IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
covery-mover.biz
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.64.1
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
dwell-exclaim.biz
https://ac.ecosia.org/autocomplete?q=
unknown
https://atten-supporse.biz/apie
unknown
https://atten-supporse.biz/&&
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://crl.micro
unknown
zinc-sneark.biz
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f10
unknown
https://atten-supporse.biz/p
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://atten-supporse.biz:443/apiicrosoft
unknown
formy-spill.biz
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
atten-supporse.biz
https://atten-supporse.biz:443/api
unknown
se-blurry.biz
https://atten-supporse.biz/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
print-vexer.biz
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://atten-supporse.biz/apii
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.64.1

IPs

IP
Domain
Country
Malicious
104.21.64.1
atten-supporse.biz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5410000
direct allocation
page read and write
malicious
1600000
direct allocation
page read and write
16DF000
heap
page read and write
5F4A000
trusted library allocation
page read and write
13F0000
heap
page read and write
16DD000
heap
page read and write
5F1A000
trusted library allocation
page read and write
1764000
heap
page read and write
321E000
stack
page read and write
E40000
heap
page read and write
1701000
heap
page read and write
1764000
heap
page read and write
5EFA000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
1764000
heap
page read and write
1175000
unkown
page execute and read and write
1600000
direct allocation
page read and write
16FC000
heap
page read and write
3CCF000
stack
page read and write
16CB000
heap
page read and write
16F1000
heap
page read and write
5F68000
trusted library allocation
page read and write
CDB000
stack
page read and write
1764000
heap
page read and write
5F79000
trusted library allocation
page read and write
5F43000
trusted library allocation
page read and write
16D0000
heap
page read and write
5F11000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
5570000
direct allocation
page execute and read and write
36CE000
stack
page read and write
45CE000
stack
page read and write
5F70000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
5F4E000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
5FFA000
trusted library allocation
page read and write
5DE0000
heap
page read and write
582D000
stack
page read and write
1701000
heap
page read and write
5F06000
trusted library allocation
page read and write
554F000
stack
page read and write
5F61000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
6124000
trusted library allocation
page read and write
1654000
heap
page read and write
16D3000
heap
page read and write
5AEE000
stack
page read and write
4E4F000
stack
page read and write
16FE000
heap
page read and write
1610000
heap
page read and write
5F79000
trusted library allocation
page read and write
40CE000
stack
page read and write
5F78000
trusted library allocation
page read and write
4F90000
heap
page read and write
16CD000
heap
page read and write
5FA1000
trusted library allocation
page read and write
16D0000
heap
page read and write
165E000
heap
page read and write
5F60000
trusted library allocation
page read and write
16EA000
heap
page read and write
165E000
heap
page read and write
16EF000
heap
page read and write
4C0E000
stack
page read and write
5590000
direct allocation
page execute and read and write
5F0F000
trusted library allocation
page read and write
1670000
heap
page read and write
37CF000
stack
page read and write
3D0E000
stack
page read and write
4E8E000
stack
page read and write
5F52000
trusted library allocation
page read and write
16F4000
heap
page read and write
5F0A000
trusted library allocation
page read and write
16F1000
heap
page read and write
5F42000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
5570000
direct allocation
page execute and read and write
5F5B000
trusted library allocation
page read and write
5F83000
trusted library allocation
page read and write
5F0A000
trusted library allocation
page read and write
5F6D000
trusted library allocation
page read and write
119D000
unkown
page execute and read and write
5F68000
trusted library allocation
page read and write
16DF000
heap
page read and write
5F47000
trusted library allocation
page read and write
16F4000
heap
page read and write
5F60000
trusted library allocation
page read and write
16FF000
heap
page read and write
3220000
direct allocation
page read and write
170D000
heap
page read and write
4F91000
heap
page read and write
170C000
heap
page read and write
1764000
heap
page read and write
5F17000
trusted library allocation
page read and write
4F91000
heap
page read and write
164D000
heap
page read and write
604B000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
170B000
heap
page read and write
5F17000
trusted library allocation
page read and write
5C3E000
stack
page read and write
5F60000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
134C000
unkown
page execute and write copy
F13000
unkown
page write copy
444F000
stack
page read and write
5EFA000
trusted library allocation
page read and write
3E0F000
stack
page read and write
5F27000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
5F0C000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
5F43000
trusted library allocation
page read and write
6093000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
16F5000
heap
page read and write
EC0000
unkown
page readonly
5F37000
trusted library allocation
page read and write
16F5000
heap
page read and write
5F60000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
4F8F000
stack
page read and write
358E000
stack
page read and write
1701000
heap
page read and write
5EF8000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
11A4000
unkown
page execute and read and write
572E000
stack
page read and write
1650000
heap
page read and write
608C000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
4F91000
heap
page read and write
1764000
heap
page read and write
5F60000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
16EF000
heap
page read and write
5F60000
trusted library allocation
page read and write
458F000
stack
page read and write
5090000
trusted library allocation
page read and write
544B000
stack
page read and write
5F6E000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
170E000
heap
page read and write
55A0000
direct allocation
page execute and read and write
1650000
heap
page read and write
16F1000
heap
page read and write
170D000
heap
page read and write
394E000
stack
page read and write
5F60000
trusted library allocation
page read and write
164D000
heap
page read and write
5EEE000
stack
page read and write
5F68000
trusted library allocation
page read and write
6A0D000
trusted library allocation
page read and write
5F45000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5D3F000
stack
page read and write
5EFA000
trusted library allocation
page read and write
4FA0000
heap
page read and write
5F0A000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F24000
trusted library allocation
page read and write
167E000
heap
page read and write
494F000
stack
page read and write
4A8F000
stack
page read and write
5F68000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
5F69000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
16DA000
heap
page read and write
193F000
stack
page read and write
55BF000
trusted library allocation
page read and write
5F26000
trusted library allocation
page read and write
5F3E000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
16F2000
heap
page read and write
E50000
heap
page read and write
5F34000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
60CB000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
1600000
direct allocation
page read and write
5F5B000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F47000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
4F91000
heap
page read and write
5EFA000
trusted library allocation
page read and write
F15000
unkown
page execute and read and write
420E000
stack
page read and write
5F43000
trusted library allocation
page read and write
4F91000
heap
page read and write
5F06000
trusted library allocation
page read and write
3A4F000
stack
page read and write
6013000
trusted library allocation
page read and write
56EE000
stack
page read and write
5F1A000
trusted library allocation
page read and write
1600000
direct allocation
page read and write
5F3B000
trusted library allocation
page read and write
16F1000
heap
page read and write
16DD000
heap
page read and write
5F60000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
5F26000
trusted library allocation
page read and write
139E000
stack
page read and write
4F91000
heap
page read and write
5DAD000
stack
page read and write
5F1A000
trusted library allocation
page read and write
5F41000
trusted library allocation
page read and write
5F33000
trusted library allocation
page read and write
16D5000
heap
page read and write
5FF4000
trusted library allocation
page read and write
16F8000
heap
page read and write
5F68000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
1764000
heap
page read and write
4F91000
heap
page read and write
430F000
stack
page read and write
5F2D000
trusted library allocation
page read and write
5F14000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
161E000
heap
page read and write
5F0A000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
5AAE000
stack
page read and write
3A8E000
stack
page read and write
16CB000
heap
page read and write
170E000
heap
page read and write
16F4000
heap
page read and write
16DA000
heap
page read and write
11B3000
unkown
page execute and read and write
5BEF000
stack
page read and write
5EFA000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
46CE000
stack
page read and write
170E000
heap
page read and write
5F23000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
4F91000
heap
page read and write
16C9000
heap
page read and write
334F000
stack
page read and write
16F2000
heap
page read and write
5EF8000
trusted library allocation
page read and write
134B000
unkown
page execute and read and write
4BCF000
stack
page read and write
5F78000
trusted library allocation
page read and write
480F000
stack
page read and write
5F07000
trusted library allocation
page read and write
1764000
heap
page read and write
5F0A000
trusted library allocation
page read and write
EC1000
unkown
page execute and write copy
55ED000
stack
page read and write
5FF1000
trusted library allocation
page read and write
5F5D000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
390F000
stack
page read and write
5570000
direct allocation
page execute and read and write
5F12000
trusted library allocation
page read and write
53D0000
heap
page read and write
5EF3000
trusted library allocation
page read and write
5F6D000
trusted library allocation
page read and write
1600000
direct allocation
page read and write
3F4F000
stack
page read and write
5F1A000
trusted library allocation
page read and write
5F94000
trusted library allocation
page read and write
170B000
heap
page read and write
5F10000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
5F21000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
16DB000
heap
page read and write
5F24000
trusted library allocation
page read and write
41CF000
stack
page read and write
1704000
heap
page read and write
5F1A000
trusted library allocation
page read and write
5F78000
trusted library allocation
page read and write
3F8E000
stack
page read and write
5EF8000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
1670000
heap
page read and write
5F32000
trusted library allocation
page read and write
59AE000
stack
page read and write
4D0F000
stack
page read and write
5F6E000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
1764000
heap
page read and write
170E000
heap
page read and write
5F47000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
1643000
heap
page read and write
161A000
heap
page read and write
16DA000
heap
page read and write
484E000
stack
page read and write
3230000
direct allocation
page execute and read and write
16FE000
heap
page read and write
5F21000
trusted library allocation
page read and write
1760000
heap
page read and write
3E4E000
stack
page read and write
5F0A000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
11B3000
unkown
page execute and write copy
5F43000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
5EF7000
trusted library allocation
page read and write
1701000
heap
page read and write
13EE000
stack
page read and write
5F1A000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
5F0A000
trusted library allocation
page read and write
1600000
direct allocation
page read and write
5EFA000
trusted library allocation
page read and write
170B000
heap
page read and write
16D0000
heap
page read and write
1704000
heap
page read and write
1600000
direct allocation
page read and write
1600000
direct allocation
page read and write
16DF000
heap
page read and write
EC1000
unkown
page execute and read and write
16FF000
heap
page read and write
5F14000
trusted library allocation
page read and write
4F91000
heap
page read and write
5F0B000
trusted library allocation
page read and write
5550000
direct allocation
page execute and read and write
5F2F000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
380E000
stack
page read and write
1764000
heap
page read and write
16DD000
heap
page read and write
170B000
heap
page read and write
5F3D000
trusted library allocation
page read and write
5EFD000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
4F91000
heap
page read and write
5570000
direct allocation
page execute and read and write
167E000
heap
page read and write
5EFA000
trusted library allocation
page read and write
1600000
direct allocation
page read and write
6163000
trusted library allocation
page read and write
5F27000
trusted library allocation
page read and write
16EA000
heap
page read and write
5F1A000
trusted library allocation
page read and write
5EF1000
trusted library allocation
page read and write
F02000
unkown
page execute and read and write
1764000
heap
page read and write
5570000
direct allocation
page execute and read and write
5F63000
trusted library allocation
page read and write
1600000
direct allocation
page read and write
498E000
stack
page read and write
1654000
heap
page read and write
6192000
trusted library allocation
page read and write
368F000
stack
page read and write
1600000
direct allocation
page read and write
5FF7000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
170E000
heap
page read and write
16DA000
heap
page read and write
4F91000
heap
page read and write
4F91000
heap
page read and write
5F3A000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
3240000
heap
page read and write
3B8F000
stack
page read and write
1600000
direct allocation
page read and write
5EF1000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
5F6C000
trusted library allocation
page read and write
170E000
heap
page read and write
5F66000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
5F81000
trusted library allocation
page read and write
4F91000
heap
page read and write
5EF2000
trusted library allocation
page read and write
5F16000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
16D5000
heap
page read and write
1764000
heap
page read and write
4D4E000
stack
page read and write
1764000
heap
page read and write
5F18000
trusted library allocation
page read and write
174C000
stack
page read and write
5EFA000
trusted library allocation
page read and write
5EFF000
trusted library allocation
page read and write
16DD000
heap
page read and write
4F91000
heap
page read and write
5F05000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
4F91000
heap
page read and write
5F05000
trusted library allocation
page read and write
F13000
unkown
page write copy
5F60000
trusted library allocation
page read and write
16DA000
heap
page read and write
16DB000
heap
page read and write
5F8B000
trusted library allocation
page read and write
DDB000
stack
page read and write
596F000
stack
page read and write
5F60000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
1764000
heap
page read and write
5560000
direct allocation
page execute and read and write
5F21000
trusted library allocation
page read and write
1705000
heap
page read and write
170B000
heap
page read and write
3247000
heap
page read and write
5F3C000
trusted library allocation
page read and write
53F0000
remote allocation
page read and write
5EF5000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
5F0B000
trusted library allocation
page read and write
5570000
direct allocation
page execute and read and write
64F5000
trusted library allocation
page read and write
16DA000
heap
page read and write
408F000
stack
page read and write
4ACE000
stack
page read and write
5F27000
trusted library allocation
page read and write
4F91000
heap
page read and write
170D000
heap
page read and write
5F69000
trusted library allocation
page read and write
1704000
heap
page read and write
1600000
direct allocation
page read and write
5F0A000
trusted library allocation
page read and write
5F66000
trusted library allocation
page read and write
5F4A000
trusted library allocation
page read and write
60C3000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
1648000
heap
page read and write
31DF000
stack
page read and write
5F35000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
4F91000
heap
page read and write
16D0000
heap
page read and write
5451000
direct allocation
page read and write
5FA1000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F01000
trusted library allocation
page read and write
448E000
stack
page read and write
4F91000
heap
page read and write
5580000
direct allocation
page execute and read and write
1648000
heap
page read and write
5EFF000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
5F32000
trusted library allocation
page read and write
5F87000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
EBE000
stack
page read and write
53F0000
remote allocation
page read and write
3220000
direct allocation
page read and write
5F0C000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
3BCE000
stack
page read and write
1600000
direct allocation
page read and write
5EFA000
trusted library allocation
page read and write
470E000
stack
page read and write
5F1A000
trusted library allocation
page read and write
11B4000
unkown
page execute and write copy
5F60000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
354F000
stack
page read and write
5F6B000
trusted library allocation
page read and write
4F91000
heap
page read and write
53F0000
remote allocation
page read and write
586E000
stack
page read and write
EC0000
unkown
page read and write
4F91000
heap
page read and write
5F69000
trusted library allocation
page read and write
5F0A000
trusted library allocation
page read and write
16DC000
heap
page read and write
5EF9000
trusted library allocation
page read and write
16CB000
heap
page read and write
60D3000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
16F1000
heap
page read and write
5F68000
trusted library allocation
page read and write
170D000
heap
page read and write
109C000
unkown
page execute and read and write
16F4000
heap
page read and write
5F68000
trusted library allocation
page read and write
1701000
heap
page read and write
5F1B000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F60000
trusted library allocation
page read and write
344F000
stack
page read and write
434E000
stack
page read and write
16F8000
heap
page read and write
5F58000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
170E000
heap
page read and write
170D000
heap
page read and write
5F32000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
1764000
heap
page read and write
5F0A000
trusted library allocation
page read and write
5F31000
trusted library allocation
page read and write
609B000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
16DD000
heap
page read and write
There are 498 hidden memdumps, click here to show them.