IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 101
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 102
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 104
JSON data
dropped
Chrome Cache Entry: 105
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 106
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 108
JSON data
downloaded
Chrome Cache Entry: 109
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 110
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 111
JSON data
downloaded
Chrome Cache Entry: 112
JSON data
dropped
Chrome Cache Entry: 113
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 114
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 115
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 116
ASCII text
dropped
Chrome Cache Entry: 117
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 118
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 119
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 120
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 121
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 122
JSON data
dropped
Chrome Cache Entry: 123
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 124
JSON data
downloaded
Chrome Cache Entry: 125
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 87
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 88
JSON data
dropped
Chrome Cache Entry: 89
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 90
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 92
JSON data
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
JSON data
dropped
Chrome Cache Entry: 96
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 98
ASCII text
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (52717), with no line terminators
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1900,i,6270560810318321206,4862603060177102708,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1988,i,9570468939057985229,18284962801725825015,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://marshal-zhukov.com/y
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://steamcommunity.com/profiles/76561199724331900
104.121.10.34
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://github.com/Thraka
unknown
http://microsoft.co
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=OgygW_VD
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://www.ecosia.org/newtab/
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://github.com/adegeo
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=nT6RHKdfWgaJ&l=e
unknown
https://github.com/dotnet/try
unknown
https://store.steampowered.com/about/
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=4Vb3xc8UazdB&a
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
https://marshal-zhukov.com/)
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
unknown
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
unknown
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
unknown
https://marshal-zhukov.com/api
172.67.160.80
https://github.com/gewarren
unknown
https://marshal-zhukov.com/apiYB
unknown
https://steamcommunity.com/workshop/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
unknown
https://store.steampowered.com/legal/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
unknown
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.121.10.34
marshal-zhukov.com
172.67.160.80
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
powerful-avoids.sbs
unknown
property-imper.sbs
unknown
mdec.nelreports.net
unknown
leg-sate-boat.sbs
unknown
occupy-blushi.sbs
unknown
disobey-curly.sbs
unknown
blade-govern.sbs
unknown
story-tense-faz.sbs
unknown
motion-treesz.sbs
unknown
frogs-severz.sbs
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.10
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
104.121.10.34
steamcommunity.com
United States
142.250.181.100
www.google.com
United States
172.67.160.80
marshal-zhukov.com
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
5467000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
5655000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
760000
direct allocation
page read and write
4EBD000
stack
page read and write
853000
heap
page read and write
5DB0000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
410E000
stack
page read and write
2F8E000
stack
page read and write
557E000
trusted library allocation
page read and write
3ACE000
stack
page read and write
544A000
trusted library allocation
page read and write
5C05000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
380F000
stack
page read and write
4371000
heap
page read and write
5541000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
7B8000
heap
page read and write
5DA9000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
3C0E000
stack
page read and write
5DAD000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
58E000
stack
page read and write
5B0E000
trusted library allocation
page read and write
4FBC000
stack
page read and write
483B000
stack
page read and write
5529000
trusted library allocation
page read and write
54AF000
trusted library allocation
page read and write
5548000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
36CF000
stack
page read and write
563D000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
850000
heap
page read and write
5586000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5551000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
77E000
heap
page read and write
4CFF000
stack
page read and write
5446000
trusted library allocation
page read and write
8160000
direct allocation
page read and write
5425000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
280F000
stack
page read and write
344F000
stack
page read and write
5DAD000
trusted library allocation
page read and write
5588000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
856000
heap
page read and write
5446000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
546B000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
542B000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
3D4E000
stack
page read and write
30CE000
stack
page read and write
545D000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
E82000
unkown
page execute and read and write
5B03000
trusted library allocation
page read and write
760000
direct allocation
page read and write
49B0000
direct allocation
page execute and read and write
5508000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
5DAD000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
5549000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
515E000
stack
page read and write
4371000
heap
page read and write
5541000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
BC0000
unkown
page read and write
54BE000
trusted library allocation
page read and write
2E4E000
stack
page read and write
5534000
trusted library allocation
page read and write
5B39000
stack
page read and write
4371000
heap
page read and write
5B08000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
85B000
heap
page read and write
5B0C000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
40CF000
stack
page read and write
5465000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
542B000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
4382000
heap
page read and write
544F000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
760000
direct allocation
page read and write
5455000
trusted library allocation
page read and write
4970000
direct allocation
page execute and read and write
4D3E000
stack
page read and write
5517000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
55A8000
trusted library allocation
page read and write
5504000
trusted library allocation
page read and write
6B7000
heap
page read and write
5576000
trusted library allocation
page read and write
5427000
trusted library allocation
page read and write
4381000
heap
page read and write
5B0C000
trusted library allocation
page read and write
5549000
trusted library allocation
page read and write
493F000
stack
page read and write
5BC9000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
5BBB000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
5582000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
605A000
trusted library allocation
page execute and read and write
549E000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
863000
heap
page read and write
8100000
direct allocation
page read and write
9B000
stack
page read and write
4371000
heap
page read and write
5B0D000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
603E000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
760000
direct allocation
page read and write
4371000
heap
page read and write
5DAE000
trusted library allocation
page read and write
3BCF000
stack
page read and write
5502000
trusted library allocation
page read and write
1065000
unkown
page execute and read and write
5B0A000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
BC1000
unkown
page execute and read and write
5433000
trusted library allocation
page read and write
EC5000
unkown
page execute and read and write
5DA7000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
760000
direct allocation
page read and write
5479000
trusted library allocation
page read and write
4350000
heap
page read and write
5B0A000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
575D000
trusted library allocation
page read and write
552E000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
50FD000
stack
page read and write
5DAC000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
47ED000
stack
page read and write
5490000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
4ABE000
stack
page read and write
57AD000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
54A6000
trusted library allocation
page read and write
398E000
stack
page read and write
5519000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
6AE000
stack
page read and write
330F000
stack
page read and write
4371000
heap
page read and write
5448000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
5B0D000
trusted library allocation
page read and write
5B9F000
trusted library allocation
page read and write
5C00000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
8100000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
55E2000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5C9C000
trusted library allocation
page read and write
4371000
heap
page read and write
5B01000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
8160000
direct allocation
page read and write
5B0F000
trusted library allocation
page read and write
5BCF000
trusted library allocation
page read and write
370E000
stack
page read and write
5B0E000
trusted library allocation
page read and write
553A000
trusted library allocation
page read and write
5DA8000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
5B06000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
4E0000
heap
page read and write
4BBD000
stack
page read and write
857000
heap
page read and write
4980000
direct allocation
page execute and read and write
5DAF000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
2B8F000
stack
page read and write
556E000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
4FFE000
stack
page read and write
5637000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
EAF000
unkown
page execute and read and write
81E0000
direct allocation
page execute and read and write
5BB2000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
563D000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
384E000
stack
page read and write
545C000
trusted library allocation
page read and write
543B000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
760000
direct allocation
page read and write
5528000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
5529000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
4371000
heap
page read and write
5581000
trusted library allocation
page read and write
4E60000
remote allocation
page read and write
5686000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
19A000
stack
page read and write
5B07000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
5578000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
5502000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
4371000
heap
page read and write
3E4F000
stack
page read and write
5499000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
760000
direct allocation
page read and write
57DE000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
5B0B000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
2E0F000
stack
page read and write
545A000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
424E000
stack
page read and write
5433000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
542B000
trusted library allocation
page read and write
4370000
heap
page read and write
848000
heap
page read and write
54B0000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5BB4000
trusted library allocation
page read and write
4371000
heap
page read and write
557F000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
498E000
stack
page read and write
5DAF000
trusted library allocation
page read and write
846000
heap
page read and write
557F000
trusted library allocation
page read and write
552C000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
4E60000
remote allocation
page read and write
4960000
direct allocation
page execute and read and write
4E3F000
stack
page read and write
4371000
heap
page read and write
5A0000
heap
page read and write
545C000
trusted library allocation
page read and write
5DA8000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
35CE000
stack
page read and write
5490000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
70E000
stack
page read and write
5464000
trusted library allocation
page read and write
4371000
heap
page read and write
5B08000
trusted library allocation
page read and write
47F0000
direct allocation
page read and write
5520000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
49C1000
trusted library allocation
page read and write
2D0E000
stack
page read and write
5DAD000
trusted library allocation
page read and write
5475000
trusted library allocation
page read and write
552F000
trusted library allocation
page read and write
562E000
trusted library allocation
page read and write
5B0F000
trusted library allocation
page read and write
57DE000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
EB7000
unkown
page execute and read and write
54A0000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
863000
heap
page read and write
5539000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
82B000
heap
page read and write
7B1000
heap
page read and write
544A000
trusted library allocation
page read and write
320E000
stack
page read and write
556E000
trusted library allocation
page read and write
5508000
trusted library allocation
page read and write
846000
heap
page read and write
760000
direct allocation
page read and write
54A0000
trusted library allocation
page read and write
3FCE000
stack
page read and write
5725000
trusted library allocation
page read and write
EC6000
unkown
page execute and write copy
5B10000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
770000
heap
page read and write
54AC000
trusted library allocation
page read and write
760000
direct allocation
page read and write
5448000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
434F000
stack
page read and write
420F000
stack
page read and write
5490000
trusted library allocation
page read and write
863000
heap
page read and write
5581000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
74C000
stack
page read and write
290F000
stack
page read and write
5DAB000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
C19000
unkown
page execute and read and write
54B7000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
82D000
heap
page read and write
5443000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
4BFD000
stack
page read and write
55F2000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
394F000
stack
page read and write
5519000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
5DA1000
trusted library allocation
page read and write
5451000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
7C2000
heap
page read and write
5B0D000
trusted library allocation
page read and write
525F000
stack
page read and write
5511000
trusted library allocation
page read and write
5DA4000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
5BAF000
trusted library allocation
page read and write
5B0F000
trusted library allocation
page read and write
2F4F000
stack
page read and write
5B05000
trusted library allocation
page read and write
294E000
stack
page read and write
5B03000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
750000
heap
page read and write
576F000
trusted library allocation
page read and write
52CE000
stack
page read and write
5B0E000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
856000
heap
page read and write
5273000
heap
page read and write
543C000
trusted library allocation
page read and write
BAE000
stack
page read and write
5420000
trusted library allocation
page read and write
77A000
heap
page read and write
5F2C000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
4371000
heap
page read and write
5B06000
trusted library allocation
page read and write
7DE000
heap
page read and write
308F000
stack
page read and write
5586000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
5DAC000
trusted library allocation
page read and write
5539000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
C17000
unkown
page read and write
5DA3000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5554000
trusted library allocation
page read and write
552A000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
5BBE000
trusted library allocation
page read and write
5C70000
direct allocation
page read and write
5511000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
4E60000
remote allocation
page read and write
5B06000
trusted library allocation
page read and write
5588000
trusted library allocation
page read and write
7DA000
heap
page read and write
5576000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
3A8F000
stack
page read and write
5424000
trusted library allocation
page read and write
5C39000
stack
page read and write
54BB000
trusted library allocation
page read and write
5B0F000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
47F0000
direct allocation
page read and write
5DAF000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
760000
direct allocation
page read and write
557E000
trusted library allocation
page read and write
400000
heap
page read and write
8100000
direct allocation
page read and write
5588000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
D9C000
unkown
page execute and read and write
83B000
heap
page read and write
4371000
heap
page read and write
5B07000
trusted library allocation
page read and write
542B000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
31CF000
stack
page read and write
5DA4000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
570D000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
5653000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
5576000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
7A8000
heap
page read and write
760000
direct allocation
page read and write
5A5000
heap
page read and write
83F000
heap
page read and write
5DAE000
trusted library allocation
page read and write
556E000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5479000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
760000
direct allocation
page read and write
5DAB000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
5559000
trusted library allocation
page read and write
54E000
stack
page read and write
6052000
trusted library allocation
page execute and read and write
543C000
trusted library allocation
page read and write
6B0000
heap
page read and write
5519000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
857000
heap
page read and write
5655000
trusted library allocation
page read and write
4844000
direct allocation
page read and write
5587000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
760000
direct allocation
page read and write
8100000
direct allocation
page read and write
C17000
unkown
page write copy
8100000
direct allocation
page read and write
270F000
stack
page read and write
557F000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
5DA2000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
8160000
direct allocation
page read and write
5DAA000
trusted library allocation
page read and write
8100000
direct allocation
page read and write
5588000
trusted library allocation
page read and write
2A8E000
stack
page read and write
54AF000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
358F000
stack
page read and write
5448000
trusted library allocation
page read and write
2A4F000
stack
page read and write
3D0F000
stack
page read and write
5B03000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
2BCE000
stack
page read and write
4371000
heap
page read and write
4470000
trusted library allocation
page read and write
53CF000
stack
page read and write
54AB000
trusted library allocation
page read and write
856000
heap
page read and write
49A0000
direct allocation
page execute and read and write
5B08000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
85E000
heap
page read and write
5558000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
5576000
trusted library allocation
page read and write
5571000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
5576000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
6056000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
85A000
heap
page read and write
553F000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
96E000
stack
page read and write
5DA3000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
4950000
direct allocation
page execute and read and write
5503000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
3E8E000
stack
page read and write
5DB1000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
5BCB000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
47F0000
direct allocation
page read and write
BC1000
unkown
page execute and write copy
4371000
heap
page read and write
557F000
trusted library allocation
page read and write
856000
heap
page read and write
542C000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
82B000
heap
page read and write
5521000
trusted library allocation
page read and write
856000
heap
page read and write
5B0C000
trusted library allocation
page read and write
56BE000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
5501000
trusted library allocation
page read and write
5528000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
348E000
stack
page read and write
544D000
trusted library allocation
page read and write
7EE000
heap
page read and write
81B0000
direct allocation
page execute and read and write
5B10000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
EC5000
unkown
page execute and write copy
5B10000
trusted library allocation
page read and write
3F8F000
stack
page read and write
5DAE000
trusted library allocation
page read and write
C05000
unkown
page execute and read and write
5529000
trusted library allocation
page read and write
BC0000
unkown
page readonly
4371000
heap
page read and write
4371000
heap
page read and write
54AC000
trusted library allocation
page read and write
334E000
stack
page read and write
61E0000
trusted library allocation
page execute and read and write
5424000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
4371000
heap
page read and write
542B000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
760000
direct allocation
page read and write
5576000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
83F000
heap
page read and write
5270000
heap
page read and write
2CCF000
stack
page read and write
4371000
heap
page read and write
5702000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
5539000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
There are 721 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0