IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:36 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 102
JSON data
dropped
Chrome Cache Entry: 103
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 104
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 106
JSON data
downloaded
Chrome Cache Entry: 107
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 108
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 109
JSON data
dropped
Chrome Cache Entry: 110
JSON data
downloaded
Chrome Cache Entry: 111
JSON data
dropped
Chrome Cache Entry: 112
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 113
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 114
JSON data
dropped
Chrome Cache Entry: 115
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 116
ASCII text
dropped
Chrome Cache Entry: 117
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 118
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 119
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 120
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 121
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 122
JSON data
dropped
Chrome Cache Entry: 123
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 124
JSON data
downloaded
Chrome Cache Entry: 125
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 83
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 86
JSON data
dropped
Chrome Cache Entry: 87
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 88
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 89
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 91
JSON data
dropped
Chrome Cache Entry: 92
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 93
JSON data
downloaded
Chrome Cache Entry: 94
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 96
ASCII text
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 98
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 99
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1980,i,9850134868156104095,2027123724465788591,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1160 --field-trial-handle=2008,i,16001316125916077205,5372674781634389717,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://atten-supporse.biz/R
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
dwell-exclaim.biz
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://atten-supporse.biz/apite
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://atten-supporse.biz/apib
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
formy-spill.biz
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
se-blurry.biz
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://185.215.113.16/off/def.exed
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
covery-mover.biz
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://atten-supporse.biz/apif%aX
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.16.1
https://github.com/mairaw
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://github.com/adegeo
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exe
unknown
https://atten-supporse.biz/l
unknown
https://atten-supporse.biz:443/apiicrosoft
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
atten-supporse.biz
https://github.com/js-cookie/js-cookie
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://atten-supporse.biz/apidnv
unknown
https://atten-supporse.biz/t
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
https://atten-supporse.biz/r
unknown
print-vexer.biz
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://atten-supporse.biz/apio%hX
unknown
https://github.com/dotnet/try
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.16.1
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
104.21.16.1
atten-supporse.biz
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
5819000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
11D6000
heap
page read and write
4E20000
direct allocation
page execute and read and write
2B9F000
stack
page read and write
61B0000
trusted library allocation
page read and write
620D000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
3D3E000
stack
page read and write
57F9000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
E59000
unkown
page execute and read and write
36FE000
stack
page read and write
6168000
trusted library allocation
page read and write
5887000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
1040000
unkown
page execute and read and write
11E3000
heap
page read and write
5803000
trusted library allocation
page read and write
117D000
heap
page read and write
1100000
heap
page read and write
5788000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
11D6000
heap
page read and write
6027000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
6103000
trusted library allocation
page read and write
578D000
trusted library allocation
page read and write
2BB7000
heap
page read and write
6027000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
60C7000
trusted library allocation
page read and write
117D000
heap
page read and write
6166000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
5888000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5792000
trusted library allocation
page read and write
579D000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
8480000
trusted library allocation
page read and write
6028000
trusted library allocation
page read and write
58AA000
trusted library allocation
page read and write
11D7000
heap
page read and write
6177000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
602F000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
6121000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
11CB000
heap
page read and write
584D000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
10D0000
direct allocation
page read and write
5AB9000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
57B5000
trusted library allocation
page read and write
10D0000
direct allocation
page read and write
57FF000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
6219000
trusted library allocation
page read and write
3E3F000
stack
page read and write
5784000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
60C2000
trusted library allocation
page read and write
602E000
trusted library allocation
page read and write
602D000
trusted library allocation
page read and write
5917000
trusted library allocation
page read and write
11D3000
heap
page read and write
6022000
trusted library allocation
page read and write
4841000
heap
page read and write
E98000
unkown
page execute and read and write
4841000
heap
page read and write
584D000
trusted library allocation
page read and write
11DA000
heap
page read and write
1184000
heap
page read and write
4841000
heap
page read and write
11DA000
heap
page read and write
584D000
trusted library allocation
page read and write
6199000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
6028000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
57C5000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
1162000
heap
page read and write
6155000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
5C22000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
5888000
trusted library allocation
page read and write
B90000
unkown
page readonly
8640000
direct allocation
page execute and read and write
57FC000
trusted library allocation
page read and write
6027000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
11D7000
heap
page read and write
57FC000
trusted library allocation
page read and write
11D6000
heap
page read and write
E99000
unkown
page execute and write copy
581A000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
2CFE000
stack
page read and write
9E0000
heap
page read and write
5805000
trusted library allocation
page read and write
4851000
heap
page read and write
6290000
trusted library allocation
page read and write
9D0000
heap
page read and write
6023000
trusted library allocation
page read and write
41FF000
stack
page read and write
BD2000
unkown
page execute and read and write
5630000
heap
page read and write
11D6000
heap
page read and write
580A000
trusted library allocation
page read and write
11CB000
heap
page read and write
60D1000
trusted library allocation
page read and write
6022000
trusted library allocation
page read and write
10D0000
direct allocation
page read and write
582C000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
6022000
trusted library allocation
page read and write
579C000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
6119000
trusted library allocation
page read and write
116A000
heap
page read and write
5821000
trusted library allocation
page read and write
60F4000
trusted library allocation
page read and write
6134000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5799000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
11DC000
heap
page read and write
11D6000
heap
page read and write
582D000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
57AA000
trusted library allocation
page read and write
1183000
heap
page read and write
383E000
stack
page read and write
5819000
trusted library allocation
page read and write
6022000
trusted library allocation
page read and write
58AF000
trusted library allocation
page read and write
4F5D000
stack
page read and write
108E000
stack
page read and write
57AD000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
11DE000
heap
page read and write
5784000
trusted library allocation
page read and write
B4E000
stack
page read and write
60D0000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
4D01000
direct allocation
page read and write
6029000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
2F3F000
stack
page read and write
620F000
trusted library allocation
page read and write
579D000
trusted library allocation
page read and write
6027000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
617D000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
613C000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
57CC000
trusted library allocation
page read and write
2DFF000
stack
page read and write
5B12000
trusted library allocation
page read and write
45BF000
stack
page read and write
6023000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
1169000
heap
page read and write
6021000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
602D000
trusted library allocation
page read and write
11CD000
heap
page read and write
397E000
stack
page read and write
5816000
trusted library allocation
page read and write
6175000
trusted library allocation
page read and write
5835000
trusted library allocation
page read and write
5BF1000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
32FF000
stack
page read and write
58B9000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
6021000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5784000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
117E000
heap
page read and write
584D000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
11C7000
heap
page read and write
8480000
direct allocation
page read and write
4CBD000
stack
page read and write
60C8000
trusted library allocation
page read and write
598E000
trusted library allocation
page read and write
11DF000
heap
page read and write
60E4000
trusted library allocation
page read and write
1183000
heap
page read and write
5803000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
60F2000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
6024000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
602D000
trusted library allocation
page read and write
11D6000
heap
page read and write
60CE000
trusted library allocation
page read and write
57AA000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
578A000
trusted library allocation
page read and write
6122000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
578D000
trusted library allocation
page read and write
6027000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
11E2000
heap
page read and write
4F9D000
stack
page read and write
602C000
trusted library allocation
page read and write
60CA000
trusted library allocation
page read and write
6024000
trusted library allocation
page read and write
60DF000
trusted library allocation
page read and write
4841000
heap
page read and write
584D000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
4841000
heap
page read and write
50DE000
stack
page read and write
11D3000
heap
page read and write
5798000
trusted library allocation
page read and write
4841000
heap
page read and write
6111000
trusted library allocation
page read and write
5888000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
5784000
trusted library allocation
page read and write
333E000
stack
page read and write
11D7000
heap
page read and write
60CF000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
62A8000
trusted library allocation
page read and write
624B000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
11DA000
heap
page read and write
584D000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
57FF000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
6023000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
58A2000
trusted library allocation
page read and write
BE3000
unkown
page write copy
6024000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
60CE000
trusted library allocation
page read and write
1182000
heap
page read and write
4841000
heap
page read and write
5809000
trusted library allocation
page read and write
1179000
heap
page read and write
578A000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
58A2000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
11DA000
heap
page read and write
8480000
direct allocation
page read and write
5821000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
3FBE000
stack
page read and write
584D000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
117C000
heap
page read and write
584D000
trusted library allocation
page read and write
11D6000
heap
page read and write
584D000
trusted library allocation
page read and write
611D000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
61BF000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
11D6000
heap
page read and write
35BE000
stack
page read and write
6028000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
8670000
direct allocation
page execute and read and write
623D000
trusted library allocation
page read and write
623F000
trusted library allocation
page read and write
117E000
heap
page read and write
61BD000
trusted library allocation
page read and write
117D000
heap
page read and write
11CD000
heap
page read and write
614D000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
117D000
heap
page read and write
5834000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
586A000
trusted library allocation
page read and write
618B000
trusted library allocation
page read and write
535E000
stack
page read and write
11D6000
heap
page read and write
84A0000
direct allocation
page read and write
580E000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
6189000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
11EA000
heap
page read and write
D74000
unkown
page execute and read and write
580E000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
10D0000
direct allocation
page read and write
6164000
trusted library allocation
page read and write
117E000
heap
page read and write
6130000
trusted library allocation
page read and write
347E000
stack
page read and write
60C5000
trusted library allocation
page read and write
60D8000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
3F7E000
stack
page read and write
5821000
trusted library allocation
page read and write
602C000
trusted library allocation
page read and write
6113000
trusted library allocation
page read and write
4E00000
remote allocation
page read and write
10D0000
direct allocation
page read and write
5A8A000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
6117000
trusted library allocation
page read and write
6105000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
10F0000
direct allocation
page read and write
602A000
trusted library allocation
page read and write
602C000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
1180000
heap
page read and write
584D000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
11EA000
heap
page read and write
6029000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
5825000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
8FB000
stack
page read and write
57FC000
trusted library allocation
page read and write
60D1000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
3A7F000
stack
page read and write
E89000
unkown
page execute and read and write
60F2000
trusted library allocation
page read and write
591D000
trusted library allocation
page read and write
578A000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
60FF000
trusted library allocation
page read and write
6027000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
11DB000
heap
page read and write
57AA000
trusted library allocation
page read and write
114E000
heap
page read and write
117D000
heap
page read and write
5805000
trusted library allocation
page read and write
4E00000
remote allocation
page read and write
11DA000
heap
page read and write
602A000
trusted library allocation
page read and write
4841000
heap
page read and write
580E000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
6109000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
5AD9000
trusted library allocation
page read and write
11CE000
heap
page read and write
54CE000
stack
page read and write
61F1000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
11CB000
heap
page read and write
5785000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
A05000
heap
page read and write
6026000
trusted library allocation
page read and write
E81000
unkown
page execute and read and write
612E000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
6028000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
6162000
trusted library allocation
page read and write
2CBF000
stack
page read and write
613A000
trusted library allocation
page read and write
37FF000
stack
page read and write
10D0000
direct allocation
page read and write
5791000
trusted library allocation
page read and write
10D0000
direct allocation
page read and write
628E000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
578C000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
6022000
trusted library allocation
page read and write
6023000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
6179000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
6027000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5AFE000
stack
page read and write
6029000
trusted library allocation
page read and write
1041000
unkown
page execute and write copy
4E00000
direct allocation
page execute and read and write
617B000
trusted library allocation
page read and write
E98000
unkown
page execute and write copy
602F000
trusted library allocation
page read and write
614C000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
5A83000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
11D6000
heap
page read and write
582C000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
6024000
trusted library allocation
page read and write
60D3000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
1138000
heap
page read and write
44BE000
stack
page read and write
578B000
trusted library allocation
page read and write
509D000
stack
page read and write
1180000
heap
page read and write
614E000
trusted library allocation
page read and write
BE3000
unkown
page write copy
582C000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
57DB000
trusted library allocation
page read and write
473E000
stack
page read and write
5A0A000
trusted library allocation
page read and write
11DC000
heap
page read and write
58B1000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
5AA1000
trusted library allocation
page read and write
11D6000
heap
page read and write
1169000
heap
page read and write
582D000
trusted library allocation
page read and write
10D0000
direct allocation
page read and write
5808000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
30BE000
stack
page read and write
2BB0000
heap
page read and write
58B9000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
4841000
heap
page read and write
582C000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
10D0000
direct allocation
page read and write
B8E000
stack
page read and write
57A3000
trusted library allocation
page read and write
57CE000
trusted library allocation
page read and write
393F000
stack
page read and write
84A0000
direct allocation
page read and write
588A000
trusted library allocation
page read and write
46FF000
stack
page read and write
584D000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
11CD000
heap
page read and write
3BBF000
stack
page read and write
5881000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
613B000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
2E3E000
stack
page read and write
5881000
trusted library allocation
page read and write
10CC000
stack
page read and write
110A000
heap
page read and write
59ED000
trusted library allocation
page read and write
11D7000
heap
page read and write
614F000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
5798000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
5AB9000
stack
page read and write
5786000
trusted library allocation
page read and write
4841000
heap
page read and write
577E000
stack
page read and write
117D000
heap
page read and write
580B000
trusted library allocation
page read and write
110E000
heap
page read and write
5B61000
trusted library allocation
page read and write
6108000
trusted library allocation
page read and write
40BF000
stack
page read and write
307F000
stack
page read and write
597C000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
602C000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
51DF000
stack
page read and write
8480000
direct allocation
page read and write
57F9000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
6124000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
11D3000
heap
page read and write
5808000
trusted library allocation
page read and write
6279000
trusted library allocation
page read and write
6136000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
433F000
stack
page read and write
45FE000
stack
page read and write
57AA000
trusted library allocation
page read and write
117D000
heap
page read and write
5784000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
6102000
trusted library allocation
page read and write
A00000
heap
page read and write
5821000
trusted library allocation
page read and write
10D0000
direct allocation
page read and write
6139000
trusted library allocation
page read and write
3BFE000
stack
page read and write
57FC000
trusted library allocation
page read and write
1180000
heap
page read and write
580C000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
6021000
trusted library allocation
page read and write
2BA0000
direct allocation
page execute and read and write
5803000
trusted library allocation
page read and write
6025000
trusted library allocation
page read and write
55CF000
stack
page read and write
57A2000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
6162000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
5A8D000
trusted library allocation
page read and write
11CB000
heap
page read and write
10F0000
direct allocation
page read and write
5803000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
617F000
trusted library allocation
page read and write
11CD000
heap
page read and write
11BF000
heap
page read and write
5B51000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
6157000
trusted library allocation
page read and write
BE5000
unkown
page execute and read and write
57FC000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
11D6000
heap
page read and write
357F000
stack
page read and write
11DA000
heap
page read and write
583D000
trusted library allocation
page read and write
5798000
trusted library allocation
page read and write
11D6000
heap
page read and write
3E7E000
stack
page read and write
5899000
trusted library allocation
page read and write
57AD000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
5887000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
521E000
stack
page read and write
1175000
heap
page read and write
6104000
trusted library allocation
page read and write
6132000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
11D6000
heap
page read and write
10D0000
direct allocation
page read and write
36BF000
stack
page read and write
4850000
heap
page read and write
4CFB000
stack
page read and write
4E69000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
4841000
heap
page read and write
57D9000
trusted library allocation
page read and write
6249000
trusted library allocation
page read and write
602F000
trusted library allocation
page read and write
578C000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
11D6000
heap
page read and write
581B000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
6028000
trusted library allocation
page read and write
11DF000
heap
page read and write
602E000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
567E000
stack
page read and write
580E000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
60D6000
trusted library allocation
page read and write
11CB000
heap
page read and write
40FE000
stack
page read and write
6119000
trusted library allocation
page read and write
4841000
heap
page read and write
5803000
trusted library allocation
page read and write
5633000
heap
page read and write
57C2000
trusted library allocation
page read and write
6028000
trusted library allocation
page read and write
5A0000
heap
page read and write
11CD000
heap
page read and write
11D6000
heap
page read and write
57BB000
trusted library allocation
page read and write
4840000
heap
page read and write
B91000
unkown
page execute and write copy
584D000
trusted library allocation
page read and write
11BF000
heap
page read and write
5784000
trusted library allocation
page read and write
627B000
trusted library allocation
page read and write
58A7000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
11D6000
heap
page read and write
10D0000
direct allocation
page read and write
5811000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
581A000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
1180000
heap
page read and write
11DF000
heap
page read and write
8480000
direct allocation
page read and write
57BA000
trusted library allocation
page read and write
6492000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
6162000
trusted library allocation
page read and write
11DF000
heap
page read and write
57B2000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
11BF000
heap
page read and write
6159000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
1160000
heap
page read and write
592B000
trusted library allocation
page read and write
B91000
unkown
page execute and read and write
621B000
trusted library allocation
page read and write
4841000
heap
page read and write
5A85000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
84A0000
direct allocation
page read and write
584D000
trusted library allocation
page read and write
4841000
heap
page read and write
1178000
heap
page read and write
57DB000
trusted library allocation
page read and write
58A2000
trusted library allocation
page read and write
31FE000
stack
page read and write
4E10000
direct allocation
page execute and read and write
6024000
trusted library allocation
page read and write
483F000
stack
page read and write
57FC000
trusted library allocation
page read and write
589F000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
6106000
trusted library allocation
page read and write
437E000
stack
page read and write
6024000
trusted library allocation
page read and write
11D6000
heap
page read and write
423E000
stack
page read and write
586A000
trusted library allocation
page read and write
1183000
heap
page read and write
60DD000
trusted library allocation
page read and write
4CC0000
direct allocation
page read and write
57BA000
trusted library allocation
page read and write
A4D000
stack
page read and write
5B29000
trusted library allocation
page read and write
602C000
trusted library allocation
page read and write
58AF000
trusted library allocation
page read and write
57BB000
trusted library allocation
page read and write
6023000
trusted library allocation
page read and write
1169000
heap
page read and write
57FC000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
61CD000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
545F000
stack
page read and write
5811000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
6028000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
612C000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
31BF000
stack
page read and write
61CB000
trusted library allocation
page read and write
12FE000
stack
page read and write
6101000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
3CFF000
stack
page read and write
4841000
heap
page read and write
B90000
unkown
page read and write
5888000
trusted library allocation
page read and write
578C000
trusted library allocation
page read and write
5792000
trusted library allocation
page read and write
447F000
stack
page read and write
1169000
heap
page read and write
5B0000
heap
page read and write
4841000
heap
page read and write
10D0000
direct allocation
page read and write
584D000
trusted library allocation
page read and write
4841000
heap
page read and write
60CC000
trusted library allocation
page read and write
11E3000
heap
page read and write
8480000
direct allocation
page read and write
6023000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
4841000
heap
page read and write
5816000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
6107000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
3ABE000
stack
page read and write
53B000
stack
page read and write
580C000
trusted library allocation
page read and write
11E2000
heap
page read and write
11DC000
heap
page read and write
5808000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
4841000
heap
page read and write
583D000
trusted library allocation
page read and write
4E00000
remote allocation
page read and write
4841000
heap
page read and write
6027000
trusted library allocation
page read and write
6166000
trusted library allocation
page read and write
5834000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
4841000
heap
page read and write
531F000
stack
page read and write
11DE000
heap
page read and write
578D000
trusted library allocation
page read and write
62AA000
trusted library allocation
page read and write
343F000
stack
page read and write
581E000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
602D000
trusted library allocation
page read and write
4DFF000
stack
page read and write
59B4000
trusted library allocation
page read and write
61AE000
trusted library allocation
page read and write
6024000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
11BC000
heap
page read and write
2F7E000
stack
page read and write
611B000
trusted library allocation
page read and write
11CD000
heap
page read and write
8480000
direct allocation
page read and write
10D0000
direct allocation
page read and write
6031000
trusted library allocation
page read and write
6164000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
602F000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
There are 814 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0