IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
plaintediousidowsko.shop
malicious
acceptabledcooeprs.shop
malicious
zippyfinickysofwps.shop
malicious
https://greetclassifytalk.shop/api
104.21.51.78
malicious
obsceneclassyjuwks.shop
malicious
holicisticscrarws.shop
malicious
greetclassifytalk.shop
malicious
boredimperissvieos.shop
malicious
sweetsquarediaslw.shop
malicious
miniaturefinerninewjs.shop
malicious
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8z
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.sandbox.midtrans.comtimestamp
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.midtrans.cominvalid
unknown
https://greetclassifytalk.shop/l
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://protobuf.dev/reference/go/faq#
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://greetclassifytalk.shop/apiE=
unknown
https://greetclassifytalk.shop/
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictMpohxHrXTsWUtcYRySvTtdvgYoOzPaTLHQkyDGHWUOSc
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://fastcopy.jpF
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
https://greetclassifytalk.shop/apio
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://greetclassifytalk.shop/K
unknown
https://fastcopy.jp
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://greetclassifytalk.shop/apiu
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://greetclassifytalk.shop:443/api6
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
greetclassifytalk.shop
104.21.51.78
malicious

IPs

IP
Domain
Country
Malicious
104.21.51.78
greetclassifytalk.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1C839B22000
direct allocation
page read and write
53B9000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
5357000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
C000025000
direct allocation
page read and write
5411000
trusted library allocation
page read and write
7FF663222000
unkown
page write copy
5447000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
5328000
trusted library allocation
page read and write
5351000
trusted library allocation
page read and write
1C839A90000
heap
page read and write
5321000
trusted library allocation
page read and write
C0000BE000
direct allocation
page read and write
4A209FF000
stack
page read and write
53B7000
trusted library allocation
page read and write
C000006000
direct allocation
page read and write
C0004DF000
direct allocation
page read and write
5532000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
1C839ACB000
direct allocation
page read and write
53B2000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
C000148000
direct allocation
page read and write
536A000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
C000098000
direct allocation
page read and write
1C839B58000
heap
page read and write
537D000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
54CF000
trusted library allocation
page read and write
C00008E000
direct allocation
page read and write
5324000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
C0000F2000
direct allocation
page read and write
536A000
trusted library allocation
page read and write
3087000
heap
page read and write
5320000
trusted library allocation
page read and write
C000045000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
E7E000
stack
page read and write
53E8000
trusted library allocation
page read and write
C00009A000
direct allocation
page read and write
53D8000
trusted library allocation
page read and write
3080000
heap
page read and write
5411000
trusted library allocation
page read and write
7FF663228000
unkown
page write copy
5408000
trusted library allocation
page read and write
7FF663679000
unkown
page write copy
C00009C000
direct allocation
page read and write
53B7000
trusted library allocation
page read and write
2F49000
heap
page read and write
53E8000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
C000027000
direct allocation
page read and write
540B000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
7FF663675000
unkown
page write copy
53AB000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
C00000E000
direct allocation
page read and write
540B000
trusted library allocation
page read and write
B40000
remote allocation
page execute and read and write
5597000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
C000400000
direct allocation
page read and write
5368000
trusted library allocation
page read and write
C000012000
direct allocation
page read and write
C000002000
direct allocation
page read and write
1C839AC0000
direct allocation
page read and write
5408000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
C000018000
direct allocation
page read and write
53DA000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
2FD0000
heap
page read and write
5408000
trusted library allocation
page read and write
1C839AC9000
direct allocation
page read and write
2FC7000
heap
page read and write
5357000
trusted library allocation
page read and write
C0000DE000
direct allocation
page read and write
5366000
trusted library allocation
page read and write
B09000
stack
page read and write
53C8000
trusted library allocation
page read and write
C00004E000
direct allocation
page read and write
7FF66325E000
unkown
page write copy
2F40000
heap
page read and write
5421000
heap
page read and write
5336000
trusted library allocation
page read and write
4CD0000
heap
page read and write
536A000
trusted library allocation
page read and write
C00003C000
direct allocation
page read and write
5368000
trusted library allocation
page read and write
5347000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
BE0000
heap
page read and write
5357000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
521F000
stack
page read and write
7FF663676000
unkown
page write copy
2F61000
heap
page read and write
4A203FE000
stack
page read and write
5364000
trusted library allocation
page read and write
1C839B30000
direct allocation
page read and write
4CBE000
stack
page read and write
5334000
trusted library allocation
page read and write
C0000F8000
direct allocation
page read and write
537C000
trusted library allocation
page read and write
7FF663222000
unkown
page read and write
2FCC000
heap
page read and write
536E000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
7FF663225000
unkown
page read and write
5406000
trusted library allocation
page read and write
C000037000
direct allocation
page read and write
540F000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
2FCA000
heap
page read and write
5369000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
5369000
trusted library allocation
page read and write
4A1FBFD000
stack
page read and write
5507000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
4BFD000
stack
page read and write
5353000
trusted library allocation
page read and write
C000054000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
536A000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
C000088000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
1C839AC4000
direct allocation
page read and write
533F000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
4A1FDFE000
stack
page read and write
53E8000
trusted library allocation
page read and write
5521000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
C000366000
direct allocation
page read and write
534F000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
C000462000
direct allocation
page read and write
53B5000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
4AFE000
stack
page read and write
53B7000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
7FF662F31000
unkown
page execute read
540E000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
C000029000
direct allocation
page read and write
53C8000
trusted library allocation
page read and write
2FC8000
heap
page read and write
5411000
trusted library allocation
page read and write
2FC1000
heap
page read and write
5364000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
4A1FFFE000
stack
page read and write
533A000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
1C839D70000
direct allocation
page read and write
5364000
trusted library allocation
page read and write
C0001FC000
direct allocation
page read and write
5521000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
C000020000
direct allocation
page read and write
C0004D4000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
5411000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
C0000A0000
direct allocation
page read and write
BD0000
heap
page read and write
5328000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
4A201FC000
stack
page read and write
2F00000
remote allocation
page read and write
C000094000
direct allocation
page read and write
5401000
trusted library allocation
page read and write
7FF66366B000
unkown
page read and write
533F000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
5559000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
B97000
remote allocation
page execute and read and write
C0000B0000
direct allocation
page read and write
325F000
stack
page read and write
5408000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
1C87F030000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
1C87F087000
direct allocation
page read and write
5354000
trusted library allocation
page read and write
C000041000
direct allocation
page read and write
5362000
trusted library allocation
page read and write
2F65000
heap
page read and write
C000010000
direct allocation
page read and write
535F000
trusted library allocation
page read and write
C000063000
direct allocation
page read and write
5878000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
C00053F000
direct allocation
page read and write
5328000
trusted library allocation
page read and write
3085000
heap
page read and write
C0000E8000
direct allocation
page read and write
C000030000
direct allocation
page read and write
7FF663262000
unkown
page readonly
5322000
trusted library allocation
page read and write
2FC4000
heap
page read and write
53FD000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
1C87EE99000
direct allocation
page read and write
540B000
trusted library allocation
page read and write
1C87EE94000
direct allocation
page read and write
533F000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
2FBA000
heap
page read and write
2FCA000
heap
page read and write
533F000
trusted library allocation
page read and write
5420000
heap
page read and write
1C87EED0000
direct allocation
page read and write
536A000
trusted library allocation
page read and write
C000056000
direct allocation
page read and write
1C839A70000
heap
page read and write
5368000
trusted library allocation
page read and write
1C839D80000
heap
page read and write
5990000
heap
page read and write
C0000D2000
direct allocation
page read and write
7FF66368E000
unkown
page readonly
540B000
trusted library allocation
page read and write
2F00000
remote allocation
page read and write
5367000
trusted library allocation
page read and write
5328000
trusted library allocation
page read and write
2F55000
heap
page read and write
5521000
trusted library allocation
page read and write
C000092000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
7FF663675000
unkown
page read and write
53C8000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
5539000
trusted library allocation
page read and write
1C87EFF1000
direct allocation
page read and write
305D000
stack
page read and write
533F000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
7FF663226000
unkown
page write copy
540E000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
C000100000
direct allocation
page read and write
5408000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
C000022000
direct allocation
page read and write
5408000
trusted library allocation
page read and write
7FF663260000
unkown
page read and write
5357000
trusted library allocation
page read and write
542E000
trusted library allocation
page read and write
1C87EE90000
direct allocation
page read and write
7FF663616000
unkown
page read and write
53BC000
trusted library allocation
page read and write
C0000EA000
direct allocation
page read and write
5411000
trusted library allocation
page read and write
ACB000
stack
page read and write
53B0000
trusted library allocation
page read and write
5369000
trusted library allocation
page read and write
2F65000
heap
page read and write
1C839B40000
direct allocation
page read and write
54FF000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
C0000CE000
direct allocation
page read and write
53FD000
trusted library allocation
page read and write
576E000
stack
page read and write
536A000
trusted library allocation
page read and write
7FF662F31000
unkown
page execute read
536E000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
C00000A000
direct allocation
page read and write
2FC7000
heap
page read and write
C0000BC000
direct allocation
page read and write
54F7000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
7FF662F30000
unkown
page readonly
57EE000
trusted library allocation
page read and write
2F20000
heap
page read and write
7FF66368E000
unkown
page readonly
C0000B2000
direct allocation
page read and write
53D8000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
63B4000
trusted library allocation
page read and write
5528000
trusted library allocation
page read and write
2F65000
heap
page read and write
5408000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
7FF663670000
unkown
page read and write
5364000
trusted library allocation
page read and write
4A205FF000
stack
page read and write
1C87F090000
direct allocation
page read and write
C000080000
direct allocation
page read and write
5411000
trusted library allocation
page read and write
C000090000
direct allocation
page read and write
540E000
trusted library allocation
page read and write
7FF663644000
unkown
page read and write
C000480000
direct allocation
page read and write
7FF663224000
unkown
page write copy
2FC1000
heap
page read and write
537E000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
5551000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
C0000D8000
direct allocation
page read and write
53D8000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
C000014000
direct allocation
page read and write
1C87F090000
direct allocation
page read and write
1C839990000
heap
page read and write
5411000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
E3E000
stack
page read and write
7FF66363D000
unkown
page read and write
5362000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
53D8000
trusted library allocation
page read and write
531E000
stack
page read and write
532D000
trusted library allocation
page read and write
53D8000
trusted library allocation
page read and write
2F5F000
heap
page read and write
536D000
trusted library allocation
page read and write
E80000
heap
page read and write
C000086000
direct allocation
page read and write
1C839B20000
direct allocation
page read and write
545F000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
2F6C000
heap
page read and write
540B000
trusted library allocation
page read and write
C000035000
direct allocation
page read and write
7FF663679000
unkown
page write copy
5367000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
C0000E6000
direct allocation
page read and write
4C7E000
stack
page read and write
5428000
trusted library allocation
page read and write
C000000000
direct allocation
page read and write
5411000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
C00045D000
direct allocation
page read and write
5337000
trusted library allocation
page read and write
2FC8000
heap
page read and write
C000052000
direct allocation
page read and write
53DA000
trusted library allocation
page read and write
4DDD000
stack
page read and write
2F5F000
heap
page read and write
C0000B8000
direct allocation
page read and write
5401000
trusted library allocation
page read and write
57AF000
stack
page read and write
C00001C000
direct allocation
page read and write
5350000
trusted library allocation
page read and write
2FB2000
heap
page read and write
7FF662F30000
unkown
page readonly
536A000
trusted library allocation
page read and write
1C839D50000
direct allocation
page read and write
540E000
trusted library allocation
page read and write
2F00000
remote allocation
page read and write
C00000C000
direct allocation
page read and write
5331000
trusted library allocation
page read and write
7FF663227000
unkown
page read and write
1C839B50000
heap
page read and write
C000047000
direct allocation
page read and write
C000061000
direct allocation
page read and write
53DA000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
C000016000
direct allocation
page read and write
4C3D000
stack
page read and write
7FF663262000
unkown
page readonly
53AB000
trusted library allocation
page read and write
5EA2000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
2FCC000
heap
page read and write
C000454000
direct allocation
page read and write
53D9000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
4A207FE000
stack
page read and write
5362000
trusted library allocation
page read and write
7FF66324E000
unkown
page read and write
53E8000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
C0000FA000
direct allocation
page read and write
C000069000
direct allocation
page read and write
532D000
trusted library allocation
page read and write
53D8000
trusted library allocation
page read and write
C0000EE000
direct allocation
page read and write
53E6000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
534F000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
C0000C8000
direct allocation
page read and write
538F000
trusted library allocation
page read and write
1C87F0D0000
direct allocation
page read and write
1C839D85000
heap
page read and write
53CB000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
C000058000
direct allocation
page read and write
5328000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5357000
trusted library allocation
page read and write
5322000
trusted library allocation
page read and write
C0000C0000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
2F28000
heap
page read and write
5334000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
C000096000
direct allocation
page read and write
5383000
trusted library allocation
page read and write
C000050000
direct allocation
page read and write
There are 467 hidden memdumps, click here to show them.