IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 102
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 103
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 104
JSON data
dropped
Chrome Cache Entry: 105
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 106
JSON data
downloaded
Chrome Cache Entry: 107
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 69
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 71
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 72
JSON data
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 75
JSON data
dropped
Chrome Cache Entry: 76
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 77
JSON data
downloaded
Chrome Cache Entry: 78
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 80
ASCII text
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 82
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 83
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 87
JSON data
dropped
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 89
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 91
JSON data
downloaded
Chrome Cache Entry: 92
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 93
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 96
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 97
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 98
ASCII text
dropped
Chrome Cache Entry: 99
SVG Scalable Vector Graphics image
downloaded
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1884,i,17699298288420818842,9296858339139321116,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1848,i,12859633962272970777,3292351338685912697,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://atten-supporse.biz/Q
unknown
https://github.com/Youssef1313
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://atten-supporse.biz//
unknown
http://185.215.113.16/off/def.exez
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://185.215.113.16/e
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.mozilla.or
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.16.9
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exeicrosoft
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://atten-supporse.biz/api7
unknown
https://atten-supporse.biz:443/api
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
https://channel9.msdn.com/
unknown
http://crl.microx
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://github.com/dotnet/try
unknown
There are 66 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.16.9
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
104.21.16.9
atten-supporse.biz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
53B0000
trusted library allocation
page read and write
862000
heap
page read and write
5393000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
536E000
stack
page read and write
5FAF000
stack
page read and write
547C000
trusted library allocation
page read and write
595C000
trusted library allocation
page read and write
766E000
stack
page read and write
43F1000
heap
page read and write
595D000
trusted library allocation
page read and write
5D4000
heap
page read and write
5902000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
84E000
heap
page read and write
5D4D000
trusted library allocation
page execute and read and write
712F000
stack
page read and write
7C70000
direct allocation
page read and write
5D4000
heap
page read and write
4A40000
direct allocation
page execute and read and write
5E5A000
trusted library allocation
page execute and read and write
5394000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
15B000
stack
page read and write
863000
heap
page read and write
5816000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
5200000
heap
page read and write
53DB000
trusted library allocation
page read and write
4E0E000
stack
page read and write
65EF000
stack
page read and write
43F1000
heap
page read and write
5394000
trusted library allocation
page read and write
CB1000
unkown
page execute and write copy
53BF000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
2DAE000
stack
page read and write
53BF000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
4400000
heap
page read and write
49E0000
direct allocation
page execute and read and write
4A1D000
stack
page read and write
5936000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
5D4000
heap
page read and write
5471000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
592E000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
69AF000
stack
page read and write
5371000
trusted library allocation
page read and write
316E000
stack
page read and write
53BF000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
58FC000
trusted library allocation
page read and write
7C90000
direct allocation
page read and write
5816000
trusted library allocation
page read and write
68AE000
stack
page read and write
86C000
heap
page read and write
43F1000
heap
page read and write
4880000
direct allocation
page read and write
53B7000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
53D9000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5D4000
heap
page read and write
5811000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
53D7000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
59A9000
trusted library allocation
page read and write
581A000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
58CF000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
CA0000
direct allocation
page read and write
58E0000
trusted library allocation
page read and write
75E000
stack
page read and write
7C6F000
stack
page read and write
5BB9000
stack
page read and write
84E000
heap
page read and write
FAD000
unkown
page execute and write copy
5818000
trusted library allocation
page read and write
676E000
stack
page read and write
5944000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
83F000
heap
page read and write
53B5000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
7B3000
heap
page read and write
542C000
trusted library allocation
page read and write
2C6E000
stack
page read and write
5A3F000
trusted library allocation
page read and write
53AF000
trusted library allocation
page read and write
BBE000
stack
page read and write
7E80000
heap
page read and write
61E000
stack
page read and write
50EE000
stack
page read and write
594E000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
53DC000
trusted library allocation
page read and write
55ED000
trusted library allocation
page read and write
581A000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
507F000
stack
page read and write
5D4000
heap
page read and write
5818000
trusted library allocation
page read and write
526E000
stack
page read and write
539E000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
53AF000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
49CF000
stack
page read and write
4DCE000
stack
page read and write
86E000
heap
page read and write
5EAE000
stack
page read and write
58AB000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
537B000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
820000
heap
page read and write
C57000
heap
page read and write
58C4000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
302E000
stack
page read and write
5395000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
53BB000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
28EF000
stack
page read and write
5A08000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
2EEE000
stack
page read and write
85E000
heap
page read and write
82F000
heap
page read and write
53BF000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
843000
heap
page read and write
5386000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
83F000
heap
page read and write
5819000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
86C000
heap
page read and write
53ED000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
43F1000
heap
page read and write
53BF000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
4C8D000
stack
page read and write
4A20000
direct allocation
page execute and read and write
6FEF000
stack
page read and write
C3E000
stack
page read and write
53C5000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
5935000
trusted library allocation
page read and write
7D6000
heap
page read and write
5371000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
402F000
stack
page read and write
53BF000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
7C1000
heap
page read and write
5815000
trusted library allocation
page read and write
5D4000
heap
page read and write
5AA4000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
1C0000
heap
page read and write
539F000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
860000
heap
page read and write
863000
heap
page read and write
5946000
trusted library allocation
page read and write
850000
heap
page read and write
7C90000
direct allocation
page read and write
538D000
trusted library allocation
page read and write
3EEF000
stack
page read and write
4A58000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
27EF000
stack
page read and write
96E0000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
86A000
heap
page read and write
53AF000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
4CCE000
stack
page read and write
58BD000
trusted library allocation
page read and write
547A000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
5A77000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5D4000
heap
page read and write
726F000
stack
page read and write
53BF000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
43F1000
heap
page read and write
5395000
trusted library allocation
page read and write
2EAF000
stack
page read and write
49F0000
direct allocation
page execute and read and write
5811000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
58E9000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
612E000
stack
page read and write
861000
heap
page read and write
43F1000
heap
page read and write
53E8000
trusted library allocation
page read and write
33AF000
stack
page read and write
CA0000
direct allocation
page read and write
861000
heap
page read and write
43F1000
heap
page read and write
539F000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
5393000
trusted library allocation
page read and write
53BC000
trusted library allocation
page read and write
39EF000
stack
page read and write
861000
heap
page read and write
86E000
heap
page read and write
64EE000
stack
page read and write
5970000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
C40000
heap
page read and write
34EF000
stack
page read and write
6EEE000
stack
page read and write
5390000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
53BC000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
854000
heap
page read and write
5D4000
heap
page read and write
5387000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
C50000
heap
page read and write
2B2E000
stack
page read and write
539E000
trusted library allocation
page read and write
845000
heap
page read and write
5819000
trusted library allocation
page read and write
74EF000
stack
page read and write
5E83000
trusted library allocation
page read and write
5D4000
heap
page read and write
53AF000
trusted library allocation
page read and write
72AE000
stack
page read and write
843000
heap
page read and write
43F1000
heap
page read and write
5394000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
85B000
heap
page read and write
5814000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
5931000
trusted library allocation
page read and write
58E2000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
43EF000
stack
page read and write
53F7000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
43F1000
heap
page read and write
F9F000
unkown
page execute and read and write
53C4000
trusted library allocation
page read and write
77A000
heap
page read and write
7C90000
direct allocation
page read and write
53B1000
trusted library allocation
page read and write
406E000
stack
page read and write
538B000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
5A5F000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
662E000
stack
page read and write
538D000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
58C3000
trusted library allocation
page read and write
5525000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
4840000
heap
page read and write
5817000
trusted library allocation
page read and write
3F2E000
stack
page read and write
114B000
unkown
page execute and read and write
53AF000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
5906000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
596B000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5A5D000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
362F000
stack
page read and write
859000
heap
page read and write
53AF000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
5D0000
heap
page read and write
539E000
trusted library allocation
page read and write
593B000
trusted library allocation
page read and write
78AF000
stack
page read and write
6C2F000
stack
page read and write
5948000
trusted library allocation
page read and write
86A000
heap
page read and write
4F0F000
stack
page read and write
5555000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
581E000
trusted library allocation
page read and write
550A000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5D4000
heap
page read and write
538D000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
5D4000
heap
page read and write
53BF000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
7F82000
trusted library allocation
page read and write
82FC000
stack
page read and write
537B000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
1D0000
heap
page read and write
7E60000
direct allocation
page execute and read and write
5811000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
5985000
trusted library allocation
page read and write
5D4000
heap
page read and write
D05000
unkown
page write copy
863000
heap
page read and write
58A9000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
43F1000
heap
page read and write
53A9000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
58E3000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
762F000
stack
page read and write
86A000
heap
page read and write
7F80000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
38EE000
stack
page read and write
CA0000
direct allocation
page read and write
5382000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
37AE000
stack
page read and write
53E8000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
776F000
stack
page read and write
43F1000
heap
page read and write
597A000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
58DB000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
84E000
heap
page read and write
539E000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
7F1000
heap
page read and write
53BE000
trusted library allocation
page read and write
6D6F000
stack
page read and write
861000
heap
page read and write
537E000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
CF3000
unkown
page execute and read and write
5394000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
86E000
heap
page read and write
53A7000
trusted library allocation
page read and write
2FEF000
stack
page read and write
58D7000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
60EF000
stack
page read and write
5399000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
42AF000
stack
page read and write
539E000
trusted library allocation
page read and write
5A31000
trusted library allocation
page read and write
84A000
heap
page read and write
4A10000
direct allocation
page execute and read and write
5415000
trusted library allocation
page read and write
86E000
heap
page read and write
5386000
trusted library allocation
page read and write
312F000
stack
page read and write
7B6E000
stack
page read and write
590B000
trusted library allocation
page read and write
5957000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
53D8000
trusted library allocation
page read and write
58EF000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
850000
heap
page read and write
CB0000
unkown
page readonly
7D2B000
stack
page read and write
C9E000
stack
page read and write
581D000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page execute and read and write
5815000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
43F1000
heap
page read and write
5812000
trusted library allocation
page read and write
581E000
trusted library allocation
page read and write
863000
heap
page read and write
4FA000
stack
page read and write
7C70000
direct allocation
page read and write
58FE000
trusted library allocation
page read and write
84F000
heap
page read and write
5382000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
53DC000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
555D000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
53E8000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
843000
heap
page read and write
96E000
stack
page read and write
53B0000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
48C2000
direct allocation
page read and write
58D5000
trusted library allocation
page read and write
9760000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
BFB000
stack
page read and write
53BF000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
5AB7000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
7CA0000
heap
page read and write
590A000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
F97000
unkown
page execute and read and write
53BF000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
416F000
stack
page read and write
53A3000
trusted library allocation
page read and write
86A000
heap
page read and write
752E000
stack
page read and write
53B0000
trusted library allocation
page read and write
3CAE000
stack
page read and write
541C000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
E92000
unkown
page execute and read and write
5377000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
FAE000
unkown
page execute and write copy
83F000
heap
page read and write
6B2E000
stack
page read and write
86A000
heap
page read and write
5484000
trusted library allocation
page read and write
3B6E000
stack
page read and write
51EF000
stack
page read and write
73EE000
stack
page read and write
541D000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
376F000
stack
page read and write
43F1000
heap
page read and write
114C000
unkown
page execute and write copy
83F000
heap
page read and write
7B2F000
stack
page read and write
86A000
heap
page read and write
53A7000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
78EE000
stack
page read and write
5BC2000
trusted library allocation
page execute and read and write
5390000
trusted library allocation
page read and write
58CB000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
D07000
unkown
page execute and read and write
63AE000
stack
page read and write
53BD000
trusted library allocation
page read and write
581A000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
85E000
heap
page read and write
86E000
heap
page read and write
5811000
trusted library allocation
page read and write
43F1000
heap
page read and write
5382000
trusted library allocation
page read and write
3DAF000
stack
page read and write
CA0000
direct allocation
page read and write
53C8000
trusted library allocation
page read and write
86C000
heap
page read and write
5A4D000
trusted library allocation
page read and write
5D4000
heap
page read and write
591F000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
5404000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
5D4000
heap
page read and write
44F0000
trusted library allocation
page read and write
581A000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
82A000
heap
page read and write
58F5000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
86E000
heap
page read and write
5D4000
heap
page read and write
860000
heap
page read and write
29EF000
stack
page read and write
7F8A000
trusted library allocation
page read and write
4B8D000
stack
page read and write
539E000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
53EF000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
863000
heap
page read and write
5D4000
heap
page read and write
869000
heap
page read and write
CB1000
unkown
page execute and read and write
38AF000
stack
page read and write
CB0000
unkown
page read and write
53D8000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
554D000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
5E68000
trusted library allocation
page execute and read and write
53A0000
trusted library allocation
page read and write
84E000
heap
page read and write
53ED000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
86E000
heap
page read and write
53AF000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
86A000
heap
page read and write
53BF000
trusted library allocation
page read and write
58CD000
trusted library allocation
page read and write
58ED000
trusted library allocation
page read and write
5D4000
heap
page read and write
3A2E000
stack
page read and write
53B1000
trusted library allocation
page read and write
69EE000
stack
page read and write
592C000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
5983000
trusted library allocation
page read and write
59CF000
trusted library allocation
page read and write
5D4000
heap
page read and write
53AC000
trusted library allocation
page read and write
2C2F000
stack
page read and write
7C1000
heap
page read and write
53A6000
trusted library allocation
page read and write
843000
heap
page read and write
5816000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
53AF000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
79EF000
stack
page read and write
53AF000
trusted library allocation
page read and write
716E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
5906000
trusted library allocation
page read and write
43F1000
heap
page read and write
53A4000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
42EE000
stack
page read and write
53D5000
trusted library allocation
page read and write
53CA000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
7BC000
heap
page read and write
84F000
heap
page read and write
539F000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
43F1000
heap
page read and write
622F000
stack
page read and write
352E000
stack
page read and write
86A000
heap
page read and write
53A5000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
5909000
trusted library allocation
page read and write
3B2E000
stack
page read and write
77E000
heap
page read and write
53A6000
trusted library allocation
page read and write
851000
heap
page read and write
5AAA000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
5E6A000
trusted library allocation
page execute and read and write
537B000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
85A000
heap
page read and write
53B0000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
53BB000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
48CC000
stack
page read and write
5816000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
4F10000
remote allocation
page read and write
53AF000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
43F0000
heap
page read and write
53B5000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
58CE000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
5978000
trusted library allocation
page read and write
591E000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
7A7000
heap
page read and write
71E000
stack
page read and write
5813000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
5955000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
53AF000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
43F1000
heap
page read and write
843000
heap
page read and write
77AE000
stack
page read and write
53BF000
trusted library allocation
page read and write
32AE000
stack
page read and write
86E000
heap
page read and write
53CA000
trusted library allocation
page read and write
5379000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
537C000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
859000
heap
page read and write
5382000
trusted library allocation
page read and write
82F000
heap
page read and write
53BF000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
859000
heap
page read and write
84A000
heap
page read and write
2AEF000
stack
page read and write
5816000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
CA0000
direct allocation
page read and write
547E000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
64AF000
stack
page read and write
3DEE000
stack
page read and write
53BC000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
5203000
heap
page read and write
CA0000
direct allocation
page read and write
6DAE000
stack
page read and write
58CD000
trusted library allocation
page read and write
5D4000
heap
page read and write
53CE000
trusted library allocation
page read and write
58E7000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
859000
heap
page read and write
53AE000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
770000
heap
page read and write
4F10000
remote allocation
page read and write
581D000
trusted library allocation
page read and write
3C6E000
stack
page read and write
84D000
heap
page read and write
6EAF000
stack
page read and write
326F000
stack
page read and write
581F000
trusted library allocation
page read and write
843000
heap
page read and write
5816000
trusted library allocation
page read and write
5928000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
86C000
heap
page read and write
53A3000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
686F000
stack
page read and write
73AF000
stack
page read and write
84D000
heap
page read and write
833E000
stack
page read and write
5A0A000
trusted library allocation
page read and write
54E0000
direct allocation
page read and write
53C4000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
53DC000
trusted library allocation
page read and write
841000
heap
page read and write
33EE000
stack
page read and write
41AE000
stack
page read and write
4B4C000
stack
page read and write
5370000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
7D6000
heap
page read and write
43F1000
heap
page read and write
7E30000
direct allocation
page execute and read and write
FAD000
unkown
page execute and read and write
7C70000
direct allocation
page read and write
626E000
stack
page read and write
702E000
stack
page read and write
53B0000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
590C000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
4F7E000
stack
page read and write
CA0000
direct allocation
page read and write
59AB000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
53AE000
trusted library allocation
page read and write
843000
heap
page read and write
CA0000
direct allocation
page read and write
53ED000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
636F000
stack
page read and write
7E2F000
stack
page read and write
366E000
stack
page read and write
672F000
stack
page read and write
7C70000
direct allocation
page read and write
537A000
trusted library allocation
page read and write
843E000
stack
page read and write
5913000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
6AEF000
stack
page read and write
5386000
trusted library allocation
page read and write
D05000
unkown
page read and write
538B000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
53D8000
trusted library allocation
page read and write
F6C000
unkown
page execute and read and write
863000
heap
page read and write
7A2E000
stack
page read and write
5819000
trusted library allocation
page read and write
6C6E000
stack
page read and write
53B0000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
595E000
trusted library allocation
page read and write
53AF000
trusted library allocation
page read and write
81FC000
stack
page read and write
53CA000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
4F10000
remote allocation
page read and write
539F000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
5FEB000
stack
page read and write
7C70000
direct allocation
page read and write
840000
heap
page read and write
539F000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
58D9000
trusted library allocation
page read and write
5D4000
heap
page read and write
59DE000
trusted library allocation
page read and write
43F1000
heap
page read and write
581D000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
581E000
trusted library allocation
page read and write
54A9000
stack
page read and write
859000
heap
page read and write
53A9000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
43F1000
heap
page read and write
58F2000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5934000
trusted library allocation
page read and write
84A000
heap
page read and write
2D6F000
stack
page read and write
592A000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
There are 887 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0