Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 101
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 102
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 103
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 104
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 66
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 67
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 68
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 69
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 70
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 71
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 72
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 73
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 74
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 75
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 76
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 77
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 78
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 80
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 81
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 82
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 83
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 85
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 86
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 87
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 89
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 90
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 91
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 92
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 93
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 95
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 96
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 97
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 99
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2008,i,3826648894822423509,4444800806446167080,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1980,i,2029121025495776,18205823423671010898,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://cook-rain.sbs/C
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://cook-rain.sbs/apirvice
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://cook-rain.sbs/9
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
http://185.215.113.16/off/def.exemX
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
http://185.215.113.16/off/def.exeqX
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://cook-rain.sbs/apivalue
|
unknown
|
||
processhol.sbs
|
|||
https://cook-rain.sbs/apiu
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
104.21.66.38
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://cook-rain.sbs/o
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://cook-rain.sbs/.
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
http://185.215.113.16/jr
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://cook-rain.sbs/tP
|
unknown
|
||
https://cook-rain.sbs/%
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://cook-rain.sbs/apid
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
http://185.215.113.16/Er
|
unknown
|
There are 76 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
104.21.66.38
|
||
www.google.com
|
216.58.208.228
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.4
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
192.168.2.7
|
unknown
|
unknown
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
104.21.66.38
|
cook-rain.sbs
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
216.58.208.228
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
49B0000
|
direct allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
59F8000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
59F7000
|
trusted library allocation
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
5935000
|
trusted library allocation
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
54C3000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
5A39000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
5935000
|
trusted library allocation
|
page read and write
|
||
5A02000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
DE9000
|
heap
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
54FA000
|
trusted library allocation
|
page read and write
|
||
5BCD000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
5AE1000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5644000
|
trusted library allocation
|
page read and write
|
||
DBC000
|
heap
|
page read and write
|
||
5B2F000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
5030000
|
remote allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5030000
|
remote allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
5A27000
|
trusted library allocation
|
page read and write
|
||
DE9000
|
heap
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
59F9000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
5B60000
|
trusted library allocation
|
page read and write
|
||
5A2C000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5A26000
|
trusted library allocation
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
5A5C000
|
trusted library allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
59F7000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5933000
|
trusted library allocation
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5E5D000
|
trusted library allocation
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
5A55000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
59FA000
|
trusted library allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
5A52000
|
trusted library allocation
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5A54000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
5931000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
5B8B000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
5A3D000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
5A58000
|
trusted library allocation
|
page read and write
|
||
59F8000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
5BA5000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
54E6000
|
trusted library allocation
|
page read and write
|
||
5A2B000
|
trusted library allocation
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
5A63000
|
trusted library allocation
|
page read and write
|
||
5BDC000
|
trusted library allocation
|
page read and write
|
||
593E000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
5A04000
|
trusted library allocation
|
page read and write
|
||
551A000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
226000
|
unkown
|
page write copy
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
5931000
|
trusted library allocation
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
5A1C000
|
trusted library allocation
|
page read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
551D000
|
trusted library allocation
|
page read and write
|
||
5A2C000
|
trusted library allocation
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
5A89000
|
trusted library allocation
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
5A35000
|
trusted library allocation
|
page read and write
|
||
5A1E000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
5931000
|
trusted library allocation
|
page read and write
|
||
5935000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
5A1D000
|
trusted library allocation
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
59CB000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
4B7E000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5A8E000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
DD1000
|
heap
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
5B31000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
59EF000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5A04000
|
trusted library allocation
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
5935000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
59F6000
|
trusted library allocation
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
5A1F000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
559D000
|
trusted library allocation
|
page read and write
|
||
566C000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
5A04000
|
trusted library allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5A4B000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
5030000
|
remote allocation
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
DA3000
|
heap
|
page read and write
|
||
5598000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
49F4000
|
direct allocation
|
page read and write
|
||
5937000
|
trusted library allocation
|
page read and write
|
||
5BCF000
|
trusted library allocation
|
page read and write
|
||
5732000
|
trusted library allocation
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
5A58000
|
trusted library allocation
|
page read and write
|
||
4DA000
|
unkown
|
page execute and write copy
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
heap
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
1D1000
|
unkown
|
page execute and write copy
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5A24000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
552B000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
DC4000
|
heap
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
59F9000
|
trusted library allocation
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
5933000
|
trusted library allocation
|
page read and write
|
||
5BC3000
|
trusted library allocation
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
55BC000
|
trusted library allocation
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
5B85000
|
trusted library allocation
|
page read and write
|
||
5598000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
5B9C000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
567C000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
5933000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5A02000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
5933000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
5A02000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
DC9000
|
heap
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
49A0000
|
direct allocation
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
54E6000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
593F000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
5A29000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
5597000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
5931000
|
trusted library allocation
|
page read and write
|
||
4521000
|
heap
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
5A67000
|
trusted library allocation
|
page read and write
|
||
593E000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
5593000
|
trusted library allocation
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
direct allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
5933000
|
trusted library allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
5674000
|
trusted library allocation
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
593E000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
5931000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
There are 538 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|