IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
shatterbreathepsw.shop
malicious
https://shortsvelventysjo.shop/api
104.21.16.225
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
alcojoldwograpciw.shop
malicious
incredibleextedwj.shop
malicious
liabilitynighstjsko.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://shortsvelventysjo.shop/api8
unknown
https://shortsvelventysjo.shop/h
unknown
http://ocsp.sectigo.com0
unknown
https://shortsvelventysjo.shop/api=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://shortsvelventysjo.shop/8
unknown
https://shortsvelventysjo.shop/9
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://shortsvelventysjo.shop/E
unknown
https://shortsvelventysjo.shop/apiS
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://shortsvelventysjo.shop/#
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://shortsvelventysjo.shop/
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://shortsvelventysjo.shop/PDJ
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://shortsvelventysjo.shop/apiakijgnj
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://shortsvelventysjo.shop/)DC
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://shortsvelventysjo.shop/apinn
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
shortsvelventysjo.shop
104.21.16.225
malicious

IPs

IP
Domain
Country
Malicious
104.21.16.225
shortsvelventysjo.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B2A000
unkown
page readonly
malicious
1A0D000
heap
page read and write
1A04000
heap
page read and write
3EBB000
trusted library allocation
page read and write
3F27000
trusted library allocation
page read and write
1A3F000
heap
page read and write
3EC5000
trusted library allocation
page read and write
3EDB000
trusted library allocation
page read and write
1A41000
heap
page read and write
1A29000
heap
page read and write
3EA0000
trusted library allocation
page read and write
1A29000
heap
page read and write
3EB3000
trusted library allocation
page read and write
3FAF000
trusted library allocation
page read and write
3ED8000
trusted library allocation
page read and write
E12000
unkown
page execute read
3EE7000
trusted library allocation
page read and write
1A39000
heap
page read and write
1A3E000
heap
page read and write
3EFE000
trusted library allocation
page read and write
3EAF000
trusted library allocation
page read and write
34FD000
stack
page read and write
1A2E000
heap
page read and write
1A04000
heap
page read and write
3EF5000
trusted library allocation
page read and write
3F0B000
trusted library allocation
page read and write
1A2C000
heap
page read and write
1A39000
heap
page read and write
1A33000
heap
page read and write
198F000
heap
page read and write
1A29000
heap
page read and write
4341000
trusted library allocation
page read and write
1A33000
heap
page read and write
17A5000
heap
page read and write
1A39000
heap
page read and write
1A44000
heap
page read and write
1A28000
heap
page read and write
3ECB000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3EB3000
trusted library allocation
page read and write
19AB000
heap
page read and write
4075000
trusted library allocation
page read and write
3EDB000
trusted library allocation
page read and write
3EE1000
trusted library allocation
page read and write
3F3C000
trusted library allocation
page read and write
3EAC000
trusted library allocation
page read and write
3ED3000
trusted library allocation
page read and write
3FA1000
heap
page read and write
1A44000
heap
page read and write
3ED1000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
1A40000
heap
page read and write
1A30000
heap
page read and write
353E000
stack
page read and write
1A1A000
heap
page read and write
4230000
trusted library allocation
page read and write
3EB2000
trusted library allocation
page read and write
1A20000
heap
page read and write
191D000
stack
page read and write
3D4F000
stack
page read and write
1A33000
heap
page read and write
1A1C000
heap
page read and write
1A15000
heap
page read and write
3E8E000
stack
page read and write
3EDB000
trusted library allocation
page read and write
1A2A000
heap
page read and write
3EE2000
trusted library allocation
page read and write
1730000
heap
page read and write
3EF7000
trusted library allocation
page read and write
1A3B000
heap
page read and write
40E4000
trusted library allocation
page read and write
1A39000
heap
page read and write
B2D000
unkown
page read and write
3EC4000
trusted library allocation
page read and write
3F1F000
trusted library allocation
page read and write
1960000
heap
page read and write
3EBD000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
1A3F000
heap
page read and write
3FAC000
trusted library allocation
page read and write
1A41000
heap
page read and write
3EBF000
trusted library allocation
page read and write
1A33000
heap
page read and write
3EAD000
trusted library allocation
page read and write
B38000
unkown
page execute read
196E000
heap
page read and write
13DA000
unkown
page readonly
1A41000
heap
page read and write
16F8000
stack
page read and write
1A17000
heap
page read and write
35B0000
heap
page read and write
1A29000
heap
page read and write
40FE000
stack
page read and write
1A44000
heap
page read and write
3C4E000
stack
page read and write
3EF3000
trusted library allocation
page read and write
1A3B000
heap
page read and write
AF0000
unkown
page readonly
38BF000
stack
page read and write
3ECD000
trusted library allocation
page read and write
1A39000
heap
page read and write
3EC9000
trusted library allocation
page read and write
19A9000
heap
page read and write
1996000
heap
page read and write
3EF5000
trusted library allocation
page read and write
1A1C000
heap
page read and write
1A15000
heap
page read and write
3590000
remote allocation
page read and write
1A3B000
heap
page read and write
3EC4000
trusted library allocation
page read and write
3F1F000
trusted library allocation
page read and write
E12000
unkown
page execute read
3EAA000
trusted library allocation
page read and write
1A3A000
heap
page read and write
1A1A000
heap
page read and write
3EA7000
trusted library allocation
page read and write
3EC7000
trusted library allocation
page read and write
3FA0000
heap
page read and write
1A0A000
heap
page read and write
3EEB000
trusted library allocation
page read and write
3EF7000
trusted library allocation
page read and write
4330000
heap
page read and write
1A44000
heap
page read and write
1A15000
heap
page read and write
1A29000
heap
page read and write
1A30000
heap
page read and write
19BA000
heap
page read and write
1C5E000
stack
page read and write
1A39000
heap
page read and write
1A46000
heap
page read and write
3EC7000
trusted library allocation
page read and write
1A33000
heap
page read and write
3EAA000
trusted library allocation
page read and write
18C0000
heap
page read and write
3ECF000
trusted library allocation
page read and write
404D000
trusted library allocation
page read and write
1A41000
heap
page read and write
3EAC000
trusted library allocation
page read and write
3ECB000
trusted library allocation
page read and write
3EA6000
trusted library allocation
page read and write
AF1000
unkown
page execute read
19BA000
heap
page read and write
1A28000
heap
page read and write
1A41000
heap
page read and write
3ECB000
trusted library allocation
page read and write
1A2D000
heap
page read and write
3F0C000
trusted library allocation
page read and write
19AD000
heap
page read and write
3ED3000
trusted library allocation
page read and write
1A0A000
heap
page read and write
1A39000
heap
page read and write
3EB8000
trusted library allocation
page read and write
1A15000
heap
page read and write
1A33000
heap
page read and write
3F1B000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3ED6000
trusted library allocation
page read and write
19B6000
heap
page read and write
3EBC000
trusted library allocation
page read and write
1A2C000
heap
page read and write
AF0000
unkown
page readonly
4D5F000
trusted library allocation
page read and write
1A41000
heap
page read and write
1A39000
heap
page read and write
3EA3000
trusted library allocation
page read and write
1A29000
heap
page read and write
37BF000
stack
page read and write
1A33000
heap
page read and write
1A19000
heap
page read and write
3F2F000
trusted library allocation
page read and write
1A15000
heap
page read and write
3EE0000
trusted library allocation
page read and write
3F03000
trusted library allocation
page read and write
3F1C000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
3EA9000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3EA5000
trusted library allocation
page read and write
1A33000
heap
page read and write
1A41000
heap
page read and write
1A3B000
heap
page read and write
1A44000
heap
page read and write
3ECD000
trusted library allocation
page read and write
3EE5000
trusted library allocation
page read and write
1A33000
heap
page read and write
3EA7000
trusted library allocation
page read and write
1A41000
heap
page read and write
1A33000
heap
page read and write
AAB000
stack
page read and write
3EA6000
trusted library allocation
page read and write
3EED000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
3EDD000
trusted library allocation
page read and write
1A1A000
heap
page read and write
1A38000
heap
page read and write
1A44000
heap
page read and write
1A1A000
heap
page read and write
3ECA000
trusted library allocation
page read and write
3EEA000
trusted library allocation
page read and write
407D000
trusted library allocation
page read and write
1A28000
heap
page read and write
19CE000
heap
page read and write
1A15000
heap
page read and write
1A1A000
heap
page read and write
4841000
trusted library allocation
page read and write
1A3B000
heap
page read and write
1A26000
heap
page read and write
1A3B000
heap
page read and write
1A3F000
heap
page read and write
3EA9000
trusted library allocation
page read and write
3EC0000
trusted library allocation
page read and write
1A28000
heap
page read and write
19BA000
heap
page read and write
1A15000
heap
page read and write
1B5F000
stack
page read and write
3EDB000
trusted library allocation
page read and write
41FF000
stack
page read and write
3EDD000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3F20000
trusted library allocation
page read and write
4450000
trusted library allocation
page read and write
3FC5000
trusted library allocation
page read and write
1A20000
heap
page read and write
3EAF000
trusted library allocation
page read and write
195D000
stack
page read and write
3ECA000
trusted library allocation
page read and write
1A39000
heap
page read and write
3EBB000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
3ED3000
trusted library allocation
page read and write
1A33000
heap
page read and write
3ED7000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3EC2000
trusted library allocation
page read and write
19BA000
heap
page read and write
3F23000
trusted library allocation
page read and write
3EAF000
trusted library allocation
page read and write
1A33000
heap
page read and write
196A000
heap
page read and write
1A17000
heap
page read and write
1A20000
heap
page read and write
357E000
stack
page read and write
3ED1000
trusted library allocation
page read and write
1A30000
heap
page read and write
3ED6000
trusted library allocation
page read and write
1A1F000
heap
page read and write
3F04000
trusted library allocation
page read and write
1A28000
heap
page read and write
199B000
heap
page read and write
1A15000
heap
page read and write
3ED7000
trusted library allocation
page read and write
3ECD000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
1A28000
heap
page read and write
1A1A000
heap
page read and write
3EE3000
trusted library allocation
page read and write
36BC000
stack
page read and write
1A28000
heap
page read and write
3F1E000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
19B4000
heap
page read and write
1A41000
heap
page read and write
1A3B000
heap
page read and write
3EA7000
trusted library allocation
page read and write
1A41000
heap
page read and write
3EAA000
trusted library allocation
page read and write
1A1A000
heap
page read and write
1A39000
heap
page read and write
3ED7000
trusted library allocation
page read and write
1A40000
heap
page read and write
3EF3000
trusted library allocation
page read and write
1A41000
heap
page read and write
3ED9000
trusted library allocation
page read and write
3ED8000
trusted library allocation
page read and write
3590000
remote allocation
page read and write
3ECE000
trusted library allocation
page read and write
3EC7000
trusted library allocation
page read and write
4115000
trusted library allocation
page read and write
1A26000
heap
page read and write
3EED000
trusted library allocation
page read and write
1A41000
heap
page read and write
1A1A000
heap
page read and write
1996000
heap
page read and write
1A28000
heap
page read and write
1A05000
heap
page read and write
1A28000
heap
page read and write
3EAB000
trusted library allocation
page read and write
19BA000
heap
page read and write
3EEB000
trusted library allocation
page read and write
1A1A000
heap
page read and write
3EC1000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3ED2000
trusted library allocation
page read and write
1A28000
heap
page read and write
1A43000
heap
page read and write
1A29000
heap
page read and write
3F03000
trusted library allocation
page read and write
3590000
remote allocation
page read and write
1A1A000
heap
page read and write
3EEA000
trusted library allocation
page read and write
1A20000
heap
page read and write
17A0000
heap
page read and write
1A20000
heap
page read and write
3EAC000
trusted library allocation
page read and write
3EF2000
trusted library allocation
page read and write
3FA6000
trusted library allocation
page read and write
1A15000
heap
page read and write
1A41000
heap
page read and write
3EAF000
trusted library allocation
page read and write
3EA5000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3EC1000
trusted library allocation
page read and write
3FDD000
trusted library allocation
page read and write
1990000
heap
page read and write
1A39000
heap
page read and write
3ED6000
trusted library allocation
page read and write
1A3B000
heap
page read and write
3ED3000
trusted library allocation
page read and write
1A1F000
heap
page read and write
1A0A000
heap
page read and write
1A39000
heap
page read and write
18BE000
stack
page read and write
1720000
heap
page read and write
1A52000
heap
page read and write
1A18000
heap
page read and write
3F27000
trusted library allocation
page read and write
1A33000
heap
page read and write
1A16000
heap
page read and write
3F50000
trusted library allocation
page read and write
1A47000
heap
page read and write
1A41000
heap
page read and write
177E000
stack
page read and write
1A1F000
heap
page read and write
4453000
trusted library allocation
page read and write
3F1C000
trusted library allocation
page read and write
1A31000
heap
page read and write
3EAF000
trusted library allocation
page read and write
1A1A000
heap
page read and write
1A41000
heap
page read and write
1A28000
heap
page read and write
1A3E000
heap
page read and write
19A9000
heap
page read and write
19A9000
heap
page read and write
19CD000
heap
page read and write
1996000
heap
page read and write
4085000
trusted library allocation
page read and write
1A33000
heap
page read and write
3EC0000
trusted library allocation
page read and write
3EA5000
trusted library allocation
page read and write
13DA000
unkown
page readonly
3ECB000
trusted library allocation
page read and write
1A3B000
heap
page read and write
1A1C000
heap
page read and write
1A33000
heap
page read and write
198F000
heap
page read and write
1A28000
heap
page read and write
1A3B000
heap
page read and write
1A29000
heap
page read and write
1A39000
heap
page read and write
3EA7000
trusted library allocation
page read and write
17A7000
heap
page read and write
19AB000
heap
page read and write
3EEE000
trusted library allocation
page read and write
3D8D000
stack
page read and write
1A15000
heap
page read and write
1A33000
heap
page read and write
3EA9000
trusted library allocation
page read and write
1A3B000
heap
page read and write
1A30000
heap
page read and write
3ED9000
trusted library allocation
page read and write
3FFD000
trusted library allocation
page read and write
1A33000
heap
page read and write
1A41000
heap
page read and write
3EB2000
trusted library allocation
page read and write
3EA1000
trusted library allocation
page read and write
There are 365 hidden memdumps, click here to show them.