IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:08 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
JSON data
dropped
Chrome Cache Entry: 101
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 102
JSON data
downloaded
Chrome Cache Entry: 103
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 105
ASCII text
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 107
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 108
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 109
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 111
JSON data
dropped
Chrome Cache Entry: 112
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 113
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 114
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 115
JSON data
downloaded
Chrome Cache Entry: 116
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 117
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 118
JSON data
downloaded
Chrome Cache Entry: 119
JSON data
dropped
Chrome Cache Entry: 120
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 121
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 122
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 123
ASCII text
dropped
Chrome Cache Entry: 124
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 125
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 126
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 127
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 128
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 129
JSON data
dropped
Chrome Cache Entry: 130
JSON data
dropped
Chrome Cache Entry: 131
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 132
JSON data
downloaded
Chrome Cache Entry: 133
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 92
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 93
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 94
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 95
JSON data
dropped
Chrome Cache Entry: 96
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 97
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 98
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (65410)
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1828,i,11464838882767469421,13980832017172917232,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1988,i,12511401562534462833,16217488018526680522,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://atten-supporse.biz/apibdoD
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://atten-supporse.biz/RSz
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/JSB
unknown
https://atten-supporse.biz/api
104.21.16.9
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.16.9
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.8
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
104.21.16.9
atten-supporse.biz
United States
172.217.21.36
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5A79000
stack
page read and write
10E0000
direct allocation
page read and write
5949000
trusted library allocation
page read and write
44DF000
stack
page read and write
5977000
trusted library allocation
page read and write
56F0000
heap
page read and write
568E000
stack
page read and write
5DE0000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
4FF0000
direct allocation
page execute and read and write
722E000
stack
page read and write
5968000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
606E000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
598C000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
1054000
heap
page read and write
80EF000
stack
page read and write
59DE000
trusted library allocation
page read and write
11ED000
heap
page read and write
5967000
trusted library allocation
page read and write
596F000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
5EC9000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
82B0000
direct allocation
page read and write
5DEB000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
6CE000
unkown
page write copy
59A3000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
5DE1000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5E92000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
3FDF000
stack
page read and write
82B0000
direct allocation
page read and write
49E1000
heap
page read and write
5959000
trusted library allocation
page read and write
1054000
heap
page read and write
6BEE000
stack
page read and write
8280000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
49E1000
heap
page read and write
597E000
trusted library allocation
page read and write
57FF000
stack
page read and write
10E0000
direct allocation
page read and write
894C000
stack
page read and write
596B000
trusted library allocation
page read and write
335F000
stack
page read and write
5967000
trusted library allocation
page read and write
5EA7000
trusted library allocation
page read and write
976000
unkown
page execute and write copy
5DE1000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
451E000
stack
page read and write
2C90000
heap
page read and write
76EF000
stack
page read and write
842F000
stack
page read and write
59AE000
trusted library allocation
page read and write
11E7000
heap
page read and write
5987000
trusted library allocation
page read and write
1200000
heap
page read and write
5DED000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
5955000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
5E99000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
598C000
trusted library allocation
page read and write
5ED2000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
59D5000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
371F000
stack
page read and write
5964000
trusted library allocation
page read and write
7FEE000
stack
page read and write
772E000
stack
page read and write
5B73000
trusted library allocation
page read and write
7D6E000
stack
page read and write
5ED4000
trusted library allocation
page read and write
1209000
heap
page read and write
5E9C000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
70EE000
stack
page read and write
11F0000
heap
page read and write
5DE4000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
5EA2000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
109E000
stack
page read and write
5DE9000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
4FE0000
direct allocation
page execute and read and write
5DE5000
trusted library allocation
page read and write
5F01000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
49E1000
heap
page read and write
49E1000
heap
page read and write
9D60000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
5E96000
trusted library allocation
page read and write
796F000
stack
page read and write
401E000
stack
page read and write
5979000
trusted library allocation
page read and write
5957000
trusted library allocation
page read and write
6358000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
1202000
heap
page read and write
5964000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
597C000
trusted library allocation
page read and write
F10000
heap
page read and write
1054000
heap
page read and write
30DF000
stack
page read and write
49E1000
heap
page read and write
5979000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
6BAF000
stack
page read and write
10E0000
direct allocation
page read and write
5DE6000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
79AE000
stack
page read and write
5BE2000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
5ECB000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
11E0000
heap
page read and write
5DE4000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
11FD000
heap
page read and write
696E000
stack
page read and write
5F9D000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
7AEE000
stack
page read and write
49F2000
heap
page read and write
59B8000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
74AE000
stack
page read and write
5FAF000
trusted library allocation
page read and write
120B000
heap
page read and write
52BE000
stack
page read and write
5DE5000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
7EAE000
stack
page read and write
5DEE000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
5979000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
660E000
trusted library allocation
page execute and read and write
5954000
trusted library allocation
page read and write
5F9B000
trusted library allocation
page read and write
5EE4000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
6453000
trusted library allocation
page read and write
3ADF000
stack
page read and write
6D0000
unkown
page execute and read and write
321F000
stack
page read and write
594A000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
425F000
stack
page read and write
11C0000
heap
page read and write
5967000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
6F6F000
stack
page read and write
7D2F000
stack
page read and write
5974000
trusted library allocation
page read and write
11F0000
heap
page read and write
5969000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
8602000
trusted library allocation
page read and write
5E9E000
trusted library allocation
page read and write
5E88000
trusted library allocation
page read and write
375E000
stack
page read and write
5997000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
11EF000
heap
page read and write
1200000
heap
page read and write
5970000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
415E000
stack
page read and write
5E7F000
trusted library allocation
page read and write
95B000
unkown
page execute and read and write
596C000
trusted library allocation
page read and write
680000
unkown
page readonly
10E0000
direct allocation
page read and write
5DE0000
trusted library allocation
page read and write
115E000
heap
page read and write
596A000
trusted library allocation
page read and write
5FDF000
stack
page read and write
5DE5000
trusted library allocation
page read and write
461F000
stack
page read and write
5967000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
884C000
stack
page read and write
11F0000
heap
page read and write
411E000
stack
page read and write
6E6E000
stack
page read and write
1054000
heap
page read and write
583D000
stack
page read and write
594F000
trusted library allocation
page read and write
5EF8000
trusted library allocation
page read and write
732F000
stack
page read and write
5EEC000
trusted library allocation
page read and write
5E86000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
5968000
trusted library allocation
page read and write
746F000
stack
page read and write
594F000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
120A000
heap
page read and write
5EFF000
trusted library allocation
page read and write
935000
unkown
page execute and read and write
5F0D000
trusted library allocation
page read and write
1054000
heap
page read and write
3C5E000
stack
page read and write
11E9000
heap
page read and write
8250000
direct allocation
page read and write
5966000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
11C1000
heap
page read and write
3D9E000
stack
page read and write
596A000
trusted library allocation
page read and write
475F000
stack
page read and write
5EB0000
trusted library allocation
page read and write
5E97000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
53BE000
stack
page read and write
5A4A000
trusted library allocation
page read and write
5EF7000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
5F06000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
59A1000
trusted library allocation
page read and write
429E000
stack
page read and write
594A000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
11FD000
heap
page read and write
5941000
trusted library allocation
page read and write
8230000
direct allocation
page read and write
822F000
stack
page read and write
3D5F000
stack
page read and write
602C000
trusted library allocation
page read and write
1204000
heap
page read and write
49E1000
heap
page read and write
120A000
heap
page read and write
6BD000
unkown
page execute and read and write
39DE000
stack
page read and write
5979000
trusted library allocation
page read and write
5974000
trusted library allocation
page read and write
736E000
stack
page read and write
5E94000
trusted library allocation
page read and write
1205000
heap
page read and write
5958000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
5EA5000
trusted library allocation
page read and write
6366000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
5ABE000
stack
page read and write
5971000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
5957000
trusted library allocation
page read and write
120D000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
325E000
stack
page read and write
5941000
trusted library allocation
page read and write
11FF000
heap
page read and write
5AEA000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
7E6F000
stack
page read and write
5EEA000
trusted library allocation
page read and write
2BEE000
stack
page read and write
5979000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
5E92000
trusted library allocation
page read and write
349F000
stack
page read and write
5F24000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
5F48000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
6049000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
5F24000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
59BE000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
5F5A000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5963000
trusted library allocation
page read and write
601B000
stack
page read and write
5DE6000
trusted library allocation
page read and write
2F9F000
stack
page read and write
1054000
heap
page read and write
120D000
heap
page read and write
5948000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
5957000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
11F4000
heap
page read and write
11ED000
heap
page read and write
5968000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
3B1E000
stack
page read and write
5F1D000
trusted library allocation
page read and write
49E1000
heap
page read and write
1100000
direct allocation
page read and write
594F000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
5F7B000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
120D000
heap
page read and write
5F5C000
trusted library allocation
page read and write
5957000
trusted library allocation
page read and write
5975000
trusted library allocation
page read and write
117E000
heap
page read and write
6FAE000
stack
page read and write
6AAE000
stack
page read and write
339E000
stack
page read and write
5960000
trusted library allocation
page read and write
49E1000
heap
page read and write
5941000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
4E9B000
stack
page read and write
596B000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
2D9F000
stack
page read and write
1054000
heap
page read and write
5ED3000
trusted library allocation
page read and write
5948000
trusted library allocation
page read and write
1207000
heap
page read and write
595B000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
1178000
heap
page read and write
5954000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
6A6F000
stack
page read and write
11EF000
heap
page read and write
10E0000
direct allocation
page read and write
832B000
stack
page read and write
596B000
trusted library allocation
page read and write
1050000
heap
page read and write
857000
unkown
page execute and read and write
49E1000
heap
page read and write
596C000
trusted library allocation
page read and write
812E000
stack
page read and write
11F4000
heap
page read and write
120A000
heap
page read and write
672F000
stack
page read and write
5999000
trusted library allocation
page read and write
11FD000
heap
page read and write
5DE8000
trusted library allocation
page read and write
604B000
trusted library allocation
page read and write
609E000
stack
page read and write
634B000
trusted library allocation
page read and write
111A000
heap
page read and write
5EE2000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
5B2C000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
4E20000
heap
page read and write
5982000
trusted library allocation
page read and write
3E9F000
stack
page read and write
5998000
trusted library allocation
page read and write
5957000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
11FD000
heap
page read and write
11EF000
heap
page read and write
49E1000
heap
page read and write
5EAC000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
59DF000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
5FF7000
trusted library allocation
page read and write
120B000
heap
page read and write
681000
unkown
page execute and write copy
6D2E000
stack
page read and write
786E000
stack
page read and write
1054000
heap
page read and write
11F7000
heap
page read and write
11F0000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1054000
heap
page read and write
682F000
stack
page read and write
120E000
heap
page read and write
49E1000
heap
page read and write
70AF000
stack
page read and write
5DE2000
trusted library allocation
page read and write
1148000
heap
page read and write
5979000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
594C000
trusted library allocation
page read and write
4E9C000
direct allocation
page read and write
60A3000
trusted library allocation
page read and write
120A000
heap
page read and write
595A000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5FF9000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
7AAF000
stack
page read and write
5A48000
trusted library allocation
page read and write
553E000
stack
page read and write
439F000
stack
page read and write
5949000
trusted library allocation
page read and write
59BD000
trusted library allocation
page read and write
56F3000
heap
page read and write
5962000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
1054000
heap
page read and write
5DEC000
trusted library allocation
page read and write
1040000
heap
page read and write
59DE000
trusted library allocation
page read and write
5976000
trusted library allocation
page read and write
1200000
heap
page read and write
5957000
trusted library allocation
page read and write
5EB9000
trusted library allocation
page read and write
3C1F000
stack
page read and write
5F1B000
trusted library allocation
page read and write
489F000
stack
page read and write
513E000
stack
page read and write
5EEC000
trusted library allocation
page read and write
59FC000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
967000
unkown
page execute and read and write
5945000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
11F0000
heap
page read and write
5E90000
trusted library allocation
page read and write
1209000
heap
page read and write
5A53000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
5DE8000
trusted library allocation
page read and write
5955000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
5EAE000
trusted library allocation
page read and write
8250000
trusted library allocation
page read and write
1170000
heap
page read and write
5E8E000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
5F27000
trusted library allocation
page read and write
120E000
heap
page read and write
593E000
stack
page read and write
49E1000
heap
page read and write
5DE5000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
5997000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
59FA000
trusted library allocation
page read and write
7FAF000
stack
page read and write
5DEC000
trusted library allocation
page read and write
8500000
heap
page read and write
6236000
trusted library allocation
page read and write
5EF5000
trusted library allocation
page read and write
7C2E000
stack
page read and write
117E000
heap
page read and write
5F73000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
8440000
direct allocation
page execute and read and write
599B000
trusted library allocation
page read and write
6CEF000
stack
page read and write
503D000
stack
page read and write
5F10000
trusted library allocation
page read and write
1202000
heap
page read and write
600C000
trusted library allocation
page read and write
636A000
trusted library allocation
page execute and read and write
5BBC000
trusted library allocation
page read and write
120D000
heap
page read and write
5F3C000
trusted library allocation
page read and write
2C80000
direct allocation
page execute and read and write
5968000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
120E000
heap
page read and write
5F3A000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
8608000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
4FA0000
direct allocation
page execute and read and write
5EB4000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
49E1000
heap
page read and write
5982000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
49E1000
heap
page read and write
5FB1000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
5B24000
trusted library allocation
page read and write
5988000
trusted library allocation
page read and write
11CA000
heap
page read and write
5E94000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
120C000
heap
page read and write
5DEB000
trusted library allocation
page read and write
6CE000
unkown
page read and write
5EEE000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5ED9000
stack
page read and write
5A2F000
trusted library allocation
page read and write
4F9F000
stack
page read and write
B14000
unkown
page execute and write copy
5DE6000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
975000
unkown
page execute and write copy
5E84000
trusted library allocation
page read and write
5995000
trusted library allocation
page read and write
54FF000
stack
page read and write
82E0000
heap
page read and write
595A000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
11F5000
heap
page read and write
597E000
trusted library allocation
page read and write
5E82000
trusted library allocation
page read and write
661E000
trusted library allocation
page execute and read and write
5961000
trusted library allocation
page read and write
59D2000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
782F000
stack
page read and write
5993000
trusted library allocation
page read and write
361E000
stack
page read and write
2C2C000
stack
page read and write
1054000
heap
page read and write
5F1A000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
517E000
stack
page read and write
2FDE000
stack
page read and write
594D000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
5FDB000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
5F75000
trusted library allocation
page read and write
59BC000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
5E97000
trusted library allocation
page read and write
1054000
heap
page read and write
5EBB000
trusted library allocation
page read and write
5997000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
120D000
heap
page read and write
5976000
trusted library allocation
page read and write
600E000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
5977000
trusted library allocation
page read and write
2C97000
heap
page read and write
5EB7000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
75EE000
stack
page read and write
59A3000
trusted library allocation
page read and write
49E1000
heap
page read and write
5DE9000
trusted library allocation
page read and write
5977000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5FBB000
trusted library allocation
page read and write
49E1000
heap
page read and write
11F0000
heap
page read and write
8250000
direct allocation
page read and write
5F26000
trusted library allocation
page read and write
FF0000
heap
page read and write
5DE2000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
11EF000
heap
page read and write
5999000
trusted library allocation
page read and write
11F2000
heap
page read and write
11EA000
heap
page read and write
598E000
trusted library allocation
page read and write
53FE000
stack
page read and write
43DE000
stack
page read and write
5997000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
5946000
trusted library allocation
page read and write
5E7D000
trusted library allocation
page read and write
6362000
trusted library allocation
page execute and read and write
399F000
stack
page read and write
71EF000
stack
page read and write
2E9F000
stack
page read and write
59A6000
trusted library allocation
page read and write
5987000
trusted library allocation
page read and write
5983000
trusted library allocation
page read and write
10DD000
stack
page read and write
5DE1000
trusted library allocation
page read and write
11FA000
heap
page read and write
594C000
trusted library allocation
page read and write
1205000
heap
page read and write
596A000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
11FD000
heap
page read and write
5991000
trusted library allocation
page read and write
49F2000
heap
page read and write
11F6000
heap
page read and write
1209000
heap
page read and write
5DEE000
trusted library allocation
page read and write
5ED7000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
5EBD000
trusted library allocation
page read and write
5EF8000
trusted library allocation
page read and write
59B8000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
111E000
heap
page read and write
5DEE000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
594D000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
5F7D000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
385F000
stack
page read and write
5DE9000
trusted library allocation
page read and write
4E40000
remote allocation
page read and write
59B8000
trusted library allocation
page read and write
6012000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
BAB000
stack
page read and write
8250000
direct allocation
page read and write
11EF000
heap
page read and write
597B000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
5DE4000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
4E40000
remote allocation
page read and write
5956000
trusted library allocation
page read and write
563F000
stack
page read and write
59BF000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5F12000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
11F0000
heap
page read and write
898E000
stack
page read and write
49E1000
heap
page read and write
594F000
trusted library allocation
page read and write
EFB000
stack
page read and write
1209000
heap
page read and write
8250000
direct allocation
page read and write
59B5000
trusted library allocation
page read and write
11E8000
heap
page read and write
35DF000
stack
page read and write
11D6000
heap
page read and write
465E000
stack
page read and write
5977000
trusted library allocation
page read and write
5FB9000
trusted library allocation
page read and write
8A8E000
stack
page read and write
1110000
heap
page read and write
1054000
heap
page read and write
6014000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
4E40000
remote allocation
page read and write
597D000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
48DE000
stack
page read and write
680000
unkown
page read and write
5EC4000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5EF6000
trusted library allocation
page read and write
140E000
stack
page read and write
5976000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
11C0000
heap
page read and write
11FD000
heap
page read and write
5ED2000
trusted library allocation
page read and write
64FA000
trusted library allocation
page execute and read and write
5ED5000
trusted library allocation
page read and write
692F000
stack
page read and write
975000
unkown
page execute and read and write
11E4000
heap
page read and write
6070000
trusted library allocation
page read and write
34DE000
stack
page read and write
5ED1000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
11E0000
heap
page read and write
1054000
heap
page read and write
5E83000
trusted library allocation
page read and write
120A000
heap
page read and write
49E0000
heap
page read and write
5F18000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
6E2F000
stack
page read and write
11F4000
heap
page read and write
7BEF000
stack
page read and write
594D000
trusted library allocation
page read and write
49E1000
heap
page read and write
5F0F000
trusted library allocation
page read and write
B13000
unkown
page execute and read and write
5979000
trusted library allocation
page read and write
595C000
trusted library allocation
page read and write
130E000
stack
page read and write
10E0000
direct allocation
page read and write
10E0000
direct allocation
page read and write
5DE3000
trusted library allocation
page read and write
5004000
trusted library allocation
page read and write
1100000
direct allocation
page read and write
5DEC000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
661C000
trusted library allocation
page execute and read and write
11E7000
heap
page read and write
8250000
direct allocation
page read and write
1202000
heap
page read and write
11F4000
heap
page read and write
5968000
trusted library allocation
page read and write
10E0000
direct allocation
page read and write
5EDE000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
5FDD000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
3EDE000
stack
page read and write
5F26000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
527C000
stack
page read and write
120D000
heap
page read and write
59AC000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
311E000
stack
page read and write
5976000
trusted library allocation
page read and write
11F4000
heap
page read and write
11EA000
heap
page read and write
5949000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
11FA000
heap
page read and write
75AF000
stack
page read and write
1054000
heap
page read and write
2C6E000
stack
page read and write
82B0000
direct allocation
page read and write
5981000
trusted library allocation
page read and write
11EC000
heap
page read and write
681000
unkown
page execute and read and write
5958000
trusted library allocation
page read and write
8250000
direct allocation
page read and write
5A45000
trusted library allocation
page read and write
5976000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
49DF000
stack
page read and write
5963000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
389E000
stack
page read and write
59ED000
trusted library allocation
page read and write
5979000
trusted library allocation
page read and write
5998000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
1209000
heap
page read and write
5DE4000
trusted library allocation
page read and write
11FA000
heap
page read and write
49E1000
heap
page read and write
479E000
stack
page read and write
602A000
trusted library allocation
page read and write
5BE7000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
605E000
stack
page read and write
120A000
heap
page read and write
594F000
trusted library allocation
page read and write
5EC6000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
82C0000
direct allocation
page execute and read and write
59ED000
trusted library allocation
page read and write
There are 801 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0