IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 101
JSON data
downloaded
Chrome Cache Entry: 102
JSON data
dropped
Chrome Cache Entry: 103
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 104
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 105
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 106
ASCII text
dropped
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 109
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 111
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 112
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 113
JSON data
dropped
Chrome Cache Entry: 114
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 115
JSON data
downloaded
Chrome Cache Entry: 116
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 76
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 77
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 82
JSON data
dropped
Chrome Cache Entry: 83
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 84
JSON data
downloaded
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 87
ASCII text
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 89
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 90
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 91
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 92
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 94
JSON data
dropped
Chrome Cache Entry: 95
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 96
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 98
JSON data
downloaded
Chrome Cache Entry: 99
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1944,i,15678705187657892955,17844764496678976098,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1928,i,17398790498450911145,18130191618194724577,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://atten-supporse.biz/F
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16:80/off/def.exePackages
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://atten-supporse.biz/V
unknown
https://atten-supporse.biz:443/apil
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
http://185.215.113.16/steam/random.exev
unknown
https://atten-supporse.biz/-G
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://atten-supporse.biz:443/apiK
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://atten-supporse.biz/EA
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
172.67.165.166
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://atten-supporse.biz/apitEO
unknown
https://atten-supporse.biz/f
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
http://185.215.113.16/off/def.exe=
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://atten-supporse.biz/n
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://atten-supporse.biz/api5
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://atten-supporse.biz:443/api
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
172.67.165.166
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
172.67.165.166
atten-supporse.biz
United States
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.23
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
5D4E000
trusted library allocation
page read and write
62D4000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
555D000
stack
page read and write
58E0000
remote allocation
page read and write
64A0000
direct allocation
page read and write
6291000
trusted library allocation
page read and write
4C5F000
stack
page read and write
61E8000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
5D8B000
trusted library allocation
page read and write
5EB0000
direct allocation
page read and write
61E1000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
6328000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
6765000
trusted library allocation
page read and write
78CF000
stack
page read and write
1330000
heap
page read and write
3C5E000
stack
page read and write
5D5F000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
64A0000
direct allocation
page read and write
642C000
trusted library allocation
page read and write
3B1E000
stack
page read and write
5E42000
trusted library allocation
page read and write
641B000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
6283000
trusted library allocation
page read and write
64A0000
direct allocation
page read and write
6780000
trusted library allocation
page read and write
714F000
stack
page read and write
768E000
stack
page read and write
138B000
heap
page read and write
389E000
stack
page read and write
5D4B000
trusted library allocation
page read and write
631A000
trusted library allocation
page read and write
8BFC000
stack
page read and write
63BE000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
551C000
stack
page read and write
5D7E000
trusted library allocation
page read and write
FCB000
stack
page read and write
53E0000
direct allocation
page execute and read and write
6C4F000
stack
page read and write
6285000
trusted library allocation
page read and write
5D93000
trusted library allocation
page read and write
5FEF000
trusted library allocation
page read and write
63DF000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
63D9000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
1454000
heap
page read and write
1434000
heap
page read and write
13F0000
heap
page read and write
5E43000
trusted library allocation
page read and write
3C1F000
stack
page read and write
7048F000
unkown
page readonly
5410000
direct allocation
page execute and read and write
6351000
trusted library allocation
page read and write
A110000
trusted library allocation
page read and write
1454000
heap
page read and write
5A3000
unkown
page execute and read and write
5D85000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
5E52000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
1428000
heap
page read and write
141F000
heap
page read and write
7E0E000
stack
page read and write
1420000
heap
page read and write
5DA7000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
1454000
heap
page read and write
1408000
heap
page read and write
143E000
heap
page read and write
61E7000
trusted library allocation
page read and write
700F000
stack
page read and write
61E7000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
465E000
stack
page read and write
4DC1000
heap
page read and write
5D9D000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
1420000
heap
page read and write
5D6E000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
1454000
heap
page read and write
2E3000
unkown
page execute and read and write
629A000
trusted library allocation
page read and write
82CF000
stack
page read and write
4DB0000
direct allocation
page read and write
5F23000
trusted library allocation
page read and write
13B4000
heap
page read and write
5DDA000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
6391000
trusted library allocation
page read and write
844E000
stack
page read and write
5D76000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
1454000
heap
page read and write
5D8F000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
3EDE000
stack
page read and write
5DA6000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
644D000
trusted library allocation
page read and write
4DC1000
heap
page read and write
70470000
unkown
page readonly
5D5F000
trusted library allocation
page read and write
5C3D000
stack
page read and write
1424000
heap
page read and write
2F6000
unkown
page execute and read and write
451E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
6348000
trusted library allocation
page read and write
5F1B000
trusted library allocation
page read and write
62F1000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
64A0000
direct allocation
page read and write
62CF000
trusted library allocation
page read and write
560000
unkown
page execute and read and write
61EB000
trusted library allocation
page read and write
1420000
heap
page read and write
5D5F000
trusted library allocation
page read and write
86E0000
direct allocation
page read and write
5D92000
trusted library allocation
page read and write
1421000
heap
page read and write
1440000
heap
page read and write
13F0000
heap
page read and write
61E7000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
399F000
stack
page read and write
639D000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
746000
unkown
page execute and read and write
5250000
direct allocation
page read and write
5D58000
trusted library allocation
page read and write
6786000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
5D95000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
641F000
stack
page read and write
52A2000
direct allocation
page read and write
62FF000
trusted library allocation
page read and write
6306000
trusted library allocation
page read and write
1409000
heap
page read and write
6481000
trusted library allocation
page read and write
632A000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
1402000
heap
page read and write
6285000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
647D000
trusted library allocation
page read and write
1454000
heap
page read and write
5D8C000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
7048D000
unkown
page read and write
61E4000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
5BE3000
heap
page read and write
18DD000
stack
page read and write
5D84000
trusted library allocation
page read and write
64BB000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
5D7F000
trusted library allocation
page read and write
764F000
stack
page read and write
64A0000
direct allocation
page read and write
2A0000
unkown
page read and write
5D5B000
trusted library allocation
page read and write
6317000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
6364000
trusted library allocation
page read and write
425F000
stack
page read and write
1454000
heap
page read and write
5D5C000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
5D8E000
trusted library allocation
page read and write
349F000
stack
page read and write
61E7000
trusted library allocation
page read and write
7A0F000
stack
page read and write
1420000
heap
page read and write
4DC1000
heap
page read and write
61EB000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
4B1F000
stack
page read and write
5D84000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
461F000
stack
page read and write
5DAA000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
86E0000
direct allocation
page read and write
6299000
trusted library allocation
page read and write
3E9F000
stack
page read and write
6416000
trusted library allocation
page read and write
475F000
stack
page read and write
5D7F000
trusted library allocation
page read and write
5DB7000
trusted library allocation
page read and write
138C000
heap
page read and write
62B6000
trusted library allocation
page read and write
5E6B000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
411F000
stack
page read and write
142B000
heap
page read and write
5D5F000
trusted library allocation
page read and write
47D000
unkown
page execute and read and write
5DC3000
trusted library allocation
page read and write
5D8D000
trusted library allocation
page read and write
142A000
heap
page read and write
5D99000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
4DA0000
heap
page read and write
81CE000
stack
page read and write
6295000
trusted library allocation
page read and write
385F000
stack
page read and write
7A4E000
stack
page read and write
639B000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
6296000
trusted library allocation
page read and write
1378000
heap
page read and write
5D44000
trusted library allocation
page read and write
7CCE000
stack
page read and write
6331000
trusted library allocation
page read and write
4B5E000
stack
page read and write
5D97000
trusted library allocation
page read and write
4DC1000
heap
page read and write
34DE000
stack
page read and write
5D7F000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
64A0000
direct allocation
page read and write
5400000
direct allocation
page execute and read and write
1454000
heap
page read and write
6ECF000
stack
page read and write
61E7000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
1424000
heap
page read and write
1421000
heap
page read and write
1413000
heap
page read and write
6F0E000
stack
page read and write
5D5A000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
754E000
stack
page read and write
61E5000
trusted library allocation
page read and write
2A1000
unkown
page execute and write copy
5D8F000
trusted library allocation
page read and write
4DC1000
heap
page read and write
5DA2000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
62D6000
trusted library allocation
page read and write
840F000
stack
page read and write
885E000
stack
page read and write
5D5D000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D8B000
trusted library allocation
page read and write
647F000
trusted library allocation
page read and write
1454000
heap
page read and write
1439000
heap
page read and write
61EA000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
62A3000
trusted library allocation
page read and write
8D3E000
stack
page read and write
143A000
heap
page read and write
5D45000
trusted library allocation
page read and write
1436000
heap
page read and write
5D60000
trusted library allocation
page read and write
6851000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
6366000
trusted library allocation
page read and write
579F000
stack
page read and write
6A44000
trusted library allocation
page execute and read and write
62DE000
trusted library allocation
page read and write
854F000
stack
page read and write
5DDD000
trusted library allocation
page read and write
62A1000
trusted library allocation
page read and write
4DD0000
heap
page read and write
750F000
stack
page read and write
8E3E000
stack
page read and write
62FD000
trusted library allocation
page read and write
4DC1000
heap
page read and write
5D50000
trusted library allocation
page read and write
48DE000
stack
page read and write
6297000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
5210000
heap
page read and write
5D77000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
5D6F000
trusted library allocation
page read and write
1434000
heap
page read and write
718E000
stack
page read and write
13A6000
heap
page read and write
2F4000
unkown
page write copy
6295000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
1439000
heap
page read and write
4DB0000
direct allocation
page read and write
8690000
trusted library allocation
page read and write
6313000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
62BB000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
4DC1000
heap
page read and write
1426000
heap
page read and write
704E000
stack
page read and write
632F000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
6297000
trusted library allocation
page read and write
6322000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
1426000
heap
page read and write
6C8E000
stack
page read and write
5D75000
trusted library allocation
page read and write
6287000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
335F000
stack
page read and write
5D98000
trusted library allocation
page read and write
1391000
heap
page read and write
6354000
trusted library allocation
page read and write
168E000
stack
page read and write
5BBF000
stack
page read and write
1433000
heap
page read and write
142B000
heap
page read and write
5D5E000
trusted library allocation
page read and write
631B000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
7F4E000
stack
page read and write
633B000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
479E000
stack
page read and write
6327000
trusted library allocation
page read and write
1454000
heap
page read and write
4DB0000
direct allocation
page read and write
2F87000
heap
page read and write
61F0000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
70486000
unkown
page execute and read and write
1436000
heap
page read and write
12FB000
stack
page read and write
5D88000
trusted library allocation
page read and write
64A0000
direct allocation
page read and write
63D7000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
3D5F000
stack
page read and write
4DC1000
heap
page read and write
1454000
heap
page read and write
5D5D000
trusted library allocation
page read and write
6294000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
6352000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
140F000
heap
page read and write
5D8C000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
5D58000
trusted library allocation
page read and write
5D58000
trusted library allocation
page read and write
8710000
heap
page read and write
5D88000
trusted library allocation
page read and write
1454000
heap
page read and write
5D97000
trusted library allocation
page read and write
49DF000
stack
page read and write
61E2000
trusted library allocation
page read and write
790E000
stack
page read and write
77CE000
stack
page read and write
5D99000
trusted library allocation
page read and write
5E7A000
stack
page read and write
5DDA000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
134E000
heap
page read and write
62E0000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
5D43000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D77000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
4DC1000
heap
page read and write
63EE000
trusted library allocation
page read and write
5DB9000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
5ED9000
trusted library allocation
page read and write
6458000
trusted library allocation
page read and write
569E000
stack
page read and write
7C8F000
stack
page read and write
5D6F000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
1421000
heap
page read and write
43DE000
stack
page read and write
13B4000
heap
page read and write
5D5B000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
638F000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
13B4000
heap
page read and write
5D5C000
trusted library allocation
page read and write
4DC1000
heap
page read and write
5D60000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
6319000
trusted library allocation
page read and write
88B0000
heap
page read and write
141D000
heap
page read and write
644F000
trusted library allocation
page read and write
1420000
heap
page read and write
64B9000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
63EC000
trusted library allocation
page read and write
73CF000
stack
page read and write
5D55000
trusted library allocation
page read and write
539F000
stack
page read and write
64A0000
direct allocation
page read and write
1386000
heap
page read and write
58DE000
stack
page read and write
747000
unkown
page execute and write copy
5D67000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5DBD000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
61E0000
trusted library allocation
page read and write
5D89000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
5D7D000
trusted library allocation
page read and write
5E83000
trusted library allocation
page read and write
6298000
trusted library allocation
page read and write
6324000
trusted library allocation
page read and write
61EC000
trusted library allocation
page read and write
565D000
stack
page read and write
5D48000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
61E3000
trusted library allocation
page read and write
1391000
heap
page read and write
1439000
heap
page read and write
5D62000
trusted library allocation
page read and write
2F80000
heap
page read and write
4DB0000
direct allocation
page read and write
5D5F000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
830E000
stack
page read and write
5DC3000
trusted library allocation
page read and write
631E000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
1450000
heap
page read and write
429E000
stack
page read and write
5D3E000
stack
page read and write
62FD000
trusted library allocation
page read and write
4DC1000
heap
page read and write
5DB7000
trusted library allocation
page read and write
1454000
heap
page read and write
5DCA000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5EA3000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
4D9F000
stack
page read and write
5D6F000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
8CFC000
stack
page read and write
158E000
stack
page read and write
61E6000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
64A0000
direct allocation
page read and write
62EF000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
594E000
stack
page read and write
4A1E000
stack
page read and write
61E6000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
6305000
trusted library allocation
page read and write
664E000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
2A0000
unkown
page readonly
5E4C000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
1454000
heap
page read and write
5D4A000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
61F1000
trusted library allocation
page read and write
86E0000
direct allocation
page read and write
5D5E000
trusted library allocation
page read and write
5BE0000
heap
page read and write
5D5F000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
1439000
heap
page read and write
5D5D000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
1454000
heap
page read and write
62E0000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
58B000
unkown
page execute and read and write
4DC1000
heap
page read and write
5D7F000
trusted library allocation
page read and write
6319000
trusted library allocation
page read and write
1431000
heap
page read and write
5E45000
trusted library allocation
page read and write
439F000
stack
page read and write
678A000
trusted library allocation
page execute and read and write
5DA3000
trusted library allocation
page read and write
649E000
stack
page read and write
5DAF000
trusted library allocation
page read and write
627F000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
401E000
stack
page read and write
61E9000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
89BA000
trusted library allocation
page read and write
4DC1000
heap
page read and write
143A000
heap
page read and write
5DD9000
trusted library allocation
page read and write
4DC0000
heap
page read and write
595000
unkown
page execute and read and write
5DD9000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
30DF000
stack
page read and write
5D7F000
trusted library allocation
page read and write
140F000
heap
page read and write
6293000
trusted library allocation
page read and write
1425000
heap
page read and write
633D000
trusted library allocation
page read and write
858E000
stack
page read and write
1454000
heap
page read and write
5A3000
unkown
page execute and write copy
61E2000
trusted library allocation
page read and write
4C9E000
stack
page read and write
61E4000
trusted library allocation
page read and write
1439000
heap
page read and write
5D76000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
1340000
heap
page read and write
5D89000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
5D5D000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
62A1000
trusted library allocation
page read and write
1427000
heap
page read and write
86B0000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
529B000
stack
page read and write
70471000
unkown
page execute read
58E0000
remote allocation
page read and write
62D9000
stack
page read and write
1403000
heap
page read and write
63DB000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
19DE000
stack
page read and write
5D7B000
trusted library allocation
page read and write
63C0000
trusted library allocation
page read and write
140A000
heap
page read and write
3FDF000
stack
page read and write
631C000
trusted library allocation
page read and write
2A1000
unkown
page execute and read and write
64A0000
direct allocation
page read and write
5DD9000
trusted library allocation
page read and write
1454000
heap
page read and write
778F000
stack
page read and write
5250000
direct allocation
page read and write
64A0000
direct allocation
page read and write
5D9F000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
70487000
unkown
page readonly
3D9E000
stack
page read and write
5D6F000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
6A32000
trusted library allocation
page execute and read and write
61EC000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
4DC1000
heap
page read and write
5DD3000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
62E0000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
86F0000
direct allocation
page execute and read and write
5DBF000
trusted library allocation
page read and write
1428000
heap
page read and write
61E2000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5250000
direct allocation
page read and write
5A4F000
stack
page read and write
62B5000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
740E000
stack
page read and write
5D57000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
6418000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
A190000
trusted library allocation
page read and write
2FDE000
stack
page read and write
5D55000
trusted library allocation
page read and write
4DC1000
heap
page read and write
6A42000
trusted library allocation
page execute and read and write
62A3000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
13F0000
heap
page read and write
5DDC000
trusted library allocation
page read and write
2F4000
unkown
page read and write
62D2000
trusted library allocation
page read and write
5F2B000
trusted library allocation
page read and write
642E000
trusted library allocation
page read and write
5D5E000
trusted library allocation
page read and write
62C3000
trusted library allocation
page read and write
4DC1000
heap
page read and write
5D5A000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
62FB000
trusted library allocation
page read and write
142B000
heap
page read and write
5D8D000
trusted library allocation
page read and write
1439000
heap
page read and write
61E9000
trusted library allocation
page read and write
143E000
heap
page read and write
631C000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
339E000
stack
page read and write
5DAC000
trusted library allocation
page read and write
6D8F000
stack
page read and write
61EE000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
4DB0000
direct allocation
page read and write
53D0000
direct allocation
page execute and read and write
64A0000
direct allocation
page read and write
808E000
stack
page read and write
5D7F000
trusted library allocation
page read and write
728F000
stack
page read and write
5DA4000
trusted library allocation
page read and write
647F000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
35DF000
stack
page read and write
645A000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
6B4F000
stack
page read and write
5DBC000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
361E000
stack
page read and write
61E0000
trusted library allocation
page read and write
5EF3000
trusted library allocation
page read and write
321F000
stack
page read and write
5DA7000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
415E000
stack
page read and write
64A0000
direct allocation
page read and write
8870000
direct allocation
page execute and read and write
61EA000
trusted library allocation
page read and write
63D9000
trusted library allocation
page read and write
4DC1000
heap
page read and write
5D9A000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
57DE000
stack
page read and write
5D78000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
634F000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
72CE000
stack
page read and write
58E0000
remote allocation
page read and write
5D65000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
4DC1000
heap
page read and write
6773000
trusted library allocation
page read and write
62E2000
trusted library allocation
page read and write
5D77000
trusted library allocation
page read and write
13A6000
heap
page read and write
62E8000
trusted library allocation
page read and write
134A000
heap
page read and write
5DD9000
trusted library allocation
page read and write
5D85000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
4DC1000
heap
page read and write
5ABE000
stack
page read and write
7B4F000
stack
page read and write
5D41000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
61F1000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
1424000
heap
page read and write
61E9000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
1454000
heap
page read and write
5D9C000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
5FBB000
trusted library allocation
page read and write
61E3000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
142B000
heap
page read and write
627D000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
39DE000
stack
page read and write
61EE000
trusted library allocation
page read and write
6307000
trusted library allocation
page read and write
1424000
heap
page read and write
5D6F000
trusted library allocation
page read and write
5D7F000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
489F000
stack
page read and write
5D73000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
641D000
trusted library allocation
page read and write
1439000
heap
page read and write
13A6000
heap
page read and write
5D5A000
trusted library allocation
page read and write
7B8E000
stack
page read and write
6782000
trusted library allocation
page execute and read and write
5DA0000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
5D9F000
trusted library allocation
page read and write
3ADF000
stack
page read and write
5260000
direct allocation
page read and write
89B2000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
371F000
stack
page read and write
62EA000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
64A0000
direct allocation
page read and write
1454000
heap
page read and write
7DCF000
stack
page read and write
868F000
stack
page read and write
7F0F000
stack
page read and write
61EF000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
375E000
stack
page read and write
63DD000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
5DAF000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
142B000
heap
page read and write
804F000
stack
page read and write
5D87000
trusted library allocation
page read and write
691C000
trusted library allocation
page execute and read and write
6325000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
5D92000
trusted library allocation
page read and write
631E000
stack
page read and write
5D55000
trusted library allocation
page read and write
141F000
heap
page read and write
818F000
stack
page read and write
5D5F000
trusted library allocation
page read and write
6DCE000
stack
page read and write
5DD0000
trusted library allocation
page read and write
311B000
stack
page read and write
1417000
heap
page read and write
5D73000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
875C000
stack
page read and write
5D5A000
trusted library allocation
page read and write
325E000
stack
page read and write
1391000
heap
page read and write
44DF000
stack
page read and write
5D6F000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
1454000
heap
page read and write
5D6E000
trusted library allocation
page read and write
53EE000
stack
page read and write
5D7F000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
645C000
stack
page read and write
4DC1000
heap
page read and write
6293000
trusted library allocation
page read and write
1431000
heap
page read and write
6304000
trusted library allocation
page read and write
62D1000
trusted library allocation
page read and write
4DB0000
direct allocation
page read and write
5D41000
trusted library allocation
page read and write
5A4000
unkown
page execute and write copy
61EF000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
6315000
trusted library allocation
page read and write
There are 836 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0