IOC Report
92s4OjHVFf.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\92s4OjHVFf.exe
"C:\Users\user\Desktop\92s4OjHVFf.exe"
malicious

URLs

Name
IP
Malicious
towerxxuytwi.xyz
malicious
contintnetksows.shop
malicious
penetratedpoopp.xyz
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
potterryisiw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://foodypannyjsud.shop/api2
unknown
https://foodypannyjsud.shop/s
unknown
https://foodypannyjsud.shop/w
unknown
https://foodypannyjsud.shop/api:
unknown
https://foodypannyjsud.shop/jh4
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://foodypannyjsud.shop/raw
unknown
https://foodypannyjsud.shop/a
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://foodypannyjsud.shop/F9r
unknown
https://foodypannyjsud.shop/api
188.114.97.3
https://foodypannyjsud.shop/pir
unknown
https://foodypannyjsud.shop/piw
unknown
https://foodypannyjsud.shop:443/apiBrowser
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://foodypannyjsud.shop/s~
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://foodypannyjsud.shop/A
unknown
https://foodypannyjsud.shop/pie
unknown
https://foodypannyjsud.shop/pi
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://foodypannyjsud.shop/he
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://foodypannyjsud.shop/bm
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://foodypannyjsud.shop/obZ
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://foodypannyjsud.shop/ob
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://foodypannyjsud.shop/apili
unknown
https://www.ecosia.org/newtab/
unknown
https://foodypannyjsud.shop/apie
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://foodypannyjsud.shop/
unknown
https://foodypannyjsud.shop/apih
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://foodypannyjsud.shop/apiT
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://foodypannyjsud.shop/bu:
unknown
https://foodypannyjsud.shop/apiF
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
foodypannyjsud.shop
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
foodypannyjsud.shop
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
CAD000
unkown
page readonly
malicious
C70000
unkown
page readonly
41D8000
trusted library allocation
page read and write
1B4A000
heap
page read and write
41F0000
trusted library allocation
page read and write
45E2000
trusted library allocation
page read and write
1B64000
heap
page read and write
1B89000
heap
page read and write
1AED000
heap
page read and write
1AEE000
heap
page read and write
1B89000
heap
page read and write
1B82000
heap
page read and write
1B87000
heap
page read and write
41A9000
trusted library allocation
page read and write
1B14000
heap
page read and write
419F000
trusted library allocation
page read and write
41D8000
trusted library allocation
page read and write
1AD7000
heap
page read and write
1B4A000
heap
page read and write
1B4A000
heap
page read and write
1B4E000
heap
page read and write
4F67000
trusted library allocation
page read and write
41DA000
trusted library allocation
page read and write
1B64000
heap
page read and write
41C9000
trusted library allocation
page read and write
1B77000
heap
page read and write
4199000
trusted library allocation
page read and write
1B68000
heap
page read and write
1B02000
heap
page read and write
1B87000
heap
page read and write
1AEE000
heap
page read and write
1B66000
heap
page read and write
41AB000
trusted library allocation
page read and write
41E1000
trusted library allocation
page read and write
4181000
trusted library allocation
page read and write
41B7000
trusted library allocation
page read and write
1584000
unkown
page readonly
1B77000
heap
page read and write
41AB000
trusted library allocation
page read and write
1B87000
heap
page read and write
1B02000
heap
page read and write
419F000
trusted library allocation
page read and write
1B7A000
heap
page read and write
36CD000
stack
page read and write
1B64000
heap
page read and write
1AED000
heap
page read and write
420C000
trusted library allocation
page read and write
17F0000
heap
page read and write
41C0000
trusted library allocation
page read and write
41A4000
trusted library allocation
page read and write
1B02000
heap
page read and write
41A9000
trusted library allocation
page read and write
1B56000
heap
page read and write
1AD0000
heap
page read and write
41D3000
trusted library allocation
page read and write
1B87000
heap
page read and write
1AEE000
heap
page read and write
4188000
trusted library allocation
page read and write
1B4A000
heap
page read and write
1B66000
heap
page read and write
1B4E000
heap
page read and write
1AEE000
heap
page read and write
41A1000
trusted library allocation
page read and write
1B77000
heap
page read and write
1AFD000
heap
page read and write
FA5000
unkown
page execute read
1B89000
heap
page read and write
1B7D000
heap
page read and write
4181000
trusted library allocation
page read and write
1AD7000
heap
page read and write
1B87000
heap
page read and write
1B87000
heap
page read and write
3F2E000
stack
page read and write
1B89000
heap
page read and write
1B89000
heap
page read and write
420A000
trusted library allocation
page read and write
1B77000
heap
page read and write
1B87000
heap
page read and write
1B4E000
heap
page read and write
1B87000
heap
page read and write
1B64000
heap
page read and write
1B02000
heap
page read and write
420B000
trusted library allocation
page read and write
1B64000
heap
page read and write
1B61000
heap
page read and write
1B4A000
heap
page read and write
44DF000
stack
page read and write
1B4E000
heap
page read and write
41C9000
trusted library allocation
page read and write
1B64000
heap
page read and write
1B87000
heap
page read and write
C71000
unkown
page execute read
1B66000
heap
page read and write
41EE000
trusted library allocation
page read and write
455A000
trusted library allocation
page read and write
4192000
trusted library allocation
page read and write
1B77000
heap
page read and write
1B4A000
heap
page read and write
42E1000
trusted library allocation
page read and write
1B4E000
heap
page read and write
1B64000
heap
page read and write
1B87000
heap
page read and write
41E3000
trusted library allocation
page read and write
1B89000
heap
page read and write
4198000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
4199000
trusted library allocation
page read and write
1B4A000
heap
page read and write
1B4A000
heap
page read and write
1B02000
heap
page read and write
1B02000
heap
page read and write
1B6D000
heap
page read and write
1B02000
heap
page read and write
1B5A000
heap
page read and write
4A5E000
trusted library allocation
page read and write
43F9000
trusted library allocation
page read and write
1B87000
heap
page read and write
1A57000
heap
page read and write
420B000
trusted library allocation
page read and write
1B64000
heap
page read and write
1B77000
heap
page read and write
1B64000
heap
page read and write
1B6D000
heap
page read and write
1B87000
heap
page read and write
1AEE000
heap
page read and write
402F000
stack
page read and write
1B4A000
heap
page read and write
1AED000
heap
page read and write
4186000
trusted library allocation
page read and write
1B4E000
heap
page read and write
4200000
trusted library allocation
page read and write
41B9000
trusted library allocation
page read and write
1AF0000
heap
page read and write
1B87000
heap
page read and write
41B7000
trusted library allocation
page read and write
1B4E000
heap
page read and write
1B7D000
heap
page read and write
1B8F000
heap
page read and write
37ED000
stack
page read and write
4183000
trusted library allocation
page read and write
1B51000
heap
page read and write
41EC000
trusted library allocation
page read and write
1B02000
heap
page read and write
41A7000
trusted library allocation
page read and write
41AF000
trusted library allocation
page read and write
41C8000
trusted library allocation
page read and write
4181000
trusted library allocation
page read and write
368D000
stack
page read and write
41B9000
trusted library allocation
page read and write
1B89000
heap
page read and write
1B87000
heap
page read and write
41D8000
trusted library allocation
page read and write
1B4E000
heap
page read and write
1B02000
heap
page read and write
1B4E000
heap
page read and write
41AF000
trusted library allocation
page read and write
406D000
stack
page read and write
1B02000
heap
page read and write
1B4A000
heap
page read and write
41DE000
trusted library allocation
page read and write
1B02000
heap
page read and write
1B77000
heap
page read and write
4540000
heap
page read and write
1B02000
heap
page read and write
1B87000
heap
page read and write
1B64000
heap
page read and write
1B64000
heap
page read and write
1B89000
heap
page read and write
1B89000
heap
page read and write
1B81000
heap
page read and write
41B6000
trusted library allocation
page read and write
4369000
trusted library allocation
page read and write
1B64000
heap
page read and write
1B82000
heap
page read and write
4180000
trusted library allocation
page read and write
1A50000
heap
page read and write
41AB000
trusted library allocation
page read and write
1B4E000
heap
page read and write
1B02000
heap
page read and write
1B4A000
heap
page read and write
4187000
trusted library allocation
page read and write
1B75000
heap
page read and write
1AEE000
heap
page read and write
41D2000
trusted library allocation
page read and write
3A2E000
stack
page read and write
1B51000
heap
page read and write
1AD7000
heap
page read and write
418F000
trusted library allocation
page read and write
1B66000
heap
page read and write
1B87000
heap
page read and write
41E5000
trusted library allocation
page read and write
1B89000
heap
page read and write
1B4A000
heap
page read and write
41AB000
trusted library allocation
page read and write
169B000
stack
page read and write
1B02000
heap
page read and write
1B7B000
heap
page read and write
1AAA000
heap
page read and write
4186000
trusted library allocation
page read and write
41B6000
trusted library allocation
page read and write
1B98000
heap
page read and write
41F0000
trusted library allocation
page read and write
41DC000
trusted library allocation
page read and write
1B4E000
heap
page read and write
1B64000
heap
page read and write
1B87000
heap
page read and write
1B64000
heap
page read and write
1B4A000
heap
page read and write
1AD2000
heap
page read and write
1AEE000
heap
page read and write
1B89000
heap
page read and write
1B62000
heap
page read and write
1B02000
heap
page read and write
1B02000
heap
page read and write
1B89000
heap
page read and write
1A55000
heap
page read and write
4191000
trusted library allocation
page read and write
1B98000
heap
page read and write
3A6E000
stack
page read and write
1B4A000
heap
page read and write
41B8000
trusted library allocation
page read and write
4181000
trusted library allocation
page read and write
1B51000
heap
page read and write
1AEE000
heap
page read and write
1B4A000
heap
page read and write
1B4E000
heap
page read and write
1A00000
heap
page read and write
1B77000
heap
page read and write
1B87000
heap
page read and write
4188000
trusted library allocation
page read and write
4188000
trusted library allocation
page read and write
1AEB000
heap
page read and write
1B4A000
heap
page read and write
41B3000
trusted library allocation
page read and write
41ED000
trusted library allocation
page read and write
1B62000
heap
page read and write
1B6E000
heap
page read and write
1B02000
heap
page read and write
1AEB000
heap
page read and write
1B66000
heap
page read and write
1AEE000
heap
page read and write
1B02000
heap
page read and write
1B64000
heap
page read and write
4281000
heap
page read and write
1B64000
heap
page read and write
3B6F000
stack
page read and write
1AEE000
heap
page read and write
1AEE000
heap
page read and write
1B02000
heap
page read and write
1B87000
heap
page read and write
4192000
trusted library allocation
page read and write
1B87000
heap
page read and write
42A9000
trusted library allocation
page read and write
419A000
trusted library allocation
page read and write
1B51000
heap
page read and write
41B7000
trusted library allocation
page read and write
1B89000
heap
page read and write
1B4A000
heap
page read and write
416E000
stack
page read and write
1B8C000
heap
page read and write
1DAE000
stack
page read and write
1B89000
heap
page read and write
4198000
trusted library allocation
page read and write
1B6A000
heap
page read and write
1B4A000
heap
page read and write
41B0000
trusted library allocation
page read and write
1B4A000
heap
page read and write
41BB000
trusted library allocation
page read and write
1B77000
heap
page read and write
418F000
trusted library allocation
page read and write
1B7B000
heap
page read and write
1B4E000
heap
page read and write
41F0000
trusted library allocation
page read and write
41B9000
trusted library allocation
page read and write
419F000
trusted library allocation
page read and write
179A000
stack
page read and write
1AEB000
heap
page read and write
4188000
trusted library allocation
page read and write
1584000
unkown
page readonly
1AEE000
heap
page read and write
419F000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
1B6B000
heap
page read and write
41AF000
trusted library allocation
page read and write
41B8000
trusted library allocation
page read and write
3B80000
remote allocation
page read and write
1B87000
heap
page read and write
1B64000
heap
page read and write
1B02000
heap
page read and write
1B4A000
heap
page read and write
4181000
trusted library allocation
page read and write
1B02000
heap
page read and write
1B4A000
heap
page read and write
1AEB000
heap
page read and write
1EAE000
stack
page read and write
1B64000
heap
page read and write
41D6000
trusted library allocation
page read and write
FA5000
unkown
page execute read
41B4000
trusted library allocation
page read and write
FA4000
unkown
page write copy
41D0000
trusted library allocation
page read and write
41B9000
trusted library allocation
page read and write
1AEE000
heap
page read and write
41E1000
trusted library allocation
page read and write
1B64000
heap
page read and write
1B64000
heap
page read and write
1B02000
heap
page read and write
1B87000
heap
page read and write
3B80000
remote allocation
page read and write
1AD7000
heap
page read and write
1AEE000
heap
page read and write
1AED000
heap
page read and write
1B4A000
heap
page read and write
392E000
stack
page read and write
1B60000
heap
page read and write
C70000
unkown
page readonly
41A9000
trusted library allocation
page read and write
1B4E000
heap
page read and write
4198000
trusted library allocation
page read and write
4204000
trusted library allocation
page read and write
1B81000
heap
page read and write
41D0000
trusted library allocation
page read and write
1B4E000
heap
page read and write
41C8000
trusted library allocation
page read and write
1AD2000
heap
page read and write
4211000
trusted library allocation
page read and write
1AA0000
heap
page read and write
419F000
trusted library allocation
page read and write
1B4E000
heap
page read and write
419E000
trusted library allocation
page read and write
41AB000
trusted library allocation
page read and write
1B02000
heap
page read and write
1B87000
heap
page read and write
1B82000
heap
page read and write
428A000
trusted library allocation
page read and write
1B81000
heap
page read and write
1AED000
heap
page read and write
1AC7000
heap
page read and write
1B8C000
heap
page read and write
365C000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
420B000
trusted library allocation
page read and write
1AAE000
heap
page read and write
1B87000
heap
page read and write
1AED000
heap
page read and write
1B77000
heap
page read and write
1B02000
heap
page read and write
41EF000
trusted library allocation
page read and write
CC3000
unkown
page execute read
1B4A000
heap
page read and write
1B87000
heap
page read and write
419A000
trusted library allocation
page read and write
421D000
trusted library allocation
page read and write
1AD0000
heap
page read and write
1B87000
heap
page read and write
1B87000
heap
page read and write
1B02000
heap
page read and write
1B89000
heap
page read and write
46F4000
trusted library allocation
page read and write
1B4A000
heap
page read and write
1B4A000
heap
page read and write
41B9000
trusted library allocation
page read and write
41A0000
trusted library allocation
page read and write
1B4E000
heap
page read and write
4290000
trusted library allocation
page read and write
4331000
trusted library allocation
page read and write
1B87000
heap
page read and write
1AFD000
heap
page read and write
1B68000
heap
page read and write
1B64000
heap
page read and write
1B4A000
heap
page read and write
41A1000
trusted library allocation
page read and write
4280000
heap
page read and write
1B02000
heap
page read and write
41BC000
trusted library allocation
page read and write
1B64000
heap
page read and write
FA4000
unkown
page read and write
420B000
trusted library allocation
page read and write
4182000
trusted library allocation
page read and write
1A30000
heap
page read and write
1AF0000
heap
page read and write
1B4E000
heap
page read and write
1B89000
heap
page read and write
41D0000
trusted library allocation
page read and write
CB0000
unkown
page read and write
41C8000
trusted library allocation
page read and write
418B000
trusted library allocation
page read and write
41DD000
trusted library allocation
page read and write
1B4E000
heap
page read and write
1B02000
heap
page read and write
1AEE000
heap
page read and write
1B99000
heap
page read and write
1B87000
heap
page read and write
1AEE000
heap
page read and write
1B64000
heap
page read and write
4185000
trusted library allocation
page read and write
1B87000
heap
page read and write
4361000
trusted library allocation
page read and write
1B6D000
heap
page read and write
3B80000
remote allocation
page read and write
1B7F000
heap
page read and write
1AEE000
heap
page read and write
1B77000
heap
page read and write
1AED000
heap
page read and write
1B4A000
heap
page read and write
1B7E000
heap
page read and write
36E0000
heap
page read and write
41C6000
trusted library allocation
page read and write
1D6E000
stack
page read and write
1B02000
heap
page read and write
43DE000
stack
page read and write
41A9000
trusted library allocation
page read and write
41B7000
trusted library allocation
page read and write
1B4A000
heap
page read and write
1B4A000
heap
page read and write
1B4A000
heap
page read and write
1B87000
heap
page read and write
1AED000
heap
page read and write
1B89000
heap
page read and write
1B64000
heap
page read and write
1B89000
heap
page read and write
38ED000
stack
page read and write
1AEE000
heap
page read and write
1B77000
heap
page read and write
1B86000
heap
page read and write
1B57000
heap
page read and write
1B64000
heap
page read and write
1B02000
heap
page read and write
41A9000
trusted library allocation
page read and write
1B87000
heap
page read and write
1B87000
heap
page read and write
4181000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
1B7F000
heap
page read and write
41F0000
trusted library allocation
page read and write
1B51000
heap
page read and write
1B77000
heap
page read and write
1B6D000
heap
page read and write
1B89000
heap
page read and write
1B02000
heap
page read and write
1AEE000
heap
page read and write
1A9D000
stack
page read and write
1B64000
heap
page read and write
1B77000
heap
page read and write
1B89000
heap
page read and write
1B4E000
heap
page read and write
1B02000
heap
page read and write
1B4A000
heap
page read and write
4359000
trusted library allocation
page read and write
1B8A000
heap
page read and write
41B9000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
1B4E000
heap
page read and write
1B4A000
heap
page read and write
1B87000
heap
page read and write
1B77000
heap
page read and write
4188000
trusted library allocation
page read and write
1B87000
heap
page read and write
418D000
trusted library allocation
page read and write
419D000
trusted library allocation
page read and write
There are 450 hidden memdumps, click here to show them.