IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JSON data
downloaded
Chrome Cache Entry: 101
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 102
JSON data
downloaded
Chrome Cache Entry: 103
JSON data
dropped
Chrome Cache Entry: 104
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 105
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 107
ASCII text
dropped
Chrome Cache Entry: 108
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 109
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 111
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 112
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 113
JSON data
dropped
Chrome Cache Entry: 114
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 115
JSON data
downloaded
Chrome Cache Entry: 116
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 77
JSON data
dropped
Chrome Cache Entry: 78
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 79
JSON data
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 82
JSON data
dropped
Chrome Cache Entry: 83
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 84
JSON data
downloaded
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 87
ASCII text
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 89
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 91
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 92
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 93
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 94
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 96
JSON data
dropped
Chrome Cache Entry: 97
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 98
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (33148), with no line terminators
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1924,i,16693149984039008949,18427732997764737227,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1928,i,15905540884992955177,16070851734019653976,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://cook-rain.sbs/Hf
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://cook-rain.sbs/apibe
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://cook-rain.sbs/zf
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
104.21.66.38
http://185.215.113.16/steam/random.exeI
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://cook-rain.sbs/Af
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://cook-rain.sbs/apigs
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://cook-rain.sbs/Wf
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
https://cook-rain.sbs/api_
unknown
There are 69 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
104.21.66.38
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
104.21.66.38
cook-rain.sbs
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
141000
unkown
page execute and read and write
malicious
5C35000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
5C6E000
trusted library allocation
page read and write
2E2F000
stack
page read and write
56BF000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
5B41000
trusted library allocation
page read and write
5240000
remote allocation
page read and write
5B43000
trusted library allocation
page read and write
F8A000
heap
page read and write
56E8000
trusted library allocation
page read and write
79BE000
stack
page read and write
A39E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
4D4D000
stack
page read and write
9F7000
heap
page read and write
56CF000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
7AFE000
stack
page read and write
56A1000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
5C7B000
trusted library allocation
page read and write
61FE000
stack
page read and write
56AB000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
56D4000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
F74000
heap
page read and write
4D10000
direct allocation
page execute and read and write
4BFB000
stack
page read and write
556E000
stack
page read and write
56BE000
trusted library allocation
page read and write
F7C000
heap
page read and write
5DBC000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
E34000
heap
page read and write
5B4D000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
523E000
stack
page read and write
5BD8000
trusted library allocation
page read and write
E34000
heap
page read and write
56A8000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
66BF000
stack
page read and write
5C96000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
5753000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
E9A000
heap
page read and write
56E7000
trusted library allocation
page read and write
F60000
heap
page read and write
5C6B000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
56E7000
trusted library allocation
page read and write
31EF000
stack
page read and write
5C08000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
3D6D000
stack
page read and write
4D40000
direct allocation
page execute and read and write
6F7F000
stack
page read and write
7FC0000
direct allocation
page read and write
56CC000
trusted library allocation
page read and write
5C9F000
trusted library allocation
page read and write
2E6E000
stack
page read and write
570F000
trusted library allocation
page read and write
F7A000
heap
page read and write
571B000
trusted library allocation
page read and write
E9E000
heap
page read and write
566F000
stack
page read and write
56B4000
trusted library allocation
page read and write
5B49000
trusted library allocation
page read and write
56A5000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
61AB000
trusted library allocation
page execute and read and write
5708000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
5919000
trusted library allocation
page read and write
5D7000
unkown
page execute and write copy
F7B000
heap
page read and write
5513000
heap
page read and write
5240000
remote allocation
page read and write
56E2000
trusted library allocation
page read and write
F40000
heap
page read and write
F7F000
heap
page read and write
5C8E000
trusted library allocation
page read and write
57A6000
trusted library allocation
page read and write
7ABF000
stack
page read and write
3C2E000
stack
page read and write
5B49000
trusted library allocation
page read and write
99E0000
trusted library allocation
page read and write
66FE000
stack
page read and write
56AE000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
513E000
stack
page read and write
5B43000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
E90000
heap
page read and write
141000
unkown
page execute and write copy
5BFD000
trusted library allocation
page read and write
E7D000
stack
page read and write
E34000
heap
page read and write
56D7000
trusted library allocation
page read and write
E34000
heap
page read and write
56F8000
trusted library allocation
page read and write
F84000
heap
page read and write
7FC0000
direct allocation
page read and write
E34000
heap
page read and write
5C3B000
trusted library allocation
page read and write
56B6000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
4B80000
heap
page read and write
570A000
trusted library allocation
page read and write
322E000
stack
page read and write
F70000
heap
page read and write
57E1000
trusted library allocation
page read and write
5C08000
trusted library allocation
page read and write
773E000
stack
page read and write
876C000
stack
page read and write
8000000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
57AA000
trusted library allocation
page read and write
5D35000
trusted library allocation
page read and write
436F000
stack
page read and write
426E000
stack
page read and write
5753000
trusted library allocation
page read and write
6E7E000
stack
page read and write
5B4F000
trusted library allocation
page read and write
4731000
heap
page read and write
6E3F000
stack
page read and write
5C38000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
70BF000
stack
page read and write
44EE000
stack
page read and write
787E000
stack
page read and write
4731000
heap
page read and write
5C98000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
807C000
stack
page read and write
56B8000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
8020000
direct allocation
page read and write
5C78000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
F63000
heap
page read and write
56E7000
trusted library allocation
page read and write
9B0000
heap
page read and write
E34000
heap
page read and write
5BEA000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
8030000
heap
page read and write
56C6000
trusted library allocation
page read and write
35AF000
stack
page read and write
56B1000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
4731000
heap
page read and write
73CE1000
unkown
page execute read
56AE000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
6A7F000
stack
page read and write
56D6000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
320000
unkown
page execute and read and write
5B47000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
5787000
trusted library allocation
page read and write
5B4C000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
E34000
heap
page read and write
56FF000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
8020000
direct allocation
page read and write
5BFE000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5B43000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
4731000
heap
page read and write
5B44000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
4731000
heap
page read and write
783F000
stack
page read and write
56E7000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
56D5000
trusted library allocation
page read and write
CFA000
stack
page read and write
5CDB000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
4740000
heap
page read and write
E80000
direct allocation
page read and write
E80000
direct allocation
page read and write
5B4C000
trusted library allocation
page read and write
61BC000
trusted library allocation
page execute and read and write
35EE000
stack
page read and write
817E000
stack
page read and write
56D3000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
39AE000
stack
page read and write
5B43000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
5B43000
trusted library allocation
page read and write
4731000
heap
page read and write
5BE7000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
56FB000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
412E000
stack
page read and write
F76000
heap
page read and write
5C6C000
trusted library allocation
page read and write
3FAF000
stack
page read and write
573B000
trusted library allocation
page read and write
F76000
heap
page read and write
647E000
stack
page read and write
56E7000
trusted library allocation
page read and write
34AE000
stack
page read and write
56C4000
trusted library allocation
page read and write
56E5000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
F60000
heap
page read and write
56D3000
trusted library allocation
page read and write
336E000
stack
page read and write
56BC000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
4731000
heap
page read and write
2A6F000
stack
page read and write
5B4F000
trusted library allocation
page read and write
E0E000
stack
page read and write
2FAE000
stack
page read and write
56E7000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
F66000
heap
page read and write
5B4A000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
5BE5000
trusted library allocation
page read and write
401000
unkown
page execute and read and write
EC8000
heap
page read and write
F64000
heap
page read and write
61B9000
trusted library allocation
page read and write
E34000
heap
page read and write
F66000
heap
page read and write
5CD8000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
332F000
stack
page read and write
5C5E000
trusted library allocation
page read and write
56F3000
trusted library allocation
page read and write
5BD6000
trusted library allocation
page read and write
6BFE000
stack
page read and write
43D000
unkown
page execute and read and write
F7D000
heap
page read and write
56BE000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
5753000
trusted library allocation
page read and write
53AF000
stack
page read and write
723E000
stack
page read and write
F84000
heap
page read and write
5F00000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
40EF000
stack
page read and write
56E7000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
36EF000
stack
page read and write
56E7000
trusted library allocation
page read and write
4EBD000
stack
page read and write
56A1000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
E30000
heap
page read and write
F76000
heap
page read and write
F70000
heap
page read and write
56EA000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
F3D000
heap
page read and write
4731000
heap
page read and write
56D6000
trusted library allocation
page read and write
2D2E000
stack
page read and write
5CEC000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
5CDA000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
5889000
trusted library allocation
page read and write
198000
unkown
page execute and read and write
F60000
heap
page read and write
56C6000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
5712000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
F63000
heap
page read and write
56CA000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
5C77000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
E34000
heap
page read and write
5706000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
5B49000
trusted library allocation
page read and write
57D9000
stack
page read and write
7FC0000
direct allocation
page read and write
84EE000
stack
page read and write
5B43000
trusted library allocation
page read and write
4C04000
direct allocation
page read and write
5B47000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
75BF000
stack
page read and write
5B42000
trusted library allocation
page read and write
94B000
stack
page read and write
F5C000
heap
page read and write
56D5000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
7FE0000
heap
page read and write
57A2000
trusted library allocation
page read and write
5CB7000
trusted library allocation
page read and write
7BFF000
stack
page read and write
56D7000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
F6E000
heap
page read and write
56E7000
trusted library allocation
page read and write
56BF000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
575D000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
F66000
heap
page read and write
5C8C000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
4D86000
trusted library allocation
page read and write
56D3000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
73CF6000
unkown
page execute and read and write
5B43000
trusted library allocation
page read and write
6BBF000
stack
page read and write
594B000
trusted library allocation
page read and write
F76000
heap
page read and write
57A2000
trusted library allocation
page read and write
733F000
stack
page read and write
386E000
stack
page read and write
633C000
stack
page read and write
7FC0000
trusted library allocation
page read and write
F7B000
heap
page read and write
693F000
stack
page read and write
74BE000
stack
page read and write
4CFF000
stack
page read and write
56F4000
trusted library allocation
page read and write
5753000
trusted library allocation
page read and write
5753000
trusted library allocation
page read and write
F6B000
heap
page read and write
56E7000
trusted library allocation
page read and write
6ABE000
stack
page read and write
F67000
heap
page read and write
56E7000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
43E000
unkown
page execute and write copy
F75000
heap
page read and write
108E000
stack
page read and write
56BC000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
F84000
heap
page read and write
56DF000
trusted library allocation
page read and write
F6D000
heap
page read and write
5723000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
4731000
heap
page read and write
56FF000
trusted library allocation
page read and write
56B3000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
56FB000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
372E000
stack
page read and write
5C2E000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
73CFF000
unkown
page readonly
56E7000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
44AF000
stack
page read and write
5705000
trusted library allocation
page read and write
4731000
heap
page read and write
56EA000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
462E000
stack
page read and write
56C6000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5B4B000
trusted library allocation
page read and write
30EE000
stack
page read and write
5B44000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
53EE000
stack
page read and write
2AAB000
stack
page read and write
56D5000
trusted library allocation
page read and write
56FB000
trusted library allocation
page read and write
8272000
trusted library allocation
page read and write
56BF000
trusted library allocation
page read and write
56A6000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5C8A000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
F72000
heap
page read and write
8020000
direct allocation
page read and write
56C3000
trusted library allocation
page read and write
9A9E000
stack
page read and write
56B2000
trusted library allocation
page read and write
4FBD000
stack
page read and write
5D4C000
trusted library allocation
page read and write
8180000
direct allocation
page execute and read and write
5C38000
trusted library allocation
page read and write
683E000
stack
page read and write
5C8A000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
62FF000
stack
page read and write
5B44000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
F62000
heap
page read and write
571C000
trusted library allocation
page read and write
54EE000
stack
page read and write
7D3F000
stack
page read and write
56D7000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
797F000
stack
page read and write
5B4A000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5743000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
56A7000
trusted library allocation
page read and write
F6D000
heap
page read and write
5B45000
trusted library allocation
page read and write
5BE4000
trusted library allocation
page read and write
7C3E000
stack
page read and write
75FE000
stack
page read and write
4731000
heap
page read and write
57A0000
trusted library allocation
page read and write
9AA0000
trusted library allocation
page read and write
4731000
heap
page read and write
5C4E000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
5B4C000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
F87000
heap
page read and write
56C5000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
45EF000
stack
page read and write
2BAF000
stack
page read and write
E20000
heap
page read and write
6D3E000
stack
page read and write
56D7000
trusted library allocation
page read and write
5B43000
trusted library allocation
page read and write
F54000
heap
page read and write
643F000
stack
page read and write
56C2000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
56A7000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
F6C000
heap
page read and write
56D6000
trusted library allocation
page read and write
5C6D000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
737E000
stack
page read and write
E34000
heap
page read and write
E80000
direct allocation
page read and write
E34000
heap
page read and write
56D5000
trusted library allocation
page read and write
396F000
stack
page read and write
F7A000
heap
page read and write
3E6F000
stack
page read and write
296E000
stack
page read and write
575F000
trusted library allocation
page read and write
81B0000
direct allocation
page execute and read and write
56C8000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
140000
unkown
page readonly
F7A000
heap
page read and write
5C0A000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
4731000
heap
page read and write
50FF000
stack
page read and write
56C6000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
866C000
stack
page read and write
56E1000
trusted library allocation
page read and write
3EAE000
stack
page read and write
F62000
heap
page read and write
73CFD000
unkown
page read and write
571B000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
F72000
heap
page read and write
56FA000
trusted library allocation
page read and write
4731000
heap
page read and write
8270000
trusted library allocation
page read and write
5F06000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
56CF000
trusted library allocation
page read and write
56DB000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
E34000
heap
page read and write
56E7000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
56A5000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
5B43000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
73CF7000
unkown
page readonly
5C58000
trusted library allocation
page read and write
E34000
heap
page read and write
5C8E000
trusted library allocation
page read and write
43D000
unkown
page execute and write copy
56A5000
trusted library allocation
page read and write
52AE000
stack
page read and write
5743000
trusted library allocation
page read and write
F62000
heap
page read and write
697E000
stack
page read and write
5704000
trusted library allocation
page read and write
4FFE000
stack
page read and write
3FEE000
stack
page read and write
9A0000
heap
page read and write
56BF000
trusted library allocation
page read and write
5C89000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
E34000
heap
page read and write
609A000
trusted library allocation
page execute and read and write
572F000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
422F000
stack
page read and write
5CD9000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
5240000
remote allocation
page read and write
5B47000
trusted library allocation
page read and write
56A7000
trusted library allocation
page read and write
5B4C000
trusted library allocation
page read and write
F76000
heap
page read and write
5835000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
7EBE000
stack
page read and write
56E7000
trusted library allocation
page read and write
5CEA000
trusted library allocation
page read and write
382F000
stack
page read and write
5C3E000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
2BEE000
stack
page read and write
2F6F000
stack
page read and write
42F000
unkown
page execute and read and write
56BA000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
F6B000
heap
page read and write
70FE000
stack
page read and write
7FC0000
direct allocation
page read and write
5D6000
unkown
page execute and read and write
57A4000
trusted library allocation
page read and write
5B42000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
E34000
heap
page read and write
5D66000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
5B4D000
trusted library allocation
page read and write
5F02000
trusted library allocation
page execute and read and write
5B43000
trusted library allocation
page read and write
4731000
heap
page read and write
56D3000
trusted library allocation
page read and write
F63000
heap
page read and write
56D7000
trusted library allocation
page read and write
E34000
heap
page read and write
56A9000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
427000
unkown
page execute and read and write
5C75000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5CD5000
trusted library allocation
page read and write
5C0B000
trusted library allocation
page read and write
747F000
stack
page read and write
472F000
stack
page read and write
5EF9000
stack
page read and write
3BEF000
stack
page read and write
56A7000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
F6B000
heap
page read and write
5C9D000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
5B4D000
trusted library allocation
page read and write
185000
unkown
page execute and read and write
E80000
direct allocation
page read and write
56E1000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
2CEF000
stack
page read and write
F63000
heap
page read and write
56D4000
trusted library allocation
page read and write
56CE000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
4731000
heap
page read and write
65BE000
stack
page read and write
F63000
heap
page read and write
5BFF000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
5713000
trusted library allocation
page read and write
5708000
trusted library allocation
page read and write
56A5000
trusted library allocation
page read and write
F74000
heap
page read and write
56D6000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
E34000
heap
page read and write
5C13000
trusted library allocation
page read and write
4D40000
direct allocation
page execute and read and write
5B42000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
56D9000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
3AEE000
stack
page read and write
F64000
heap
page read and write
5D8D000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
43AE000
stack
page read and write
56A1000
trusted library allocation
page read and write
7FBF000
stack
page read and write
5708000
trusted library allocation
page read and write
3D2F000
stack
page read and write
4D30000
direct allocation
page execute and read and write
56E6000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
6CFF000
stack
page read and write
E34000
heap
page read and write
ED8000
heap
page read and write
4BC0000
direct allocation
page read and write
5B40000
trusted library allocation
page read and write
657F000
stack
page read and write
4BC0000
direct allocation
page read and write
67FF000
stack
page read and write
61BA000
trusted library allocation
page execute and read and write
5F0A000
trusted library allocation
page execute and read and write
30AF000
stack
page read and write
56C6000
trusted library allocation
page read and write
4731000
heap
page read and write
346F000
stack
page read and write
7FC0000
direct allocation
page read and write
EE1000
heap
page read and write
56B7000
trusted library allocation
page read and write
5DF4000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
4D70000
direct allocation
page execute and read and write
F64000
heap
page read and write
E34000
heap
page read and write
9F0000
heap
page read and write
56B1000
trusted library allocation
page read and write
5810000
direct allocation
page read and write
4E7C000
stack
page read and write
5CAA000
trusted library allocation
page read and write
7D7E000
stack
page read and write
56A1000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
140000
unkown
page read and write
5B4D000
trusted library allocation
page read and write
5B47000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
5C11000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
5C79000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
E34000
heap
page read and write
56C6000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
F76000
heap
page read and write
56C5000
trusted library allocation
page read and write
5C77000
trusted library allocation
page read and write
827A000
trusted library allocation
page read and write
4730000
heap
page read and write
5B48000
trusted library allocation
page read and write
F6B000
heap
page read and write
5753000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
73CE0000
unkown
page readonly
85EF000
stack
page read and write
56C6000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
6FBE000
stack
page read and write
76FF000
stack
page read and write
570A000
trusted library allocation
page read and write
56E2000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
5BFD000
trusted library allocation
page read and write
E80000
direct allocation
page read and write
5B46000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5C7A000
trusted library allocation
page read and write
3AAF000
stack
page read and write
56C6000
trusted library allocation
page read and write
5723000
trusted library allocation
page read and write
EF5000
heap
page read and write
56A5000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
71FF000
stack
page read and write
4731000
heap
page read and write
5B50000
trusted library allocation
page read and write
138E000
stack
page read and write
5B45000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
4731000
heap
page read and write
5DBE000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
56AF000
trusted library allocation
page read and write
5510000
heap
page read and write
56DC000
trusted library allocation
page read and write
F6C000
heap
page read and write
F74000
heap
page read and write
56E7000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
7FC0000
direct allocation
page read and write
5D8F000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
5B47000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
5B43000
trusted library allocation
page read and write
7E7F000
stack
page read and write
56C9000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
56D6000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
4731000
heap
page read and write
5B41000
trusted library allocation
page read and write
There are 811 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0