IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
https://greetclassifytalk.shop/api
172.67.177.98
malicious
liabilitynighstjsko.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
greetclassifytalk.shop
malicious
productivelookewr.shop
malicious
alcojoldwograpciw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://greetclassifytalk.shop/nt
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://greetclassifytalk.shop/%D
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://greetclassifytalk.shop/$Q
unknown
https://greetclassifytalk.shop/)tO#
unknown
https://greetclassifytalk.shop/apiCz
unknown
https://greetclassifytalk.shop/gtu#
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://greetclassifytalk.shop/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://greetclassifytalk.shop/apik
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://greetclassifytalk.shop/api0
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://greetclassifytalk.shop/api-
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://greetclassifytalk.shop:443/api
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
greetclassifytalk.shop
172.67.177.98
malicious

IPs

IP
Domain
Country
Malicious
172.67.177.98
greetclassifytalk.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FDB000
unkown
page readonly
malicious
3DB8000
trusted library allocation
page read and write
EA9000
heap
page read and write
D6D000
stack
page read and write
3D94000
trusted library allocation
page read and write
EAF000
heap
page read and write
3D74000
trusted library allocation
page read and write
33C0000
heap
page read and write
EA1000
heap
page read and write
D04000
heap
page read and write
3240000
heap
page read and write
D04000
heap
page read and write
C50000
heap
page read and write
EA3000
heap
page read and write
3D9B000
trusted library allocation
page read and write
F0E000
stack
page read and write
199E000
stack
page read and write
3D7F000
trusted library allocation
page read and write
E9E000
heap
page read and write
E87000
heap
page read and write
3DAA000
trusted library allocation
page read and write
3DB0000
trusted library allocation
page read and write
1556000
unkown
page execute read
3DB8000
trusted library allocation
page read and write
E3A000
heap
page read and write
E87000
heap
page read and write
EA9000
heap
page read and write
3D88000
trusted library allocation
page read and write
E9F000
heap
page read and write
EA1000
heap
page read and write
3D77000
trusted library allocation
page read and write
E90000
heap
page read and write
E33000
heap
page read and write
3DFE000
trusted library allocation
page read and write
EB4000
heap
page read and write
3DA7000
trusted library allocation
page read and write
3DCC000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
3DAF000
trusted library allocation
page read and write
3FA9000
trusted library allocation
page read and write
3DC1000
trusted library allocation
page read and write
3D8F000
trusted library allocation
page read and write
EB4000
heap
page read and write
3D99000
trusted library allocation
page read and write
E33000
heap
page read and write
DD0000
heap
page read and write
D04000
heap
page read and write
EA6000
heap
page read and write
EA5000
heap
page read and write
3F6F000
stack
page read and write
3DB6000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
E06000
heap
page read and write
E9E000
heap
page read and write
46A9000
trusted library allocation
page read and write
3DCD000
trusted library allocation
page read and write
E36000
heap
page read and write
3F51000
trusted library allocation
page read and write
3F49000
trusted library allocation
page read and write
3241000
heap
page read and write
FA0000
unkown
page readonly
3DA9000
trusted library allocation
page read and write
EA1000
heap
page read and write
E01000
heap
page read and write
382F000
stack
page read and write
EA9000
heap
page read and write
3DFE000
trusted library allocation
page read and write
E01000
heap
page read and write
3D9B000
trusted library allocation
page read and write
E06000
heap
page read and write
EA9000
heap
page read and write
3241000
heap
page read and write
4BB4000
trusted library allocation
page read and write
3DA9000
trusted library allocation
page read and write
3DA4000
trusted library allocation
page read and write
3DA4000
trusted library allocation
page read and write
CDE000
stack
page read and write
C9D000
stack
page read and write
3D89000
trusted library allocation
page read and write
3241000
heap
page read and write
362D000
stack
page read and write
3D88000
trusted library allocation
page read and write
EA5000
heap
page read and write
3D82000
trusted library allocation
page read and write
EA1000
heap
page read and write
372F000
stack
page read and write
E87000
heap
page read and write
3241000
heap
page read and write
3D75000
trusted library allocation
page read and write
E36000
heap
page read and write
E19000
heap
page read and write
3DED000
trusted library allocation
page read and write
E36000
heap
page read and write
D04000
heap
page read and write
EA5000
heap
page read and write
3DA3000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
3DA7000
trusted library allocation
page read and write
3E99000
trusted library allocation
page read and write
100E000
unkown
page read and write
E2D000
heap
page read and write
3432000
trusted library allocation
page read and write
1014000
unkown
page execute read
D04000
heap
page read and write
3DCA000
trusted library allocation
page read and write
D00000
heap
page read and write
3DFE000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
EAA000
heap
page read and write
E88000
heap
page read and write
EA1000
heap
page read and write
EAB000
heap
page read and write
3D99000
trusted library allocation
page read and write
3DDD000
trusted library allocation
page read and write
EA9000
heap
page read and write
E19000
heap
page read and write
341E000
stack
page read and write
1895000
unkown
page readonly
3D8A000
trusted library allocation
page read and write
3DAC000
trusted library allocation
page read and write
3D7F000
trusted library allocation
page read and write
D04000
heap
page read and write
EA4000
heap
page read and write
E4B000
heap
page read and write
DDA000
heap
page read and write
3FE9000
trusted library allocation
page read and write
3D7A000
trusted library allocation
page read and write
E3A000
heap
page read and write
3241000
heap
page read and write
E36000
heap
page read and write
3C6F000
stack
page read and write
3D82000
trusted library allocation
page read and write
3DCE000
trusted library allocation
page read and write
EAD000
heap
page read and write
E36000
heap
page read and write
3DB8000
trusted library allocation
page read and write
3D9B000
trusted library allocation
page read and write
3D8F000
trusted library allocation
page read and write
ECE000
heap
page read and write
3F21000
trusted library allocation
page read and write
3DD5000
trusted library allocation
page read and write
FA0000
unkown
page readonly
FA1000
unkown
page execute read
1A9E000
stack
page read and write
EA1000
heap
page read and write
3DAB000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
3DA8000
trusted library allocation
page read and write
3DA7000
trusted library allocation
page read and write
3DC5000
trusted library allocation
page read and write
EA1000
heap
page read and write
3DC6000
trusted library allocation
page read and write
EA5000
heap
page read and write
3D7B000
trusted library allocation
page read and write
E33000
heap
page read and write
3DA6000
trusted library allocation
page read and write
EA9000
heap
page read and write
ECE000
heap
page read and write
3DA9000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
E33000
heap
page read and write
3DF5000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
3DB8000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
3D8F000
trusted library allocation
page read and write
EA6000
heap
page read and write
FDE000
unkown
page read and write
3D9B000
trusted library allocation
page read and write
EA6000
heap
page read and write
1895000
unkown
page readonly
E8B000
heap
page read and write
3D81000
trusted library allocation
page read and write
E19000
heap
page read and write
3241000
heap
page read and write
3D9F000
trusted library allocation
page read and write
DDE000
heap
page read and write
E06000
heap
page read and write
3DB3000
trusted library allocation
page read and write
F50000
remote allocation
page read and write
E3A000
heap
page read and write
EA9000
heap
page read and write
EA5000
heap
page read and write
E92000
heap
page read and write
E83000
heap
page read and write
3D89000
trusted library allocation
page read and write
E33000
heap
page read and write
EB4000
heap
page read and write
3D71000
trusted library allocation
page read and write
EAD000
heap
page read and write
352E000
stack
page read and write
3DA6000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
EA9000
heap
page read and write
3D8F000
trusted library allocation
page read and write
3DC5000
trusted library allocation
page read and write
EA9000
heap
page read and write
3D8F000
trusted library allocation
page read and write
EA4000
heap
page read and write
3D9F000
trusted library allocation
page read and write
3DCA000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
F50000
remote allocation
page read and write
A3B000
stack
page read and write
3DBD000
trusted library allocation
page read and write
3DA9000
trusted library allocation
page read and write
D04000
heap
page read and write
3DA4000
trusted library allocation
page read and write
3D89000
trusted library allocation
page read and write
EA4000
heap
page read and write
3DD1000
trusted library allocation
page read and write
EAF000
heap
page read and write
3D78000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
F4E000
stack
page read and write
E1B000
heap
page read and write
3DA9000
trusted library allocation
page read and write
EAD000
heap
page read and write
FE9000
unkown
page execute read
3E7A000
trusted library allocation
page read and write
3DCE000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
3DD3000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
3DE9000
trusted library allocation
page read and write
3D6E000
stack
page read and write
3D70000
trusted library allocation
page read and write
EA1000
heap
page read and write
E06000
heap
page read and write
3241000
heap
page read and write
EA1000
heap
page read and write
D04000
heap
page read and write
F50000
remote allocation
page read and write
131A000
unkown
page execute read
3D9F000
trusted library allocation
page read and write
3DA7000
trusted library allocation
page read and write
4034000
trusted library allocation
page read and write
3DF1000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
3E80000
trusted library allocation
page read and write
EA5000
heap
page read and write
B70000
heap
page read and write
3FA0000
trusted library allocation
page read and write
3D9B000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3DE4000
trusted library allocation
page read and write
E00000
heap
page read and write
EB8000
heap
page read and write
33BE000
stack
page read and write
3420000
heap
page read and write
3DDF000
trusted library allocation
page read and write
EA5000
heap
page read and write
3DD9000
trusted library allocation
page read and write
3250000
heap
page read and write
DAE000
stack
page read and write
3DA7000
trusted library allocation
page read and write
EA5000
heap
page read and write
3D7D000
trusted library allocation
page read and write
EA1000
heap
page read and write
3DA9000
trusted library allocation
page read and write
E9F000
heap
page read and write
EA9000
heap
page read and write
3D78000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
3DC8000
trusted library allocation
page read and write
D04000
heap
page read and write
3D89000
trusted library allocation
page read and write
3DFE000
trusted library allocation
page read and write
D04000
heap
page read and write
EA5000
heap
page read and write
3DCA000
trusted library allocation
page read and write
EA1000
heap
page read and write
3DCD000
trusted library allocation
page read and write
EA5000
heap
page read and write
D10000
heap
page read and write
D04000
heap
page read and write
3D9B000
trusted library allocation
page read and write
3D76000
trusted library allocation
page read and write
3241000
heap
page read and write
3EB1000
trusted library allocation
page read and write
3DA2000
trusted library allocation
page read and write
EB1000
heap
page read and write
B38000
stack
page read and write
3D99000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
3DA9000
trusted library allocation
page read and write
3D7D000
trusted library allocation
page read and write
3DA9000
trusted library allocation
page read and write
3D8F000
trusted library allocation
page read and write
EB9000
heap
page read and write
3D76000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
3D80000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
E87000
heap
page read and write
3DA6000
trusted library allocation
page read and write
337E000
stack
page read and write
4190000
heap
page read and write
E82000
heap
page read and write
3DCA000
trusted library allocation
page read and write
3DA6000
trusted library allocation
page read and write
E83000
heap
page read and write
E3A000
heap
page read and write
3DC0000
trusted library allocation
page read and write
D04000
heap
page read and write
E87000
heap
page read and write
3D77000
trusted library allocation
page read and write
E7A000
heap
page read and write
3D8D000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
E9B000
heap
page read and write
EB4000
heap
page read and write
E19000
heap
page read and write
3D71000
trusted library allocation
page read and write
EA6000
heap
page read and write
3D71000
trusted library allocation
page read and write
EA9000
heap
page read and write
3DC8000
trusted library allocation
page read and write
EA1000
heap
page read and write
There are 314 hidden memdumps, click here to show them.