.shop/)tO#
|
unknown
|
||
https://greetclassifytalk.shop/apiCz
|
unknown
|
||
https://greetclassifytalk.shop/gtu#
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://greetclassifytalk.shop/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://greetclassifytalk.shop/apik
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://greetclassifytalk.shop/api0
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://greetclassifytalk.shop/api-
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://greetclassifytalk.shop:443/api
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
greetclassifytalk.shop
|
172.67.177.98
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.177.98
|
greetclassifytalk.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FDB000
|
unkown
|
page readonly
|
||
3DB8000
|
trusted library allocation
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
D6D000
|
stack
|
page read and write
|
||
3D94000
|
trusted library allocation
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
3D74000
|
trusted library allocation
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
EA3000
|
heap
|
page read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
199E000
|
stack
|
page read and write
|
||
3D7F000
|
trusted library allocation
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
3DAA000
|
trusted library allocation
|
page read and write
|
||
3DB0000
|
trusted library allocation
|
page read and write
|
||
1556000
|
unkown
|
page execute read
|
||
3DB8000
|
trusted library allocation
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
3D88000
|
trusted library allocation
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
3D77000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
3DFE000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
3DCC000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
3DAF000
|
trusted library allocation
|
page read and write
|
||
3FA9000
|
trusted library allocation
|
page read and write
|
||
3DC1000
|
trusted library allocation
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
3DB6000
|
trusted library allocation
|
page read and write
|
||
3DA0000
|
trusted library allocation
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
46A9000
|
trusted library allocation
|
page read and write
|
||
3DCD000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
3F49000
|
trusted library allocation
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
3DFE000
|
trusted library allocation
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
4BB4000
|
trusted library allocation
|
page read and write
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
3DA4000
|
trusted library allocation
|
page read and write
|
||
3DA4000
|
trusted library allocation
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
C9D000
|
stack
|
page read and write
|
||
3D89000
|
trusted library allocation
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
362D000
|
stack
|
page read and write
|
||
3D88000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3D82000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
3D75000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
3DED000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3DA3000
|
trusted library allocation
|
page read and write
|
||
3D97000
|
trusted library allocation
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
3E99000
|
trusted library allocation
|
page read and write
|
||
100E000
|
unkown
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
3432000
|
trusted library allocation
|
page read and write
|
||
1014000
|
unkown
|
page execute read
|
||
D04000
|
heap
|
page read and write
|
||
3DCA000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
3DFE000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
EAA000
|
heap
|
page read and write
|
||
E88000
|
heap
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
EAB000
|
heap
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
3DDD000
|
trusted library allocation
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
1895000
|
unkown
|
page readonly
|
||
3D8A000
|
trusted library allocation
|
page read and write
|
||
3DAC000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
trusted library allocation
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
3FE9000
|
trusted library allocation
|
page read and write
|
||
3D7A000
|
trusted library allocation
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
3D82000
|
trusted library allocation
|
page read and write
|
||
3DCE000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
3DB8000
|
trusted library allocation
|
page read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
3F21000
|
trusted library allocation
|
page read and write
|
||
3DD5000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
FA1000
|
unkown
|
page execute read
|
||
1A9E000
|
stack
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
3DAB000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
3DA8000
|
trusted library allocation
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
3DC5000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
3DC6000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3D7B000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
3DA6000
|
trusted library allocation
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
3F59000
|
trusted library allocation
|
page read and write
|
||
3DF5000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
3DF5000
|
trusted library allocation
|
page read and write
|
||
3D81000
|
trusted library allocation
|
page read and write
|
||
3DB8000
|
trusted library allocation
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
FDE000
|
unkown
|
page read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
1895000
|
unkown
|
page readonly
|
||
E8B000
|
heap
|
page read and write
|
||
3D81000
|
trusted library allocation
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
3D9F000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
3DB3000
|
trusted library allocation
|
page read and write
|
||
F50000
|
remote allocation
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
E92000
|
heap
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
3D89000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
3DA6000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
3DC5000
|
trusted library allocation
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
3D9F000
|
trusted library allocation
|
page read and write
|
||
3DCA000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
F50000
|
remote allocation
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
3DBD000
|
trusted library allocation
|
page read and write
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
3DA4000
|
trusted library allocation
|
page read and write
|
||
3D89000
|
trusted library allocation
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
3DD1000
|
trusted library allocation
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
FE9000
|
unkown
|
page execute read
|
||
3E7A000
|
trusted library allocation
|
page read and write
|
||
3DCE000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
3DD3000
|
trusted library allocation
|
page read and write
|
||
3ED1000
|
trusted library allocation
|
page read and write
|
||
3DE9000
|
trusted library allocation
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
3D70000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
F50000
|
remote allocation
|
page read and write
|
||
131A000
|
unkown
|
page execute read
|
||
3D9F000
|
trusted library allocation
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
4034000
|
trusted library allocation
|
page read and write
|
||
3DF1000
|
trusted library allocation
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
3D81000
|
trusted library allocation
|
page read and write
|
||
3E80000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
3FA0000
|
trusted library allocation
|
page read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
3D91000
|
trusted library allocation
|
page read and write
|
||
3DE4000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
3DDF000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3DD9000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3D7D000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
3D81000
|
trusted library allocation
|
page read and write
|
||
3D97000
|
trusted library allocation
|
page read and write
|
||
3DC8000
|
trusted library allocation
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
3D89000
|
trusted library allocation
|
page read and write
|
||
3DFE000
|
trusted library allocation
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
3DCA000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
3DCD000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
3D9B000
|
trusted library allocation
|
page read and write
|
||
3D76000
|
trusted library allocation
|
page read and write
|
||
3241000
|
heap
|
page read and write
|
||
3EB1000
|
trusted library allocation
|
page read and write
|
||
3DA2000
|
trusted library allocation
|
page read and write
|
||
EB1000
|
heap
|
page read and write
|
||
B38000
|
stack
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
3D7D000
|
trusted library allocation
|
page read and write
|
||
3DA9000
|
trusted library allocation
|
page read and write
|
||
3D8F000
|
trusted library allocation
|
page read and write
|
||
EB9000
|
heap
|
page read and write
|
||
3D76000
|
trusted library allocation
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
3D80000
|
trusted library allocation
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
3DA6000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
4190000
|
heap
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
3DCA000
|
trusted library allocation
|
page read and write
|
||
3DA6000
|
trusted library allocation
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
3DC0000
|
trusted library allocation
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
3D77000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
3D8D000
|
trusted library allocation
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
EB4000
|
heap
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
EA6000
|
heap
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
3DC8000
|
trusted library allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
There are 314 hidden memdumps, click here to show them.