IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
https://greetclassifytalk.shop/api
104.21.51.78
malicious
liabilitynighstjsko.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
greetclassifytalk.shop
malicious
productivelookewr.shop
malicious
alcojoldwograpciw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://greetclassifytalk.shop/US5i
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://greetclassifytalk.shop/Tx=
unknown
https://greetclassifytalk.shop/apiO
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://greetclassifytalk.shop/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://greetclassifytalk.shop/G
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://greetclassifytalk.shop/ziRL
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
greetclassifytalk.shop
104.21.51.78
malicious
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
104.21.51.78
greetclassifytalk.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D0B000
unkown
page readonly
malicious
387E000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
784000
heap
page read and write
9FA000
heap
page read and write
38DF000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
9B4000
heap
page read and write
387F000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
38C8000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
38EF000
trusted library allocation
page read and write
38CC000
trusted library allocation
page read and write
9FC000
heap
page read and write
3A4C000
trusted library allocation
page read and write
322F000
stack
page read and write
389D000
trusted library allocation
page read and write
2D8E000
stack
page read and write
A10000
heap
page read and write
A14000
heap
page read and write
38B1000
trusted library allocation
page read and write
388C000
trusted library allocation
page read and write
9E8000
heap
page read and write
38B1000
trusted library allocation
page read and write
302E000
stack
page read and write
3885000
trusted library allocation
page read and write
388A000
trusted library allocation
page read and write
38CE000
trusted library allocation
page read and write
399C000
trusted library allocation
page read and write
993000
heap
page read and write
387C000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
6B0000
heap
page read and write
389F000
trusted library allocation
page read and write
A23000
heap
page read and write
38B8000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
3983000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
38CC000
trusted library allocation
page read and write
2E40000
heap
page read and write
1049000
unkown
page execute read
38BD000
trusted library allocation
page read and write
2E31000
heap
page read and write
38C3000
trusted library allocation
page read and write
332F000
stack
page read and write
A24000
heap
page read and write
407D000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
94E000
stack
page read and write
2E30000
heap
page read and write
2E00000
heap
page read and write
3883000
trusted library allocation
page read and write
2D0E000
stack
page read and write
3875000
trusted library allocation
page read and write
9A1000
heap
page read and write
389F000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
38DA000
trusted library allocation
page read and write
993000
heap
page read and write
38A7000
trusted library allocation
page read and write
A26000
heap
page read and write
784000
heap
page read and write
74D000
stack
page read and write
784000
heap
page read and write
3879000
trusted library allocation
page read and write
387F000
trusted library allocation
page read and write
38AA000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
3892000
trusted library allocation
page read and write
387A000
trusted library allocation
page read and write
760000
heap
page read and write
3874000
trusted library allocation
page read and write
47B000
stack
page read and write
9FA000
heap
page read and write
389D000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
38AC000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
9FA000
heap
page read and write
C8E000
stack
page read and write
784000
heap
page read and write
95A000
heap
page read and write
9FC000
heap
page read and write
388C000
trusted library allocation
page read and write
D19000
unkown
page execute read
387C000
trusted library allocation
page read and write
99E000
heap
page read and write
88F000
stack
page read and write
387C000
trusted library allocation
page read and write
A2C000
heap
page read and write
3874000
trusted library allocation
page read and write
784000
heap
page read and write
38D1000
trusted library allocation
page read and write
38A3000
trusted library allocation
page read and write
2E31000
heap
page read and write
38C3000
trusted library allocation
page read and write
38AC000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
CB0000
remote allocation
page read and write
387A000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
39D4000
trusted library allocation
page read and write
A09000
heap
page read and write
A2C000
heap
page read and write
38BC000
trusted library allocation
page read and write
950000
heap
page read and write
3875000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
A1C000
heap
page read and write
38DC000
trusted library allocation
page read and write
A27000
heap
page read and write
38B6000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
986000
heap
page read and write
3885000
trusted library allocation
page read and write
A1C000
heap
page read and write
A36000
heap
page read and write
A1F000
heap
page read and write
15C3000
unkown
page readonly
387C000
trusted library allocation
page read and write
3AEC000
trusted library allocation
page read and write
38A5000
trusted library allocation
page read and write
388C000
trusted library allocation
page read and write
9E8000
heap
page read and write
387F000
trusted library allocation
page read and write
388F000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
A37000
heap
page read and write
784000
heap
page read and write
38A4000
trusted library allocation
page read and write
3892000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
2E31000
heap
page read and write
3896000
trusted library allocation
page read and write
981000
heap
page read and write
388D000
trusted library allocation
page read and write
993000
heap
page read and write
A21000
heap
page read and write
387C000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
389D000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
A23000
heap
page read and write
389E000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
9A1000
heap
page read and write
3873000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
784000
heap
page read and write
312D000
stack
page read and write
A39000
heap
page read and write
9B4000
heap
page read and write
9CF000
heap
page read and write
2E31000
heap
page read and write
D0E000
unkown
page read and write
986000
heap
page read and write
CD1000
unkown
page execute read
A22000
heap
page read and write
388D000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
9E8000
heap
page read and write
3878000
trusted library allocation
page read and write
A1C000
heap
page read and write
3889000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
CD0000
unkown
page readonly
388F000
trusted library allocation
page read and write
95E000
heap
page read and write
A36000
heap
page read and write
38BD000
trusted library allocation
page read and write
986000
heap
page read and write
3885000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
6FE000
stack
page read and write
A1C000
heap
page read and write
A36000
heap
page read and write
A23000
heap
page read and write
38D4000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
784000
heap
page read and write
3A5C000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
388D000
trusted library allocation
page read and write
1067000
unkown
page execute read
38B1000
trusted library allocation
page read and write
386E000
stack
page read and write
3872000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
38B4000
trusted library allocation
page read and write
99E000
heap
page read and write
387C000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
387B000
trusted library allocation
page read and write
38FC000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
387A000
trusted library allocation
page read and write
38AA000
trusted library allocation
page read and write
38CD000
trusted library allocation
page read and write
A23000
heap
page read and write
389E000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
376F000
stack
page read and write
A27000
heap
page read and write
9FC000
heap
page read and write
389D000
trusted library allocation
page read and write
A1E000
heap
page read and write
A20000
heap
page read and write
38A1000
trusted library allocation
page read and write
90E000
stack
page read and write
2DCE000
stack
page read and write
A21000
heap
page read and write
387F000
trusted library allocation
page read and write
9FC000
heap
page read and write
387C000
trusted library allocation
page read and write
A24000
heap
page read and write
9E8000
heap
page read and write
38DC000
trusted library allocation
page read and write
980000
heap
page read and write
387C000
trusted library allocation
page read and write
5D0000
heap
page read and write
3886000
trusted library allocation
page read and write
15C3000
unkown
page readonly
38D3000
trusted library allocation
page read and write
388B000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
3891000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
38A0000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
9E8000
heap
page read and write
981000
heap
page read and write
A24000
heap
page read and write
387C000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
780000
heap
page read and write
38BD000
trusted library allocation
page read and write
38A4000
trusted library allocation
page read and write
388C000
trusted library allocation
page read and write
3905000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
A1E000
heap
page read and write
A0F000
heap
page read and write
38AA000
trusted library allocation
page read and write
3872000
trusted library allocation
page read and write
388E000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
2D40000
heap
page read and write
99E000
heap
page read and write
38C4000
trusted library allocation
page read and write
38B7000
trusted library allocation
page read and write
9BA000
heap
page read and write
3A24000
trusted library allocation
page read and write
38A7000
trusted library allocation
page read and write
2CBE000
stack
page read and write
3885000
trusted library allocation
page read and write
9BD000
heap
page read and write
38B9000
trusted library allocation
page read and write
3A54000
trusted library allocation
page read and write
A0F000
heap
page read and write
38AE000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
387B000
trusted library allocation
page read and write
9FA000
heap
page read and write
8CD000
stack
page read and write
3875000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
A27000
heap
page read and write
38B4000
trusted library allocation
page read and write
38D1000
trusted library allocation
page read and write
38E5000
trusted library allocation
page read and write
39B4000
trusted library allocation
page read and write
2C6E000
stack
page read and write
397D000
trusted library allocation
page read and write
784000
heap
page read and write
38AF000
trusted library allocation
page read and write
38D5000
trusted library allocation
page read and write
3878000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
2E31000
heap
page read and write
387C000
trusted library allocation
page read and write
A23000
heap
page read and write
2E20000
heap
page read and write
38AE000
trusted library allocation
page read and write
9A1000
heap
page read and write
2E31000
heap
page read and write
38D1000
trusted library allocation
page read and write
784000
heap
page read and write
9B6000
heap
page read and write
9CE000
heap
page read and write
3885000
trusted library allocation
page read and write
3870000
trusted library allocation
page read and write
3878000
trusted library allocation
page read and write
9FA000
heap
page read and write
38CB000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
784000
heap
page read and write
38A4000
trusted library allocation
page read and write
38E8000
trusted library allocation
page read and write
38AC000
trusted library allocation
page read and write
38CC000
trusted library allocation
page read and write
38B1000
trusted library allocation
page read and write
38A6000
trusted library allocation
page read and write
9B8000
heap
page read and write
38A8000
trusted library allocation
page read and write
388F000
trusted library allocation
page read and write
38C3000
trusted library allocation
page read and write
3A6F000
stack
page read and write
A1C000
heap
page read and write
2E31000
heap
page read and write
3886000
trusted library allocation
page read and write
D44000
unkown
page execute read
9CE000
heap
page read and write
388C000
trusted library allocation
page read and write
9FC000
heap
page read and write
CB0000
remote allocation
page read and write
3C0C000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
CB0000
remote allocation
page read and write
784000
heap
page read and write
38D5000
trusted library allocation
page read and write
38C4000
trusted library allocation
page read and write
A2C000
heap
page read and write
578000
stack
page read and write
D3E000
unkown
page read and write
3889000
trusted library allocation
page read and write
3871000
trusted library allocation
page read and write
38CD000
trusted library allocation
page read and write
CD0000
unkown
page readonly
38BD000
trusted library allocation
page read and write
3D14000
trusted library allocation
page read and write
38BD000
trusted library allocation
page read and write
3889000
trusted library allocation
page read and write
387F000
trusted library allocation
page read and write
2E31000
heap
page read and write
3B6F000
stack
page read and write
3875000
trusted library allocation
page read and write
A28000
heap
page read and write
3B7C000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
There are 343 hidden memdumps, click here to show them.