IOC Report
SoftWare.exe1.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SoftWare.exe1.exe
"C:\Users\user\Desktop\SoftWare.exe1.exe"
malicious
C:\Users\user\Desktop\SoftWare.exe1.exe
"C:\Users\user\Desktop\SoftWare.exe1.exe"
malicious

URLs

Name
IP
Malicious
crosshairc.life/dAnjhw
malicious
https://citydisco.bet:443/gdJIS
unknown
https://citydisco.bet//
unknown
mrodularmall.top/aNzS
https://duckduckgo.com/ac/?q=
unknown
https://citydisco.bet/s
unknown
https://citydisco.bet/gdJISDZ0c
unknown
bugildbett.top/bAuz
https://citydisco.bet:443/gdJISl
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
jowinjoinery.icu/bdWUa
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
legenassedk.top/bdpWO
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
citydisco.bet/gdJIS
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://www.ecosia.org/newtab/v20w
unknown
htardwarehu.icu/Sbdsa
https://citydisco.bet/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://citydisco.bet/gdJIS
188.114.96.3
https://citydisco.bet/gdJISt4
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
cjlaspcorne.icu/DbIps
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
citydisco.bet
188.114.96.3

IPs

IP
Domain
Country
Malicious
188.114.96.3
citydisco.bet
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
1273000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1354000
heap
page read and write
3A97000
trusted library allocation
page read and write
3AA2000
trusted library allocation
page read and write
7D0000
unkown
page readonly
3E34000
trusted library allocation
page read and write
3A98000
trusted library allocation
page read and write
3A9D000
trusted library allocation
page read and write
134A000
heap
page read and write
1354000
heap
page read and write
31FD000
stack
page read and write
3B19000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
3AC9000
trusted library allocation
page read and write
3ABF000
trusted library allocation
page read and write
153F000
stack
page read and write
824000
unkown
page readonly
1375000
heap
page read and write
3A99000
trusted library allocation
page read and write
830000
unkown
page read and write
3B72000
trusted library allocation
page read and write
3AB5000
trusted library allocation
page read and write
3AB5000
trusted library allocation
page read and write
3890000
trusted library allocation
page readonly
12AA000
heap
page read and write
3ACE000
trusted library allocation
page read and write
3AC4000
trusted library allocation
page read and write
30A0000
heap
page read and write
136B000
heap
page read and write
3AA4000
trusted library allocation
page read and write
105E000
stack
page read and write
1325000
heap
page read and write
3A92000
trusted library allocation
page read and write
12AC000
heap
page read and write
3AB5000
trusted library allocation
page read and write
1341000
heap
page read and write
136B000
heap
page read and write
35BF000
stack
page read and write
3AA9000
trusted library allocation
page read and write
3AF7000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
3B6B000
trusted library allocation
page read and write
1375000
heap
page read and write
1354000
heap
page read and write
12DB000
heap
page read and write
12DC000
heap
page read and write
3AF9000
trusted library allocation
page read and write
12D0000
heap
page read and write
3AA4000
trusted library allocation
page read and write
34BE000
stack
page read and write
1343000
heap
page read and write
134A000
heap
page read and write
1369000
heap
page read and write
12D3000
heap
page read and write
1374000
heap
page read and write
3AA9000
trusted library allocation
page read and write
1375000
heap
page read and write
1343000
heap
page read and write
3AB5000
trusted library allocation
page read and write
1359000
heap
page read and write
824000
unkown
page readonly
3D55000
trusted library allocation
page read and write
12D3000
heap
page read and write
3AB5000
trusted library allocation
page read and write
FDE000
stack
page read and write
3A94000
trusted library allocation
page read and write
82F000
unkown
page write copy
136B000
heap
page read and write
3D79000
trusted library allocation
page read and write
3AC8000
trusted library allocation
page read and write
136B000
heap
page read and write
3A91000
trusted library allocation
page read and write
3AB5000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
3B21000
trusted library allocation
page read and write
35D0000
remote allocation
page read and write
333E000
stack
page read and write
12D0000
heap
page read and write
1375000
heap
page read and write
3892000
trusted library allocation
page readonly
136B000
heap
page read and write
1375000
heap
page read and write
3B4B000
trusted library allocation
page read and write
143F000
stack
page read and write
12D4000
heap
page read and write
3AA4000
trusted library allocation
page read and write
3B98000
trusted library allocation
page read and write
3AC7000
trusted library allocation
page read and write
1366000
heap
page read and write
836000
unkown
page write copy
10AE000
heap
page read and write
3D58000
trusted library allocation
page read and write
3AD9000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
1342000
heap
page read and write
3B3B000
trusted library allocation
page read and write
7D0000
unkown
page readonly
3AA4000
trusted library allocation
page read and write
1343000
heap
page read and write
133D000
heap
page read and write
415E000
stack
page read and write
12CD000
heap
page read and write
12D3000
heap
page read and write
1356000
heap
page read and write
3B14000
trusted library allocation
page read and write
3AA2000
trusted library allocation
page read and write
3EC4000
trusted library allocation
page read and write
1363000
heap
page read and write
12DB000
heap
page read and write
1359000
heap
page read and write
3AB5000
trusted library allocation
page read and write
3B5B000
trusted library allocation
page read and write
F90000
heap
page read and write
1359000
heap
page read and write
1325000
heap
page read and write
3AD5000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
3AB7000
trusted library allocation
page read and write
3A98000
trusted library allocation
page read and write
1331000
heap
page read and write
3AC9000
trusted library allocation
page read and write
1359000
heap
page read and write
3AB5000
trusted library allocation
page read and write
136C000
heap
page read and write
3E2C000
trusted library allocation
page read and write
12DB000
heap
page read and write
F3D000
stack
page read and write
3ABB000
trusted library allocation
page read and write
3A96000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
3E24000
trusted library allocation
page read and write
3AC8000
trusted library allocation
page read and write
4961000
trusted library allocation
page read and write
82F000
unkown
page write copy
3ABE000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
134C000
heap
page read and write
1343000
heap
page read and write
3C51000
heap
page read and write
1280000
heap
page read and write
136C000
heap
page read and write
3AB5000
trusted library allocation
page read and write
7D1000
unkown
page execute read
3AA4000
trusted library allocation
page read and write
3B3A000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
1316000
heap
page read and write
836000
unkown
page write copy
3D51000
trusted library allocation
page read and write
1353000
heap
page read and write
11F7000
heap
page read and write
135D000
heap
page read and write
1346000
heap
page read and write
12EC000
heap
page read and write
3A90000
trusted library allocation
page read and write
1362000
heap
page read and write
1361000
heap
page read and write
1327000
heap
page read and write
134D000
heap
page read and write
3AED000
trusted library allocation
page read and write
30FD000
stack
page read and write
3AC4000
trusted library allocation
page read and write
3B3C000
trusted library allocation
page read and write
1327000
heap
page read and write
12D0000
heap
page read and write
3AB0000
trusted library allocation
page read and write
136C000
heap
page read and write
11F0000
heap
page read and write
10FB000
stack
page read and write
1357000
heap
page read and write
3AC9000
trusted library allocation
page read and write
3DAC000
trusted library allocation
page read and write
3B3A000
trusted library allocation
page read and write
10AA000
heap
page read and write
3B2A000
trusted library allocation
page read and write
12B5000
heap
page read and write
DAB000
stack
page read and write
3AA8000
trusted library allocation
page read and write
1364000
heap
page read and write
136F000
heap
page read and write
1343000
heap
page read and write
3A9B000
trusted library allocation
page read and write
10A0000
heap
page read and write
833000
unkown
page readonly
833000
unkown
page readonly
3DFC000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
12B2000
heap
page read and write
1369000
heap
page read and write
3AA8000
trusted library allocation
page read and write
1327000
heap
page read and write
12DA000
heap
page read and write
12ED000
heap
page read and write
12D1000
heap
page read and write
136B000
heap
page read and write
3A98000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
12CD000
heap
page read and write
3AB5000
trusted library allocation
page read and write
7D1000
unkown
page execute read
3AA4000
trusted library allocation
page read and write
136D000
heap
page read and write
1343000
heap
page read and write
1366000
heap
page read and write
3AD9000
trusted library allocation
page read and write
136B000
heap
page read and write
3AB5000
trusted library allocation
page read and write
4456000
trusted library allocation
page read and write
373F000
stack
page read and write
1375000
heap
page read and write
12AC000
heap
page read and write
3A9D000
trusted library allocation
page read and write
11F5000
heap
page read and write
3D89000
trusted library allocation
page read and write
135F000
heap
page read and write
1370000
heap
page read and write
1374000
heap
page read and write
3AC7000
trusted library allocation
page read and write
2D50000
heap
page read and write
1366000
heap
page read and write
3A95000
trusted library allocation
page read and write
1349000
heap
page read and write
1331000
heap
page read and write
3AB5000
trusted library allocation
page read and write
12B2000
heap
page read and write
12B2000
heap
page read and write
135B000
heap
page read and write
3B22000
trusted library allocation
page read and write
1354000
heap
page read and write
12D3000
heap
page read and write
3A97000
trusted library allocation
page read and write
3ACF000
trusted library allocation
page read and write
1361000
heap
page read and write
3A91000
trusted library allocation
page read and write
136D000
heap
page read and write
337D000
stack
page read and write
12B3000
heap
page read and write
82F000
unkown
page write copy
12DB000
heap
page read and write
135B000
heap
page read and write
3A98000
trusted library allocation
page read and write
1362000
heap
page read and write
3AA9000
trusted library allocation
page read and write
1359000
heap
page read and write
3AC3000
trusted library allocation
page read and write
1369000
heap
page read and write
7D1000
unkown
page execute read
3AB5000
trusted library allocation
page read and write
3ABA000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
3AD3000
trusted library allocation
page read and write
11F7000
heap
page read and write
3AA4000
trusted library allocation
page read and write
1373000
heap
page read and write
133C000
heap
page read and write
1375000
heap
page read and write
12EC000
heap
page read and write
3AA9000
trusted library allocation
page read and write
12CF000
heap
page read and write
3A97000
trusted library allocation
page read and write
1361000
heap
page read and write
377E000
stack
page read and write
3AA7000
trusted library allocation
page read and write
35D0000
remote allocation
page read and write
3AB5000
trusted library allocation
page read and write
136B000
heap
page read and write
1343000
heap
page read and write
3AA4000
trusted library allocation
page read and write
1349000
heap
page read and write
3AAD000
trusted library allocation
page read and write
3B0D000
trusted library allocation
page read and write
1343000
heap
page read and write
3D5B000
trusted library allocation
page read and write
136B000
heap
page read and write
129C000
heap
page read and write
387E000
stack
page read and write
12ED000
heap
page read and write
3AA0000
trusted library allocation
page read and write
3A5C000
stack
page read and write
136C000
heap
page read and write
3AA4000
trusted library allocation
page read and write
1369000
heap
page read and write
1370000
heap
page read and write
1343000
heap
page read and write
1375000
heap
page read and write
1363000
heap
page read and write
3B0D000
trusted library allocation
page read and write
824000
unkown
page readonly
836000
unkown
page write copy
82F000
unkown
page execute and read and write
1010000
heap
page read and write
11E0000
heap
page read and write
136C000
heap
page read and write
3A9A000
trusted library allocation
page read and write
1343000
heap
page read and write
E3D000
stack
page read and write
3A98000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
3AAF000
trusted library allocation
page read and write
3B9E000
trusted library allocation
page read and write
1324000
heap
page read and write
3A91000
trusted library allocation
page read and write
12DD000
heap
page read and write
347D000
stack
page read and write
833000
unkown
page readonly
1349000
heap
page read and write
1100000
heap
page read and write
134C000
heap
page read and write
3C51000
heap
page read and write
3891000
trusted library allocation
page execute read
363E000
stack
page read and write
824000
unkown
page readonly
3A92000
trusted library allocation
page read and write
3A92000
trusted library allocation
page read and write
12EC000
heap
page read and write
12D3000
heap
page read and write
1353000
heap
page read and write
1374000
heap
page read and write
7D0000
unkown
page readonly
12D3000
heap
page read and write
12AA000
heap
page read and write
1341000
heap
page read and write
12DB000
heap
page read and write
131A000
heap
page read and write
1369000
heap
page read and write
136B000
heap
page read and write
1354000
heap
page read and write
3AA5000
trusted library allocation
page read and write
3BCC000
trusted library allocation
page read and write
12DB000
heap
page read and write
3D74000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
1354000
heap
page read and write
132D000
heap
page read and write
12EC000
heap
page read and write
3AA6000
trusted library allocation
page read and write
3B3B000
trusted library allocation
page read and write
2D39000
trusted library allocation
page read and write
461000
remote allocation
page execute and read and write
7D1000
unkown
page execute read
3AAD000
trusted library allocation
page read and write
3A94000
trusted library allocation
page read and write
1343000
heap
page read and write
3B0D000
trusted library allocation
page read and write
3ACB000
trusted library allocation
page read and write
1326000
heap
page read and write
136B000
heap
page read and write
1375000
heap
page read and write
3A98000
trusted library allocation
page read and write
1369000
heap
page read and write
3AC2000
trusted library allocation
page read and write
3AA4000
trusted library allocation
page read and write
F80000
heap
page read and write
3AB5000
trusted library allocation
page read and write
3AC1000
trusted library allocation
page read and write
3C50000
heap
page read and write
3A96000
trusted library allocation
page read and write
1288000
heap
page read and write
3AA7000
trusted library allocation
page read and write
1316000
heap
page read and write
3B0D000
trusted library allocation
page read and write
1349000
heap
page read and write
12D3000
heap
page read and write
3AB7000
trusted library allocation
page read and write
1325000
heap
page read and write
1325000
heap
page read and write
833000
unkown
page readonly
3D50000
trusted library allocation
page read and write
35D0000
remote allocation
page read and write
1710000
heap
page read and write
3AA4000
trusted library allocation
page read and write
1366000
heap
page read and write
1359000
heap
page read and write
1370000
heap
page read and write
1375000
heap
page read and write
3AB5000
trusted library allocation
page read and write
3AC9000
trusted library allocation
page read and write
3B4B000
trusted library allocation
page read and write
12B2000
heap
page read and write
3ABF000
trusted library allocation
page read and write
1375000
heap
page read and write
323E000
stack
page read and write
12CD000
heap
page read and write
3A80000
heap
page read and write
3AB5000
trusted library allocation
page read and write
135B000
heap
page read and write
3F58000
trusted library allocation
page read and write
1330000
heap
page read and write
1361000
heap
page read and write
136B000
heap
page read and write
1346000
heap
page read and write
7D0000
unkown
page readonly
1359000
heap
page read and write
3A95000
trusted library allocation
page read and write
836000
unkown
page write copy
3AB5000
trusted library allocation
page read and write
There are 388 hidden memdumps, click here to show them.