IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
liabilitynighstjsko.shop
malicious
shatterbreathepsw.shop
malicious
https://shortsvelventysjo.shop/api
104.21.16.225
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
alcojoldwograpciw.shop
malicious
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8z
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://ocsp.sectigo.com0
unknown
https://shortsvelventysjo.shop/api=
unknown
https://shortsvelventysjo.shop/3
unknown
https://shortsvelventysjo.shop/u
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://shortsvelventysjo.shop/api2
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://shortsvelventysjo.shop/
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://shortsvelventysjo.shop/L
unknown
https://shortsvelventysjo.shop/F
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://shortsvelventysjo.shop/apih?
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://shortsvelventysjo.shop/8
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://shortsvelventysjo.shop/apiL
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
shortsvelventysjo.shop
104.21.16.225
malicious
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
104.21.16.225
shortsvelventysjo.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FBA000
unkown
page readonly
malicious
ADB000
stack
page read and write
F25000
heap
page read and write
4048000
trusted library allocation
page read and write
E40000
heap
page read and write
1A97000
heap
page read and write
1A56000
heap
page read and write
1A11000
heap
page read and write
40E8000
trusted library allocation
page read and write
1A9A000
heap
page read and write
40F9000
trusted library allocation
page read and write
1A06000
heap
page read and write
3CA0000
heap
page read and write
1A13000
heap
page read and write
40E0000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
193E000
stack
page read and write
405D000
trusted library allocation
page read and write
1A8B000
heap
page read and write
4074000
trusted library allocation
page read and write
4048000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
1A96000
heap
page read and write
40F9000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
4067000
trusted library allocation
page read and write
40E8000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
12C8000
unkown
page execute read
1A00000
heap
page read and write
4119000
trusted library allocation
page read and write
1A13000
heap
page read and write
1A97000
heap
page read and write
411B000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
1A9C000
heap
page read and write
351D000
trusted library allocation
page read and write
40BC000
trusted library allocation
page read and write
408D000
trusted library allocation
page read and write
40D0000
trusted library allocation
page read and write
1A9A000
heap
page read and write
4048000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
1A1D000
heap
page read and write
42BB000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
1A1D000
heap
page read and write
4B74000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
409C000
trusted library allocation
page read and write
4052000
trusted library allocation
page read and write
4042000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
4086000
trusted library allocation
page read and write
4078000
trusted library allocation
page read and write
1A96000
heap
page read and write
407F000
trusted library allocation
page read and write
44DE000
trusted library allocation
page read and write
1A8F000
heap
page read and write
408E000
trusted library allocation
page read and write
1A1D000
heap
page read and write
12C8000
unkown
page execute read
1A56000
heap
page read and write
408E000
trusted library allocation
page read and write
40E5000
trusted library allocation
page read and write
F80000
unkown
page readonly
4079000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
34F0000
remote allocation
page read and write
404B000
trusted library allocation
page read and write
1A9A000
heap
page read and write
1A9D000
heap
page read and write
3EEF000
stack
page read and write
4076000
trusted library allocation
page read and write
40C4000
trusted library allocation
page read and write
1A9A000
heap
page read and write
402E000
stack
page read and write
410B000
trusted library allocation
page read and write
34F0000
remote allocation
page read and write
18E5000
unkown
page readonly
4051000
trusted library allocation
page read and write
4059000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
1A9A000
heap
page read and write
394E000
stack
page read and write
1A94000
heap
page read and write
40BC000
trusted library allocation
page read and write
422B000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
4054000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
F81000
unkown
page execute read
405E000
trusted library allocation
page read and write
F20000
heap
page read and write
4077000
trusted library allocation
page read and write
414C000
trusted library allocation
page read and write
1CCF000
stack
page read and write
1A87000
heap
page read and write
40E8000
trusted library allocation
page read and write
404E000
trusted library allocation
page read and write
408D000
trusted library allocation
page read and write
40E0000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
4079000
trusted library allocation
page read and write
1A84000
heap
page read and write
4045000
trusted library allocation
page read and write
404D000
trusted library allocation
page read and write
19D0000
heap
page read and write
40EA000
trusted library allocation
page read and write
1A06000
heap
page read and write
4171000
trusted library allocation
page read and write
4147000
trusted library allocation
page read and write
4045000
trusted library allocation
page read and write
1A93000
heap
page read and write
40DC000
trusted library allocation
page read and write
404B000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
4047000
trusted library allocation
page read and write
1A9C000
heap
page read and write
F80000
unkown
page readonly
40E1000
trusted library allocation
page read and write
40DC000
trusted library allocation
page read and write
1A9D000
heap
page read and write
4140000
trusted library allocation
page read and write
1A9D000
heap
page read and write
4078000
trusted library allocation
page read and write
4070000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
1A9A000
heap
page read and write
40DC000
trusted library allocation
page read and write
1A93000
heap
page read and write
1A99000
heap
page read and write
4119000
trusted library allocation
page read and write
3F2E000
stack
page read and write
1A76000
heap
page read and write
40FB000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
4148000
trusted library allocation
page read and write
40CB000
trusted library allocation
page read and write
4059000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
408D000
trusted library allocation
page read and write
1A76000
heap
page read and write
40EA000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
19DA000
heap
page read and write
1A9C000
heap
page read and write
449F000
stack
page read and write
4044000
trusted library allocation
page read and write
1A93000
heap
page read and write
4118000
trusted library allocation
page read and write
4223000
trusted library allocation
page read and write
1A9A000
heap
page read and write
4079000
trusted library allocation
page read and write
40CB000
trusted library allocation
page read and write
5086000
trusted library allocation
page read and write
4078000
trusted library allocation
page read and write
3DEE000
stack
page read and write
408E000
trusted library allocation
page read and write
1A76000
heap
page read and write
FBD000
unkown
page read and write
405F000
trusted library allocation
page read and write
4080000
trusted library allocation
page read and write
4048000
trusted library allocation
page read and write
1A9C000
heap
page read and write
BD9000
stack
page read and write
4044000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
4179000
trusted library allocation
page read and write
4046000
trusted library allocation
page read and write
370E000
stack
page read and write
1A93000
heap
page read and write
41F3000
trusted library allocation
page read and write
1A76000
heap
page read and write
408E000
trusted library allocation
page read and write
1A93000
heap
page read and write
40AF000
trusted library allocation
page read and write
40F9000
trusted library allocation
page read and write
4088000
trusted library allocation
page read and write
1A8C000
heap
page read and write
1A56000
heap
page read and write
4109000
trusted library allocation
page read and write
1A90000
heap
page read and write
4044000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
4040000
trusted library allocation
page read and write
19DE000
heap
page read and write
408D000
trusted library allocation
page read and write
40F9000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
4111000
trusted library allocation
page read and write
1A11000
heap
page read and write
408E000
trusted library allocation
page read and write
360D000
stack
page read and write
4660000
heap
page read and write
40E3000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
19FF000
heap
page read and write
408E000
trusted library allocation
page read and write
421B000
trusted library allocation
page read and write
40DD000
trusted library allocation
page read and write
1A9D000
heap
page read and write
40BC000
trusted library allocation
page read and write
1A9A000
heap
page read and write
F7E000
stack
page read and write
404D000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
1A9A000
heap
page read and write
18E5000
unkown
page readonly
439E000
stack
page read and write
4085000
trusted library allocation
page read and write
1A9E000
heap
page read and write
4077000
trusted library allocation
page read and write
4080000
trusted library allocation
page read and write
40C4000
trusted library allocation
page read and write
406F000
trusted library allocation
page read and write
1A13000
heap
page read and write
404D000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
1A84000
heap
page read and write
1A11000
heap
page read and write
1A93000
heap
page read and write
1A93000
heap
page read and write
1A98000
heap
page read and write
4041000
trusted library allocation
page read and write
1A80000
heap
page read and write
4074000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
1A28000
heap
page read and write
408E000
trusted library allocation
page read and write
4109000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
406F000
trusted library allocation
page read and write
1A98000
heap
page read and write
4047000
trusted library allocation
page read and write
34EE000
stack
page read and write
3500000
heap
page read and write
4077000
trusted library allocation
page read and write
4095000
trusted library allocation
page read and write
40FA000
trusted library allocation
page read and write
1A93000
heap
page read and write
1A7C000
heap
page read and write
4152000
trusted library allocation
page read and write
40D9000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
4077000
trusted library allocation
page read and write
4077000
trusted library allocation
page read and write
408D000
trusted library allocation
page read and write
40D2000
trusted library allocation
page read and write
F30000
heap
page read and write
1BCE000
stack
page read and write
1A9A000
heap
page read and write
1A56000
heap
page read and write
4073000
trusted library allocation
page read and write
4069000
trusted library allocation
page read and write
34AD000
stack
page read and write
1A9A000
heap
page read and write
1A90000
heap
page read and write
4078000
trusted library allocation
page read and write
4183000
trusted library allocation
page read and write
1A06000
heap
page read and write
1A93000
heap
page read and write
19FB000
heap
page read and write
1A9C000
heap
page read and write
4045000
trusted library allocation
page read and write
405A000
trusted library allocation
page read and write
405D000
trusted library allocation
page read and write
384E000
stack
page read and write
40E2000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
34F0000
remote allocation
page read and write
4084000
trusted library allocation
page read and write
1A9E000
heap
page read and write
4675000
trusted library allocation
page read and write
40E0000
trusted library allocation
page read and write
41A3000
trusted library allocation
page read and write
1A93000
heap
page read and write
1A90000
heap
page read and write
40E1000
trusted library allocation
page read and write
408E000
trusted library allocation
page read and write
404E000
trusted library allocation
page read and write
405C000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
416B000
trusted library allocation
page read and write
19AE000
stack
page read and write
405F000
trusted library allocation
page read and write
414F000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
1A97000
heap
page read and write
4047000
trusted library allocation
page read and write
1A00000
heap
page read and write
3C90000
heap
page read and write
380F000
stack
page read and write
FC8000
unkown
page execute read
408E000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
4044000
trusted library allocation
page read and write
1A7A000
heap
page read and write
1950000
heap
page read and write
406B000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
1A9E000
heap
page read and write
40BC000
trusted library allocation
page read and write
1A93000
heap
page read and write
4046000
trusted library allocation
page read and write
405D000
trusted library allocation
page read and write
409E000
trusted library allocation
page read and write
1A9E000
heap
page read and write
40E8000
trusted library allocation
page read and write
40E8000
trusted library allocation
page read and write
4159000
trusted library allocation
page read and write
There are 305 hidden memdumps, click here to show them.