IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 101
ASCII text
dropped
Chrome Cache Entry: 102
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 103
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 105
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 106
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 109
JSON data
downloaded
Chrome Cache Entry: 110
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 69
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 71
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 72
JSON data
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 76
JSON data
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 78
JSON data
downloaded
Chrome Cache Entry: 79
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 81
ASCII text
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 83
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 84
JSON data
dropped
Chrome Cache Entry: 85
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 86
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 87
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 89
JSON data
dropped
Chrome Cache Entry: 90
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 91
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 93
JSON data
downloaded
Chrome Cache Entry: 94
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 95
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 99
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1944,i,12398090769683283580,15883976292217934783,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1916,i,5027301421968509795,4579798897625562281,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://atten-supporse.biz/G
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://duckduckgo.com/ac/?q=
unknown
http://crl.microsoft
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://atten-supporse.biz/apiT7
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
dwell-exclaim.biz
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
formy-spill.biz
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
se-blurry.biz
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://185.215.113.16/rD
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://atten-supporse.biz/URDT
unknown
covery-mover.biz
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
172.67.165.166
https://github.com/mairaw
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://atten-supporse.biz/h
unknown
https://atten-supporse.biz/0u
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://185.215.113.16/5
unknown
http://185.215.113.16:80/off/def.exe
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://atten-supporse.biz/w
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
atten-supporse.biz
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
print-vexer.biz
https://channel9.msdn.com/
unknown
https://atten-supporse.biz/api0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 71 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
172.67.165.166
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
172.67.165.166
atten-supporse.biz
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5080000
direct allocation
page read and write
malicious
1395000
heap
page read and write
5B90000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
5FE7000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
1386000
heap
page read and write
1290000
direct allocation
page read and write
1290000
direct allocation
page read and write
60B5000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
60B3000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
5BFE000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B83000
trusted library allocation
page read and write
1398000
heap
page read and write
60E7000
trusted library allocation
page read and write
5B7C000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
617A000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5BAB000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
610E000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
137D000
heap
page read and write
5B5C000
trusted library allocation
page read and write
6073000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BBE000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
5BEC000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
5FE5000
trusted library allocation
page read and write
61A7000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
60BA000
trusted library allocation
page read and write
60A1000
trusted library allocation
page read and write
614C000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
5FE9000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
138C000
heap
page read and write
6152000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
613B000
trusted library allocation
page read and write
5FF1000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
303000
unkown
page write copy
4C01000
heap
page read and write
139E000
heap
page read and write
5BAA000
trusted library allocation
page read and write
11E4000
heap
page read and write
5B65000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5B79000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
5B76000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
612B000
trusted library allocation
page read and write
4C01000
heap
page read and write
5FF0000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
5FE5000
trusted library allocation
page read and write
5B6E000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
138D000
heap
page read and write
5FE6000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
5B89000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
5C82000
trusted library allocation
page read and write
1386000
heap
page read and write
5B90000
trusted library allocation
page read and write
6211000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1395000
heap
page read and write
5FE8000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5FEA000
trusted library allocation
page read and write
6142000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
5B5D000
trusted library allocation
page read and write
6096000
trusted library allocation
page read and write
612E000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
5B7C000
trusted library allocation
page read and write
11E4000
heap
page read and write
138A000
heap
page read and write
4C01000
heap
page read and write
6137000
trusted library allocation
page read and write
4C01000
heap
page read and write
5FE2000
trusted library allocation
page read and write
5BAB000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
60DC000
trusted library allocation
page read and write
626C000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5FED000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
6148000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
60C3000
trusted library allocation
page read and write
5BD8000
trusted library allocation
page read and write
139C000
heap
page read and write
5B65000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5BAB000
trusted library allocation
page read and write
1386000
heap
page read and write
6118000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
1367000
heap
page read and write
51C0000
direct allocation
page execute and read and write
5BB8000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5FEA000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
627B000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
6217000
trusted library allocation
page read and write
5B8F000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
5B8E000
trusted library allocation
page read and write
612C000
trusted library allocation
page read and write
60FF000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
5FEB000
trusted library allocation
page read and write
5B4D000
trusted library allocation
page read and write
5B56000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
614E000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B53000
trusted library allocation
page read and write
5FE9000
trusted library allocation
page read and write
11E4000
heap
page read and write
62AD000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
6106000
trusted library allocation
page read and write
5FE5000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
60A9000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
6101000
trusted library allocation
page read and write
5B53000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
5FEC000
trusted library allocation
page read and write
60D1000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5FE1000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
6098000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
11E4000
heap
page read and write
5B87000
trusted library allocation
page read and write
614C000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
6092000
trusted library allocation
page read and write
5B53000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
60C2000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BA2000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
5B57000
trusted library allocation
page read and write
1395000
heap
page read and write
60E8000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
5FE5000
trusted library allocation
page read and write
612E000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
60DA000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B5D000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
5BA0000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
1364000
heap
page read and write
1391000
heap
page read and write
5FE6000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
4C01000
heap
page read and write
5FE1000
trusted library allocation
page read and write
1376000
heap
page read and write
5FED000
trusted library allocation
page read and write
135D000
heap
page read and write
60A9000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1384000
heap
page read and write
614A000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
51E0000
direct allocation
page execute and read and write
138E000
heap
page read and write
6215000
trusted library allocation
page read and write
60A3000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
5FED000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
1290000
direct allocation
page read and write
5BA7000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
1376000
heap
page read and write
5FEA000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
5FEC000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BD1000
trusted library allocation
page read and write
137A000
heap
page read and write
5B74000
trusted library allocation
page read and write
5B7E000
trusted library allocation
page read and write
1371000
heap
page read and write
5FE4000
trusted library allocation
page read and write
629A000
trusted library allocation
page read and write
1386000
heap
page read and write
623B000
trusted library allocation
page read and write
626E000
trusted library allocation
page read and write
6094000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
4C01000
heap
page read and write
5B90000
trusted library allocation
page read and write
1371000
heap
page read and write
60A7000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
4C01000
heap
page read and write
2B0000
unkown
page readonly
6199000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
60C1000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
4C01000
heap
page read and write
5DE2000
trusted library allocation
page read and write
6253000
trusted library allocation
page read and write
5FE8000
trusted library allocation
page read and write
5BA7000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
5FE8000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
5B79000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
60BF000
trusted library allocation
page read and write
1393000
heap
page read and write
627D000
trusted library allocation
page read and write
1389000
heap
page read and write
11E4000
heap
page read and write
5B46000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
6122000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
5BBC000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
1384000
heap
page read and write
5B50000
trusted library allocation
page read and write
1395000
heap
page read and write
61A0000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
137A000
heap
page read and write
6139000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1376000
heap
page read and write
6112000
trusted library allocation
page read and write
1391000
heap
page read and write
5FEB000
trusted library allocation
page read and write
1391000
heap
page read and write
665B000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
1386000
heap
page read and write
5FE3000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
1371000
heap
page read and write
51F0000
direct allocation
page execute and read and write
2B1000
unkown
page execute and write copy
5FE9000
trusted library allocation
page read and write
5BB7000
trusted library allocation
page read and write
61FF000
trusted library allocation
page read and write
5FE1000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
4C01000
heap
page read and write
1378000
heap
page read and write
60C1000
trusted library allocation
page read and write
137A000
heap
page read and write
5FE1000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
137A000
heap
page read and write
5B65000
trusted library allocation
page read and write
5B73000
trusted library allocation
page read and write
5FF1000
trusted library allocation
page read and write
5070000
remote allocation
page read and write
5B5D000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
5B41000
trusted library allocation
page read and write
11E4000
heap
page read and write
5FE4000
trusted library allocation
page read and write
135E000
heap
page read and write
1368000
heap
page read and write
5B70000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5BC8000
trusted library allocation
page read and write
11E4000
heap
page read and write
1398000
heap
page read and write
6146000
trusted library allocation
page read and write
614E000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
5B56000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
625D000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
60F8000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
1387000
heap
page read and write
1364000
heap
page read and write
5C43000
trusted library allocation
page read and write
5FE9000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5FE7000
trusted library allocation
page read and write
5BC2000
trusted library allocation
page read and write
4C01000
heap
page read and write
5FEF000
trusted library allocation
page read and write
5070000
remote allocation
page read and write
620F000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
5B49000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
612C000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
629C000
trusted library allocation
page read and write
5BDF000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
5FEC000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
1386000
heap
page read and write
5B5E000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5BA3000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
137D000
heap
page read and write
5FE0000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
11E4000
heap
page read and write
5FE4000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
11E4000
heap
page read and write
5B73000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
6255000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
625F000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
5BD6000
trusted library allocation
page read and write
610C000
trusted library allocation
page read and write
5FEB000
trusted library allocation
page read and write
1398000
heap
page read and write
5B8B000
trusted library allocation
page read and write
61A9000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
60C2000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
614C000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
5B7C000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
61FD000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
60E9000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
619E000
trusted library allocation
page read and write
11E4000
heap
page read and write
5B8E000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
608B000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B8A000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5B87000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
1395000
heap
page read and write
5B73000
trusted library allocation
page read and write
5FEF000
trusted library allocation
page read and write
1371000
heap
page read and write
5C51000
trusted library allocation
page read and write
5BC8000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
5B4D000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
4C01000
heap
page read and write
6251000
trusted library allocation
page read and write
1371000
heap
page read and write
5B90000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
5FEC000
trusted library allocation
page read and write
137D000
heap
page read and write
5B90000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
61EE000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
5FEF000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
611A000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BA4000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
1390000
heap
page read and write
1384000
heap
page read and write
5B56000
trusted library allocation
page read and write
11E4000
heap
page read and write
5FE8000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5B4D000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
60FA000
trusted library allocation
page read and write
6135000
trusted library allocation
page read and write
1386000
heap
page read and write
60D3000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
5B75000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BAB000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
5B8D000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5FEF000
trusted library allocation
page read and write
5A9000
unkown
page execute and write copy
60A4000
trusted library allocation
page read and write
1367000
heap
page read and write
5B7A000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
1370000
heap
page read and write
138A000
heap
page read and write
5B50000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
11E4000
heap
page read and write
6110000
trusted library allocation
page read and write
1386000
heap
page read and write
5B7A000
trusted library allocation
page read and write
5FE1000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
50C1000
direct allocation
page read and write
5B8C000
trusted library allocation
page read and write
62AB000
trusted library allocation
page read and write
610E000
trusted library allocation
page read and write
11E4000
heap
page read and write
11E4000
heap
page read and write
61AC000
trusted library allocation
page read and write
4C01000
heap
page read and write
5B58000
trusted library allocation
page read and write
1376000
heap
page read and write
1290000
direct allocation
page read and write
5B49000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
5B75000
trusted library allocation
page read and write
4C01000
heap
page read and write
5B65000
trusted library allocation
page read and write
60B8000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5FE1000
trusted library allocation
page read and write
11E4000
heap
page read and write
5B8D000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
1394000
heap
page read and write
5FE5000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
137E000
heap
page read and write
5B5C000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
611C000
trusted library allocation
page read and write
5B8C000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
5FE3000
trusted library allocation
page read and write
5B80000
trusted library allocation
page read and write
5FE8000
trusted library allocation
page read and write
1398000
heap
page read and write
5B98000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
5BB4000
trusted library allocation
page read and write
5B73000
trusted library allocation
page read and write
5BB0000
trusted library allocation
page read and write
5FF1000
trusted library allocation
page read and write
138C000
heap
page read and write
5B90000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
5BA2000
trusted library allocation
page read and write
5FE9000
trusted library allocation
page read and write
5FE2000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
612D000
trusted library allocation
page read and write
5FE6000
trusted library allocation
page read and write
138A000
heap
page read and write
6138000
trusted library allocation
page read and write
6075000
trusted library allocation
page read and write
5070000
remote allocation
page read and write
5B99000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
1290000
direct allocation
page read and write
6178000
trusted library allocation
page read and write
61DE000
trusted library allocation
page read and write
51F0000
direct allocation
page execute and read and write
1391000
heap
page read and write
6082000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
6092000
trusted library allocation
page read and write
137D000
heap
page read and write
5B86000
trusted library allocation
page read and write
1351000
heap
page read and write
6089000
trusted library allocation
page read and write
5FEB000
trusted library allocation
page read and write
6104000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
5FEC000
trusted library allocation
page read and write
5BC8000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
612C000
trusted library allocation
page read and write
5FE4000
trusted library allocation
page read and write
5FEF000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
4C01000
heap
page read and write
61ED000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
4C01000
heap
page read and write
5FEB000
trusted library allocation
page read and write
1389000
heap
page read and write
612E000
trusted library allocation
page read and write
139E000
heap
page read and write
51D0000
direct allocation
page execute and read and write
5B90000
trusted library allocation
page read and write
There are 633 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0