IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 102
ASCII text
dropped
Chrome Cache Entry: 103
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 104
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 106
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 107
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 108
JSON data
dropped
Chrome Cache Entry: 109
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 110
JSON data
downloaded
Chrome Cache Entry: 111
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 71
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 72
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 73
JSON data
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 76
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 80
JSON data
downloaded
Chrome Cache Entry: 81
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 85
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 86
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 87
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 92
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
JSON data
dropped
Chrome Cache Entry: 97
JSON data
downloaded
Chrome Cache Entry: 98
JSON data
dropped
Chrome Cache Entry: 99
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1932,i,6400708159271862020,17994335093903247733,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1908 --field-trial-handle=1996,i,9808520038763490769,5132435854326033979,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
172.67.155.248
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://crl.micro
unknown
https://support.microsof
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://schema.org/Organization
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cook-rain.sbs
172.67.155.248
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
172.67.155.248
cook-rain.sbs
United States
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
6003000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
600A000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
5B77000
trusted library allocation
page read and write
5B8E000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
6125000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
6124000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
60AF000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
5BAB000
trusted library allocation
page read and write
5B6E000
trusted library allocation
page read and write
1284000
heap
page read and write
5BE6000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
64EF000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
6011000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
51D0000
direct allocation
page execute and read and write
5B7B000
trusted library allocation
page read and write
6142000
trusted library allocation
page read and write
6127000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
600E000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
5B7B000
trusted library allocation
page read and write
6274000
trusted library allocation
page read and write
51C0000
direct allocation
page execute and read and write
5B7D000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
297000
unkown
page write copy
5B7A000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
1244000
heap
page read and write
5B77000
trusted library allocation
page read and write
5BDE000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
1221000
heap
page read and write
5B9D000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
1220000
heap
page read and write
5B8C000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
1284000
heap
page read and write
5BFA000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
60F3000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
6009000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B7C000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
1242000
heap
page read and write
5B9D000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
1246000
heap
page read and write
5B8C000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
1284000
heap
page read and write
5B6F000
trusted library allocation
page read and write
640A000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
1246000
heap
page read and write
5BB6000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
1284000
heap
page read and write
5B8C000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
600E000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
6259000
trusted library allocation
page read and write
617B000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
1284000
heap
page read and write
5B93000
trusted library allocation
page read and write
6182000
trusted library allocation
page read and write
5BE3000
trusted library allocation
page read and write
60F2000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5BDE000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B8E000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
6107000
trusted library allocation
page read and write
1284000
heap
page read and write
4BD1000
heap
page read and write
5BB5000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
60FF000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
4BD1000
heap
page read and write
6003000
trusted library allocation
page read and write
6008000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5D08000
trusted library allocation
page read and write
1284000
heap
page read and write
60F0000
trusted library allocation
page read and write
1246000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
6216000
trusted library allocation
page read and write
1284000
heap
page read and write
1252000
heap
page read and write
5B83000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
125E000
heap
page read and write
5B6F000
trusted library allocation
page read and write
612B000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
619F000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
1248000
heap
page read and write
6146000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B8D000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
610D000
trusted library allocation
page read and write
6164000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
5B76000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
6129000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B6F000
trusted library allocation
page read and write
6519000
trusted library allocation
page read and write
4BD1000
heap
page read and write
600A000
trusted library allocation
page read and write
6184000
trusted library allocation
page read and write
6007000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
5CB8000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
60CB000
trusted library allocation
page read and write
5700000
remote allocation
page read and write
5B9D000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B64000
trusted library allocation
page read and write
600B000
trusted library allocation
page read and write
6184000
trusted library allocation
page read and write
5B64000
trusted library allocation
page read and write
60C9000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
600E000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
6005000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5B70000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
6119000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
600E000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
1256000
heap
page read and write
60BC000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B83000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
1284000
heap
page read and write
5B7B000
trusted library allocation
page read and write
622F000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
6006000
trusted library allocation
page read and write
1257000
heap
page read and write
5B6F000
trusted library allocation
page read and write
1251000
heap
page read and write
5B94000
trusted library allocation
page read and write
5B62000
trusted library allocation
page read and write
6008000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
1246000
heap
page read and write
5B6F000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
5BB4000
trusted library allocation
page read and write
4BD1000
heap
page read and write
651B000
trusted library allocation
page read and write
640B000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
1267000
heap
page read and write
5B75000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
628D000
trusted library allocation
page read and write
60AE000
trusted library allocation
page read and write
620F000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
1244000
heap
page read and write
5B90000
trusted library allocation
page read and write
1246000
heap
page read and write
5B9D000
trusted library allocation
page read and write
1246000
heap
page read and write
5B8C000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
6258000
trusted library allocation
page read and write
60AD000
trusted library allocation
page read and write
1284000
heap
page read and write
5B9A000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
5BCC000
trusted library allocation
page read and write
5BA5000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
1246000
heap
page read and write
6002000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
1255000
heap
page read and write
5BC0000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5BCC000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
6008000
trusted library allocation
page read and write
5BA9000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
6115000
trusted library allocation
page read and write
5BCC000
trusted library allocation
page read and write
1251000
heap
page read and write
4BD1000
heap
page read and write
5BCC000
trusted library allocation
page read and write
60B8000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
125B000
heap
page read and write
5B8D000
trusted library allocation
page read and write
1256000
heap
page read and write
5C06000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
60D9000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
6008000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
6009000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
1258000
heap
page read and write
5B94000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
60BE000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
1266000
heap
page read and write
6011000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
6001000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B8C000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
60FD000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
6256000
trusted library allocation
page read and write
6011000
trusted library allocation
page read and write
6008000
trusted library allocation
page read and write
5BC2000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
617D000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
600A000
trusted library allocation
page read and write
667F000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
64ED000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
1255000
heap
page read and write
5B97000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
6272000
trusted library allocation
page read and write
5BA6000
trusted library allocation
page read and write
60D3000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
1236000
heap
page read and write
1244000
heap
page read and write
610D000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5BC4000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
600B000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
6145000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
1284000
heap
page read and write
4BD1000
heap
page read and write
5D38000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
600D000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
60C1000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
6231000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
533000
unkown
page execute and write copy
5B8C000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5B68000
trusted library allocation
page read and write
60CD000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
610B000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
1284000
heap
page read and write
5B6F000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
5B75000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
240000
unkown
page readonly
5B8C000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
6284000
trusted library allocation
page read and write
125B000
heap
page read and write
5B9E000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
628A000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
600A000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
60B7000
trusted library allocation
page read and write
1251000
heap
page read and write
5B77000
trusted library allocation
page read and write
5B6E000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
4BD1000
heap
page read and write
1255000
heap
page read and write
1244000
heap
page read and write
5BE3000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
5BC9000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
6005000
trusted library allocation
page read and write
6007000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
125B000
heap
page read and write
5B77000
trusted library allocation
page read and write
1261000
heap
page read and write
5B98000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B63000
trusted library allocation
page read and write
5B66000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
6109000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B8C000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5BD3000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
5BB9000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
6147000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
6148000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
1246000
heap
page read and write
5B6F000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
50A4000
direct allocation
page read and write
4BD1000
heap
page read and write
5B7B000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
1284000
heap
page read and write
1242000
heap
page read and write
5B61000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
61AE000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
6002000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
60BA000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
124B000
heap
page read and write
60BC000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
5BEE000
trusted library allocation
page read and write
4BC0000
direct allocation
page read and write
5B8C000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B65000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
1284000
heap
page read and write
5B98000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
5B7C000
trusted library allocation
page read and write
613C000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
6001000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
1255000
heap
page read and write
4BC0000
direct allocation
page read and write
6009000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
600A000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B98000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
1244000
heap
page read and write
5D30000
trusted library allocation
page read and write
6282000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
5BFA000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
666B000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
640B000
trusted library allocation
page read and write
524C000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
5B75000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
60D1000
trusted library allocation
page read and write
5E02000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
1284000
heap
page read and write
5B9D000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
1255000
heap
page read and write
5B70000
trusted library allocation
page read and write
1284000
heap
page read and write
6144000
trusted library allocation
page read and write
5B86000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
620D000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5700000
remote allocation
page read and write
1284000
heap
page read and write
5B77000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5C98000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
5B62000
trusted library allocation
page read and write
600D000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
600E000
trusted library allocation
page read and write
1284000
heap
page read and write
5B6F000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
6005000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B83000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
5BD5000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5B6F000
trusted library allocation
page read and write
5B7C000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
6003000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B9D000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5C06000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
612D000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
610F000
trusted library allocation
page read and write
5BFA000
trusted library allocation
page read and write
60D7000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
122F000
heap
page read and write
5B7B000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5C0E000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
1284000
heap
page read and write
5B7B000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5BFA000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
1242000
heap
page read and write
5B83000
trusted library allocation
page read and write
61D7000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
5B76000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
60BA000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
1255000
heap
page read and write
5B7B000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
6004000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
612F000
trusted library allocation
page read and write
125E000
heap
page read and write
6004000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B75000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
60BF000
trusted library allocation
page read and write
6005000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
1264000
heap
page read and write
619D000
trusted library allocation
page read and write
6697000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
4BC0000
direct allocation
page read and write
5BCD000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
6006000
trusted library allocation
page read and write
1251000
heap
page read and write
1241000
heap
page read and write
5B7B000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
60CB000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
600F000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
1284000
heap
page read and write
6009000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
6218000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5BE8000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5B7B000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
5B68000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
241000
unkown
page execute and write copy
612F000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
60C2000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
600D000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5700000
remote allocation
page read and write
5B83000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
6007000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
4BD1000
heap
page read and write
5B6F000
trusted library allocation
page read and write
6003000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
1251000
heap
page read and write
5B8C000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
625B000
trusted library allocation
page read and write
600C000
trusted library allocation
page read and write
61D9000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
60F5000
trusted library allocation
page read and write
628F000
trusted library allocation
page read and write
1233000
heap
page read and write
5B6F000
trusted library allocation
page read and write
4BD1000
heap
page read and write
6006000
trusted library allocation
page read and write
5B83000
trusted library allocation
page read and write
5B63000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
6116000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B72000
trusted library allocation
page read and write
60B5000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
6122000
trusted library allocation
page read and write
6008000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
6007000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5B6F000
trusted library allocation
page read and write
5B75000
trusted library allocation
page read and write
6011000
trusted library allocation
page read and write
628D000
trusted library allocation
page read and write
There are 817 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0