IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 102
ASCII text
dropped
Chrome Cache Entry: 103
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 104
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 106
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 107
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 108
JSON data
dropped
Chrome Cache Entry: 109
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 110
JSON data
downloaded
Chrome Cache Entry: 111
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 71
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 72
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 73
JSON data
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 76
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 80
JSON data
downloaded
Chrome Cache Entry: 81
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 85
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 86
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 87
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 92
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
JSON data
dropped
Chrome Cache Entry: 99
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 --field-trial-handle=2388,i,17003217840531008037,10136595972546319066,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1952,i,10276600850100983597,11233374651624369468,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16/off/def.exe~81
unknown
https://cook-rain.sbs/apirG
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://185.215.113.16/steam/random.exep
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://cook-rain.sbs/apiwF
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cook-rain.sbs/apiJ
unknown
https://cook-rain.sbs/t_stat
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://cook-rain.sbs/api%F
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cook-rain.Xr
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
188.114.96.3
http://crl.microH
unknown
https://cook-rain.sbs/NF
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.45
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://cook-rain.sbs/e48
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://185.215.113.16/off/def.exed4f
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.microsof
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
188.114.96.3
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.186.68
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
142.250.186.68
www.google.com
United States
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
188.114.96.3
cook-rain.sbs
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
50D0000
heap
page read and write
47CE000
stack
page read and write
5E5B000
trusted library allocation
page read and write
608A000
trusted library allocation
page read and write
608B000
trusted library allocation
page read and write
FEB000
unkown
page execute and write copy
5C52000
trusted library allocation
page read and write
414F000
stack
page read and write
6083000
trusted library allocation
page read and write
8570000
direct allocation
page read and write
5C05000
trusted library allocation
page read and write
5C06000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
171C000
heap
page read and write
360F000
stack
page read and write
608F000
trusted library allocation
page read and write
8570000
direct allocation
page read and write
1728000
heap
page read and write
6D3F000
stack
page read and write
1444000
heap
page read and write
5BEA000
trusted library allocation
page read and write
6087000
trusted library allocation
page read and write
6084000
trusted library allocation
page read and write
7D7F000
stack
page read and write
5D71000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
5BEE000
trusted library allocation
page read and write
6086000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
6324000
trusted library allocation
page read and write
6442000
trusted library allocation
page execute and read and write
8500000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
5BEC000
trusted library allocation
page read and write
171C000
heap
page read and write
16FC000
heap
page read and write
42CE000
stack
page read and write
5C04000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
5CE2000
trusted library allocation
page read and write
4C8F000
stack
page read and write
6137000
trusted library allocation
page read and write
1729000
heap
page read and write
6162000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
1444000
heap
page read and write
66F0000
trusted library allocation
page execute and read and write
619B000
trusted library allocation
page read and write
74BF000
stack
page read and write
1620000
direct allocation
page read and write
608E000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
5C44000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
62FD000
trusted library allocation
page read and write
16EE000
heap
page read and write
3A0E000
stack
page read and write
1181000
unkown
page execute and write copy
5BE1000
trusted library allocation
page read and write
61C3000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
16FD000
heap
page read and write
83BF000
stack
page read and write
7C7E000
stack
page read and write
5C56000
trusted library allocation
page read and write
6168000
trusted library allocation
page read and write
61A8000
trusted library allocation
page read and write
78BE000
stack
page read and write
5C15000
trusted library allocation
page read and write
1729000
heap
page read and write
6086000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
388F000
stack
page read and write
3ECF000
stack
page read and write
608A000
trusted library allocation
page read and write
1444000
heap
page read and write
6081000
trusted library allocation
page read and write
777E000
stack
page read and write
1700000
heap
page read and write
613C000
trusted library allocation
page read and write
5CEC000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
618D000
trusted library allocation
page read and write
773F000
stack
page read and write
32CF000
stack
page read and write
3B0F000
stack
page read and write
9EB000
stack
page read and write
1705000
heap
page read and write
1630000
heap
page read and write
5BE1000
trusted library allocation
page read and write
5C78000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
6706000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
171A000
heap
page read and write
1420000
heap
page read and write
567E000
stack
page read and write
5BF5000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
3C8E000
stack
page read and write
6087000
trusted library allocation
page read and write
1620000
direct allocation
page read and write
170E000
heap
page read and write
595E000
stack
page read and write
5C31000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
608E000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
171C000
heap
page read and write
5BF5000
trusted library allocation
page read and write
4C91000
heap
page read and write
5BF2000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
4C91000
heap
page read and write
5780000
remote allocation
page read and write
6133000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
1444000
heap
page read and write
5270000
direct allocation
page execute and read and write
5BF5000
trusted library allocation
page read and write
154E000
stack
page read and write
1669000
heap
page read and write
61DD000
trusted library allocation
page read and write
5C13000
trusted library allocation
page read and write
8740000
heap
page read and write
170C000
heap
page read and write
5BF9000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
172D000
heap
page read and write
5ADD000
stack
page read and write
630C000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
61BA000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
6173000
trusted library allocation
page read and write
7FFF000
stack
page read and write
3B4E000
stack
page read and write
65CC000
trusted library allocation
page execute and read and write
172A000
heap
page read and write
5C04000
trusted library allocation
page read and write
FEA000
unkown
page execute and read and write
C50000
heap
page read and write
1444000
heap
page read and write
5BFC000
trusted library allocation
page read and write
4C91000
heap
page read and write
D48000
unkown
page execute and read and write
54FD000
stack
page read and write
615E000
trusted library allocation
page read and write
1729000
heap
page read and write
CBD000
stack
page read and write
5C0C000
trusted library allocation
page read and write
79FE000
stack
page read and write
5C91000
trusted library allocation
page read and write
172A000
heap
page read and write
53BD000
stack
page read and write
CF0000
unkown
page read and write
5C04000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
6172000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
1717000
heap
page read and write
61DB000
trusted library allocation
page read and write
6082000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
5BFA000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
5C2A000
trusted library allocation
page read and write
4A4E000
stack
page read and write
1705000
heap
page read and write
6139000
trusted library allocation
page read and write
16FC000
heap
page read and write
4C91000
heap
page read and write
5BF5000
trusted library allocation
page read and write
4C91000
heap
page read and write
171C000
heap
page read and write
ED8000
unkown
page execute and read and write
61A3000
trusted library allocation
page read and write
616A000
trusted library allocation
page read and write
FEA000
unkown
page execute and write copy
6D7E000
stack
page read and write
50D0000
trusted library allocation
page read and write
171C000
heap
page read and write
6088000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
5C11000
trusted library allocation
page read and write
608E000
trusted library allocation
page read and write
9FA0000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
1728000
heap
page read and write
454E000
stack
page read and write
1703000
heap
page read and write
5C4E000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
478F000
stack
page read and write
6089000
trusted library allocation
page read and write
48CF000
stack
page read and write
6087000
trusted library allocation
page read and write
608C000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
1703000
heap
page read and write
5DCB000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
608C000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
450F000
stack
page read and write
163E000
heap
page read and write
5A7F000
stack
page read and write
171A000
heap
page read and write
5C04000
trusted library allocation
page read and write
6129000
trusted library allocation
page read and write
61B8000
trusted library allocation
page read and write
1444000
heap
page read and write
61D3000
trusted library allocation
page read and write
16A6000
heap
page read and write
CF1000
unkown
page execute and write copy
1701000
heap
page read and write
FAA000
unkown
page execute and read and write
5C66000
trusted library allocation
page read and write
1725000
heap
page read and write
31CF000
stack
page read and write
57EE000
stack
page read and write
6171000
trusted library allocation
page read and write
418E000
stack
page read and write
5C4E000
trusted library allocation
page read and write
5C05000
trusted library allocation
page read and write
6088000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
170E000
heap
page read and write
172A000
heap
page read and write
1430000
direct allocation
page read and write
62AB000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
163A000
heap
page read and write
5973000
heap
page read and write
5C04000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
6ABF000
stack
page read and write
5BF5000
trusted library allocation
page read and write
827F000
stack
page read and write
608E000
trusted library allocation
page read and write
1709000
heap
page read and write
6085000
trusted library allocation
page read and write
563F000
stack
page read and write
618F000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
1717000
heap
page read and write
6197000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
613A000
trusted library allocation
page read and write
61A8000
trusted library allocation
page read and write
61BB000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
172D000
heap
page read and write
817E000
stack
page read and write
608B000
trusted library allocation
page read and write
5BE3000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
61B7000
trusted library allocation
page read and write
464F000
stack
page read and write
5D50000
direct allocation
page read and write
8570000
direct allocation
page read and write
617B000
trusted library allocation
page read and write
61CE000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
737F000
stack
page read and write
6088000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
374F000
stack
page read and write
5C04000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
5BE6000
trusted library allocation
page read and write
172D000
heap
page read and write
618F000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
6AFE000
stack
page read and write
171C000
heap
page read and write
6087000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
4C91000
heap
page read and write
5BFA000
trusted library allocation
page read and write
1700000
heap
page read and write
61DF000
trusted library allocation
page read and write
139E000
stack
page read and write
8530000
trusted library allocation
page read and write
4C91000
heap
page read and write
6168000
trusted library allocation
page read and write
644A000
trusted library allocation
page execute and read and write
5C0C000
trusted library allocation
page read and write
6440000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
1444000
heap
page read and write
5D43000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
5E82000
trusted library allocation
page read and write
5C03000
trusted library allocation
page read and write
5C03000
trusted library allocation
page read and write
61FC000
trusted library allocation
page read and write
5C06000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
6146000
trusted library allocation
page read and write
1703000
heap
page read and write
6081000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C01000
trusted library allocation
page read and write
58EF000
stack
page read and write
7C3F000
stack
page read and write
4C91000
heap
page read and write
6084000
trusted library allocation
page read and write
172A000
heap
page read and write
171C000
heap
page read and write
168C000
heap
page read and write
66F2000
trusted library allocation
page execute and read and write
608C000
trusted library allocation
page read and write
170E000
heap
page read and write
1700000
heap
page read and write
61AD000
trusted library allocation
page read and write
608F000
trusted library allocation
page read and write
172A000
heap
page read and write
16FF000
heap
page read and write
171A000
heap
page read and write
697F000
stack
page read and write
5C4E000
trusted library allocation
page read and write
1701000
heap
page read and write
5C42000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
6084000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
5C13000
trusted library allocation
page read and write
4C91000
heap
page read and write
7B3E000
stack
page read and write
CF0000
unkown
page readonly
378E000
stack
page read and write
624F000
trusted library allocation
page read and write
6169000
trusted library allocation
page read and write
170E000
heap
page read and write
1717000
heap
page read and write
1713000
heap
page read and write
5C0C000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
400F000
stack
page read and write
5C4C000
trusted library allocation
page read and write
4C91000
heap
page read and write
1430000
direct allocation
page read and write
5BE2000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
350E000
stack
page read and write
5C15000
trusted library allocation
page read and write
5C13000
trusted library allocation
page read and write
33CF000
stack
page read and write
5780000
remote allocation
page read and write
7DBE000
stack
page read and write
6084000
trusted library allocation
page read and write
83FE000
stack
page read and write
5970000
heap
page read and write
170C000
heap
page read and write
673E000
stack
page read and write
75FF000
stack
page read and write
440E000
stack
page read and write
608C000
trusted library allocation
page read and write
170F000
heap
page read and write
1717000
heap
page read and write
4CA0000
heap
page read and write
6087000
trusted library allocation
page read and write
616A000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
1728000
heap
page read and write
5BFA000
trusted library allocation
page read and write
39CF000
stack
page read and write
608D000
trusted library allocation
page read and write
172D000
heap
page read and write
5BFC000
trusted library allocation
page read and write
6218000
trusted library allocation
page read and write
6088000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
3C4F000
stack
page read and write
5E80000
trusted library allocation
page read and write
3D8F000
stack
page read and write
34CF000
stack
page read and write
1444000
heap
page read and write
5C4F000
trusted library allocation
page read and write
4B8E000
stack
page read and write
FDB000
unkown
page execute and read and write
5C03000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
170F000
heap
page read and write
6127000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
CE0000
heap
page read and write
61A4000
trusted library allocation
page read and write
5C24000
trusted library allocation
page read and write
170C000
heap
page read and write
172D000
heap
page read and write
5BEC000
trusted library allocation
page read and write
1728000
heap
page read and write
6152000
trusted library allocation
page read and write
887E000
stack
page read and write
5C12000
trusted library allocation
page read and write
1444000
heap
page read and write
5DC3000
trusted library allocation
page read and write
16FC000
heap
page read and write
53FD000
stack
page read and write
1444000
heap
page read and write
6089000
trusted library allocation
page read and write
428F000
stack
page read and write
5780000
remote allocation
page read and write
5C2D000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
73BE000
stack
page read and write
5BF1000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
84FF000
stack
page read and write
5C0C000
trusted library allocation
page read and write
5BF7000
trusted library allocation
page read and write
CE7000
heap
page read and write
61CC000
trusted library allocation
page read and write
5C86000
trusted library allocation
page read and write
43CE000
stack
page read and write
6134000
trusted library allocation
page read and write
404E000
stack
page read and write
172A000
heap
page read and write
172D000
heap
page read and write
5C15000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
61CB000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
38CE000
stack
page read and write
170C000
heap
page read and write
6144000
trusted library allocation
page read and write
6082000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
172A000
heap
page read and write
727E000
stack
page read and write
5C2C000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
6439000
stack
page read and write
608A000
trusted library allocation
page read and write
172A000
heap
page read and write
5DBB000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
1728000
heap
page read and write
3F0E000
stack
page read and write
621A000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
79BF000
stack
page read and write
15CE000
stack
page read and write
5C14000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
61AF000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
61CF000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
69BE000
stack
page read and write
62AD000
trusted library allocation
page read and write
61B5000
trusted library allocation
page read and write
4C91000
heap
page read and write
6086000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
4C91000
heap
page read and write
723F000
stack
page read and write
5C06000
trusted library allocation
page read and write
614D000
trusted library allocation
page read and write
172A000
heap
page read and write
524F000
stack
page read and write
5280000
direct allocation
page execute and read and write
1703000
heap
page read and write
5C0D000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
6129000
trusted library allocation
page read and write
1180000
unkown
page execute and read and write
5C15000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
8880000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
171D000
heap
page read and write
5280000
direct allocation
page execute and read and write
687C000
stack
page read and write
4C91000
heap
page read and write
6FFE000
stack
page read and write
171D000
heap
page read and write
30CF000
stack
page read and write
8500000
direct allocation
page read and write
6332000
trusted library allocation
page read and write
1697000
heap
page read and write
6089000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
61CD000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
1444000
heap
page read and write
632D000
trusted library allocation
page read and write
61C9000
trusted library allocation
page read and write
CF1000
unkown
page execute and read and write
C40000
heap
page read and write
577E000
stack
page read and write
1430000
direct allocation
page read and write
528E000
stack
page read and write
5BF1000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
1444000
heap
page read and write
5CE3000
trusted library allocation
page read and write
6229000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
5C04000
trusted library allocation
page read and write
5BFA000
trusted library allocation
page read and write
66E1000
trusted library allocation
page execute and read and write
6088000
trusted library allocation
page read and write
4C91000
heap
page read and write
630A000
trusted library allocation
page read and write
4C90000
heap
page read and write
5BE1000
trusted library allocation
page read and write
70FF000
stack
page read and write
172D000
heap
page read and write
5C36000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
172C000
heap
page read and write
5C15000
trusted library allocation
page read and write
5BF6000
trusted library allocation
page read and write
6179000
trusted library allocation
page read and write
86C0000
direct allocation
page execute and read and write
6133000
trusted library allocation
page read and write
5C05000
trusted library allocation
page read and write
FD5000
unkown
page execute and read and write
6292000
trusted library allocation
page read and write
803E000
stack
page read and write
6083000
trusted library allocation
page read and write
8C3C000
stack
page read and write
172A000
heap
page read and write
8500000
direct allocation
page read and write
608B000
trusted library allocation
page read and write
6179000
trusted library allocation
page read and write
6082000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
6091000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
514C000
stack
page read and write
6088000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
618D000
trusted library allocation
page read and write
5BE6000
trusted library allocation
page read and write
618F000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
1444000
heap
page read and write
86F0000
direct allocation
page execute and read and write
6167000
trusted library allocation
page read and write
4C91000
heap
page read and write
490E000
stack
page read and write
170C000
heap
page read and write
5C2C000
trusted library allocation
page read and write
1444000
heap
page read and write
8550000
heap
page read and write
6083000
trusted library allocation
page read and write
7EFE000
stack
page read and write
1444000
heap
page read and write
8BBE000
stack
page read and write
171C000
heap
page read and write
5C39000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
5250000
direct allocation
page execute and read and write
5C1B000
trusted library allocation
page read and write
128A000
stack
page read and write
5C18000
trusted library allocation
page read and write
787F000
stack
page read and write
5C2B000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
6FBF000
stack
page read and write
5280000
direct allocation
page execute and read and write
6086000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
1444000
heap
page read and write
5C15000
trusted library allocation
page read and write
5BFC000
trusted library allocation
page read and write
5154000
direct allocation
page read and write
6EBE000
stack
page read and write
5BF2000
trusted library allocation
page read and write
608A000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
6BFF000
stack
page read and write
61FE000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
888A000
trusted library allocation
page read and write
608B000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
1444000
heap
page read and write
5BED000
trusted library allocation
page read and write
A7DE000
stack
page read and write
5C34000
trusted library allocation
page read and write
6446000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
1705000
heap
page read and write
5290000
direct allocation
page execute and read and write
5C1A000
trusted library allocation
page read and write
1716000
heap
page read and write
6091000
trusted library allocation
page read and write
1700000
heap
page read and write
171C000
heap
page read and write
171F000
heap
page read and write
5CE4000
trusted library allocation
page read and write
16FC000
heap
page read and write
6150000
trusted library allocation
page read and write
61B9000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
632B000
trusted library allocation
page read and write
61CB000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
626A000
trusted library allocation
page read and write
D35000
unkown
page execute and read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
62FF000
trusted library allocation
page read and write
5BDE000
stack
page read and write
5BED000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
6174000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
5C2D000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
1444000
heap
page read and write
6085000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
16A3000
heap
page read and write
8500000
direct allocation
page read and write
5C0F000
trusted library allocation
page read and write
170C000
heap
page read and write
5C04000
trusted library allocation
page read and write
3DCE000
stack
page read and write
61D1000
trusted library allocation
page read and write
6082000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
85AC000
stack
page read and write
5BF1000
trusted library allocation
page read and write
620F000
trusted library allocation
page read and write
8882000
trusted library allocation
page read and write
608B000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
4A0F000
stack
page read and write
52C4000
trusted library allocation
page read and write
172C000
heap
page read and write
6083000
trusted library allocation
page read and write
170C000
heap
page read and write
713E000
stack
page read and write
612B000
trusted library allocation
page read and write
622B000
trusted library allocation
page read and write
16A6000
heap
page read and write
5C15000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
6272000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
8500000
direct allocation
page read and write
1705000
heap
page read and write
615A000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
169A000
heap
page read and write
6270000
trusted library allocation
page read and write
617B000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
608B000
trusted library allocation
page read and write
82BE000
stack
page read and write
5BE1000
trusted library allocation
page read and write
61A1000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
1440000
heap
page read and write
5C15000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
5BFD000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
608D000
trusted library allocation
page read and write
A8DF000
stack
page read and write
1728000
heap
page read and write
5BFD000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
171C000
heap
page read and write
5C06000
trusted library allocation
page read and write
13DE000
stack
page read and write
158E000
stack
page read and write
5BEF000
trusted library allocation
page read and write
4C91000
heap
page read and write
1706000
heap
page read and write
86AF000
stack
page read and write
608A000
trusted library allocation
page read and write
61C5000
trusted library allocation
page read and write
6E7F000
stack
page read and write
61D5000
trusted library allocation
page read and write
1444000
heap
page read and write
6083000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
1701000
heap
page read and write
5C15000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
5C15000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
6248000
trusted library allocation
page read and write
5C7E000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
608D000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
5D23000
trusted library allocation
page read and write
7AFF000
stack
page read and write
182E000
stack
page read and write
5C15000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
6137000
trusted library allocation
page read and write
813F000
stack
page read and write
5D19000
stack
page read and write
5C1B000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
553E000
stack
page read and write
5C2E000
trusted library allocation
page read and write
5BEE000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
61E1000
trusted library allocation
page read and write
5110000
direct allocation
page read and write
160E000
stack
page read and write
5BFD000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
763E000
stack
page read and write
364E000
stack
page read and write
16A6000
heap
page read and write
6083000
trusted library allocation
page read and write
172D000
heap
page read and write
1683000
heap
page read and write
608E000
trusted library allocation
page read and write
170C000
heap
page read and write
5BF2000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
141B000
stack
page read and write
5D93000
trusted library allocation
page read and write
16FD000
heap
page read and write
1709000
heap
page read and write
172A000
heap
page read and write
6C3E000
stack
page read and write
8D3C000
stack
page read and write
5C15000
trusted library allocation
page read and write
5BFD000
trusted library allocation
page read and write
1430000
direct allocation
page read and write
6251000
trusted library allocation
page read and write
626C000
trusted library allocation
page read and write
7EBF000
stack
page read and write
608F000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
74FE000
stack
page read and write
5CE2000
trusted library allocation
page read and write
8500000
direct allocation
page read and write
5C03000
trusted library allocation
page read and write
683F000
stack
page read and write
5BF5000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
6294000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
170A000
heap
page read and write
8500000
direct allocation
page read and write
5BED000
trusted library allocation
page read and write
5C03000
trusted library allocation
page read and write
614F000
trusted library allocation
page read and write
468E000
stack
page read and write
170C000
heap
page read and write
1430000
direct allocation
page read and write
6091000
trusted library allocation
page read and write
4B4F000
stack
page read and write
1444000
heap
page read and write
5BEF000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
5C0D000
trusted library allocation
page read and write
61A2000
trusted library allocation
page read and write
There are 807 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0