IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 101
JSON data
downloaded
Chrome Cache Entry: 102
JSON data
dropped
Chrome Cache Entry: 103
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 104
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 106
ASCII text
dropped
Chrome Cache Entry: 107
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 108
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 110
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 111
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 112
JSON data
dropped
Chrome Cache Entry: 113
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 114
JSON data
downloaded
Chrome Cache Entry: 115
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 77
JSON data
dropped
Chrome Cache Entry: 78
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 81
JSON data
dropped
Chrome Cache Entry: 82
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 83
JSON data
downloaded
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 86
ASCII text
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 88
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 89
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 90
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 91
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 92
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 94
JSON data
dropped
Chrome Cache Entry: 95
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 96
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 99
JSON data
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1924,i,2095106671095358693,17802434904325068709,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1916,i,16216201613498523600,2861810971136064477,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cook-rain.sbs/apivL
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cook-rain.sbs/9
unknown
https://cook-rain.sbs/ers
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://cook-rain.sbs/h
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://cook-rain.sbs/a
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://cook-rain.sbs/Z
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://cook-rain.sbs/T
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
104.21.66.38
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://cook-rain.sbs/z
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://185.215.113.16/steam/random.exe-
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://cook-rain.sbs/s
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://cook-rain.sbs/api.m
unknown
https://cook-rain.sbs/-l
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://cook-rain.sbs:443/api
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://cook-rain.sbs/%
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
https://cook-rain.sbs/apiqjf
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 76 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
104.21.66.38
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
104.21.66.38
cook-rain.sbs
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
761000
unkown
page execute and read and write
malicious
5BEC000
trusted library allocation
page read and write
D6B000
heap
page read and write
599F000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
4ABF000
stack
page read and write
5A8F000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
D7F000
heap
page read and write
44F1000
heap
page read and write
4B00000
direct allocation
page execute and read and write
2D6E000
stack
page read and write
5635000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
55EC000
trusted library allocation
page read and write
DA5000
heap
page read and write
2820000
heap
page read and write
44F1000
heap
page read and write
4930000
trusted library allocation
page read and write
44F1000
heap
page read and write
55D9000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
7B9000
unkown
page execute and read and write
4970000
direct allocation
page read and write
750000
direct allocation
page read and write
55DE000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
372F000
stack
page read and write
55C4000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
590000
heap
page read and write
44F1000
heap
page read and write
7EA0000
direct allocation
page read and write
5D6E000
trusted library allocation
page execute and read and write
558F000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
A52000
unkown
page execute and read and write
55B4000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
5996000
trusted library allocation
page read and write
3D6F000
stack
page read and write
599E000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
55E6000
trusted library allocation
page read and write
55D7000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
D9E000
heap
page read and write
D8B000
heap
page read and write
55D4000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
5B90000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
5AD7000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
599D000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
D89000
heap
page read and write
336F000
stack
page read and write
559E000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
42AE000
stack
page read and write
559F000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
D8B000
heap
page read and write
55D4000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
750000
direct allocation
page read and write
55B3000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
EAE000
stack
page read and write
55D9000
trusted library allocation
page read and write
5AD2000
trusted library allocation
page execute and read and write
55A7000
trusted library allocation
page read and write
44F1000
heap
page read and write
55B3000
trusted library allocation
page read and write
44F1000
heap
page read and write
5995000
trusted library allocation
page read and write
5AD7000
trusted library allocation
page read and write
5C61000
trusted library allocation
page execute and read and write
559E000
trusted library allocation
page read and write
44F1000
heap
page read and write
D89000
heap
page read and write
533E000
stack
page read and write
5608000
trusted library allocation
page read and write
5A5B000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
38AE000
stack
page read and write
5A59000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
55A2000
trusted library allocation
page read and write
55D9000
trusted library allocation
page read and write
4AF0000
direct allocation
page execute and read and write
55D4000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
4B0D000
stack
page read and write
55D7000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
44F1000
heap
page read and write
D8B000
heap
page read and write
2E6F000
stack
page read and write
5996000
trusted library allocation
page read and write
55C9000
trusted library allocation
page read and write
D2B000
heap
page read and write
55BE000
trusted library allocation
page read and write
750000
direct allocation
page read and write
4970000
direct allocation
page read and write
559A000
trusted library allocation
page read and write
D8B000
heap
page read and write
D8B000
heap
page read and write
322F000
stack
page read and write
5608000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
D8B000
heap
page read and write
55B5000
trusted library allocation
page read and write
5A5C000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55D2000
trusted library allocation
page read and write
557C000
stack
page read and write
5608000
trusted library allocation
page read and write
560B000
trusted library allocation
page read and write
D8B000
heap
page read and write
5C1D000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
7EA0000
trusted library allocation
page read and write
D8A000
heap
page read and write
599F000
trusted library allocation
page read and write
3EEE000
stack
page read and write
D97000
heap
page read and write
5B29000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
D8B000
heap
page read and write
55B3000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
44F1000
heap
page read and write
5B17000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
5A23000
trusted library allocation
page read and write
34AF000
stack
page read and write
750000
direct allocation
page read and write
DA2000
heap
page read and write
D8B000
heap
page read and write
5997000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
D97000
heap
page read and write
559A000
trusted library allocation
page read and write
558F000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
7EA0000
direct allocation
page read and write
5AC9000
trusted library allocation
page read and write
569F000
trusted library allocation
page read and write
44F0000
heap
page read and write
55D4000
trusted library allocation
page read and write
750000
direct allocation
page read and write
5594000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
59C9000
stack
page read and write
55FA000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
D8B000
heap
page read and write
5792000
trusted library allocation
page read and write
5996000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
55BC000
trusted library allocation
page read and write
55D1000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
3C6E000
stack
page read and write
7F10000
direct allocation
page read and write
43B000
stack
page read and write
504E000
stack
page read and write
558B000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
D8B000
heap
page read and write
55B0000
trusted library allocation
page read and write
39EE000
stack
page read and write
5996000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
4D3D000
stack
page read and write
55D4000
trusted library allocation
page read and write
5A25000
trusted library allocation
page read and write
D97000
heap
page read and write
5AA4000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
D89000
heap
page read and write
5C04000
trusted library allocation
page read and write
55B8000
trusted library allocation
page read and write
D97000
heap
page read and write
5999000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
559B000
trusted library allocation
page read and write
559A000
trusted library allocation
page read and write
44EF000
stack
page read and write
55D4000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
D8B000
heap
page read and write
5A35000
trusted library allocation
page read and write
543E000
stack
page read and write
5A32000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
D99000
heap
page read and write
44F1000
heap
page read and write
5E5000
heap
page read and write
55D4000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
D16000
heap
page read and write
5635000
trusted library allocation
page read and write
C0C000
unkown
page execute and read and write
D8B000
heap
page read and write
55C0000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
3EAF000
stack
page read and write
5ADB000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
D8D000
heap
page read and write
D8B000
heap
page read and write
55A6000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
5B46000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
44F1000
heap
page read and write
27CE000
stack
page read and write
5A3A000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
44F1000
heap
page read and write
5614000
trusted library allocation
page read and write
DA9000
heap
page read and write
4D7E000
stack
page read and write
5AD9000
trusted library allocation
page read and write
5E0000
heap
page read and write
D8B000
heap
page read and write
5601000
trusted library allocation
page read and write
55BE000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
326E000
stack
page read and write
55D6000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
2A2F000
stack
page read and write
5B5E000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
D88000
heap
page read and write
55E7000
trusted library allocation
page read and write
C8B000
stack
page read and write
312E000
stack
page read and write
5AD6000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
51CE000
stack
page read and write
55F3000
trusted library allocation
page read and write
760000
unkown
page readonly
7EA0000
direct allocation
page read and write
55D4000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
DA3000
heap
page read and write
558E000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5A7C000
trusted library allocation
page read and write
34EE000
stack
page read and write
5AEF000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
D86000
heap
page read and write
5998000
trusted library allocation
page read and write
55F4000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
55D4000
trusted library allocation
page read and write
D78000
heap
page read and write
5583000
trusted library allocation
page read and write
3B2D000
stack
page read and write
55CB000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
D7B000
heap
page read and write
55CC000
trusted library allocation
page read and write
2EAE000
stack
page read and write
DA4000
heap
page read and write
CBE000
heap
page read and write
5AC2000
trusted library allocation
page read and write
D89000
heap
page read and write
5AE6000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
55D4000
trusted library allocation
page read and write
7F10000
direct allocation
page read and write
5BFF000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
55CD000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
750000
direct allocation
page read and write
DA0000
heap
page read and write
D99000
heap
page read and write
4B10000
direct allocation
page execute and read and write
599C000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5A96000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
558F000
trusted library allocation
page read and write
DA0000
heap
page read and write
5C27000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
5A8D000
trusted library allocation
page read and write
43AF000
stack
page read and write
55D4000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
599D000
trusted library allocation
page read and write
3FEF000
stack
page read and write
5B15000
trusted library allocation
page read and write
5BAB000
trusted library allocation
page read and write
44F1000
heap
page read and write
57EF000
trusted library allocation
page read and write
44F1000
heap
page read and write
55EA000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
609B000
trusted library allocation
page read and write
5BEE000
trusted library allocation
page read and write
750000
direct allocation
page read and write
6FE000
stack
page read and write
D2F000
heap
page read and write
7EA0000
direct allocation
page read and write
564C000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
D9E000
heap
page read and write
D99000
heap
page read and write
3DAE000
stack
page read and write
7F10000
direct allocation
page read and write
5A42000
trusted library allocation
page read and write
55CA000
trusted library allocation
page read and write
2C2F000
stack
page read and write
599E000
trusted library allocation
page read and write
5757000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
5A44000
trusted library allocation
page read and write
52CF000
stack
page read and write
5A26000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
C90000
heap
page read and write
5C25000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
5593000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
2B2F000
stack
page read and write
44F1000
heap
page read and write
750000
direct allocation
page read and write
55C4000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
35EF000
stack
page read and write
3AEF000
stack
page read and write
7EA0000
direct allocation
page read and write
44F1000
heap
page read and write
D8B000
heap
page read and write
55BE000
trusted library allocation
page read and write
416E000
stack
page read and write
55B3000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
292F000
stack
page read and write
5B9F000
trusted library allocation
page read and write
5AC9000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
43EE000
stack
page read and write
5ABF000
trusted library allocation
page read and write
750000
direct allocation
page read and write
5AA5000
trusted library allocation
page read and write
D7F000
heap
page read and write
59A0000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
568B000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
362E000
stack
page read and write
55B3000
trusted library allocation
page read and write
D8B000
heap
page read and write
CB0000
heap
page read and write
55C3000
trusted library allocation
page read and write
D8B000
heap
page read and write
44F1000
heap
page read and write
5A8D000
trusted library allocation
page read and write
D93000
heap
page read and write
2D2F000
stack
page read and write
55A7000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
5AD1000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
5A8E000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
D98000
heap
page read and write
5AA6000
trusted library allocation
page read and write
558C000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
574F000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
559E000
trusted library allocation
page read and write
44F1000
heap
page read and write
55B6000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
D8B000
heap
page read and write
55A2000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5AB5000
trusted library allocation
page read and write
5A38000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
D9E000
heap
page read and write
44F1000
heap
page read and write
5A28000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
D93000
heap
page read and write
5996000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
94D000
unkown
page execute and read and write
55D4000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5589000
trusted library allocation
page read and write
5B27000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
55D9000
trusted library allocation
page read and write
750000
direct allocation
page read and write
55B5000
trusted library allocation
page read and write
A29000
unkown
page execute and read and write
55D4000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
5EFB000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
8090000
direct allocation
page execute and read and write
55B4000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
4C3D000
stack
page read and write
278E000
stack
page read and write
55BB000
trusted library allocation
page read and write
49BC000
stack
page read and write
55AB000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
750000
direct allocation
page read and write
D8B000
heap
page read and write
D7B000
heap
page read and write
DA0000
heap
page read and write
CE7000
heap
page read and write
5A5D000
trusted library allocation
page read and write
5727000
trusted library allocation
page read and write
44F1000
heap
page read and write
5A6B000
trusted library allocation
page read and write
39AF000
stack
page read and write
55C4000
trusted library allocation
page read and write
55AE000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
A68000
unkown
page execute and read and write
5602000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
5A7C000
trusted library allocation
page read and write
D8B000
heap
page read and write
D9B000
heap
page read and write
D01000
heap
page read and write
55E5000
trusted library allocation
page read and write
386F000
stack
page read and write
5997000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
D8B000
heap
page read and write
D7B000
heap
page read and write
55D4000
trusted library allocation
page read and write
DA9000
heap
page read and write
8060000
direct allocation
page execute and read and write
5A8B000
trusted library allocation
page read and write
280E000
stack
page read and write
4B20000
direct allocation
page execute and read and write
5583000
trusted library allocation
page read and write
5996000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
5996000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
2FAF000
stack
page read and write
55C0000
trusted library allocation
page read and write
53A000
stack
page read and write
761000
unkown
page execute and write copy
558A000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
599D000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
55CB000
trusted library allocation
page read and write
D8B000
heap
page read and write
55D4000
trusted library allocation
page read and write
55D3000
trusted library allocation
page read and write
514F000
stack
page read and write
750000
direct allocation
page read and write
376E000
stack
page read and write
D8B000
heap
page read and write
559A000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
44F1000
heap
page read and write
55D4000
trusted library allocation
page read and write
33AE000
stack
page read and write
55D4000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
4E7F000
stack
page read and write
558F000
trusted library allocation
page read and write
5DEE000
stack
page read and write
740000
heap
page read and write
55E3000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
73E000
stack
page read and write
5635000
trusted library allocation
page read and write
5608000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
5EF9000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
496D000
stack
page read and write
55A5000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
D89000
heap
page read and write
D8B000
heap
page read and write
5A4F000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
55D4000
trusted library allocation
page read and write
D8B000
heap
page read and write
5995000
trusted library allocation
page read and write
D93000
heap
page read and write
7EA0000
direct allocation
page read and write
5D7C000
trusted library allocation
page execute and read and write
D7F000
heap
page read and write
55CB000
trusted library allocation
page read and write
559A000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
4B00000
direct allocation
page execute and read and write
A68000
unkown
page execute and write copy
5608000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
D8B000
heap
page read and write
55A3000
trusted library allocation
page read and write
D8B000
heap
page read and write
5D7E000
trusted library allocation
page execute and read and write
55AA000
trusted library allocation
page read and write
44F1000
heap
page read and write
5AA1000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
30EF000
stack
page read and write
55B4000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
5A33000
trusted library allocation
page read and write
44F1000
heap
page read and write
55B4000
trusted library allocation
page read and write
D8B000
heap
page read and write
D8B000
heap
page read and write
55A5000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
D8B000
heap
page read and write
55B2000
trusted library allocation
page read and write
D8B000
heap
page read and write
5AFA000
trusted library allocation
page read and write
D8B000
heap
page read and write
5183000
heap
page read and write
D8B000
heap
page read and write
5990000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
A59000
unkown
page execute and read and write
D8A000
heap
page read and write
5A38000
trusted library allocation
page read and write
4B43000
trusted library allocation
page read and write
D8B000
heap
page read and write
55BB000
trusted library allocation
page read and write
55E2000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
CBA000
heap
page read and write
575F000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
55A2000
trusted library allocation
page read and write
55EC000
trusted library allocation
page read and write
55B3000
trusted library allocation
page read and write
55A7000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page execute and read and write
5B01000
trusted library allocation
page read and write
D8B000
heap
page read and write
55B4000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
D23000
heap
page read and write
55C4000
trusted library allocation
page read and write
D89000
heap
page read and write
5C02000
trusted library allocation
page read and write
5180000
heap
page read and write
55B4000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
D98000
heap
page read and write
55EB000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
55B7000
trusted library allocation
page read and write
5AC9000
stack
page read and write
D31000
heap
page read and write
5998000
trusted library allocation
page read and write
750000
direct allocation
page read and write
D8B000
heap
page read and write
4FBF000
stack
page read and write
D99000
heap
page read and write
5997000
trusted library allocation
page read and write
49B4000
direct allocation
page read and write
5B8E000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
55A0000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
412F000
stack
page read and write
55B6000
trusted library allocation
page read and write
D74000
heap
page read and write
55A2000
trusted library allocation
page read and write
FAE000
stack
page read and write
55A2000
trusted library allocation
page read and write
547D000
stack
page read and write
4500000
heap
page read and write
2FEE000
stack
page read and write
580000
heap
page read and write
5791000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
7EA0000
direct allocation
page read and write
55B3000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
5EEF000
stack
page read and write
5ACB000
trusted library allocation
page read and write
402E000
stack
page read and write
55A5000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
750000
direct allocation
page read and write
55B4000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
C4E000
stack
page read and write
55B4000
trusted library allocation
page read and write
7A5000
unkown
page execute and read and write
5596000
trusted library allocation
page read and write
5A9F000
trusted library allocation
page read and write
559A000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
D8B000
heap
page read and write
55A2000
trusted library allocation
page read and write
558D000
trusted library allocation
page read and write
DA0000
heap
page read and write
760000
unkown
page read and write
7B7000
unkown
page write copy
5996000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
426F000
stack
page read and write
D8B000
heap
page read and write
5A91000
trusted library allocation
page read and write
5A6F000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
5599000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
5A36000
trusted library allocation
page read and write
D8B000
heap
page read and write
5ACB000
trusted library allocation
page read and write
5A22000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
D8B000
heap
page read and write
2827000
heap
page read and write
55B5000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
7B7000
unkown
page read and write
55B4000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
A69000
unkown
page execute and write copy
D9F000
heap
page read and write
55A9000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
4EBE000
stack
page read and write
D8B000
heap
page read and write
D8B000
heap
page read and write
5B60000
trusted library allocation
page read and write
559B000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
DA9000
heap
page read and write
3C2F000
stack
page read and write
55AB000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
4FE0000
remote allocation
page read and write
5583000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
5A54000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
D8B000
heap
page read and write
D8A000
heap
page read and write
There are 809 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0