IOC Report
ModMenu.exe1.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ModMenu.exe1.exe
"C:\Users\user\Desktop\ModMenu.exe1.exe"
malicious
C:\Users\user\Desktop\ModMenu.exe1.exe
"C:\Users\user\Desktop\ModMenu.exe1.exe"
malicious

URLs

Name
IP
Malicious
crosshairc.life/dAnjhw
malicious
https://citydisco.bet:443/gdJIS
unknown
https://citydisco.bet/gdJISP
unknown
mrodularmall.top/aNzS
https://duckduckgo.com/ac/?q=
unknown
https://citydisco.bet/gdJISime
unknown
bugildbett.top/bAuz
https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
unknown
https://citydisco.bet/gdJISAAAA
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
jowinjoinery.icu/bdWUa
legenassedk.top/bdpWO
https://citydisco.bet/gdJISj
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://citydisco.bet/gdJIS(D
unknown
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
unknown
citydisco.bet/gdJIS
https://citydisco.bet:443/gdJISJ
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://www.ecosia.org/newtab/v20
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
unknown
htardwarehu.icu/Sbdsa
https://citydisco.bet/R
unknown
https://citydisco.bet/
unknown
https://citydisco.bet/gdJISz
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://citydisco.bet/Y
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://citydisco.bet/gdJISs
unknown
https://citydisco.bet/gdJIS
188.114.97.3
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
https://citydisco.bet/(
unknown
cjlaspcorne.icu/DbIps
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
citydisco.bet
188.114.97.3

IPs

IP
Domain
Country
Malicious
188.114.97.3
citydisco.bet
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
859000
heap
page read and write
malicious
3D58000
trusted library allocation
page read and write
F4F000
unkown
page execute and read and write
3D36000
trusted library allocation
page read and write
1625000
heap
page read and write
1603000
heap
page read and write
1636000
heap
page read and write
160E000
heap
page read and write
F4F000
unkown
page write copy
6DE000
stack
page read and write
3F0D000
trusted library allocation
page read and write
3D37000
trusted library allocation
page read and write
160D000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1627000
heap
page read and write
3D40000
trusted library allocation
page read and write
75A000
heap
page read and write
13E0000
heap
page read and write
3D64000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
EF0000
unkown
page readonly
1636000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D61000
trusted library allocation
page read and write
161B000
heap
page read and write
351E000
stack
page read and write
E2B000
stack
page read and write
3D41000
trusted library allocation
page read and write
1603000
heap
page read and write
161B000
heap
page read and write
F56000
unkown
page write copy
3D81000
trusted library allocation
page read and write
377E000
stack
page read and write
3D62000
trusted library allocation
page read and write
3D31000
trusted library allocation
page read and write
3E5D000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
3620000
heap
page read and write
3D7B000
trusted library allocation
page read and write
3DA8000
trusted library allocation
page read and write
3D31000
trusted library allocation
page read and write
1590000
heap
page read and write
3D91000
trusted library allocation
page read and write
1636000
heap
page read and write
3E08000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
1548000
heap
page read and write
3D40000
trusted library allocation
page read and write
1603000
heap
page read and write
3D40000
trusted library allocation
page read and write
1636000
heap
page read and write
1622000
heap
page read and write
3D91000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
3E08000
trusted library allocation
page read and write
1636000
heap
page read and write
3D8F000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D49000
trusted library allocation
page read and write
E80000
heap
page read and write
3D91000
trusted library allocation
page read and write
1636000
heap
page read and write
484D000
trusted library allocation
page read and write
1632000
heap
page read and write
F53000
unkown
page readonly
3D40000
trusted library allocation
page read and write
3D41000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3E95000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
1636000
heap
page read and write
3D97000
trusted library allocation
page read and write
1630000
heap
page read and write
3E75000
trusted library allocation
page read and write
3C1A000
trusted library allocation
page read and write
F44000
unkown
page readonly
158E000
heap
page read and write
3D91000
trusted library allocation
page read and write
15EF000
heap
page read and write
1625000
heap
page read and write
3D37000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
3DAA000
trusted library allocation
page read and write
1625000
heap
page read and write
3D40000
trusted library allocation
page read and write
3D48000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
161E000
heap
page read and write
B1F000
stack
page read and write
33DE000
stack
page read and write
3D40000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
39D0000
trusted library allocation
page readonly
1618000
heap
page read and write
3D91000
trusted library allocation
page read and write
1530000
remote allocation
page read and write
158F000
heap
page read and write
1626000
heap
page read and write
F56000
unkown
page write copy
3D41000
trusted library allocation
page read and write
3D65000
trusted library allocation
page read and write
1615000
heap
page read and write
14F0000
heap
page read and write
3D35000
trusted library allocation
page read and write
EF0000
unkown
page readonly
3D4D000
trusted library allocation
page read and write
1625000
heap
page read and write
D2B000
stack
page read and write
15F4000
heap
page read and write
160A000
heap
page read and write
3D40000
trusted library allocation
page read and write
1624000
heap
page read and write
1627000
heap
page read and write
2DEA000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
39BE000
stack
page read and write
3E3E000
trusted library allocation
page read and write
1599000
heap
page read and write
3D8E000
trusted library allocation
page read and write
1622000
heap
page read and write
3D30000
trusted library allocation
page read and write
1636000
heap
page read and write
3D91000
trusted library allocation
page read and write
F44000
unkown
page readonly
15E6000
heap
page read and write
3D38000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
1636000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D80000
trusted library allocation
page read and write
1599000
heap
page read and write
160A000
heap
page read and write
3DB8000
trusted library allocation
page read and write
F56000
unkown
page write copy
1618000
heap
page read and write
161F000
heap
page read and write
3D79000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D38000
trusted library allocation
page read and write
3D38000
trusted library allocation
page read and write
3D93000
trusted library allocation
page read and write
161F000
heap
page read and write
3D91000
trusted library allocation
page read and write
3DCF000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
750000
heap
page read and write
3D5D000
trusted library allocation
page read and write
1577000
heap
page read and write
315D000
stack
page read and write
161F000
heap
page read and write
3D91000
trusted library allocation
page read and write
1603000
heap
page read and write
3D40000
trusted library allocation
page read and write
1615000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
1599000
heap
page read and write
3D91000
trusted library allocation
page read and write
3E08000
trusted library allocation
page read and write
15EB000
heap
page read and write
3D40000
trusted library allocation
page read and write
162F000
heap
page read and write
3D40000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
F44000
unkown
page readonly
3D5A000
trusted library allocation
page read and write
1574000
heap
page read and write
13E5000
heap
page read and write
3A67000
trusted library allocation
page read and write
3C0F000
stack
page read and write
3D91000
trusted library allocation
page read and write
F4F000
unkown
page write copy
3D3B000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1599000
heap
page read and write
1636000
heap
page read and write
1590000
heap
page read and write
3D40000
trusted library allocation
page read and write
3D61000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
ED0000
heap
page read and write
3E08000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1615000
heap
page read and write
155C000
heap
page read and write
39D1000
trusted library allocation
page execute read
160A000
heap
page read and write
161F000
heap
page read and write
38BD000
stack
page read and write
3D40000
trusted library allocation
page read and write
161B000
heap
page read and write
3D71000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
15FB000
heap
page read and write
3D40000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1622000
heap
page read and write
3A2E000
stack
page read and write
550000
heap
page read and write
3E44000
trusted library allocation
page read and write
3D94000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
161F000
heap
page read and write
161B000
heap
page read and write
3D53000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
5C0000
heap
page read and write
1540000
heap
page read and write
161B000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
F53000
unkown
page readonly
F53000
unkown
page readonly
1626000
heap
page read and write
3DA9000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
F50000
unkown
page read and write
1611000
heap
page read and write
3D8F000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
1603000
heap
page read and write
3D97000
trusted library allocation
page read and write
1636000
heap
page read and write
3D40000
trusted library allocation
page read and write
3D3B000
trusted library allocation
page read and write
4FD000
stack
page read and write
3D4F000
trusted library allocation
page read and write
161F000
heap
page read and write
3D6B000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3A6F000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1617000
heap
page read and write
3D91000
trusted library allocation
page read and write
15EC000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
162C000
heap
page read and write
3630000
heap
page read and write
F53000
unkown
page readonly
3E08000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1627000
heap
page read and write
1530000
remote allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3F15000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
15FC000
heap
page read and write
3D91000
trusted library allocation
page read and write
1624000
heap
page read and write
161D000
heap
page read and write
1619000
heap
page read and write
3DC8000
trusted library allocation
page read and write
1636000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D55000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1574000
heap
page read and write
159C000
heap
page read and write
3DA0000
trusted library allocation
page read and write
EF1000
unkown
page execute read
1625000
heap
page read and write
3D42000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
1530000
remote allocation
page read and write
1636000
heap
page read and write
EF0000
unkown
page readonly
3CA0000
trusted library allocation
page read and write
3D41000
trusted library allocation
page read and write
1636000
heap
page read and write
161B000
heap
page read and write
3D91000
trusted library allocation
page read and write
329D000
stack
page read and write
5AE000
stack
page read and write
3D91000
trusted library allocation
page read and write
1602000
heap
page read and write
A1F000
stack
page read and write
3D91000
trusted library allocation
page read and write
3D6F000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D48000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D5F000
trusted library allocation
page read and write
1625000
heap
page read and write
3D8E000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1636000
heap
page read and write
3D37000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
1622000
heap
page read and write
EF1000
unkown
page execute read
1636000
heap
page read and write
156B000
heap
page read and write
3D91000
trusted library allocation
page read and write
1636000
heap
page read and write
1617000
heap
page read and write
160A000
heap
page read and write
3D85000
trusted library allocation
page read and write
EF0000
unkown
page readonly
3D67000
trusted library allocation
page read and write
1625000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D4F000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
161F000
heap
page read and write
15EF000
heap
page read and write
1622000
heap
page read and write
F56000
unkown
page write copy
15A9000
heap
page read and write
3D91000
trusted library allocation
page read and write
1622000
heap
page read and write
3D40000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
1625000
heap
page read and write
1FD000
stack
page read and write
3D41000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
39D2000
trusted library allocation
page readonly
3FAD000
trusted library allocation
page read and write
158C000
heap
page read and write
15AA000
heap
page read and write
3D64000
trusted library allocation
page read and write
3C17000
trusted library allocation
page read and write
3D70000
trusted library allocation
page read and write
1636000
heap
page read and write
3D8E000
trusted library allocation
page read and write
3A9C000
stack
page read and write
325E000
stack
page read and write
3D38000
trusted library allocation
page read and write
161F000
heap
page read and write
3D31000
trusted library allocation
page read and write
3D6B000
trusted library allocation
page read and write
4339000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
160A000
heap
page read and write
3D67000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D57000
trusted library allocation
page read and write
3D31000
trusted library allocation
page read and write
161F000
heap
page read and write
3D40000
trusted library allocation
page read and write
1636000
heap
page read and write
3D81000
trusted library allocation
page read and write
161F000
heap
page read and write
3D50000
trusted library allocation
page read and write
3D39000
trusted library allocation
page read and write
3D4B000
trusted library allocation
page read and write
3D49000
trusted library allocation
page read and write
560000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D4A000
trusted library allocation
page read and write
1636000
heap
page read and write
361F000
stack
page read and write
3D7D000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
1636000
heap
page read and write
1599000
heap
page read and write
3D7D000
trusted library allocation
page read and write
3D34000
trusted library allocation
page read and write
1622000
heap
page read and write
3D7D000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
15E5000
heap
page read and write
1636000
heap
page read and write
3E04000
trusted library allocation
page read and write
387F000
stack
page read and write
1615000
heap
page read and write
3D91000
trusted library allocation
page read and write
3E04000
trusted library allocation
page read and write
15FB000
heap
page read and write
1624000
heap
page read and write
3D91000
trusted library allocation
page read and write
1636000
heap
page read and write
3D69000
trusted library allocation
page read and write
3D49000
trusted library allocation
page read and write
3DB1000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3DC4000
trusted library allocation
page read and write
1636000
heap
page read and write
161B000
heap
page read and write
EF1000
unkown
page execute read
1636000
heap
page read and write
F44000
unkown
page readonly
6E0000
heap
page read and write
3D3D000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
15A9000
heap
page read and write
3D6B000
trusted library allocation
page read and write
3D8E000
trusted library allocation
page read and write
3B00000
heap
page read and write
3D97000
trusted library allocation
page read and write
1615000
heap
page read and write
3D40000
trusted library allocation
page read and write
339D000
stack
page read and write
3D91000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
1636000
heap
page read and write
34DF000
stack
page read and write
3D91000
trusted library allocation
page read and write
15FE000
heap
page read and write
3D91000
trusted library allocation
page read and write
161F000
heap
page read and write
158C000
heap
page read and write
3D57000
trusted library allocation
page read and write
3A65000
trusted library allocation
page read and write
EF1000
unkown
page execute read
3EE5000
trusted library allocation
page read and write
1622000
heap
page read and write
3D91000
trusted library allocation
page read and write
460000
remote allocation
page execute and read and write
156C000
heap
page read and write
3D91000
trusted library allocation
page read and write
FF0000
heap
page read and write
3D68000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D41000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
3D46000
trusted library allocation
page read and write
15F2000
heap
page read and write
1625000
heap
page read and write
159B000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D3B000
trusted library allocation
page read and write
3F1D000
trusted library allocation
page read and write
75E000
heap
page read and write
1615000
heap
page read and write
3D40000
trusted library allocation
page read and write
1636000
heap
page read and write
F4F000
unkown
page write copy
3F2E000
stack
page read and write
3D41000
trusted library allocation
page read and write
3D36000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
3D67000
trusted library allocation
page read and write
3D38000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1615000
heap
page read and write
3D69000
trusted library allocation
page read and write
3D32000
trusted library allocation
page read and write
3D3A000
trusted library allocation
page read and write
3D97000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
1636000
heap
page read and write
15FD000
heap
page read and write
3D91000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
There are 460 hidden memdumps, click here to show them.