IOC Report
Call 0f Duty A1 Launcher.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe
"C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe"
malicious
C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe
"C:\Users\user\Desktop\Call 0f Duty A1 Launcher.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs:443/apiicrosoft
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://property-imper.sbs/apij
unknown
http://147.45.47.81/
unknown
https://property-imper.sbs/api
104.21.33.116
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://147.45.47.81/conhost.exe
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://147.45.47.81/conhost.exeZ
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://147.45.47.81/conhost.exec
unknown
http://147.45.47.81/4
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://property-imper.sbs/a
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://property-imper.sbs/accoC7
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://147.45.47.81:80/conhost.exeK
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States
147.45.47.81
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
5CED000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5CD3000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
38B000
unkown
page write copy
359C000
heap
page read and write
358D000
heap
page read and write
5CFF000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
3587000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
5CD7000
trusted library allocation
page read and write
35A0000
heap
page read and write
5CFC000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
35AE000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
3592000
heap
page read and write
5CC4000
trusted library allocation
page read and write
3578000
heap
page read and write
5CF3000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
359B000
heap
page read and write
3572000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
359C000
heap
page read and write
3514000
heap
page read and write
3564000
heap
page read and write
5D1D000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
5CDB000
trusted library allocation
page read and write
68DB000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
5CB6000
trusted library allocation
page read and write
3591000
heap
page read and write
5E6F000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
360000
unkown
page readonly
5CD3000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
5ABE000
stack
page read and write
5CC3000
trusted library allocation
page read and write
38B000
unkown
page execute and read and write
558E000
stack
page read and write
357C000
heap
page read and write
5CD3000
trusted library allocation
page read and write
568F000
stack
page read and write
36C0000
remote allocation
page read and write
5CD7000
trusted library allocation
page read and write
5CE5000
trusted library allocation
page read and write
5CD8000
trusted library allocation
page read and write
361000
unkown
page execute read
347E000
stack
page read and write
5D09000
trusted library allocation
page read and write
360000
unkown
page readonly
5CD4000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
358D000
heap
page read and write
5B18000
trusted library allocation
page read and write
383000
unkown
page readonly
35AE000
heap
page read and write
2FD0000
heap
page read and write
5CD4000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
5CAF000
stack
page read and write
38F000
unkown
page readonly
35A8000
heap
page read and write
38B000
unkown
page write copy
591F000
stack
page read and write
5D0E000
trusted library allocation
page read and write
5F8C000
trusted library allocation
page read and write
5CD4000
trusted library allocation
page read and write
3572000
heap
page read and write
5CFC000
trusted library allocation
page read and write
3480000
heap
page read and write
540D000
stack
page read and write
5CD3000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
5CB5000
trusted library allocation
page read and write
359C000
heap
page read and write
25DC000
stack
page read and write
5AC0000
trusted library allocation
page read and write
3572000
heap
page read and write
3592000
heap
page read and write
5CB2000
trusted library allocation
page read and write
3589000
heap
page read and write
5D3E000
trusted library allocation
page read and write
35AE000
heap
page read and write
35AE000
heap
page read and write
6024000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
356E000
heap
page read and write
5CD4000
trusted library allocation
page read and write
359C000
heap
page read and write
5CFE000
trusted library allocation
page read and write
2B50000
heap
page read and write
358C000
heap
page read and write
5CD3000
trusted library allocation
page read and write
3573000
heap
page read and write
298D000
stack
page read and write
5CE9000
trusted library allocation
page read and write
357A000
heap
page read and write
5D2E000
trusted library allocation
page read and write
359C000
heap
page read and write
391000
unkown
page write copy
5CCF000
trusted library allocation
page read and write
35AE000
heap
page read and write
5CD3000
trusted library allocation
page read and write
3501000
heap
page read and write
359C000
heap
page read and write
5CD3000
trusted library allocation
page read and write
35AE000
heap
page read and write
356E000
heap
page read and write
5D13000
trusted library allocation
page read and write
3510000
heap
page read and write
35AE000
heap
page read and write
5CD3000
trusted library allocation
page read and write
36C0000
remote allocation
page read and write
5CC0000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
38B000
unkown
page write copy
5D10000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
2800000
heap
page read and write
5CD3000
trusted library allocation
page read and write
35AE000
heap
page read and write
361000
unkown
page execute read
35AE000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CCD000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5DB0000
heap
page read and write
3501000
heap
page read and write
5CE0000
trusted library allocation
page read and write
3570000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
357F000
heap
page read and write
361000
unkown
page execute read
5CEE000
trusted library allocation
page read and write
5D2F000
trusted library allocation
page read and write
5CFE000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
5CFE000
trusted library allocation
page read and write
3570000
heap
page read and write
5D45000
trusted library allocation
page read and write
56CD000
stack
page read and write
35AE000
heap
page read and write
57CE000
stack
page read and write
5CC3000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
34B0000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
355B000
heap
page read and write
2920000
heap
page read and write
5D07000
trusted library allocation
page read and write
5CE5000
trusted library allocation
page read and write
29C0000
heap
page read and write
3573000
heap
page read and write
359C000
heap
page read and write
3592000
heap
page read and write
5D03000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
3572000
heap
page read and write
5D01000
trusted library allocation
page read and write
5D4D000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
34E5000
heap
page read and write
3572000
heap
page read and write
383000
unkown
page readonly
361000
unkown
page execute read
32FA000
stack
page read and write
334E000
stack
page read and write
34BA000
heap
page read and write
34FE000
heap
page read and write
35A4000
heap
page read and write
391000
unkown
page write copy
5D08000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
5A5E000
stack
page read and write
5D2C000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
391000
unkown
page write copy
38F000
unkown
page readonly
5EB3000
trusted library allocation
page read and write
360000
unkown
page readonly
3587000
heap
page read and write
3594000
heap
page read and write
5CDB000
trusted library allocation
page read and write
3572000
heap
page read and write
35AE000
heap
page read and write
5BA0000
heap
page read and write
5FC4000
trusted library allocation
page read and write
359C000
heap
page read and write
5CD3000
trusted library allocation
page read and write
3592000
heap
page read and write
5CDE000
trusted library allocation
page read and write
5CFE000
trusted library allocation
page read and write
581E000
stack
page read and write
3568000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CD4000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
3573000
heap
page read and write
38F000
unkown
page readonly
3564000
heap
page read and write
5CBA000
trusted library allocation
page read and write
3514000
heap
page read and write
5CCF000
trusted library allocation
page read and write
35AE000
heap
page read and write
391000
unkown
page write copy
5CD3000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
3592000
heap
page read and write
3575000
heap
page read and write
359C000
heap
page read and write
5EB5000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
36E0000
heap
page read and write
3592000
heap
page read and write
2FE0000
heap
page read and write
5CDD000
trusted library allocation
page read and write
35AE000
heap
page read and write
383000
unkown
page readonly
3510000
heap
page read and write
356E000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
358D000
heap
page read and write
38C000
unkown
page read and write
356E000
heap
page read and write
3568000
heap
page read and write
5CD3000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
358D000
heap
page read and write
34D3000
heap
page read and write
356E000
heap
page read and write
34E4000
heap
page read and write
383000
unkown
page readonly
3587000
heap
page read and write
35A3000
heap
page read and write
5CDB000
trusted library allocation
page read and write
5CEC000
trusted library allocation
page read and write
3572000
heap
page read and write
29CB000
heap
page read and write
544E000
stack
page read and write
5CC4000
trusted library allocation
page read and write
357F000
heap
page read and write
5CD3000
trusted library allocation
page read and write
3570000
heap
page read and write
3587000
heap
page read and write
3570000
heap
page read and write
5F5C000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
357C000
heap
page read and write
5CBA000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
38F000
unkown
page readonly
5CDC000
trusted library allocation
page read and write
357F000
heap
page read and write
5D47000
trusted library allocation
page read and write
357F000
heap
page read and write
24DC000
stack
page read and write
35AE000
heap
page read and write
5D45000
trusted library allocation
page read and write
5F0C000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
357C000
heap
page read and write
5CCB000
trusted library allocation
page read and write
3589000
heap
page read and write
3559000
heap
page read and write
5CE9000
trusted library allocation
page read and write
3572000
heap
page read and write
5D3E000
trusted library allocation
page read and write
5CC4000
trusted library allocation
page read and write
29D3000
heap
page read and write
5CD3000
trusted library allocation
page read and write
2840000
heap
page read and write
5ED4000
trusted library allocation
page read and write
5CEC000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5CD7000
trusted library allocation
page read and write
35A5000
heap
page read and write
5CD6000
trusted library allocation
page read and write
44FF000
stack
page read and write
5D11000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
457000
remote allocation
page execute and read and write
34E0000
heap
page read and write
3592000
heap
page read and write
5CDC000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
35AE000
heap
page read and write
3365000
heap
page read and write
595E000
stack
page read and write
5D13000
trusted library allocation
page read and write
2AFE000
stack
page read and write
5D15000
trusted library allocation
page read and write
530D000
stack
page read and write
36AE000
stack
page read and write
5CC4000
trusted library allocation
page read and write
3577000
heap
page read and write
5CEA000
trusted library allocation
page read and write
356E000
heap
page read and write
3591000
heap
page read and write
554E000
stack
page read and write
5CE9000
trusted library allocation
page read and write
3572000
heap
page read and write
36C0000
remote allocation
page read and write
359C000
heap
page read and write
5CC1000
trusted library allocation
page read and write
35AE000
heap
page read and write
5CEE000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
36E6000
heap
page read and write
3570000
heap
page read and write
3587000
heap
page read and write
5CF4000
trusted library allocation
page read and write
5EEC000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
359C000
heap
page read and write
5D1B000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
3570000
heap
page read and write
5CE6000
trusted library allocation
page read and write
35AB000
heap
page read and write
5D45000
trusted library allocation
page read and write
5CD7000
trusted library allocation
page read and write
34FE000
heap
page read and write
3594000
heap
page read and write
35A3000
heap
page read and write
5CE7000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
3360000
heap
page read and write
5CB0000
trusted library allocation
page read and write
35AE000
heap
page read and write
5CD3000
trusted library allocation
page read and write
4F8E000
stack
page read and write
5CC8000
trusted library allocation
page read and write
360000
unkown
page readonly
3573000
heap
page read and write
5CE6000
trusted library allocation
page read and write
35AE000
heap
page read and write
63BF000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
35AE000
heap
page read and write
5D34000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
5CB3000
trusted library allocation
page read and write
43FD000
stack
page read and write
5D54000
trusted library allocation
page read and write
3572000
heap
page read and write
5CB6000
trusted library allocation
page read and write
3570000
heap
page read and write
5CF8000
trusted library allocation
page read and write
35A3000
heap
page read and write
2F7B000
stack
page read and write
35AE000
heap
page read and write
358D000
heap
page read and write
3572000
heap
page read and write
5F94000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
35AE000
heap
page read and write
359C000
heap
page read and write
35A5000
heap
page read and write
There are 380 hidden memdumps, click here to show them.