IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 101
JSON data
dropped
Chrome Cache Entry: 102
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 103
JSON data
downloaded
Chrome Cache Entry: 104
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 66
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 67
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 68
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 69
JSON data
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 71
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 72
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 73
JSON data
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 75
JSON data
downloaded
Chrome Cache Entry: 76
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 78
ASCII text
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 80
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 81
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 82
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 83
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 85
JSON data
dropped
Chrome Cache Entry: 86
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 87
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 89
JSON data
downloaded
Chrome Cache Entry: 90
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
JSON data
downloaded
Chrome Cache Entry: 92
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 93
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 95
ASCII text
dropped
Chrome Cache Entry: 96
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 97
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 99
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=2008,i,3826648894822423509,4444800806446167080,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1980,i,2029121025495776,18205823423671010898,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cook-rain.sbs/C
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://cook-rain.sbs/apirvice
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cook-rain.sbs/9
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
http://185.215.113.16/off/def.exemX
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
http://185.215.113.16/off/def.exeqX
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://cook-rain.sbs/apivalue
unknown
processhol.sbs
https://cook-rain.sbs/apiu
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
104.21.66.38
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://cook-rain.sbs/o
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://cook-rain.sbs/.
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
http://185.215.113.16/jr
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://cook-rain.sbs/tP
unknown
https://cook-rain.sbs/%
unknown
https://support.microsof
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://cook-rain.sbs/apid
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
http://185.215.113.16/Er
unknown
There are 76 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
104.21.66.38
www.google.com
216.58.208.228
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
192.168.2.7
unknown
unknown
185.215.113.16
unknown
Portugal
104.21.66.38
cook-rain.sbs
United States
239.255.255.250
unknown
Reserved
216.58.208.228
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
49B0000
direct allocation
page read and write
malicious
DDA000
heap
page read and write
59ED000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
4521000
heap
page read and write
5513000
trusted library allocation
page read and write
DC4000
heap
page read and write
54E0000
trusted library allocation
page read and write
DC2000
heap
page read and write
5930000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
DC0000
heap
page read and write
C04000
heap
page read and write
5930000
trusted library allocation
page read and write
4521000
heap
page read and write
4B30000
direct allocation
page execute and read and write
59F8000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
59F7000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
C04000
heap
page read and write
593A000
trusted library allocation
page read and write
5935000
trusted library allocation
page read and write
DDD000
heap
page read and write
570C000
trusted library allocation
page read and write
DC5000
heap
page read and write
54C3000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
DC0000
heap
page read and write
DCA000
heap
page read and write
5BC5000
trusted library allocation
page read and write
DCE000
heap
page read and write
5A39000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
DCD000
heap
page read and write
DCC000
heap
page read and write
55A3000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
5ABD000
trusted library allocation
page read and write
5935000
trusted library allocation
page read and write
5A02000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
5FE1000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
DC1000
heap
page read and write
54C0000
trusted library allocation
page read and write
5A74000
trusted library allocation
page read and write
5A2E000
trusted library allocation
page read and write
DE9000
heap
page read and write
5A4D000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
54FA000
trusted library allocation
page read and write
5BCD000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
C04000
heap
page read and write
5644000
trusted library allocation
page read and write
DBC000
heap
page read and write
5B2F000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
DC1000
heap
page read and write
55F4000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
4521000
heap
page read and write
54C0000
trusted library allocation
page read and write
5030000
remote allocation
page read and write
5AB1000
trusted library allocation
page read and write
5030000
remote allocation
page read and write
549C000
trusted library allocation
page read and write
4B20000
direct allocation
page execute and read and write
54A7000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
54D8000
trusted library allocation
page read and write
DC5000
heap
page read and write
54A0000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
DE6000
heap
page read and write
DD5000
heap
page read and write
549B000
trusted library allocation
page read and write
5A2E000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
5515000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
DD8000
heap
page read and write
54B4000
trusted library allocation
page read and write
C04000
heap
page read and write
CD0000
direct allocation
page read and write
5A25000
trusted library allocation
page read and write
DC5000
heap
page read and write
DC5000
heap
page read and write
54D8000
trusted library allocation
page read and write
DEA000
heap
page read and write
D66000
heap
page read and write
4521000
heap
page read and write
54E8000
trusted library allocation
page read and write
C04000
heap
page read and write
C04000
heap
page read and write
59D7000
trusted library allocation
page read and write
5A27000
trusted library allocation
page read and write
DE9000
heap
page read and write
54A1000
trusted library allocation
page read and write
4521000
heap
page read and write
54D0000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
59F9000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
DAF000
heap
page read and write
54C5000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5A5C000
trusted library allocation
page read and write
59D7000
trusted library allocation
page read and write
59F7000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5B4C000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
54D6000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
C04000
heap
page read and write
5933000
trusted library allocation
page read and write
DE4000
heap
page read and write
CD0000
direct allocation
page read and write
5E5D000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
4521000
heap
page read and write
549A000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
DD6000
heap
page read and write
5938000
trusted library allocation
page read and write
DC9000
heap
page read and write
5934000
trusted library allocation
page read and write
5521000
trusted library allocation
page read and write
DE8000
heap
page read and write
54AF000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
C04000
heap
page read and write
4B10000
direct allocation
page execute and read and write
5A55000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
59FA000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
4521000
heap
page read and write
5A52000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
DE4000
heap
page read and write
59E0000
trusted library allocation
page read and write
4521000
heap
page read and write
4521000
heap
page read and write
5939000
trusted library allocation
page read and write
C04000
heap
page read and write
54C0000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
DC4000
heap
page read and write
5A56000
trusted library allocation
page read and write
C04000
heap
page read and write
5A54000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
D66000
heap
page read and write
5500000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
593C000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
DE0000
heap
page read and write
5939000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
4521000
heap
page read and write
5B4E000
trusted library allocation
page read and write
5931000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
5AB8000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
C04000
heap
page read and write
DE4000
heap
page read and write
5D5E000
trusted library allocation
page read and write
5B8B000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
5A3D000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
5A58000
trusted library allocation
page read and write
59F8000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
DD5000
heap
page read and write
5934000
trusted library allocation
page read and write
5ADF000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
DD0000
heap
page read and write
54AB000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
DD5000
heap
page read and write
54C0000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
DC2000
heap
page read and write
5BA5000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
DC4000
heap
page read and write
59CE000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
4521000
heap
page read and write
C04000
heap
page read and write
5AC7000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
C04000
heap
page read and write
CD0000
direct allocation
page read and write
5934000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
DD5000
heap
page read and write
5A63000
trusted library allocation
page read and write
5BDC000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
DC1000
heap
page read and write
5A04000
trusted library allocation
page read and write
551A000
trusted library allocation
page read and write
DDA000
heap
page read and write
226000
unkown
page write copy
54A0000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
5931000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
DE0000
heap
page read and write
5A1C000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
551D000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
5BA7000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
5A5E000
trusted library allocation
page read and write
5A89000
trusted library allocation
page read and write
54C2000
trusted library allocation
page read and write
DD8000
heap
page read and write
5A35000
trusted library allocation
page read and write
5A1E000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
DE0000
heap
page read and write
5931000
trusted library allocation
page read and write
5935000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
5A6A000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
4521000
heap
page read and write
DC0000
heap
page read and write
54AF000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
5A1D000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
DC5000
heap
page read and write
5937000
trusted library allocation
page read and write
5A37000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
4B7E000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
5A8E000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
DD1000
heap
page read and write
54AF000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
5B31000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
59EF000
trusted library allocation
page read and write
C04000
heap
page read and write
5A04000
trusted library allocation
page read and write
DC2000
heap
page read and write
5491000
trusted library allocation
page read and write
5935000
trusted library allocation
page read and write
5B2E000
trusted library allocation
page read and write
5934000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
5A37000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
59F6000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
5A1F000
trusted library allocation
page read and write
4521000
heap
page read and write
54AF000
trusted library allocation
page read and write
DC4000
heap
page read and write
54A8000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
DD0000
heap
page read and write
54F5000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
DD6000
heap
page read and write
4521000
heap
page read and write
5500000
trusted library allocation
page read and write
559D000
trusted library allocation
page read and write
566C000
trusted library allocation
page read and write
C04000
heap
page read and write
54B7000
trusted library allocation
page read and write
DD5000
heap
page read and write
5934000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
C04000
heap
page read and write
5591000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
5A04000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
59CC000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
5030000
remote allocation
page read and write
5A7C000
trusted library allocation
page read and write
DC5000
heap
page read and write
5A6B000
trusted library allocation
page read and write
DC5000
heap
page read and write
54C0000
trusted library allocation
page read and write
5937000
trusted library allocation
page read and write
DCA000
heap
page read and write
DCD000
heap
page read and write
5932000
trusted library allocation
page read and write
DA3000
heap
page read and write
5598000
trusted library allocation
page read and write
4521000
heap
page read and write
5496000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
5936000
trusted library allocation
page read and write
C04000
heap
page read and write
49F4000
direct allocation
page read and write
5937000
trusted library allocation
page read and write
5BCF000
trusted library allocation
page read and write
5732000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
5A58000
trusted library allocation
page read and write
4DA000
unkown
page execute and write copy
5BDA000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
DBE000
heap
page read and write
54A8000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
4521000
heap
page read and write
CD0000
direct allocation
page read and write
5FA0000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
4B30000
direct allocation
page execute and read and write
CD0000
direct allocation
page read and write
1D1000
unkown
page execute and write copy
549A000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
54A3000
trusted library allocation
page read and write
5A24000
trusted library allocation
page read and write
DD0000
heap
page read and write
552B000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
4521000
heap
page read and write
549F000
trusted library allocation
page read and write
DD5000
heap
page read and write
DC4000
heap
page read and write
5496000
trusted library allocation
page read and write
59F9000
trusted library allocation
page read and write
54EC000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
5BC3000
trusted library allocation
page read and write
54AD000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
DAF000
heap
page read and write
54D5000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
DE7000
heap
page read and write
DD6000
heap
page read and write
5936000
trusted library allocation
page read and write
55BC000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B85000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
DDA000
heap
page read and write
5936000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
D5A000
heap
page read and write
5AAF000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
54FF000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
DCD000
heap
page read and write
5513000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
C04000
heap
page read and write
54C0000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
DC8000
heap
page read and write
59ED000
trusted library allocation
page read and write
4521000
heap
page read and write
54DD000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
567C000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5A02000
trusted library allocation
page read and write
DC1000
heap
page read and write
1D0000
unkown
page readonly
5933000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
5A02000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
DC9000
heap
page read and write
5932000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
593C000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
54DA000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
54E6000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
DD6000
heap
page read and write
593F000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
5A7C000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
5A29000
trusted library allocation
page read and write
DC5000
heap
page read and write
5597000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
DD5000
heap
page read and write
5931000
trusted library allocation
page read and write
4521000
heap
page read and write
5513000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
C04000
heap
page read and write
DCD000
heap
page read and write
D60000
heap
page read and write
5A90000
trusted library allocation
page read and write
5A67000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
59C9000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
CD0000
direct allocation
page read and write
C04000
heap
page read and write
5933000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
54C6000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
DC5000
heap
page read and write
5931000
trusted library allocation
page read and write
DC5000
heap
page read and write
5A87000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
DE8000
heap
page read and write
There are 538 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0