IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://duckduckgo.com/ac/?q=
unknown
https://atten-supporse.biz:443/apiUU2
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://atten-supporse.bz/
unknown
covery-mover.biz
https://atten-supporse.biz/744-1-2
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.48.1
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
dwell-exclaim.biz
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
formy-spill.biz
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
atten-supporse.biz
https://atten-supporse.biz/api1
unknown
https://atten-supporse.biz/apiq
unknown
se-blurry.biz
https://atten-supporse.biz/
unknown
https://atten-supporse.biz/apis
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
print-vexer.biz
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://atten-supporse.biz:443/api://%ProgramFiles%
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.48.1

IPs

IP
Domain
Country
Malicious
104.21.48.1
atten-supporse.biz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
C51000
unkown
page execute and read and write
malicious
359E000
stack
page read and write
431F000
stack
page read and write
173F000
heap
page read and write
4FA0000
direct allocation
page read and write
62D8000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
5F3A000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
6001000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
5F79000
trusted library allocation
page read and write
173F000
heap
page read and write
6021000
trusted library allocation
page read and write
1745000
heap
page read and write
40DE000
stack
page read and write
173D000
heap
page read and write
604E000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
1746000
heap
page read and write
5F80000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
604E000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
620F000
trusted library allocation
page read and write
5F8F000
trusted library allocation
page read and write
5C3E000
stack
page read and write
55CE000
stack
page read and write
32D0000
heap
page read and write
4FB1000
heap
page read and write
604E000
trusted library allocation
page read and write
5FDE000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
6019000
trusted library allocation
page read and write
6001000
trusted library allocation
page read and write
186E000
stack
page read and write
5FD6000
trusted library allocation
page read and write
6039000
trusted library allocation
page read and write
5AFE000
stack
page read and write
5F92000
trusted library allocation
page read and write
5DAE000
stack
page read and write
5F5B000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
55D0000
direct allocation
page execute and read and write
4FA0000
direct allocation
page read and write
5F28000
trusted library allocation
page read and write
5F4B000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
614A000
trusted library allocation
page read and write
5FE7000
trusted library allocation
page read and write
CA3000
unkown
page write copy
10FD000
unkown
page execute and read and write
5F0E000
trusted library allocation
page read and write
4FB1000
heap
page read and write
5FC4000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
4FC1000
heap
page read and write
5F79000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
5FE7000
trusted library allocation
page read and write
174F000
heap
page read and write
6240000
trusted library allocation
page read and write
32B0000
heap
page read and write
5F0E000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
6019000
trusted library allocation
page read and write
6019000
trusted library allocation
page read and write
1747000
heap
page read and write
5F90000
trusted library allocation
page read and write
173E000
heap
page read and write
5F27000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
5F94000
trusted library allocation
page read and write
5F21000
trusted library allocation
page read and write
435E000
stack
page read and write
173E000
heap
page read and write
604E000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
5481000
direct allocation
page read and write
C51000
unkown
page execute and write copy
165E000
stack
page read and write
5590000
direct allocation
page execute and read and write
5F96000
trusted library allocation
page read and write
5F9D000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
5F74000
trusted library allocation
page read and write
1735000
heap
page read and write
5F2D000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
5F5B000
trusted library allocation
page read and write
495F000
stack
page read and write
5F7D000
trusted library allocation
page read and write
1749000
heap
page read and write
5F90000
trusted library allocation
page read and write
5F35000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
1746000
heap
page read and write
355F000
stack
page read and write
1741000
heap
page read and write
16AF000
heap
page read and write
C50000
unkown
page readonly
604E000
trusted library allocation
page read and write
1756000
heap
page read and write
5F59000
trusted library allocation
page read and write
6005000
trusted library allocation
page read and write
4E5F000
stack
page read and write
6021000
trusted library allocation
page read and write
5F28000
trusted library allocation
page read and write
5F91000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
4FB1000
heap
page read and write
5F34000
trusted library allocation
page read and write
3A5F000
stack
page read and write
604E000
trusted library allocation
page read and write
173E000
heap
page read and write
5F04000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
1739000
heap
page read and write
62E0000
trusted library allocation
page read and write
172E000
heap
page read and write
5F88000
trusted library allocation
page read and write
C92000
unkown
page execute and read and write
5F7E000
trusted library allocation
page read and write
173F000
heap
page read and write
5F12000
trusted library allocation
page read and write
173F000
heap
page read and write
5F7E000
trusted library allocation
page read and write
1757000
heap
page read and write
5F23000
trusted library allocation
page read and write
5FCA000
trusted library allocation
page read and write
5F7D000
trusted library allocation
page read and write
4FB1000
heap
page read and write
5F06000
trusted library allocation
page read and write
5F8C000
trusted library allocation
page read and write
369F000
stack
page read and write
319E000
stack
page read and write
16B4000
heap
page read and write
329F000
stack
page read and write
16DE000
heap
page read and write
5F90000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
1746000
heap
page read and write
5F96000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
173F000
heap
page read and write
3BDE000
stack
page read and write
5F80000
trusted library allocation
page read and write
46DF000
stack
page read and write
5F55000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
5F5B000
trusted library allocation
page read and write
331C000
stack
page read and write
6019000
trusted library allocation
page read and write
5FB2000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
597E000
stack
page read and write
5F8F000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
593E000
stack
page read and write
1720000
heap
page read and write
4BDF000
stack
page read and write
16B9000
heap
page read and write
1741000
heap
page read and write
16A8000
heap
page read and write
4FB1000
heap
page read and write
1759000
heap
page read and write
5F46000
trusted library allocation
page read and write
5F93000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
4FB1000
heap
page read and write
5F05000
trusted library allocation
page read and write
3A9E000
stack
page read and write
5F90000
trusted library allocation
page read and write
5FAD000
trusted library allocation
page read and write
32DD000
heap
page read and write
5F8D000
trusted library allocation
page read and write
5FDE000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
173F000
heap
page read and write
45DE000
stack
page read and write
1757000
heap
page read and write
5F8F000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
5FE7000
trusted library allocation
page read and write
F16000
unkown
page execute and read and write
6039000
trusted library allocation
page read and write
F57000
unkown
page execute and write copy
37DF000
stack
page read and write
6021000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
4FB1000
heap
page read and write
F40000
unkown
page execute and read and write
600A000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
6039000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5F34000
trusted library allocation
page read and write
5FCD000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
174A000
heap
page read and write
5F2D000
trusted library allocation
page read and write
341F000
stack
page read and write
5F7E000
trusted library allocation
page read and write
3CDF000
stack
page read and write
604E000
trusted library allocation
page read and write
620E000
trusted library allocation
page read and write
173F000
heap
page read and write
55A0000
direct allocation
page execute and read and write
60AF000
trusted library allocation
page read and write
604D000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
5F70000
trusted library allocation
page read and write
173F000
heap
page read and write
409F000
stack
page read and write
5F12000
trusted library allocation
page read and write
5F81000
trusted library allocation
page read and write
445F000
stack
page read and write
4FB1000
heap
page read and write
1745000
heap
page read and write
4D1F000
stack
page read and write
174D000
heap
page read and write
5F07000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
5F12000
trusted library allocation
page read and write
4C1E000
stack
page read and write
5F7D000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
1746000
heap
page read and write
4ADE000
stack
page read and write
6010000
trusted library allocation
page read and write
5D3E000
stack
page read and write
5F3B000
trusted library allocation
page read and write
55C0000
direct allocation
page execute and read and write
4FB1000
heap
page read and write
5F90000
trusted library allocation
page read and write
5F27000
trusted library allocation
page read and write
3E1F000
stack
page read and write
5F4A000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
167A000
heap
page read and write
4FA0000
direct allocation
page read and write
557F000
stack
page read and write
5F7D000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
459F000
stack
page read and write
173E000
heap
page read and write
4FB1000
heap
page read and write
50B0000
trusted library allocation
page read and write
5F0B000
trusted library allocation
page read and write
1721000
heap
page read and write
604E000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
5F3B000
trusted library allocation
page read and write
6008000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
4FB1000
heap
page read and write
5440000
direct allocation
page read and write
6021000
trusted library allocation
page read and write
16DE000
heap
page read and write
1739000
heap
page read and write
5F81000
trusted library allocation
page read and write
5FAD000
trusted library allocation
page read and write
5F07000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
4FB1000
heap
page read and write
4FB1000
heap
page read and write
1753000
heap
page read and write
55B0000
direct allocation
page execute and read and write
5F12000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
5F3A000
trusted library allocation
page read and write
32A0000
heap
page read and write
5F04000
trusted library allocation
page read and write
5440000
direct allocation
page read and write
5F44000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
16B4000
heap
page read and write
16BA000
heap
page read and write
5F0A000
trusted library allocation
page read and write
1732000
heap
page read and write
4FB0000
heap
page read and write
5F7F000
trusted library allocation
page read and write
57FD000
stack
page read and write
4FA0000
direct allocation
page read and write
6209000
trusted library allocation
page read and write
604D000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
542D000
stack
page read and write
1745000
heap
page read and write
6010000
trusted library allocation
page read and write
4A9F000
stack
page read and write
5FB2000
trusted library allocation
page read and write
16B9000
heap
page read and write
6010000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
5F8F000
trusted library allocation
page read and write
F47000
unkown
page execute and read and write
5F08000
trusted library allocation
page read and write
55E0000
direct allocation
page execute and read and write
499E000
stack
page read and write
604E000
trusted library allocation
page read and write
5F9E000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
345E000
stack
page read and write
6021000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
173F000
heap
page read and write
173E000
heap
page read and write
5F8F000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
1740000
heap
page read and write
6010000
trusted library allocation
page read and write
6005000
trusted library allocation
page read and write
5F3D000
trusted library allocation
page read and write
173F000
heap
page read and write
6011000
trusted library allocation
page read and write
16BE000
heap
page read and write
5F04000
trusted library allocation
page read and write
5FB4000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
6011000
trusted library allocation
page read and write
62E8000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
1742000
heap
page read and write
481F000
stack
page read and write
1739000
heap
page read and write
5FA3000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
1759000
heap
page read and write
5F8F000
trusted library allocation
page read and write
14FB000
stack
page read and write
56FD000
stack
page read and write
4FB1000
heap
page read and write
5F34000
trusted library allocation
page read and write
5F93000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
5F86000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
1734000
heap
page read and write
6008000
trusted library allocation
page read and write
5A90000
remote allocation
page read and write
5F83000
trusted library allocation
page read and write
5F7D000
trusted library allocation
page read and write
5F9D000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
1745000
heap
page read and write
1735000
heap
page read and write
5F3B000
trusted library allocation
page read and write
5F7D000
trusted library allocation
page read and write
5FB4000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
1743000
heap
page read and write
5F8D000
trusted library allocation
page read and write
173E000
heap
page read and write
5F23000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
1743000
heap
page read and write
5A90000
remote allocation
page read and write
4D5E000
stack
page read and write
5F05000
trusted library allocation
page read and write
15F5000
heap
page read and write
5F8D000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
16DE000
heap
page read and write
1721000
heap
page read and write
3F9E000
stack
page read and write
3E5E000
stack
page read and write
1753000
heap
page read and write
4FA0000
direct allocation
page read and write
5F17000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
6703000
trusted library allocation
page read and write
1757000
heap
page read and write
6010000
trusted library allocation
page read and write
16D0000
heap
page read and write
16D0000
heap
page read and write
4FB1000
heap
page read and write
5FD4000
trusted library allocation
page read and write
5F56000
trusted library allocation
page read and write
1743000
heap
page read and write
19AE000
stack
page read and write
173F000
heap
page read and write
5BFF000
stack
page read and write
6378000
trusted library allocation
page read and write
5F8F000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
CA3000
unkown
page write copy
1749000
heap
page read and write
5F8D000
trusted library allocation
page read and write
395E000
stack
page read and write
5F0E000
trusted library allocation
page read and write
5FDE000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
119B000
stack
page read and write
173F000
heap
page read and write
547B000
stack
page read and write
4FB1000
heap
page read and write
5F2A000
trusted library allocation
page read and write
1753000
heap
page read and write
4F9F000
stack
page read and write
391F000
stack
page read and write
5F8C000
trusted library allocation
page read and write
5F1F000
trusted library allocation
page read and write
5F2C000
trusted library allocation
page read and write
4FB1000
heap
page read and write
6021000
trusted library allocation
page read and write
172C000
heap
page read and write
173F000
heap
page read and write
5440000
direct allocation
page read and write
16BE000
heap
page read and write
5FDE000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
6026000
trusted library allocation
page read and write
16BE000
heap
page read and write
5F9D000
trusted library allocation
page read and write
5FA3000
trusted library allocation
page read and write
10FE000
unkown
page execute and write copy
5F86000
trusted library allocation
page read and write
6C14000
trusted library allocation
page read and write
173F000
heap
page read and write
16A8000
heap
page read and write
6008000
trusted library allocation
page read and write
5F91000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
471E000
stack
page read and write
449E000
stack
page read and write
5F12000
trusted library allocation
page read and write
36DE000
stack
page read and write
1742000
heap
page read and write
16AF000
heap
page read and write
16D0000
heap
page read and write
63AD000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
5FB2000
trusted library allocation
page read and write
16BE000
heap
page read and write
6000000
trusted library allocation
page read and write
167E000
heap
page read and write
5F88000
trusted library allocation
page read and write
15F0000
heap
page read and write
5F9C000
trusted library allocation
page read and write
1735000
heap
page read and write
5F59000
trusted library allocation
page read and write
41DF000
stack
page read and write
1720000
heap
page read and write
3B9F000
stack
page read and write
6002000
trusted library allocation
page read and write
174E000
heap
page read and write
5F05000
trusted library allocation
page read and write
485E000
stack
page read and write
1759000
heap
page read and write
5F26000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
1745000
heap
page read and write
604E000
trusted library allocation
page read and write
4E9E000
stack
page read and write
32D7000
heap
page read and write
5F90000
trusted library allocation
page read and write
5A7E000
stack
page read and write
5F79000
trusted library allocation
page read and write
3F5F000
stack
page read and write
5601000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
1720000
heap
page read and write
5EFF000
stack
page read and write
5F90000
trusted library allocation
page read and write
5F91000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
174A000
heap
page read and write
6021000
trusted library allocation
page read and write
174D000
heap
page read and write
583E000
stack
page read and write
16D0000
heap
page read and write
5F81000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
1670000
heap
page read and write
173E000
heap
page read and write
5F86000
trusted library allocation
page read and write
5DF0000
heap
page read and write
604E000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5F3B000
trusted library allocation
page read and write
C50000
unkown
page read and write
6295000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
CA5000
unkown
page execute and read and write
55F0000
direct allocation
page execute and read and write
5F7E000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
5FDE000
trusted library allocation
page read and write
1500000
heap
page read and write
173F000
heap
page read and write
381E000
stack
page read and write
173F000
heap
page read and write
604E000
trusted library allocation
page read and write
5FB3000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
4FA0000
direct allocation
page read and write
15E0000
heap
page read and write
5F22000
trusted library allocation
page read and write
5F00000
trusted library allocation
page read and write
5F91000
trusted library allocation
page read and write
1759000
heap
page read and write
5F91000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
1746000
heap
page read and write
5F83000
trusted library allocation
page read and write
4FB1000
heap
page read and write
6010000
trusted library allocation
page read and write
5F0B000
trusted library allocation
page read and write
16DE000
heap
page read and write
3D1E000
stack
page read and write
604E000
trusted library allocation
page read and write
E37000
unkown
page execute and read and write
604E000
trusted library allocation
page read and write
1741000
heap
page read and write
18AE000
stack
page read and write
5FC5000
trusted library allocation
page read and write
F56000
unkown
page execute and read and write
F56000
unkown
page execute and write copy
5F3F000
trusted library allocation
page read and write
4FB1000
heap
page read and write
1755000
heap
page read and write
4FB1000
heap
page read and write
6010000
trusted library allocation
page read and write
5A90000
remote allocation
page read and write
5F46000
trusted library allocation
page read and write
6228000
trusted library allocation
page read and write
421E000
stack
page read and write
5FDE000
trusted library allocation
page read and write
16A3000
heap
page read and write
5F90000
trusted library allocation
page read and write
There are 548 hidden memdumps, click here to show them.