IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
gzip compressed data, from TOPS/20, original size modulo 2^32 4897
downloaded
Chrome Cache Entry: 101
JSON data
dropped
Chrome Cache Entry: 102
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 103
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 104
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 105
ASCII text
dropped
Chrome Cache Entry: 106
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1154
downloaded
Chrome Cache Entry: 107
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 108
gzip compressed data, from TOPS/20, original size modulo 2^32 33148
downloaded
Chrome Cache Entry: 109
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 110
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 111
JSON data
dropped
Chrome Cache Entry: 112
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 47062
downloaded
Chrome Cache Entry: 113
gzip compressed data, from TOPS/20, original size modulo 2^32 3130
downloaded
Chrome Cache Entry: 114
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 77
JSON data
dropped
Chrome Cache Entry: 78
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 79
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 464328
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 81
JSON data
dropped
Chrome Cache Entry: 82
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 83
gzip compressed data, from TOPS/20, original size modulo 2^32 25553
downloaded
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 86
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1432
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 88
gzip compressed data, from TOPS/20, original size modulo 2^32 1173007
downloaded
Chrome Cache Entry: 89
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 90
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 92
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1817143
downloaded
Chrome Cache Entry: 93
JSON data
dropped
Chrome Cache Entry: 94
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 95
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 97
gzip compressed data, from TOPS/20, original size modulo 2^32 5644
downloaded
Chrome Cache Entry: 98
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 99
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1912,i,18367878757296781263,2772418614693256820,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,1634595659012258759,6139322719468599713,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://atten-supporse.biz/F
unknown
https://duckduckgo.com/ac/?q=
unknown
https://atten-supporse.biz/P
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://atten-supporse.biz/apiogb
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
dwell-exclaim.biz
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://atten-supporse.biz/apih
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
formy-spill.biz
https://atten-supporse.biz/8
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
se-blurry.biz
http://185.215.113.16/off/def.exeXSb
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://atten-supporse.biz/apiB
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
covery-mover.biz
http://go.microsoft.co:
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.48.1
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://atten-supporse.biz/apiP
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
atten-supporse.biz
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
https://atten-supporse.biz/
unknown
print-vexer.biz
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.48.1
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
104.21.48.1
atten-supporse.biz
United States
192.168.2.16
unknown
unknown
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
B61000
unkown
page execute and read and write
malicious
1655000
heap
page read and write
7C0E000
stack
page read and write
4E80000
heap
page read and write
6111000
trusted library allocation
page read and write
5F10000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
5E30000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E61000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
87AC000
stack
page read and write
5E47000
trusted library allocation
page read and write
5EAA000
trusted library allocation
page read and write
3D3E000
stack
page read and write
5E65000
trusted library allocation
page read and write
7049F000
unkown
page readonly
55ED000
stack
page read and write
62B0000
trusted library allocation
page read and write
5EB7000
trusted library allocation
page read and write
A1F0000
trusted library allocation
page read and write
3BBF000
stack
page read and write
165F000
heap
page read and write
637F000
trusted library allocation
page read and write
75CE000
stack
page read and write
5F29000
trusted library allocation
page read and write
E12000
unkown
page execute and read and write
63EC000
trusted library allocation
page read and write
6345000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
63A4000
trusted library allocation
page read and write
165F000
heap
page read and write
5E39000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
63FE000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
64A1000
trusted library allocation
page read and write
3ABE000
stack
page read and write
54B0000
direct allocation
page execute and read and write
6816000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
6347000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
6619000
trusted library allocation
page read and write
1661000
heap
page read and write
165C000
heap
page read and write
177E000
stack
page read and write
5EA6000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
71CF000
stack
page read and write
62BF000
trusted library allocation
page read and write
167A000
heap
page read and write
67F0000
direct allocation
page read and write
642C000
trusted library allocation
page read and write
54FF000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
158A000
heap
page read and write
63F9000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
397E000
stack
page read and write
3CFF000
stack
page read and write
1673000
heap
page read and write
61C5000
trusted library allocation
page read and write
635A000
trusted library allocation
page read and write
1659000
heap
page read and write
8770000
direct allocation
page read and write
63B2000
trusted library allocation
page execute and read and write
1622000
heap
page read and write
61FD000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
5E66000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
6445000
trusted library allocation
page read and write
7D4E000
stack
page read and write
5EBA000
trusted library allocation
page read and write
5E6F000
trusted library allocation
page read and write
63BA000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
644F000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
3BFE000
stack
page read and write
62BE000
trusted library allocation
page read and write
63D4000
trusted library allocation
page read and write
4EA1000
heap
page read and write
309E000
stack
page read and write
6818000
trusted library allocation
page read and write
5E12000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
6F4F000
stack
page read and write
89CA000
trusted library allocation
page read and write
63D8000
trusted library allocation
page read and write
14E0000
heap
page read and write
5E55000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
167A000
heap
page read and write
531D000
stack
page read and write
5E66000
trusted library allocation
page read and write
650B000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
63FC000
trusted library allocation
page read and write
798E000
stack
page read and write
8DBE000
stack
page read and write
8710000
direct allocation
page read and write
5E45000
trusted library allocation
page read and write
649E000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
824E000
stack
page read and write
4EA1000
heap
page read and write
5F52000
trusted library allocation
page read and write
744F000
stack
page read and write
8710000
direct allocation
page read and write
5E39000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
8770000
direct allocation
page read and write
8710000
direct allocation
page read and write
665E000
trusted library allocation
page execute and read and write
546F000
stack
page read and write
1651000
heap
page read and write
4EB0000
heap
page read and write
5EBA000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
1661000
heap
page read and write
6E4E000
stack
page read and write
62BC000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
64DF000
trusted library allocation
page read and write
433F000
stack
page read and write
5E90000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
4C3E000
stack
page read and write
46FF000
stack
page read and write
6399000
trusted library allocation
page read and write
5E7F000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
7BCF000
stack
page read and write
5F49000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
423E000
stack
page read and write
B60000
unkown
page readonly
62B1000
trusted library allocation
page read and write
6447000
trusted library allocation
page read and write
62B8000
trusted library allocation
page read and write
63F3000
trusted library allocation
page read and write
5E58000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
6376000
trusted library allocation
page read and write
1670000
heap
page read and write
166A000
heap
page read and write
4BFF000
stack
page read and write
5E30000
trusted library allocation
page read and write
167A000
heap
page read and write
62BE000
trusted library allocation
page read and write
6D0E000
stack
page read and write
647F000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
473E000
stack
page read and write
64BD000
trusted library allocation
page read and write
138B000
stack
page read and write
357F000
stack
page read and write
8710000
direct allocation
page read and write
70496000
unkown
page execute and read and write
30F0000
heap
page read and write
62B5000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
6E0F000
stack
page read and write
5E53000
trusted library allocation
page read and write
5B5E000
stack
page read and write
652F000
trusted library allocation
page read and write
834F000
stack
page read and write
63F1000
trusted library allocation
page read and write
62B1000
trusted library allocation
page read and write
860E000
stack
page read and write
30E0000
direct allocation
page read and write
5F18000
trusted library allocation
page read and write
63B5000
trusted library allocation
page read and write
636A000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
6383000
trusted library allocation
page read and write
164D000
heap
page read and write
62B4000
trusted library allocation
page read and write
1667000
heap
page read and write
611D000
trusted library allocation
page read and write
6381000
trusted library allocation
page read and write
5E1B000
trusted library allocation
page read and write
5FFE000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
820F000
stack
page read and write
794F000
stack
page read and write
5E65000
trusted library allocation
page read and write
4EA1000
heap
page read and write
62B3000
trusted library allocation
page read and write
63C2000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
5E30000
trusted library allocation
page read and write
1664000
heap
page read and write
FF4000
unkown
page execute and write copy
5E2A000
trusted library allocation
page read and write
32FF000
stack
page read and write
87C0000
heap
page read and write
6149000
stack
page read and write
4E7F000
stack
page read and write
6383000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
A130000
trusted library allocation
page read and write
1651000
heap
page read and write
62C0000
trusted library allocation
page read and write
639A000
trusted library allocation
page read and write
758F000
stack
page read and write
5E39000
trusted library allocation
page read and write
54C0000
direct allocation
page execute and read and write
4EA1000
heap
page read and write
62B9000
trusted library allocation
page read and write
41FF000
stack
page read and write
4EA1000
heap
page read and write
88CE000
stack
page read and write
848F000
stack
page read and write
5E58000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
6ABD000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
5E36000
trusted library allocation
page read and write
1400000
heap
page read and write
13D5000
heap
page read and write
62BF000
trusted library allocation
page read and write
4D3F000
stack
page read and write
5E71000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
8D7C000
stack
page read and write
61F5000
trusted library allocation
page read and write
166F000
heap
page read and write
5E11000
trusted library allocation
page read and write
FF3000
unkown
page execute and read and write
5E36000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
5E11000
trusted library allocation
page read and write
5E3F000
trusted library allocation
page read and write
63B3000
trusted library allocation
page read and write
596F000
stack
page read and write
1654000
heap
page read and write
5E0E000
stack
page read and write
5E1B000
trusted library allocation
page read and write
7E8E000
stack
page read and write
6363000
trusted library allocation
page read and write
6175000
trusted library allocation
page read and write
166F000
heap
page read and write
163D000
heap
page read and write
1664000
heap
page read and write
62B9000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
5490000
direct allocation
page execute and read and write
5E68000
trusted library allocation
page read and write
5330000
direct allocation
page read and write
4EA1000
heap
page read and write
5E66000
trusted library allocation
page read and write
1652000
heap
page read and write
5E85000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
8750000
trusted library allocation
page read and write
5F1A000
trusted library allocation
page read and write
63DA000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
635E000
trusted library allocation
page read and write
62BD000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
67EE000
stack
page read and write
7A8F000
stack
page read and write
62C0000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
63FB000
trusted library allocation
page read and write
636C000
trusted library allocation
page read and write
62BF000
trusted library allocation
page read and write
5CC0000
heap
page read and write
5E28000
trusted library allocation
page read and write
63A5000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
1654000
heap
page read and write
E3D000
unkown
page execute and read and write
E55000
unkown
page execute and read and write
5E30000
trusted library allocation
page read and write
1667000
heap
page read and write
5F41000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
7FCE000
stack
page read and write
5EA6000
trusted library allocation
page read and write
6352000
trusted library allocation
page read and write
45BF000
stack
page read and write
5E2C000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
BB3000
unkown
page write copy
6117000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
1667000
heap
page read and write
7D0F000
stack
page read and write
54D0000
direct allocation
page execute and read and write
49BE000
stack
page read and write
62B1000
trusted library allocation
page read and write
1651000
heap
page read and write
8EBE000
stack
page read and write
5E1B000
trusted library allocation
page read and write
720E000
stack
page read and write
770E000
stack
page read and write
63B3000
trusted library allocation
page read and write
56EC000
stack
page read and write
62B8000
trusted library allocation
page read and write
4EA1000
heap
page read and write
6460000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
6358000
trusted library allocation
page read and write
3FBE000
stack
page read and write
3E7E000
stack
page read and write
63B5000
trusted library allocation
page read and write
5F54000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
6115000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
638B000
trusted library allocation
page read and write
437E000
stack
page read and write
536B000
stack
page read and write
582F000
stack
page read and write
6400000
trusted library allocation
page read and write
63B1000
trusted library allocation
page read and write
784E000
stack
page read and write
8C7C000
stack
page read and write
4EA1000
heap
page read and write
1654000
heap
page read and write
63B0000
trusted library allocation
page read and write
1660000
heap
page read and write
52E0000
trusted library allocation
page read and write
6540000
trusted library allocation
page execute and read and write
63A2000
trusted library allocation
page read and write
5E67000
trusted library allocation
page read and write
63CE000
trusted library allocation
page read and write
810E000
stack
page read and write
1658000
heap
page read and write
30E0000
direct allocation
page read and write
6488000
trusted library allocation
page read and write
664F000
trusted library allocation
page execute and read and write
36BF000
stack
page read and write
165F000
heap
page read and write
6365000
trusted library allocation
page read and write
5E56000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
5E61000
trusted library allocation
page read and write
63FE000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
730F000
stack
page read and write
6360000
trusted library allocation
page read and write
5E58000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
6385000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
393F000
stack
page read and write
5E29000
trusted library allocation
page read and write
63B3000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
483F000
stack
page read and write
30E0000
direct allocation
page read and write
5E70000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
343F000
stack
page read and write
5E39000
trusted library allocation
page read and write
5F3D000
trusted library allocation
page read and write
63C6000
trusted library allocation
page read and write
154E000
stack
page read and write
30E0000
direct allocation
page read and write
64EE000
trusted library allocation
page read and write
4EA1000
heap
page read and write
5E39000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
5EA6000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
44BE000
stack
page read and write
628D000
trusted library allocation
page read and write
88D0000
direct allocation
page execute and read and write
5E50000
trusted library allocation
page read and write
5E4E000
trusted library allocation
page read and write
5E58000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
59EE000
stack
page read and write
5E68000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
4EA1000
heap
page read and write
6397000
trusted library allocation
page read and write
649F000
trusted library allocation
page read and write
5E87000
trusted library allocation
page read and write
E56000
unkown
page execute and write copy
36FE000
stack
page read and write
5E16000
trusted library allocation
page read and write
40BF000
stack
page read and write
84CE000
stack
page read and write
62B1000
trusted library allocation
page read and write
63B1000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
85CF000
stack
page read and write
638C000
trusted library allocation
page read and write
6CCF000
stack
page read and write
676F000
stack
page read and write
4EA1000
heap
page read and write
64DD000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
333E000
stack
page read and write
870F000
stack
page read and write
1570000
heap
page read and write
5E29000
trusted library allocation
page read and write
5F18000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
62BA000
trusted library allocation
page read and write
35BE000
stack
page read and write
5E39000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
586E000
stack
page read and write
158E000
heap
page read and write
1667000
heap
page read and write
645A000
trusted library allocation
page read and write
6358000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
5E4B000
trusted library allocation
page read and write
62B2000
trusted library allocation
page read and write
63B3000
trusted library allocation
page read and write
5EB3000
trusted library allocation
page read and write
7ACE000
stack
page read and write
642A000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
166C000
heap
page read and write
15E0000
heap
page read and write
5EBA000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
5371000
direct allocation
page read and write
6113000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
63D9000
trusted library allocation
page read and write
708F000
stack
page read and write
6381000
trusted library allocation
page read and write
7E4F000
stack
page read and write
62BB000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
62B4000
trusted library allocation
page read and write
650A000
trusted library allocation
page read and write
5E6E000
trusted library allocation
page read and write
8710000
direct allocation
page read and write
5E48000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5E76000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
5F54000
trusted library allocation
page read and write
4EA1000
heap
page read and write
347E000
stack
page read and write
5E71000
trusted library allocation
page read and write
640F000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
5E39000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
54E0000
direct allocation
page execute and read and write
166F000
heap
page read and write
E55000
unkown
page execute and write copy
654C000
trusted library allocation
page read and write
31FF000
stack
page read and write
6354000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
63F7000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
62C1000
trusted library allocation
page read and write
6509000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
8740000
heap
page read and write
4EA1000
heap
page read and write
62B5000
trusted library allocation
page read and write
5E44000
trusted library allocation
page read and write
166D000
heap
page read and write
165E000
heap
page read and write
447F000
stack
page read and write
5E57000
trusted library allocation
page read and write
1652000
heap
page read and write
1673000
heap
page read and write
89C2000
trusted library allocation
page read and write
6F8E000
stack
page read and write
5E78000
trusted library allocation
page read and write
63F5000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
645C000
trusted library allocation
page read and write
1676000
heap
page read and write
497F000
stack
page read and write
70CE000
stack
page read and write
62C0000
trusted library allocation
page read and write
1660000
heap
page read and write
BA2000
unkown
page execute and read and write
62B1000
trusted library allocation
page read and write
3A7F000
stack
page read and write
6660000
trusted library allocation
page execute and read and write
5E22000
trusted library allocation
page read and write
6371000
trusted library allocation
page read and write
62C0000
trusted library allocation
page read and write
8770000
direct allocation
page read and write
6B2C000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
1673000
heap
page read and write
63F9000
trusted library allocation
page read and write
165C000
heap
page read and write
63D7000
trusted library allocation
page read and write
62BB000
trusted library allocation
page read and write
618E000
stack
page read and write
B60000
unkown
page read and write
80CF000
stack
page read and write
165F000
heap
page read and write
63EE000
trusted library allocation
page read and write
15EE000
heap
page read and write
62B4000
trusted library allocation
page read and write
6374000
trusted library allocation
page read and write
40FE000
stack
page read and write
3F7F000
stack
page read and write
BB5000
unkown
page execute and read and write
5CC3000
heap
page read and write
5E29000
trusted library allocation
page read and write
1651000
heap
page read and write
4EA1000
heap
page read and write
5980000
remote allocation
page read and write
63DA000
trusted library allocation
page read and write
5EBA000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
63F7000
trusted library allocation
page read and write
70480000
unkown
page readonly
63D2000
trusted library allocation
page read and write
5E76000
trusted library allocation
page read and write
1673000
heap
page read and write
67AC000
stack
page read and write
63A9000
stack
page read and write
6BCF000
stack
page read and write
62B0000
trusted library allocation
page read and write
5980000
remote allocation
page read and write
5E39000
trusted library allocation
page read and write
62B7000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
30F7000
heap
page read and write
5EBA000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
64F0000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
1655000
heap
page read and write
5E29000
trusted library allocation
page read and write
62B6000
trusted library allocation
page read and write
63B5000
trusted library allocation
page read and write
5E61000
trusted library allocation
page read and write
5EAD000
trusted library allocation
page read and write
5E6E000
trusted library allocation
page read and write
63D8000
trusted library allocation
page read and write
167A000
heap
page read and write
6000000
trusted library allocation
page read and write
4EA1000
heap
page read and write
637E000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
5EB6000
trusted library allocation
page read and write
654E000
trusted library allocation
page read and write
3E3F000
stack
page read and write
64BF000
trusted library allocation
page read and write
62B5000
trusted library allocation
page read and write
63CC000
trusted library allocation
page read and write
613D000
trusted library allocation
page read and write
4EA1000
heap
page read and write
5D0D000
stack
page read and write
5AEF000
stack
page read and write
15CE000
heap
page read and write
54B0000
direct allocation
page execute and read and write
5E5D000
trusted library allocation
page read and write
166A000
heap
page read and write
6124000
trusted library allocation
page read and write
5C5F000
stack
page read and write
5E31000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
54BE000
stack
page read and write
5E28000
trusted library allocation
page read and write
487E000
stack
page read and write
1659000
heap
page read and write
D33000
unkown
page execute and read and write
5E85000
trusted library allocation
page read and write
63A7000
trusted library allocation
page read and write
5E28000
trusted library allocation
page read and write
E47000
unkown
page execute and read and write
63AF000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
4EA0000
heap
page read and write
54B0000
direct allocation
page execute and read and write
5E52000
trusted library allocation
page read and write
838E000
stack
page read and write
64A0000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
54B0000
direct allocation
page execute and read and write
5E47000
trusted library allocation
page read and write
37FF000
stack
page read and write
642B000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
652D000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
13D0000
heap
page read and write
30DB000
stack
page read and write
5E18000
trusted library allocation
page read and write
4AFE000
stack
page read and write
128B000
stack
page read and write
572E000
stack
page read and write
8710000
direct allocation
page read and write
5F18000
trusted library allocation
page read and write
734E000
stack
page read and write
5E29000
trusted library allocation
page read and write
650C000
trusted library allocation
page read and write
4D7E000
stack
page read and write
5E29000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
63EA000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
639C000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
7049D000
unkown
page read and write
62B0000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
5E73000
trusted library allocation
page read and write
BB3000
unkown
page write copy
4EA1000
heap
page read and write
62B6000
trusted library allocation
page read and write
54A0000
direct allocation
page execute and read and write
5E68000
trusted library allocation
page read and write
4EA1000
heap
page read and write
17BE000
stack
page read and write
648A000
trusted library allocation
page read and write
63F0000
trusted library allocation
page read and write
383E000
stack
page read and write
5E66000
trusted library allocation
page read and write
167A000
heap
page read and write
61A8000
trusted library allocation
page read and write
5EB4000
trusted library allocation
page read and write
64B9000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
62BA000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
15B7000
heap
page read and write
B61000
unkown
page execute and write copy
62B2000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
18BF000
stack
page read and write
4EA1000
heap
page read and write
64BB000
trusted library allocation
page read and write
5E67000
trusted library allocation
page read and write
637C000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
63C4000
trusted library allocation
page read and write
4EA1000
heap
page read and write
62B5000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
8710000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
76CF000
stack
page read and write
6411000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
5E5B000
trusted library allocation
page read and write
164F000
heap
page read and write
644D000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
5330000
direct allocation
page read and write
45FE000
stack
page read and write
5330000
direct allocation
page read and write
5E65000
trusted library allocation
page read and write
748E000
stack
page read and write
780F000
stack
page read and write
4EA1000
heap
page read and write
5E11000
trusted library allocation
page read and write
63B6000
trusted library allocation
page read and write
62BC000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
6389000
trusted library allocation
page read and write
636F000
trusted library allocation
page read and write
5980000
remote allocation
page read and write
611E000
trusted library allocation
page read and write
6356000
trusted library allocation
page read and write
70497000
unkown
page readonly
161F000
heap
page read and write
5EBA000
trusted library allocation
page read and write
642D000
trusted library allocation
page read and write
6AAF000
trusted library allocation
page read and write
7F8F000
stack
page read and write
30E0000
direct allocation
page read and write
5F29000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
63C4000
trusted library allocation
page read and write
70481000
unkown
page execute read
4ABF000
stack
page read and write
8900000
direct allocation
page execute and read and write
635E000
trusted library allocation
page read and write
5E2F000
trusted library allocation
page read and write
5E57000
trusted library allocation
page read and write
5E9F000
trusted library allocation
page read and write
30E0000
direct allocation
page read and write
645E000
trusted library allocation
page read and write
6481000
trusted library allocation
page read and write
638A000
trusted library allocation
page read and write
There are 723 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0