IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
ASCII text
dropped
Chrome Cache Entry: 101
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 102
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 104
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 105
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 106
JSON data
dropped
Chrome Cache Entry: 107
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 108
JSON data
downloaded
Chrome Cache Entry: 109
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 67
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 68
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 69
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 70
JSON data
dropped
Chrome Cache Entry: 71
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 72
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 73
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 74
JSON data
dropped
Chrome Cache Entry: 75
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 76
JSON data
downloaded
Chrome Cache Entry: 77
JSON data
dropped
Chrome Cache Entry: 78
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 80
ASCII text
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 82
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 83
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 84
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 88
JSON data
dropped
Chrome Cache Entry: 89
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 90
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 92
JSON data
downloaded
Chrome Cache Entry: 93
JSON data
dropped
Chrome Cache Entry: 94
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
JSON data
downloaded
Chrome Cache Entry: 96
JSON data
dropped
Chrome Cache Entry: 97
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 98
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (46884)
dropped
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1988,i,5820746288978107784,3213896217040591065,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1712 --field-trial-handle=2020,i,16253832576636000712,15236952978649801762,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://cook-rain.sbs/L
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://cook-rain.sbs/apiE
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
http://185.215.113.16/off/def.exel
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.mozilla.or
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
188.114.97.3
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.45
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=169648449
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://github.com/dotnet/try
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
188.114.97.3
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
172.217.16.132
s-part-0032.t-0009.t-msedge.net
13.107.246.60
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
13.107.246.60
s-part-0032.t-0009.t-msedge.net
United States
188.114.97.3
cook-rain.sbs
European Union
239.255.255.250
unknown
Reserved
172.217.16.132
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4D1000
unkown
page execute and read and write
malicious
5AC6000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
5BE3000
trusted library allocation
page read and write
D90000
heap
page read and write
5819000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
F04000
heap
page read and write
5AC2000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
45AF000
stack
page read and write
5C30000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
5ACD000
trusted library allocation
page read and write
8420000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
583E000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
4D0000
unkown
page read and write
5AC4000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
3AAE000
stack
page read and write
580A000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
57E0000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
4840000
heap
page read and write
583E000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
F04000
heap
page read and write
581F000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
EC7000
heap
page read and write
5886000
trusted library allocation
page read and write
580F000
trusted library allocation
page read and write
4831000
heap
page read and write
709E000
stack
page read and write
5AC4000
trusted library allocation
page read and write
2B10000
direct allocation
page read and write
57C4000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
57EF000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
8270000
direct allocation
page execute and read and write
57F7000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
5F6B000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
ED8000
heap
page read and write
111F000
stack
page read and write
581D000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
2A3E000
stack
page read and write
2D2F000
stack
page read and write
EC5000
heap
page read and write
57F0000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
745E000
stack
page read and write
57E6000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
EBB000
heap
page read and write
583B000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
EE0000
heap
page read and write
EA5000
heap
page read and write
57F5000
trusted library allocation
page read and write
EC9000
heap
page read and write
5DBE000
stack
page read and write
80B0000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
583E000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
4831000
heap
page read and write
5AC7000
trusted library allocation
page read and write
82A0000
direct allocation
page execute and read and write
57F3000
trusted library allocation
page read and write
7F9E000
stack
page read and write
5843000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
4F6D000
stack
page read and write
5854000
trusted library allocation
page read and write
35AE000
stack
page read and write
5BF1000
trusted library allocation
page read and write
5D7C000
stack
page read and write
57F6000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
EBE000
heap
page read and write
5802000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
3E2F000
stack
page read and write
80B0000
direct allocation
page read and write
EF0000
direct allocation
page read and write
5BF5000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
5BC8000
trusted library allocation
page read and write
869C000
stack
page read and write
5BD2000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
4E7A000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5B5B000
trusted library allocation
page read and write
5DFE000
stack
page read and write
57D8000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
4831000
heap
page read and write
45EE000
stack
page read and write
7B9F000
stack
page read and write
56BD000
stack
page read and write
59A3000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
EBB000
heap
page read and write
5AC7000
trusted library allocation
page read and write
EB3000
heap
page read and write
5843000
trusted library allocation
page read and write
5E40000
direct allocation
page read and write
5807000
trusted library allocation
page read and write
6B5F000
stack
page read and write
EB2000
heap
page read and write
57EF000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5844000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
5818000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
879C000
stack
page read and write
58C2000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5836000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
6222000
trusted library allocation
page execute and read and write
5843000
trusted library allocation
page read and write
5834000
trusted library allocation
page read and write
6E1E000
stack
page read and write
57E0000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5ACD000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
532F000
stack
page read and write
5843000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
7A9E000
stack
page read and write
5B9F000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
7E6000
unkown
page execute and read and write
5843000
trusted library allocation
page read and write
F04000
heap
page read and write
57E1000
trusted library allocation
page read and write
7CDF000
stack
page read and write
7F5F000
stack
page read and write
583E000
trusted library allocation
page read and write
E9D000
heap
page read and write
4DF0000
direct allocation
page execute and read and write
76DE000
stack
page read and write
5824000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
705F000
stack
page read and write
5CA6000
trusted library allocation
page read and write
57FB000
trusted library allocation
page read and write
C3B000
stack
page read and write
3A6F000
stack
page read and write
5AC2000
trusted library allocation
page read and write
5833000
trusted library allocation
page read and write
57C7000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
809F000
stack
page read and write
57CF000
trusted library allocation
page read and write
8150000
heap
page read and write
5B67000
trusted library allocation
page read and write
101E000
stack
page read and write
57F6000
trusted library allocation
page read and write
4831000
heap
page read and write
5CCD000
trusted library allocation
page read and write
7A5F000
stack
page read and write
5843000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
4831000
heap
page read and write
5843000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
F04000
heap
page read and write
5BBB000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
4831000
heap
page read and write
5B9D000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
382E000
stack
page read and write
57F6000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
6CDE000
stack
page read and write
5843000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
EC2000
heap
page read and write
57FE000
trusted library allocation
page read and write
57CE000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
6226000
trusted library allocation
page read and write
4E00000
direct allocation
page execute and read and write
583E000
trusted library allocation
page read and write
57CB000
trusted library allocation
page read and write
549F000
stack
page read and write
5853000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
825E000
stack
page read and write
583E000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
5BF2000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
422E000
stack
page read and write
4831000
heap
page read and write
5843000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
7E7000
unkown
page execute and write copy
5849000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
5ACF000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
ED5000
heap
page read and write
306F000
stack
page read and write
5BF4000
trusted library allocation
page read and write
F04000
heap
page read and write
583D000
trusted library allocation
page read and write
332E000
stack
page read and write
539E000
stack
page read and write
5B9F000
trusted library allocation
page read and write
795E000
stack
page read and write
5849000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
77DF000
stack
page read and write
57E5000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
482F000
stack
page read and write
993000
unkown
page execute and read and write
5BEF000
trusted library allocation
page read and write
5BF4000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
580F000
trusted library allocation
page read and write
EC7000
heap
page read and write
8110000
direct allocation
page read and write
5836000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
EC2000
heap
page read and write
57F5000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5BB4000
trusted library allocation
page read and write
80E0000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
A3CF000
stack
page read and write
581B000
trusted library allocation
page read and write
ED4000
heap
page read and write
40EE000
stack
page read and write
5850000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
4831000
heap
page read and write
5BB4000
trusted library allocation
page read and write
5ACB000
trusted library allocation
page read and write
F04000
heap
page read and write
583E000
trusted library allocation
page read and write
37EF000
stack
page read and write
80B0000
direct allocation
page read and write
5C18000
trusted library allocation
page read and write
63AF000
trusted library allocation
page execute and read and write
2B10000
direct allocation
page read and write
5CDF000
trusted library allocation
page read and write
EB2000
heap
page read and write
583E000
trusted library allocation
page read and write
432F000
stack
page read and write
5824000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
3CEF000
stack
page read and write
EC2000
heap
page read and write
57C8000
trusted library allocation
page read and write
731E000
stack
page read and write
EBE000
heap
page read and write
5AD1000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
F04000
heap
page read and write
5843000
trusted library allocation
page read and write
759E000
stack
page read and write
57FB000
trusted library allocation
page read and write
4FAD000
stack
page read and write
446F000
stack
page read and write
57F1000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
66DF000
stack
page read and write
57F6000
trusted library allocation
page read and write
2F6E000
stack
page read and write
5ACF000
trusted library allocation
page read and write
584A000
trusted library allocation
page read and write
51EF000
stack
page read and write
2A7C000
stack
page read and write
5816000
trusted library allocation
page read and write
522E000
stack
page read and write
4C70000
heap
page read and write
583E000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
6B8000
unkown
page execute and read and write
5827000
trusted library allocation
page read and write
6DDF000
stack
page read and write
581E000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
EC2000
heap
page read and write
3BEE000
stack
page read and write
57EF000
trusted library allocation
page read and write
ECB000
heap
page read and write
57E6000
trusted library allocation
page read and write
71DE000
stack
page read and write
5C36000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5835000
trusted library allocation
page read and write
7D7000
unkown
page execute and read and write
5BED000
trusted library allocation
page read and write
50EE000
stack
page read and write
4831000
heap
page read and write
57D5000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
5E3E000
stack
page read and write
5F69000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
41EF000
stack
page read and write
57E5000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
4CF4000
direct allocation
page read and write
589A000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
5330000
remote allocation
page read and write
ED4000
heap
page read and write
68DF000
stack
page read and write
5B55000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
DEA000
heap
page read and write
5843000
trusted library allocation
page read and write
EAE000
heap
page read and write
5C0F000
trusted library allocation
page read and write
5BF3000
trusted library allocation
page read and write
719F000
stack
page read and write
57D2000
trusted library allocation
page read and write
46EF000
stack
page read and write
57D5000
trusted library allocation
page read and write
5BCF000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
584B000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
2F2F000
stack
page read and write
5B5D000
trusted library allocation
page read and write
31AF000
stack
page read and write
5AC7000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
ED4000
heap
page read and write
57F6000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
57C4000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
40AF000
stack
page read and write
582D000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
342F000
stack
page read and write
8422000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
5DC2000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5B66000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
5833000
trusted library allocation
page read and write
755F000
stack
page read and write
36AF000
stack
page read and write
583E000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
60F4000
trusted library allocation
page read and write
F00000
heap
page read and write
57D5000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
560F000
stack
page read and write
5C12000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
741F000
stack
page read and write
57F6000
trusted library allocation
page read and write
F04000
heap
page read and write
5BF2000
trusted library allocation
page read and write
436E000
stack
page read and write
5843000
trusted library allocation
page read and write
5670000
heap
page read and write
EC1000
heap
page read and write
4831000
heap
page read and write
5BBD000
trusted library allocation
page read and write
DEE000
heap
page read and write
7E5E000
stack
page read and write
583E000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
E49000
heap
page read and write
58C2000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
EC2000
heap
page read and write
5C8B000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
E18000
heap
page read and write
587C000
trusted library allocation
page read and write
4831000
heap
page read and write
5BE2000
trusted library allocation
page read and write
5673000
heap
page read and write
5C73000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
581E000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5CD1000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
5CCF000
trusted library allocation
page read and write
50AD000
stack
page read and write
57D5000
trusted library allocation
page read and write
87DE000
stack
page read and write
57DB000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
57FE000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
2B20000
heap
page read and write
57E8000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
842A000
trusted library allocation
page read and write
4DEF000
stack
page read and write
F04000
heap
page read and write
5830000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
EC2000
heap
page read and write
ED6000
heap
page read and write
5C75000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
4D0000
unkown
page readonly
4CB0000
direct allocation
page read and write
57F6000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57F5000
trusted library allocation
page read and write
62DC000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5B98000
trusted library allocation
page read and write
5BE4000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
6F5E000
stack
page read and write
5C10000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
57CB000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
5843000
trusted library allocation
page read and write
EBF000
heap
page read and write
584B000
trusted library allocation
page read and write
5AF9000
stack
page read and write
EC8000
heap
page read and write
ED7000
heap
page read and write
5B98000
trusted library allocation
page read and write
31EE000
stack
page read and write
5E54000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5807000
trusted library allocation
page read and write
F04000
heap
page read and write
4E10000
direct allocation
page execute and read and write
5835000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
125E000
stack
page read and write
57F8000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
36EE000
stack
page read and write
583E000
trusted library allocation
page read and write
EBE000
heap
page read and write
3E6D000
stack
page read and write
515000
unkown
page execute and read and write
5825000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
5B53000
trusted library allocation
page read and write
ED9000
heap
page read and write
57E5000
trusted library allocation
page read and write
3BAF000
stack
page read and write
5843000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
64CC000
trusted library allocation
page execute and read and write
5843000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
EB2000
heap
page read and write
57E6000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
356F000
stack
page read and write
5B68000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
528000
unkown
page execute and read and write
585E000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
5BC5000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
4831000
heap
page read and write
5AC7000
trusted library allocation
page read and write
F04000
heap
page read and write
5973000
trusted library allocation
page read and write
ECA000
heap
page read and write
581D000
trusted library allocation
page read and write
769F000
stack
page read and write
4E20000
direct allocation
page execute and read and write
4CEB000
stack
page read and write
F04000
heap
page read and write
5ACE000
trusted library allocation
page read and write
4831000
heap
page read and write
57F6000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
32EF000
stack
page read and write
57E6000
trusted library allocation
page read and write
7BDE000
stack
page read and write
5AC1000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
F04000
heap
page read and write
5833000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5BED000
trusted library allocation
page read and write
F04000
heap
page read and write
5827000
trusted library allocation
page read and write
44AE000
stack
page read and write
5AC1000
trusted library allocation
page read and write
F04000
heap
page read and write
72DF000
stack
page read and write
5952000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
584B000
trusted library allocation
page read and write
5F6C000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
F04000
heap
page read and write
6F1F000
stack
page read and write
57E5000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
7E6000
unkown
page execute and write copy
5BEC000
trusted library allocation
page read and write
589A000
trusted library allocation
page read and write
5837000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
F04000
heap
page read and write
5827000
trusted library allocation
page read and write
791F000
stack
page read and write
583E000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
57F0000
trusted library allocation
page read and write
EA5000
heap
page read and write
EF0000
direct allocation
page read and write
5843000
trusted library allocation
page read and write
5D3F000
stack
page read and write
D80000
heap
page read and write
57F6000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
57F3000
trusted library allocation
page read and write
5BC3000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
6A5E000
stack
page read and write
6C9F000
stack
page read and write
781E000
stack
page read and write
5F67000
trusted library allocation
page read and write
5C11000
trusted library allocation
page read and write
EC2000
heap
page read and write
5AC4000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
EBE000
heap
page read and write
65DF000
stack
page read and write
5843000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
80B0000
direct allocation
page read and write
5AC0000
trusted library allocation
page read and write
4831000
heap
page read and write
5ACD000
trusted library allocation
page read and write
ED9000
heap
page read and write
5823000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
80F0000
heap
page read and write
550E000
stack
page read and write
57F5000
trusted library allocation
page read and write
392F000
stack
page read and write
5844000
trusted library allocation
page read and write
5330000
remote allocation
page read and write
583E000
trusted library allocation
page read and write
4831000
heap
page read and write
5819000
trusted library allocation
page read and write
994000
unkown
page execute and write copy
5841000
trusted library allocation
page read and write
EBE000
heap
page read and write
5843000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
ED8000
heap
page read and write
EBE000
heap
page read and write
5B78000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
5AC2000
trusted library allocation
page read and write
EB3000
heap
page read and write
5843000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
F04000
heap
page read and write
5AC7000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
EC8000
heap
page read and write
5AC1000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
7D1E000
stack
page read and write
4831000
heap
page read and write
2E2F000
stack
page read and write
ED7000
heap
page read and write
580A000
trusted library allocation
page read and write
584B000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
6B9E000
stack
page read and write
5843000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
EC2000
heap
page read and write
9AD0000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
5871000
trusted library allocation
page read and write
5ACC000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
57D2000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
5C11000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
5843000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
3D2E000
stack
page read and write
4831000
heap
page read and write
583E000
trusted library allocation
page read and write
5B83000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
EC8000
heap
page read and write
581D000
trusted library allocation
page read and write
5330000
remote allocation
page read and write
5827000
trusted library allocation
page read and write
57C8000
trusted library allocation
page read and write
5C11000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
581E000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
E32000
heap
page read and write
5BF3000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
5C2E000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5844000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5B7C000
trusted library allocation
page read and write
7E1F000
stack
page read and write
5BBF000
trusted library allocation
page read and write
5AC7000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
64BE000
trusted library allocation
page execute and read and write
5BD4000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
691E000
stack
page read and write
5BF9000
stack
page read and write
5824000
trusted library allocation
page read and write
472E000
stack
page read and write
57E6000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
7A6000
unkown
page execute and read and write
57E6000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
3FAE000
stack
page read and write
5ACB000
trusted library allocation
page read and write
584A000
trusted library allocation
page read and write
2B27000
heap
page read and write
5821000
trusted library allocation
page read and write
EC8000
heap
page read and write
E55000
heap
page read and write
5ACA000
trusted library allocation
page read and write
6203000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
599B000
trusted library allocation
page read and write
2ABE000
stack
page read and write
4831000
heap
page read and write
396E000
stack
page read and write
2AFE000
stack
page read and write
80B0000
direct allocation
page read and write
5848000
trusted library allocation
page read and write
3F6F000
stack
page read and write
57DA000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
8110000
direct allocation
page read and write
57EB000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
67DF000
stack
page read and write
80B0000
direct allocation
page read and write
4831000
heap
page read and write
5CD3000
trusted library allocation
page read and write
622A000
trusted library allocation
page execute and read and write
80B0000
direct allocation
page read and write
5829000
trusted library allocation
page read and write
57C7000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
2C2F000
stack
page read and write
58CB000
trusted library allocation
page read and write
7CF000
unkown
page execute and read and write
5B7C000
trusted library allocation
page read and write
5ACD000
trusted library allocation
page read and write
4E2E000
stack
page read and write
5C3E000
stack
page read and write
5C34000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
5AC4000
trusted library allocation
page read and write
EC0000
heap
page read and write
583E000
trusted library allocation
page read and write
814C000
stack
page read and write
57E5000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
4831000
heap
page read and write
4830000
heap
page read and write
5B7A000
trusted library allocation
page read and write
57BE000
stack
page read and write
5ACE000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
EAE000
heap
page read and write
5815000
trusted library allocation
page read and write
EB8000
heap
page read and write
30AE000
stack
page read and write
5909000
trusted library allocation
page read and write
64CE000
trusted library allocation
page execute and read and write
F04000
heap
page read and write
5AC9000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
5F66000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
115D000
stack
page read and write
583E000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
4D1000
unkown
page execute and write copy
346E000
stack
page read and write
F04000
heap
page read and write
583E000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
4930000
trusted library allocation
page read and write
DE0000
heap
page read and write
57F5000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
5B85000
trusted library allocation
page read and write
6A1F000
stack
page read and write
5843000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
D3B000
stack
page read and write
5843000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
5F6D000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
ED5000
heap
page read and write
5AC7000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
There are 886 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0