IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JSON data
dropped
Chrome Cache Entry: 101
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 102
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 103
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 104
ASCII text
dropped
Chrome Cache Entry: 105
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 106
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 108
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 109
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 110
JSON data
dropped
Chrome Cache Entry: 111
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 112
JSON data
downloaded
Chrome Cache Entry: 113
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 72
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 74
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 75
JSON data
dropped
Chrome Cache Entry: 76
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 80
JSON data
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 82
JSON data
downloaded
Chrome Cache Entry: 83
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 85
ASCII text
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 87
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 88
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 89
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 90
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 92
JSON data
dropped
Chrome Cache Entry: 93
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 94
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 98
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
JSON data
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1896,i,9604878912781494424,10388162517610597454,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1976,i,6169164683179771580,6537590639377131950,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://duckduckgo.com/ac/?q=
unknown
http://crl.microsoft
unknown
https://atten-supporse.biz/mv
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_
unknown
https://github.com/Youssef1313
unknown
https://atten-supporse.biz/apilit
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
dwell-exclaim.biz
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://atten-supporse.biz/apiate
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://atten-supporse.biz/apiY
unknown
formy-spill.biz
https://atten-supporse.biz/6
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
se-blurry.biz
http://185.215.113.16/f
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://185.215.113.16/steam/random.exeZ
unknown
https://www.mozilla.or
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
covery-mover.biz
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.16.1
https://github.com/mairaw
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
atten-supporse.biz
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
print-vexer.biz
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://github.com/dotnet/try
unknown
There are 75 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.16.1
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
104.21.16.1
atten-supporse.biz
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
91000
unkown
page execute and read and write
malicious
5890000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
BCD000
heap
page read and write
57DA000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
43D1000
heap
page read and write
53D4000
trusted library allocation
page read and write
2ABF000
stack
page read and write
BCD000
heap
page read and write
5457000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
BC8000
heap
page read and write
53A7000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
4C5C000
stack
page read and write
57D8000
trusted library allocation
page read and write
43D1000
heap
page read and write
537E000
trusted library allocation
page read and write
5EDA000
trusted library allocation
page execute and read and write
313E000
stack
page read and write
599F000
trusted library allocation
page read and write
58C2000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
53C3000
trusted library allocation
page read and write
BCA000
heap
page read and write
5356000
trusted library allocation
page read and write
B55000
heap
page read and write
57D8000
trusted library allocation
page read and write
537A000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
5341000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
590E000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
59BB000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
535D000
trusted library allocation
page read and write
BCC000
heap
page read and write
5350000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
BC6000
heap
page read and write
5363000
trusted library allocation
page read and write
43D1000
heap
page read and write
5A6D000
trusted library allocation
page read and write
BBC000
heap
page read and write
53E9000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
536D000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
BBB000
heap
page read and write
BB2000
heap
page read and write
535D000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
590E000
stack
page read and write
5331000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
4850000
remote allocation
page read and write
7C60000
direct allocation
page read and write
BCD000
heap
page read and write
BBB000
heap
page read and write
43D0000
heap
page read and write
BBB000
heap
page read and write
591E000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
2BFF000
stack
page read and write
49E0000
direct allocation
page execute and read and write
BC3000
heap
page read and write
43D1000
heap
page read and write
537E000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
51E3000
heap
page read and write
B32000
heap
page read and write
58A3000
trusted library allocation
page read and write
537C000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
3B3E000
stack
page read and write
58BC000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
39FE000
stack
page read and write
91000
unkown
page execute and write copy
57D6000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
940000
heap
page read and write
ADE000
heap
page read and write
58E9000
trusted library allocation
page read and write
58A4000
trusted library allocation
page read and write
BA7000
heap
page read and write
BAB000
heap
page read and write
B55000
heap
page read and write
57D0000
trusted library allocation
page read and write
536C000
trusted library allocation
page read and write
53AF000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
BC3000
heap
page read and write
BCD000
heap
page read and write
BA1000
heap
page read and write
5349000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
57D9000
trusted library allocation
page read and write
BA0000
heap
page read and write
57D9000
trusted library allocation
page read and write
2FBF000
stack
page read and write
53C9000
trusted library allocation
page read and write
5D5A000
trusted library allocation
page execute and read and write
B50000
heap
page read and write
B55000
heap
page read and write
55A7000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
BAB000
heap
page read and write
BA1000
heap
page read and write
BAF000
heap
page read and write
53AA000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
BAB000
heap
page read and write
57D5000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
53E9000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
964000
heap
page read and write
5361000
trusted library allocation
page read and write
55D2000
trusted library allocation
page read and write
BC0000
heap
page read and write
39A000
unkown
page execute and read and write
53D4000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
B53000
heap
page read and write
5507000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
58D4000
trusted library allocation
page read and write
BC3000
heap
page read and write
533A000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
54DF000
trusted library allocation
page read and write
B50000
heap
page read and write
53CA000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
522E000
stack
page read and write
595B000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
57DF000
trusted library allocation
page read and write
BC0000
heap
page read and write
58CF000
trusted library allocation
page read and write
BB0000
heap
page read and write
57D3000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
BAF000
heap
page read and write
BAF000
heap
page read and write
58FD000
trusted library allocation
page read and write
43BF000
stack
page read and write
536D000
trusted library allocation
page read and write
964000
heap
page read and write
537E000
trusted library allocation
page read and write
4F3E000
stack
page read and write
90000
unkown
page readonly
337F000
stack
page read and write
BC3000
heap
page read and write
B30000
heap
page read and write
59B9000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
964000
heap
page read and write
7C60000
direct allocation
page read and write
5896000
trusted library allocation
page read and write
4EDF000
stack
page read and write
53DB000
trusted library allocation
page read and write
BA1000
heap
page read and write
57DC000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
BC3000
heap
page read and write
2D3F000
stack
page read and write
5D3C000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
BC6000
heap
page read and write
57DA000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
BC8000
heap
page read and write
278000
unkown
page execute and read and write
BB6000
heap
page read and write
536B000
trusted library allocation
page read and write
5A1F000
trusted library allocation
page read and write
5A29000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
BBB000
heap
page read and write
B56000
heap
page read and write
537E000
trusted library allocation
page read and write
BA1000
heap
page read and write
5381000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
8FB000
stack
page read and write
BC3000
heap
page read and write
49B0000
direct allocation
page execute and read and write
BAD000
heap
page read and write
591F000
trusted library allocation
page read and write
BC3000
heap
page read and write
57D7000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
D0E000
stack
page read and write
5396000
trusted library allocation
page read and write
4D9F000
stack
page read and write
535D000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
964000
heap
page read and write
7C60000
direct allocation
page read and write
5353000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
4DDE000
stack
page read and write
B07000
heap
page read and write
BC3000
heap
page read and write
384000
unkown
page execute and read and write
43D1000
heap
page read and write
BA1000
heap
page read and write
535E000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
5905000
trusted library allocation
page read and write
5883000
trusted library allocation
page read and write
57DE000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
BAB000
heap
page read and write
534A000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
5A0F000
stack
page read and write
39A000
unkown
page execute and write copy
5397000
trusted library allocation
page read and write
5882000
trusted library allocation
page read and write
BC5000
heap
page read and write
7C60000
direct allocation
page read and write
591F000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
3D7F000
stack
page read and write
BAD000
heap
page read and write
B1E000
heap
page read and write
53C9000
trusted library allocation
page read and write
BC3000
heap
page read and write
534B000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
5332000
trusted library allocation
page read and write
BB4000
heap
page read and write
58B5000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
283F000
stack
page read and write
5E43000
trusted library allocation
page read and write
43E2000
heap
page read and write
53A7000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
B55000
heap
page read and write
58E6000
trusted library allocation
page read and write
BCA000
heap
page read and write
BC6000
heap
page read and write
43C0000
direct allocation
page read and write
57D6000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
586A000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
B55000
heap
page read and write
489B000
stack
page read and write
BA1000
heap
page read and write
5873000
trusted library allocation
page read and write
58A5000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
BC2000
heap
page read and write
BBB000
heap
page read and write
536B000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
590C000
trusted library allocation
page read and write
359000
unkown
page execute and read and write
5333000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
4B1E000
stack
page read and write
534B000
trusted library allocation
page read and write
2AFE000
stack
page read and write
57D6000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
BCA000
heap
page read and write
57DC000
trusted library allocation
page read and write
5896000
trusted library allocation
page read and write
BA3000
heap
page read and write
587B000
trusted library allocation
page read and write
517C000
stack
page read and write
30FF000
stack
page read and write
53DB000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
BB4000
heap
page read and write
535F000
trusted library allocation
page read and write
537C000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
BC3000
heap
page read and write
5D49000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
536C000
trusted library allocation
page read and write
B50000
heap
page read and write
6008000
trusted library allocation
page execute and read and write
5355000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
BCA000
heap
page read and write
57D7000
trusted library allocation
page read and write
38B000
unkown
page execute and read and write
536D000
trusted library allocation
page read and write
7D40000
direct allocation
page execute and read and write
3EBF000
stack
page read and write
57D5000
trusted library allocation
page read and write
4850000
remote allocation
page read and write
BB0000
heap
page read and write
BBB000
heap
page read and write
57D1000
trusted library allocation
page read and write
B49000
heap
page read and write
58D0000
trusted library allocation
page read and write
58AE000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
4C9E000
stack
page read and write
58FF000
trusted library allocation
page read and write
58EC000
trusted library allocation
page read and write
5336000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
57D1000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
E3000
unkown
page write copy
535D000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
BBB000
heap
page read and write
BC0000
heap
page read and write
538E000
trusted library allocation
page read and write
43D1000
heap
page read and write
B55000
heap
page read and write
417E000
stack
page read and write
53C9000
trusted library allocation
page read and write
E0E000
stack
page read and write
57D7000
trusted library allocation
page read and write
A9E000
stack
page read and write
BC4000
heap
page read and write
5347000
trusted library allocation
page read and write
39B000
unkown
page execute and write copy
537D000
trusted library allocation
page read and write
D2000
unkown
page execute and read and write
964000
heap
page read and write
58D6000
trusted library allocation
page read and write
53BE000
trusted library allocation
page read and write
297F000
stack
page read and write
5877000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
373F000
stack
page read and write
BC3000
heap
page read and write
59FF000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
BBB000
heap
page read and write
BAA000
heap
page read and write
534E000
trusted library allocation
page read and write
BB4000
heap
page read and write
5919000
trusted library allocation
page read and write
7CC0000
direct allocation
page read and write
950000
heap
page read and write
BA0000
heap
page read and write
58FA000
trusted library allocation
page read and write
BAF000
heap
page read and write
53C9000
trusted library allocation
page read and write
532F000
stack
page read and write
537E000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
B53000
heap
page read and write
5390000
trusted library allocation
page read and write
5A3C000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
BA1000
heap
page read and write
58AC000
trusted library allocation
page read and write
BAF000
heap
page read and write
5907000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
5336000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
BB0000
heap
page read and write
5340000
trusted library allocation
page read and write
413F000
stack
page read and write
57D4000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
BC3000
heap
page read and write
5353000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
964000
heap
page read and write
BCD000
heap
page read and write
BBB000
heap
page read and write
58A3000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
4810000
heap
page read and write
363E000
stack
page read and write
5365000
trusted library allocation
page read and write
34FE000
stack
page read and write
B56000
heap
page read and write
BC3000
heap
page read and write
5355000
trusted library allocation
page read and write
541000
unkown
page execute and write copy
2C3E000
stack
page read and write
53C9000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
BBB000
heap
page read and write
BB2000
heap
page read and write
53CA000
trusted library allocation
page read and write
58D8000
trusted library allocation
page read and write
BA3000
heap
page read and write
BC3000
heap
page read and write
57D4000
trusted library allocation
page read and write
BC8000
heap
page read and write
5A1E000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
BBB000
heap
page read and write
7CC0000
direct allocation
page read and write
537E000
trusted library allocation
page read and write
B55000
heap
page read and write
537C000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
960000
heap
page read and write
59CF000
trusted library allocation
page read and write
5336000
trusted library allocation
page read and write
BC3000
heap
page read and write
49E0000
direct allocation
page execute and read and write
5A8E000
stack
page read and write
BC9000
heap
page read and write
57DA000
trusted library allocation
page read and write
58FC000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
5FF7000
trusted library allocation
page execute and read and write
5A6B000
trusted library allocation
page read and write
5A09000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
BCD000
heap
page read and write
537E000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
29BE000
stack
page read and write
BBB000
heap
page read and write
BC3000
heap
page read and write
48A1000
direct allocation
page read and write
534A000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
964000
heap
page read and write
964000
heap
page read and write
59DD000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
42BE000
stack
page read and write
49E0000
direct allocation
page execute and read and write
BB6000
heap
page read and write
BBB000
heap
page read and write
BB0000
heap
page read and write
E3000
unkown
page write copy
54CB000
trusted library allocation
page read and write
BBB000
heap
page read and write
539A000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
43D1000
heap
page read and write
BB2000
heap
page read and write
536D000
trusted library allocation
page read and write
BC3000
heap
page read and write
57DC000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
43D1000
heap
page read and write
533D000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
43D1000
heap
page read and write
5898000
trusted library allocation
page read and write
5A9B000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
5868000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
35FF000
stack
page read and write
964000
heap
page read and write
34BF000
stack
page read and write
5364000
trusted library allocation
page read and write
43D1000
heap
page read and write
2FFE000
stack
page read and write
5885000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
5353000
trusted library allocation
page read and write
BAF000
heap
page read and write
5D52000
trusted library allocation
page execute and read and write
590A000
trusted library allocation
page read and write
5379000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
272C000
stack
page read and write
5439000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
57D5000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
5A45000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
BBB000
heap
page read and write
287E000
stack
page read and write
5938000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
BA3000
heap
page read and write
BC3000
heap
page read and write
5350000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
BA1000
heap
page read and write
43C0000
direct allocation
page read and write
BA1000
heap
page read and write
B55000
heap
page read and write
537E000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
58FB000
trusted library allocation
page read and write
BA1000
heap
page read and write
2E7F000
stack
page read and write
5332000
trusted library allocation
page read and write
43D1000
heap
page read and write
57D7000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
B53000
heap
page read and write
57D8000
trusted library allocation
page read and write
4A2D000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
5389000
trusted library allocation
page read and write
BA1000
heap
page read and write
5353000
trusted library allocation
page read and write
BC0000
heap
page read and write
7C60000
direct allocation
page read and write
43C0000
direct allocation
page read and write
546A000
stack
page read and write
58FD000
trusted library allocation
page read and write
43D1000
heap
page read and write
5353000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
5A4C000
stack
page read and write
58C9000
trusted library allocation
page read and write
3AFF000
stack
page read and write
5341000
trusted library allocation
page read and write
3DBE000
stack
page read and write
5A1C000
trusted library allocation
page read and write
3C3F000
stack
page read and write
BBB000
heap
page read and write
5995000
trusted library allocation
page read and write
BBB000
heap
page read and write
57DA000
trusted library allocation
page read and write
49ED000
stack
page read and write
5330000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
90000
unkown
page read and write
964000
heap
page read and write
5396000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
5370000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
5378000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
58A2000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
5A3A000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
B9A000
heap
page read and write
5366000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
7D10000
direct allocation
page execute and read and write
2737000
heap
page read and write
387F000
stack
page read and write
BCE000
heap
page read and write
AC0000
heap
page read and write
57D6000
trusted library allocation
page read and write
B55000
heap
page read and write
5341000
trusted library allocation
page read and write
327E000
stack
page read and write
53CA000
trusted library allocation
page read and write
BC3000
heap
page read and write
536D000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
B56000
heap
page read and write
BBB000
heap
page read and write
503F000
stack
page read and write
597F000
trusted library allocation
page read and write
43C0000
direct allocation
page read and write
43C0000
direct allocation
page read and write
5A21000
trusted library allocation
page read and write
BAB000
heap
page read and write
323F000
stack
page read and write
533D000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
B8E000
heap
page read and write
57D2000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
51E0000
heap
page read and write
5332000
trusted library allocation
page read and write
B52000
heap
page read and write
BA1000
heap
page read and write
5350000
trusted library allocation
page read and write
BC3000
heap
page read and write
55D0000
trusted library allocation
page read and write
E5000
unkown
page execute and read and write
5396000
trusted library allocation
page read and write
BAD000
heap
page read and write
ADA000
heap
page read and write
499F000
stack
page read and write
57D4000
trusted library allocation
page read and write
43D1000
heap
page read and write
536D000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
964000
heap
page read and write
5368000
trusted library allocation
page read and write
AD0000
heap
page read and write
533B000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
2EBE000
stack
page read and write
BA1000
heap
page read and write
377E000
stack
page read and write
58E4000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
BA3000
heap
page read and write
43D1000
heap
page read and write
57DC000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
BBB000
heap
page read and write
5917000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
57DA000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
4850000
remote allocation
page read and write
57D9000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
403E000
stack
page read and write
5921000
trusted library allocation
page read and write
BCA000
heap
page read and write
58C0000
trusted library allocation
page read and write
5DB000
stack
page read and write
49E0000
direct allocation
page execute and read and write
53D4000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
26EF000
stack
page read and write
535D000
trusted library allocation
page read and write
BC6000
heap
page read and write
43C0000
direct allocation
page read and write
BCA000
heap
page read and write
57E1000
trusted library allocation
page read and write
599D000
trusted library allocation
page read and write
58EE000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
B55000
heap
page read and write
5906000
trusted library allocation
page read and write
3FFF000
stack
page read and write
BA3000
heap
page read and write
49E0000
direct allocation
page execute and read and write
BA1000
heap
page read and write
53AE000
trusted library allocation
page read and write
964000
heap
page read and write
5908000
trusted library allocation
page read and write
BA5000
heap
page read and write
43D1000
heap
page read and write
537E000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
54B0000
direct allocation
page read and write
BB3000
heap
page read and write
BAD000
heap
page read and write
538E000
trusted library allocation
page read and write
507E000
stack
page read and write
CCE000
stack
page read and write
BCD000
heap
page read and write
25EE000
stack
page read and write
5981000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
2730000
heap
page read and write
43C0000
direct allocation
page read and write
5345000
trusted library allocation
page read and write
964000
heap
page read and write
535F000
trusted library allocation
page read and write
BBB000
heap
page read and write
5389000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
B55000
heap
page read and write
BBB000
heap
page read and write
5344000
trusted library allocation
page read and write
7C60000
direct allocation
page read and write
5375000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
BAB000
heap
page read and write
5997000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
BCC000
heap
page read and write
57D8000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
3C7E000
stack
page read and write
BA5000
heap
page read and write
538C000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
58D1000
trusted library allocation
page read and write
535D000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
BC6000
heap
page read and write
58EB000
trusted library allocation
page read and write
BC3000
heap
page read and write
57D8000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
BC3000
heap
page read and write
BBB000
heap
page read and write
427F000
stack
page read and write
591A000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
5879000
trusted library allocation
page read and write
5A07000
trusted library allocation
page read and write
5883000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
BA1000
heap
page read and write
4B5E000
stack
page read and write
536A000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
43D1000
heap
page read and write
534F000
trusted library allocation
page read and write
58C7000
trusted library allocation
page read and write
BC9000
heap
page read and write
43D1000
heap
page read and write
57D8000
trusted library allocation
page read and write
58B2000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
38BE000
stack
page read and write
53A3000
trusted library allocation
page read and write
539D000
trusted library allocation
page read and write
58C9000
stack
page read and write
53CA000
trusted library allocation
page read and write
33BE000
stack
page read and write
53A7000
trusted library allocation
page read and write
39BF000
stack
page read and write
53AC000
trusted library allocation
page read and write
535A000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
BA0000
heap
page read and write
43D1000
heap
page read and write
5350000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
2D7E000
stack
page read and write
58D6000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
BBB000
heap
page read and write
57D2000
trusted library allocation
page read and write
B47000
heap
page read and write
55DE000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
6006000
trusted library allocation
page execute and read and write
57DA000
trusted library allocation
page read and write
964000
heap
page read and write
B3E000
heap
page read and write
964000
heap
page read and write
540000
unkown
page execute and read and write
57D5000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
3EFE000
stack
page read and write
BCA000
heap
page read and write
43D1000
heap
page read and write
5345000
trusted library allocation
page read and write
B3E000
heap
page read and write
5345000
trusted library allocation
page read and write
7CC0000
direct allocation
page read and write
537D000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
57DA000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
536C000
trusted library allocation
page read and write
BA1000
heap
page read and write
5353000
trusted library allocation
page read and write
There are 856 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0