IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 101
ASCII text
dropped
Chrome Cache Entry: 102
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 103
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 105
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 106
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 109
JSON data
downloaded
Chrome Cache Entry: 110
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 69
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 71
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 72
JSON data
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 76
JSON data
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 78
JSON data
downloaded
Chrome Cache Entry: 79
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 81
JSON data
dropped
Chrome Cache Entry: 82
ASCII text
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 84
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 85
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 86
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 87
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 92
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 99
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1880,i,2658369671924741548,14956457475855153189,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2000,i,6861188437534111061,5673823380615513189,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://cook-rain.sbs/api_time
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://cook-rain.sbs/api3
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cook-rain.sbs/A
unknown
https://cook-rain.sbs/apixg3
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://cook-rain.sbs/4
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
https://cook-rain.sbs/apiB
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/off/def.exep
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.mozilla.or
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
188.114.97.3
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.45
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://cook-rain.sbs/(
unknown
https://cook-rain.sbs:443/api
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exe
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://github.com/dotnet/try
unknown
There are 70 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
188.114.97.3
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
172.217.16.196
s-part-0032.t-0009.t-msedge.net
13.107.246.60
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
188.114.97.3
cook-rain.sbs
European Union
239.255.255.250
unknown
Reserved
172.217.16.196
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5D44000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
627E000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
629F000
trusted library allocation
page read and write
5CFE000
trusted library allocation
page read and write
61A1000
trusted library allocation
page read and write
6196000
trusted library allocation
page read and write
5D0E000
trusted library allocation
page read and write
5D0E000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
1768000
heap
page read and write
5CE1000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
629E000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
5370000
direct allocation
page execute and read and write
5D41000
trusted library allocation
page read and write
62D3000
trusted library allocation
page read and write
5880000
remote allocation
page read and write
5CF2000
trusted library allocation
page read and write
4D91000
heap
page read and write
5390000
direct allocation
page execute and read and write
5D38000
trusted library allocation
page read and write
5D01000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5F92000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
177B000
heap
page read and write
5CE2000
trusted library allocation
page read and write
176E000
heap
page read and write
5D0D000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
5D03000
trusted library allocation
page read and write
1771000
heap
page read and write
5D3D000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
1775000
heap
page read and write
62B7000
trusted library allocation
page read and write
63AD000
trusted library allocation
page read and write
5D06000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
177E000
heap
page read and write
619B000
trusted library allocation
page read and write
1715000
heap
page read and write
5D42000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
5CFE000
trusted library allocation
page read and write
6328000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
619D000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
1719000
heap
page read and write
5CF2000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
4D91000
heap
page read and write
619A000
trusted library allocation
page read and write
4D91000
heap
page read and write
4D91000
heap
page read and write
6263000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D01000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
6339000
trusted library allocation
page read and write
177E000
heap
page read and write
5D15000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
4D91000
heap
page read and write
5CF2000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
626E000
trusted library allocation
page read and write
619F000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
5D46000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
1777000
heap
page read and write
5D1E000
trusted library allocation
page read and write
1775000
heap
page read and write
5D52000
trusted library allocation
page read and write
A41000
unkown
page execute and write copy
62A4000
trusted library allocation
page read and write
61A1000
trusted library allocation
page read and write
5CFD000
trusted library allocation
page read and write
1765000
heap
page read and write
619C000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
6192000
trusted library allocation
page read and write
624C000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
5D6D000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D2E000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
63AB000
trusted library allocation
page read and write
1784000
heap
page read and write
5D43000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
1785000
heap
page read and write
5D23000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
1712000
heap
page read and write
6280000
trusted library allocation
page read and write
1778000
heap
page read and write
5D7C000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6263000
trusted library allocation
page read and write
62A9000
trusted library allocation
page read and write
1714000
heap
page read and write
53A0000
direct allocation
page execute and read and write
4D91000
heap
page read and write
5CE6000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D06000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D27000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
681D000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
641F000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
629D000
trusted library allocation
page read and write
62FF000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
1765000
heap
page read and write
1765000
heap
page read and write
5D76000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
6196000
trusted library allocation
page read and write
5D96000
trusted library allocation
page read and write
5254000
direct allocation
page read and write
5D1F000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
6407000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
4D91000
heap
page read and write
5F5D000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5D9E000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
6271000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
5D0E000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
63EB000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
4D91000
heap
page read and write
5D0D000
trusted library allocation
page read and write
668A000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
4D91000
heap
page read and write
5CFF000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6257000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
5D01000
trusted library allocation
page read and write
6196000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
16F8000
heap
page read and write
624D000
trusted library allocation
page read and write
5880000
remote allocation
page read and write
5D1E000
trusted library allocation
page read and write
629C000
trusted library allocation
page read and write
5D14000
trusted library allocation
page read and write
626F000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
6402000
trusted library allocation
page read and write
63E8000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
5ECD000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
6404000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5D3E000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D08000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
176A000
heap
page read and write
A96000
unkown
page write copy
6251000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
62C6000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
6263000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
1765000
heap
page read and write
1777000
heap
page read and write
5D12000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
1777000
heap
page read and write
628A000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
5D06000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
177A000
heap
page read and write
1680000
direct allocation
page read and write
6245000
trusted library allocation
page read and write
62CE000
trusted library allocation
page read and write
177E000
heap
page read and write
6196000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
619E000
trusted library allocation
page read and write
5210000
direct allocation
page read and write
6191000
trusted library allocation
page read and write
177A000
heap
page read and write
5D4C000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
1773000
heap
page read and write
62D1000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
62A6000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
5D27000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
1775000
heap
page read and write
1680000
direct allocation
page read and write
5D24000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
63ED000
trusted library allocation
page read and write
628D000
trusted library allocation
page read and write
6409000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
1781000
heap
page read and write
629F000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
5D18000
trusted library allocation
page read and write
177B000
heap
page read and write
5D1E000
trusted library allocation
page read and write
1763000
heap
page read and write
6192000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
16E1000
heap
page read and write
619E000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
624A000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
5D25000
trusted library allocation
page read and write
6244000
trusted library allocation
page read and write
63AB000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
6192000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
4D91000
heap
page read and write
1765000
heap
page read and write
1715000
heap
page read and write
5D2A000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
4D91000
heap
page read and write
5CFE000
trusted library allocation
page read and write
5D0F000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
5E25000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5D2E000
trusted library allocation
page read and write
63C5000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
6259000
trusted library allocation
page read and write
62D2000
trusted library allocation
page read and write
1777000
heap
page read and write
5D56000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
5D06000
trusted library allocation
page read and write
619D000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
A40000
unkown
page readonly
631E000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
629D000
trusted library allocation
page read and write
6284000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
6688000
trusted library allocation
page read and write
619C000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
62AE000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
5D08000
trusted library allocation
page read and write
632F000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
659C000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
6307000
trusted library allocation
page read and write
6309000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
176C000
heap
page read and write
640F000
trusted library allocation
page read and write
5D0E000
trusted library allocation
page read and write
6196000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5D13000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
62E0000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
1768000
heap
page read and write
5CF2000
trusted library allocation
page read and write
4D91000
heap
page read and write
628A000
trusted library allocation
page read and write
6411000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
6261000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
638B000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
5D4E000
trusted library allocation
page read and write
619C000
trusted library allocation
page read and write
62A7000
trusted library allocation
page read and write
4D91000
heap
page read and write
5D09000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
1765000
heap
page read and write
5D4C000
trusted library allocation
page read and write
630C000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
5CFF000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
1680000
direct allocation
page read and write
1680000
direct allocation
page read and write
5D1B000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
6192000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
1763000
heap
page read and write
5D2D000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5CFC000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
16DC000
heap
page read and write
5D25000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
1715000
heap
page read and write
5D18000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
4D91000
heap
page read and write
5D07000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
5CFD000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
642A000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
6261000
trusted library allocation
page read and write
627A000
trusted library allocation
page read and write
619D000
trusted library allocation
page read and write
4D91000
heap
page read and write
5D24000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
176C000
heap
page read and write
4D91000
heap
page read and write
6196000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
5D14000
trusted library allocation
page read and write
6196000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
5D06000
trusted library allocation
page read and write
176D000
heap
page read and write
62A9000
trusted library allocation
page read and write
177E000
heap
page read and write
5CF2000
trusted library allocation
page read and write
5D0E000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
62CE000
trusted library allocation
page read and write
5D0F000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
1775000
heap
page read and write
5D18000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
5D14000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
1773000
heap
page read and write
6192000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
4D91000
heap
page read and write
5D28000
trusted library allocation
page read and write
63A9000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5D8D000
trusted library allocation
page read and write
6282000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
1714000
heap
page read and write
5D1A000
trusted library allocation
page read and write
619E000
trusted library allocation
page read and write
4D91000
heap
page read and write
642C000
trusted library allocation
page read and write
62C4000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6301000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
1765000
heap
page read and write
5D2A000
trusted library allocation
page read and write
63C3000
trusted library allocation
page read and write
62AB000
trusted library allocation
page read and write
5D7E000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5880000
remote allocation
page read and write
4E90000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5DF4000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
619D000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
659C000
trusted library allocation
page read and write
5210000
direct allocation
page read and write
5D25000
trusted library allocation
page read and write
4D91000
heap
page read and write
177E000
heap
page read and write
170C000
heap
page read and write
5D6E000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
635D000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
6421000
trusted library allocation
page read and write
176C000
heap
page read and write
5D6E000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
6597000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
1717000
heap
page read and write
6278000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
63EA000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
5210000
direct allocation
page read and write
5D58000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
1717000
heap
page read and write
5D02000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5D25000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6389000
trusted library allocation
page read and write
177A000
heap
page read and write
5D5B000
trusted library allocation
page read and write
6409000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D03000
trusted library allocation
page read and write
5D35000
trusted library allocation
page read and write
1765000
heap
page read and write
5D25000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
177E000
heap
page read and write
6192000
trusted library allocation
page read and write
62D0000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
4D91000
heap
page read and write
632B000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6196000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
619F000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
4D91000
heap
page read and write
624E000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6261000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
5CE5000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
6247000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
635F000
trusted library allocation
page read and write
624C000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
633B000
trusted library allocation
page read and write
632D000
trusted library allocation
page read and write
16F6000
heap
page read and write
5D47000
trusted library allocation
page read and write
6407000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
6198000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
5D46000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
176C000
heap
page read and write
5D72000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
619F000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5EC5000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
67F2000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
1777000
heap
page read and write
5D03000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
4D91000
heap
page read and write
631C000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
D38000
unkown
page execute and write copy
5CF2000
trusted library allocation
page read and write
1703000
heap
page read and write
There are 673 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0