IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B8DE7T9Q\bx[1].txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\AC\INetCache\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Temp\~DFC4AC6ACF0AA1B268.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:30:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:30:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 09:52:18 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:30:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:30:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:30:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Windows\bx.txt
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 70
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
downloaded
Chrome Cache Entry: 71
MS Windows icon resource - 1 icon, 16x16, 32 bits/pixel
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:8 WinX:0 WinY:0 IEFrame:00000000
malicious
C:\Windows\SysWOW64\explorer.exe
explorer.exe https://icafe8.kf5.com/kchat/1011049
C:\Windows\explorer.exe
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://icafe8.kf5.com/kchat/1011049
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1844,i,5322048683441253809,11267827369228071450,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://icafe8.kf5.com/kchat/1011049Ho
unknown
https://icafe8.kf5.com/kchat/1011049N
unknown
http://www.nytimes.com/
unknown
http://safe.ywxww.net:820/bx.txtceEY
unknown
https://icafe8.kf5.com/kchat/1011049Fo
unknown
https://icafe8.kf5.com/kchat/1011049R
unknown
https://icafe8.kf5.com/kchat/1011049U%
unknown
http://safe.ywxww.net:820/bx.txt-04C
unknown
https://icafe8.kf5.com/kchat/1011049storyRl
unknown
http://safe.ywxww.net:820/bx.txt
60.191.236.246
http://safe.ywxww.net:820/bx.txtOOC:
unknown
http://www.amazon.com/
unknown
http://safe.ywxww.net:820/bx.txtl
unknown
http://www.twitter.com/
unknown
https://icafe8.kf5.com/favicon.ico
106.75.91.144
https://icafe8.kf5.com/kchat/1011049003
unknown
https://icafe8.kf5.com/kchat/10110490
unknown
https://icafe8.kf5.com/kchat/1011049hrome.exe
unknown
https://icafe8.kf5.com/kchat/1011049s
unknown
https://icafe8.kf5.com/kchat/1011049t
unknown
http://safe.ywxww.net:820/bxupdate.exe
unknown
http://www.youtube.com/
unknown
https://icafe8.kf5.com/kchat/1011049
https://icafe8.kf5.com/kchat/1011049FileExists
unknown
https://icafe8.kf5.com/kchat/1011049C:
unknown
http://www.wikipedia.com/
unknown
http://safe.ywxww.net:820/bx.txtB
unknown
http://www.live.com/
unknown
http://safe.ywxww.net:820/bxupdate.exe.c:
unknown
http://safe.ywxww.net:820/bx.txtll
unknown
http://www.reddit.com/
unknown
http://safe.ywxww.net/
unknown
http://www.google.com/
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
icafe8.kf5.com
106.75.91.144
safe.ywxww.net
60.191.236.246
www.google.com
142.250.181.100

IPs

IP
Domain
Country
Malicious
60.191.236.246
safe.ywxww.net
China
192.168.2.11
unknown
unknown
239.255.255.250
unknown
Reserved
106.75.91.144
icafe8.kf5.com
China
192.168.2.5
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\History
CacheLimit

Memdumps

Base Address
Regiontype
Protect
Malicious
790E000
heap
page read and write
7826000
heap
page read and write
790E000
heap
page read and write
3650000
heap
page read and write
791E000
heap
page read and write
78FB000
heap
page read and write
4FFE000
stack
page read and write
2C90000
heap
page read and write
28B1000
heap
page read and write
1F0000
heap
page read and write
791A000
heap
page read and write
3727000
heap
page read and write
791F000
heap
page read and write
2D83000
heap
page read and write
6F9D000
stack
page read and write
375B000
heap
page read and write
791A000
heap
page read and write
7907000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
7907000
heap
page read and write
791E000
heap
page read and write
790E000
heap
page read and write
5770000
heap
page read and write
39EE000
stack
page read and write
78FA000
heap
page read and write
77FA000
heap
page read and write
270E000
stack
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
78C1000
heap
page read and write
7802000
heap
page read and write
791E000
heap
page read and write
672000
heap
page read and write
7907000
heap
page read and write
790E000
heap
page read and write
28EA000
heap
page read and write
791A000
heap
page read and write
56BE000
stack
page read and write
790E000
heap
page read and write
791E000
heap
page read and write
305C000
stack
page read and write
791E000
heap
page read and write
5196000
heap
page read and write
291F000
heap
page read and write
790E000
heap
page read and write
5190000
heap
page read and write
790E000
heap
page read and write
66C000
heap
page read and write
7919000
heap
page read and write
7813000
heap
page read and write
28B2000
heap
page read and write
23BD000
heap
page read and write
2140000
heap
page read and write
2979000
heap
page read and write
1247000
heap
page read and write
790E000
heap
page read and write
790E000
heap
page read and write
463C000
stack
page read and write
7919000
heap
page read and write
36A0000
heap
page read and write
1222000
heap
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
3720000
heap
page read and write
78FB000
heap
page read and write
7900000
heap
page read and write
1247000
heap
page read and write
7907000
heap
page read and write
56BF000
stack
page read and write
790E000
heap
page read and write
791E000
heap
page read and write
2240000
trusted library allocation
page read and write
791E000
heap
page read and write
7907000
heap
page read and write
791A000
heap
page read and write
28EA000
heap
page read and write
7907000
heap
page read and write
519F000
heap
page read and write
7907000
heap
page read and write
7919000
heap
page read and write
324F000
stack
page read and write
790E000
heap
page read and write
78FB000
heap
page read and write
57A0000
heap
page read and write
3A7E000
stack
page read and write
124B000
heap
page read and write
4640000
heap
page read and write
2FAE000
stack
page read and write
29DB000
stack
page read and write
2144000
heap
page read and write
2370000
heap
page read and write
790E000
heap
page read and write
791F000
heap
page read and write
78F7000
heap
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
2F6E000
stack
page read and write
7907000
heap
page read and write
7919000
heap
page read and write
297D000
heap
page read and write
791E000
heap
page read and write
791F000
heap
page read and write
7FF000
stack
page read and write
78FD000
heap
page read and write
27FE000
stack
page read and write
406000
unkown
page read and write
790E000
heap
page read and write
2949000
heap
page read and write
7919000
heap
page read and write
21D9000
heap
page read and write
77D5000
heap
page read and write
389E000
stack
page read and write
77C7000
heap
page read and write
77C8000
heap
page read and write
39AE000
stack
page read and write
791E000
heap
page read and write
791F000
heap
page read and write
7907000
heap
page read and write
78FA000
heap
page read and write
7919000
heap
page read and write
791A000
heap
page read and write
791E000
heap
page read and write
711E000
stack
page read and write
791E000
heap
page read and write
2D2A000
heap
page read and write
3030000
heap
page read and write
7919000
heap
page read and write
2BBE000
stack
page read and write
715F000
stack
page read and write
7919000
heap
page read and write
7919000
heap
page read and write
5A0000
trusted library allocation
page execute read
36C0000
heap
page read and write
1244000
heap
page read and write
2974000
heap
page read and write
2880000
heap
page read and write
78CD000
heap
page read and write
22FA000
stack
page read and write
369E000
stack
page read and write
790E000
heap
page read and write
4F7E000
stack
page read and write
2C90000
heap
page read and write
7907000
heap
page read and write
791A000
heap
page read and write
77D2000
heap
page read and write
45E6000
stack
page read and write
70DF000
stack
page read and write
283E000
stack
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
23BA000
heap
page read and write
7921000
heap
page read and write
7907000
heap
page read and write
7919000
heap
page read and write
790E000
heap
page read and write
2925000
heap
page read and write
790E000
heap
page read and write
470000
heap
page read and write
323D000
stack
page read and write
77E8000
heap
page read and write
2900000
heap
page read and write
2FEE000
stack
page read and write
2F2D000
stack
page read and write
76C0000
heap
page read and write
791E000
heap
page read and write
7907000
heap
page read and write
7919000
heap
page read and write
2A50000
heap
page read and write
791A000
heap
page read and write
76BC000
heap
page read and write
791F000
heap
page read and write
2933000
heap
page read and write
7919000
heap
page read and write
791E000
heap
page read and write
790E000
heap
page read and write
77EF000
heap
page read and write
2933000
heap
page read and write
297D000
heap
page read and write
DC0000
heap
page read and write
791A000
heap
page read and write
791E000
heap
page read and write
7906000
heap
page read and write
2220000
heap
page read and write
2C80000
heap
page read and write
7919000
heap
page read and write
529F000
stack
page read and write
2920000
heap
page read and write
7919000
heap
page read and write
291F000
heap
page read and write
790E000
heap
page read and write
4EA0000
heap
page read and write
77CD000
heap
page read and write
692000
heap
page read and write
29BC000
stack
page read and write
2C39000
stack
page read and write
791A000
heap
page read and write
9A000
stack
page read and write
7907000
heap
page read and write
78D3000
heap
page read and write
7907000
heap
page read and write
608000
heap
page read and write
78D9000
heap
page read and write
7907000
heap
page read and write
790E000
heap
page read and write
7921000
heap
page read and write
58E000
stack
page read and write
4FBF000
stack
page read and write
7907000
heap
page read and write
791E000
heap
page read and write
2933000
heap
page read and write
791A000
heap
page read and write
23FE000
stack
page read and write
7907000
heap
page read and write
19A000
stack
page read and write
33DB000
stack
page read and write
34BE000
stack
page read and write
2949000
heap
page read and write
791E000
heap
page read and write
790E000
heap
page read and write
7907000
heap
page read and write
790E000
heap
page read and write
291A000
heap
page read and write
2949000
heap
page read and write
291F000
heap
page read and write
790E000
heap
page read and write
624000
heap
page read and write
791E000
heap
page read and write
7907000
heap
page read and write
3A00000
heap
page read and write
28E3000
heap
page read and write
1244000
heap
page read and write
7907000
heap
page read and write
374E000
heap
page read and write
361E000
stack
page read and write
76D0000
heap
page read and write
78C0000
heap
page read and write
791A000
heap
page read and write
3AB0000
heap
page read and write
11B0000
heap
page read and write
790E000
heap
page read and write
685000
heap
page read and write
791E000
heap
page read and write
401000
unkown
page execute read
7907000
heap
page read and write
791A000
heap
page read and write
78C8000
heap
page read and write
3037000
heap
page read and write
7900000
heap
page read and write
407000
unkown
page readonly
5A00000
heap
page read and write
709E000
stack
page read and write
7907000
heap
page read and write
66C000
heap
page read and write
791E000
heap
page read and write
57BF000
heap
page read and write
8FE000
stack
page read and write
791E000
heap
page read and write
791A000
heap
page read and write
66C000
heap
page read and write
52DE000
stack
page read and write
77C0000
heap
page read and write
791E000
heap
page read and write
78F7000
heap
page read and write
6F1C000
stack
page read and write
791E000
heap
page read and write
791F000
heap
page read and write
347F000
stack
page read and write
23BC000
heap
page read and write
2932000
heap
page read and write
791D000
heap
page read and write
2978000
heap
page read and write
4B90000
heap
page read and write
7907000
heap
page read and write
7919000
heap
page read and write
401000
unkown
page execute read
503F000
stack
page read and write
21D0000
heap
page read and write
7816000
heap
page read and write
374C000
heap
page read and write
791A000
heap
page read and write
2A40000
heap
page read and write
7919000
heap
page read and write
7907000
heap
page read and write
7906000
heap
page read and write
23BE000
heap
page read and write
5D0000
heap
page read and write
DA0000
heap
page read and write
7919000
heap
page read and write
50FE000
stack
page read and write
76B5000
heap
page read and write
790E000
heap
page read and write
507D000
stack
page read and write
531F000
stack
page read and write
7919000
heap
page read and write
11FD000
heap
page read and write
791A000
heap
page read and write
2957000
heap
page read and write
57B6000
heap
page read and write
288A000
heap
page read and write
36C5000
heap
page read and write
5310000
heap
page read and write
7919000
heap
page read and write
791E000
heap
page read and write
790E000
heap
page read and write
77DD000
heap
page read and write
2C3E000
stack
page read and write
27B5000
heap
page read and write
791F000
heap
page read and write
790E000
heap
page read and write
77DE000
heap
page read and write
274E000
stack
page read and write
2924000
heap
page read and write
701E000
stack
page read and write
690000
heap
page read and write
2120000
heap
page read and write
7919000
heap
page read and write
77EF000
heap
page read and write
6F5C000
stack
page read and write
77F9000
heap
page read and write
7907000
heap
page read and write
55FE000
stack
page read and write
278E000
stack
page read and write
77C1000
heap
page read and write
302E000
stack
page read and write
11FA000
heap
page read and write
685000
heap
page read and write
7906000
heap
page read and write
4EFC000
stack
page read and write
791E000
heap
page read and write
7907000
heap
page read and write
5430000
heap
page read and write
375B000
heap
page read and write
790E000
heap
page read and write
2927000
heap
page read and write
7908000
heap
page read and write
7919000
heap
page read and write
297E000
heap
page read and write
7802000
heap
page read and write
1221000
heap
page read and write
52A0000
heap
page read and write
791A000
heap
page read and write
392E000
stack
page read and write
7919000
heap
page read and write
7919000
heap
page read and write
76B9000
heap
page read and write
791A000
heap
page read and write
790E000
heap
page read and write
333F000
stack
page read and write
76B0000
heap
page read and write
7919000
heap
page read and write
790E000
heap
page read and write
7828000
heap
page read and write
21E0000
heap
page read and write
791E000
heap
page read and write
396E000
stack
page read and write
5194000
heap
page read and write
790E000
heap
page read and write
D90000
heap
page read and write
76B4000
heap
page read and write
791A000
heap
page read and write
77FA000
heap
page read and write
7919000
heap
page read and write
674000
heap
page read and write
28AD000
heap
page read and write
7919000
heap
page read and write
7919000
heap
page read and write
7907000
heap
page read and write
2230000
heap
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
363C000
stack
page read and write
2949000
heap
page read and write
77DA000
heap
page read and write
7907000
heap
page read and write
57B0000
heap
page read and write
791A000
heap
page read and write
28EA000
heap
page read and write
407000
unkown
page readonly
2CF0000
heap
page read and write
7919000
heap
page read and write
6FDD000
stack
page read and write
7907000
heap
page read and write
78FA000
heap
page read and write
791A000
heap
page read and write
790E000
heap
page read and write
28F5000
heap
page read and write
78CD000
heap
page read and write
5330000
heap
page read and write
2976000
heap
page read and write
7919000
heap
page read and write
791F000
heap
page read and write
791A000
heap
page read and write
7900000
heap
page read and write
475000
heap
page read and write
791E000
heap
page read and write
60E000
heap
page read and write
790E000
heap
page read and write
791A000
heap
page read and write
638000
heap
page read and write
7907000
heap
page read and write
790E000
heap
page read and write
3762000
heap
page read and write
77C6000
heap
page read and write
35BF000
stack
page read and write
563F000
stack
page read and write
638000
heap
page read and write
124B000
heap
page read and write
791A000
heap
page read and write
2961000
heap
page read and write
23B0000
heap
page read and write
791E000
heap
page read and write
790E000
heap
page read and write
371F000
stack
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
77D5000
heap
page read and write
790E000
heap
page read and write
45F4000
heap
page read and write
5530000
heap
page read and write
28E7000
heap
page read and write
705F000
stack
page read and write
7907000
heap
page read and write
3762000
heap
page read and write
790E000
heap
page read and write
790E000
heap
page read and write
2DA2000
heap
page read and write
2D20000
heap
page read and write
685000
heap
page read and write
78C6000
heap
page read and write
791A000
heap
page read and write
23BE000
heap
page read and write
14A0000
heap
page read and write
337E000
stack
page read and write
791E000
heap
page read and write
11D4000
heap
page read and write
2933000
heap
page read and write
790E000
heap
page read and write
7908000
heap
page read and write
27B0000
heap
page read and write
2930000
heap
page read and write
7919000
heap
page read and write
624000
heap
page read and write
791E000
heap
page read and write
400000
unkown
page readonly
790E000
heap
page read and write
791E000
heap
page read and write
78F7000
heap
page read and write
7919000
heap
page read and write
23BC000
heap
page read and write
7908000
heap
page read and write
790E000
heap
page read and write
14A5000
heap
page read and write
57B4000
heap
page read and write
45E000
stack
page read and write
567E000
stack
page read and write
22BB000
stack
page read and write
7802000
heap
page read and write
2360000
heap
page read and write
791A000
heap
page read and write
2CF5000
heap
page read and write
790E000
heap
page read and write
638000
heap
page read and write
313D000
stack
page read and write
11F0000
heap
page read and write
28E5000
heap
page read and write
379E000
stack
page read and write
791F000
heap
page read and write
790E000
heap
page read and write
410000
heap
page read and write
7828000
heap
page read and write
7907000
heap
page read and write
2961000
heap
page read and write
56FF000
stack
page read and write
77F1000
heap
page read and write
7907000
heap
page read and write
4CB0000
heap
page read and write
2A3E000
stack
page read and write
513F000
stack
page read and write
23B7000
heap
page read and write
D48000
stack
page read and write
7907000
heap
page read and write
29FC000
stack
page read and write
791A000
heap
page read and write
600000
heap
page read and write
7906000
heap
page read and write
7906000
heap
page read and write
23BE000
heap
page read and write
791A000
heap
page read and write
28AD000
heap
page read and write
790E000
heap
page read and write
790E000
heap
page read and write
481E000
stack
page read and write
370E000
stack
page read and write
45F0000
heap
page read and write
7907000
heap
page read and write
790E000
heap
page read and write
7907000
heap
page read and write
4F3D000
stack
page read and write
7919000
heap
page read and write
400000
unkown
page readonly
5440000
heap
page read and write
50BE000
stack
page read and write
7907000
heap
page read and write
790E000
heap
page read and write
7919000
heap
page read and write
7907000
heap
page read and write
7907000
heap
page read and write
78FB000
heap
page read and write
791A000
heap
page read and write
7919000
heap
page read and write
7906000
heap
page read and write
6EC0000
heap
page read and write
790E000
heap
page read and write
7919000
heap
page read and write
77E7000
heap
page read and write
There are 507 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://icafe8.kf5.com/kchat/1011049