IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 161
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 162
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 163
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 164
JSON data
dropped
Chrome Cache Entry: 165
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 166
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 167
JSON data
dropped
Chrome Cache Entry: 168
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 169
JSON data
downloaded
Chrome Cache Entry: 170
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 171
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 172
ASCII text
downloaded
Chrome Cache Entry: 173
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 174
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 175
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 176
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 177
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 178
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 179
JSON data
dropped
Chrome Cache Entry: 180
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 181
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 182
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 183
JSON data
downloaded
Chrome Cache Entry: 184
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 185
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 186
JSON data
downloaded
Chrome Cache Entry: 187
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 188
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 189
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 190
ASCII text
dropped
Chrome Cache Entry: 191
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 192
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 193
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 194
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 195
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 196
JSON data
dropped
Chrome Cache Entry: 197
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 198
JSON data
downloaded
Chrome Cache Entry: 200
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 --field-trial-handle=2240,i,11247665999065039724,17772590480702075197,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1968,i,1675136383235350527,12148286873504019134,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.16/-p
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16/off/def.exeX
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://atten-supporse.biz/apii/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239340418598_1HURUV6S4V3U642BB&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://atten-supporse.biz/api1i
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239381874334_1JBEHDL9HJ0N3B9DS&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239381874333_1SBUUU4AZ65VOU6A5&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://185.215.113.16/Op
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239400908957_11ARMP1O2WG7GINZB&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://atten-supporse.biz/apiTA
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.mozilla.or
unknown
http://185.215.113.16/Hp
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://atten-supporse.biz/api9
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://atten-supporse.biz/apiV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
172.67.165.166
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://atten-supporse.biz/api1/
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239400908960_16UZRV6TOZWUH7P1W&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239340418597_1J0EQ8ZTOVJVXHV7G&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://atten-supporse.biz:443/api
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://github.com/dotnet/try
unknown
There are 75 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
172.67.165.166
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
172.67.165.166
atten-supporse.biz
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5D41000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
58C0000
remote allocation
page read and write
5DED000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
626C000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
1568000
heap
page read and write
5D42000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
613B000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
5282000
direct allocation
page read and write
5DEC000
trusted library allocation
page read and write
6223000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
5DE6000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
6286000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
4DA1000
heap
page read and write
61F5000
trusted library allocation
page read and write
63DF000
trusted library allocation
page read and write
6202000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
624A000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
613B000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
156B000
heap
page read and write
5D33000
trusted library allocation
page read and write
1394000
heap
page read and write
5D24000
trusted library allocation
page read and write
620000
unkown
page readonly
5DD1000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D85000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
4DA1000
heap
page read and write
6376000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
6256000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
5DD8000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
60FD000
trusted library allocation
page read and write
62DC000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
63CF000
trusted library allocation
page read and write
62DA000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
624B000
trusted library allocation
page read and write
1574000
heap
page read and write
5404000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
61F9000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
61EE000
trusted library allocation
page read and write
5D88000
trusted library allocation
page read and write
6258000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
6365000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
1394000
heap
page read and write
1571000
heap
page read and write
6130000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
6230000
trusted library allocation
page read and write
61CD000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
625F000
trusted library allocation
page read and write
6137000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
622E000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
6132000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
6253000
trusted library allocation
page read and write
627F000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
1560000
heap
page read and write
4D90000
direct allocation
page read and write
4D90000
direct allocation
page read and write
627B000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
5240000
direct allocation
page read and write
6130000
trusted library allocation
page read and write
61DD000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5D27000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
1394000
heap
page read and write
5D42000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
6225000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
1394000
heap
page read and write
6131000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
6566000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
61F7000
trusted library allocation
page read and write
1560000
heap
page read and write
5D42000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
6137000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
1577000
heap
page read and write
5D69000
trusted library allocation
page read and write
1568000
heap
page read and write
5DDE000
trusted library allocation
page read and write
6235000
trusted library allocation
page read and write
6137000
trusted library allocation
page read and write
1394000
heap
page read and write
6137000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6208000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
6362000
trusted library allocation
page read and write
6200000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5D42000
trusted library allocation
page read and write
1576000
heap
page read and write
5D4C000
trusted library allocation
page read and write
1394000
heap
page read and write
6139000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
5D23000
trusted library allocation
page read and write
5230000
direct allocation
page read and write
5E64000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
63A6000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5F58000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D85000
trusted library allocation
page read and write
1566000
heap
page read and write
5D42000
trusted library allocation
page read and write
1394000
heap
page read and write
5D42000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
63CD000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
61C8000
trusted library allocation
page read and write
61DF000
trusted library allocation
page read and write
613C000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
613C000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
63D9000
trusted library allocation
page read and write
4DA1000
heap
page read and write
6235000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5D33000
trusted library allocation
page read and write
1394000
heap
page read and write
630B000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
1570000
heap
page read and write
61CB000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
1394000
heap
page read and write
5D28000
trusted library allocation
page read and write
61F7000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
5DF6000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
1394000
heap
page read and write
5DE8000
trusted library allocation
page read and write
62AD000
trusted library allocation
page read and write
6065000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
5D28000
trusted library allocation
page read and write
156E000
heap
page read and write
621F000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
631A000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
1571000
heap
page read and write
6132000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
5D39000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
5DBD000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
155F000
heap
page read and write
6130000
trusted library allocation
page read and write
6221000
trusted library allocation
page read and write
1561000
heap
page read and write
5D25000
trusted library allocation
page read and write
613A000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
613F000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
1565000
heap
page read and write
6134000
trusted library allocation
page read and write
61F7000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
5D41000
trusted library allocation
page read and write
1565000
heap
page read and write
5D51000
trusted library allocation
page read and write
6814000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
61D7000
trusted library allocation
page read and write
602E000
trusted library allocation
page read and write
5DF6000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
613C000
trusted library allocation
page read and write
5D26000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
6235000
trusted library allocation
page read and write
5D88000
trusted library allocation
page read and write
4DA1000
heap
page read and write
6135000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
1550000
heap
page read and write
6248000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
1571000
heap
page read and write
6288000
trusted library allocation
page read and write
1394000
heap
page read and write
5DCF000
trusted library allocation
page read and write
6211000
trusted library allocation
page read and write
63A8000
trusted library allocation
page read and write
920000
unkown
page execute and write copy
6260000
trusted library allocation
page read and write
619D000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5D85000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
6522000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
157A000
heap
page read and write
633A000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
6105000
trusted library allocation
page read and write
5E64000
trusted library allocation
page read and write
4DA1000
heap
page read and write
6318000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5D6B000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5DF3000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
6249000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
1565000
heap
page read and write
58C0000
remote allocation
page read and write
5D69000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
60D5000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
6229000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
62CC000
trusted library allocation
page read and write
1394000
heap
page read and write
6284000
trusted library allocation
page read and write
613F000
trusted library allocation
page read and write
622B000
trusted library allocation
page read and write
5EDD000
trusted library allocation
page read and write
1560000
heap
page read and write
613A000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
626B000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
1576000
heap
page read and write
6341000
trusted library allocation
page read and write
613D000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
1560000
heap
page read and write
5D52000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5DEB000
trusted library allocation
page read and write
1394000
heap
page read and write
613A000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
1568000
heap
page read and write
5DD8000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
5D21000
trusted library allocation
page read and write
61DB000
trusted library allocation
page read and write
1394000
heap
page read and write
5D33000
trusted library allocation
page read and write
63DF000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D2F000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
613B000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
1563000
heap
page read and write
5D2A000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
633F000
trusted library allocation
page read and write
6235000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
6521000
trusted library allocation
page read and write
5D7A000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
4DA1000
heap
page read and write
613E000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
6342000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
620A000
trusted library allocation
page read and write
4DA1000
heap
page read and write
621C000
trusted library allocation
page read and write
638F000
trusted library allocation
page read and write
1569000
heap
page read and write
6132000
trusted library allocation
page read and write
61D5000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
6A37000
trusted library allocation
page read and write
1577000
heap
page read and write
4DA1000
heap
page read and write
5DC5000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
156C000
heap
page read and write
5DE8000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
1394000
heap
page read and write
5D2B000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
624B000
trusted library allocation
page read and write
62AF000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
627D000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
4DA1000
heap
page read and write
6233000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
1566000
heap
page read and write
61EB000
trusted library allocation
page read and write
6566000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D26000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
604D000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
6269000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
1560000
heap
page read and write
62A5000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
61DC000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
1394000
heap
page read and write
6130000
trusted library allocation
page read and write
61C6000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
626A000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
1573000
heap
page read and write
5D42000
trusted library allocation
page read and write
1574000
heap
page read and write
5DCB000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
613A000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
6141000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
5D30000
trusted library allocation
page read and write
63DB000
trusted library allocation
page read and write
5D28000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
156D000
heap
page read and write
6132000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
6286000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
6249000
trusted library allocation
page read and write
61DD000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
675000
unkown
page write copy
6140000
trusted library allocation
page read and write
621E000
trusted library allocation
page read and write
61DE000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
61F9000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
6215000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
1575000
heap
page read and write
63E1000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
63C7000
trusted library allocation
page read and write
613C000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
638D000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
6344000
trusted library allocation
page read and write
6309000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
6135000
trusted library allocation
page read and write
668D000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
6133000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
6338000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
61DB000
trusted library allocation
page read and write
58C0000
remote allocation
page read and write
5DCF000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
6363000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
1575000
heap
page read and write
5DD6000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5DCB000
trusted library allocation
page read and write
6141000
trusted library allocation
page read and write
6378000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5D8A000
trusted library allocation
page read and write
156B000
heap
page read and write
5D41000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
6213000
trusted library allocation
page read and write
1394000
heap
page read and write
1573000
heap
page read and write
63E1000
trusted library allocation
page read and write
6277000
trusted library allocation
page read and write
5DD6000
trusted library allocation
page read and write
621000
unkown
page execute and write copy
627D000
trusted library allocation
page read and write
61DD000
trusted library allocation
page read and write
6262000
trusted library allocation
page read and write
4DA1000
heap
page read and write
6137000
trusted library allocation
page read and write
1394000
heap
page read and write
6137000
trusted library allocation
page read and write
62A7000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
625D000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
5DF6000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
627E000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
5230000
direct allocation
page read and write
6137000
trusted library allocation
page read and write
6213000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
62CA000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
1394000
heap
page read and write
668F000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
6202000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
1394000
heap
page read and write
5D42000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
62DC000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
6275000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
4D90000
direct allocation
page read and write
5DB8000
trusted library allocation
page read and write
63C9000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
6255000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
610D000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
5DD8000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
There are 636 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0