IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 101
ASCII text
dropped
Chrome Cache Entry: 102
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 103
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 105
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 106
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 109
JSON data
downloaded
Chrome Cache Entry: 110
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 72
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 74
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 75
JSON data
dropped
Chrome Cache Entry: 76
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 80
JSON data
downloaded
Chrome Cache Entry: 81
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 85
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 86
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 87
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 92
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 96
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 97
JSON data
downloaded
Chrome Cache Entry: 98
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 99
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1912,i,17050092175459860122,8061209407353569252,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1968,i,12435437372849550956,943092038503640388,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://duckduckgo.com/ac/?q=
unknown
https://atten-supporse.biz/B
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://atten-supporse.biz/J
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://atten-supporse.biz/Q
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
dwell-exclaim.biz
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
formy-spill.biz
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
se-blurry.biz
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.mozilla.or
unknown
https://atten-supporse.biz/;
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
covery-mover.biz
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.112.1
https://github.com/mairaw
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
atten-supporse.biz
https://atten-supporse.biz:443/api
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/q
unknown
https://atten-supporse.biz/
unknown
print-vexer.biz
https://channel9.msdn.com/
unknown
http://crl.microx
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://atten-supporse.biz/y
unknown
https://atten-supporse.biz/z
unknown
There are 69 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.112.1
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
104.21.112.1
atten-supporse.biz
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
391000
unkown
page execute and read and write
malicious
FBC000
heap
page read and write
56EA000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
F43000
heap
page read and write
6350000
trusted library allocation
page execute and read and write
57A4000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
5876000
trusted library allocation
page read and write
FBC000
heap
page read and write
56B6000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
E8F000
stack
page read and write
F97000
heap
page read and write
390000
unkown
page read and write
76BE000
stack
page read and write
8090000
direct allocation
page read and write
46D0000
direct allocation
page read and write
56DE000
trusted library allocation
page read and write
F44000
heap
page read and write
56DC000
trusted library allocation
page read and write
F76000
heap
page read and write
5D01000
trusted library allocation
page read and write
3D2000
unkown
page execute and read and write
434E000
stack
page read and write
575C000
trusted library allocation
page read and write
56F4000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
F46000
heap
page read and write
56E1000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
5DDE000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
4B70000
direct allocation
page read and write
5749000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
5C45000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
5D7D000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
3E4E000
stack
page read and write
56A8000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
391000
unkown
page execute and write copy
56DC000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
ECA000
heap
page read and write
FB6000
heap
page read and write
3B8F000
stack
page read and write
56A1000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
40CE000
stack
page read and write
46E1000
heap
page read and write
7DFF000
stack
page read and write
46E1000
heap
page read and write
57DE000
trusted library allocation
page read and write
4CAF000
stack
page read and write
56DC000
trusted library allocation
page read and write
F96000
heap
page read and write
56B9000
trusted library allocation
page read and write
5D75000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
5CF6000
trusted library allocation
page read and write
F8C000
heap
page read and write
56ED000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
807F000
stack
page read and write
FB6000
heap
page read and write
573D000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
68D000
unkown
page execute and write copy
56AE000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
6DFE000
stack
page read and write
56C1000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
F97000
heap
page read and write
56AC000
trusted library allocation
page read and write
340F000
stack
page read and write
8090000
direct allocation
page read and write
56C0000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
5CAC000
trusted library allocation
page read and write
F92000
heap
page read and write
46E1000
heap
page read and write
743E000
stack
page read and write
56C2000
trusted library allocation
page read and write
5E43000
trusted library allocation
page read and write
F99000
heap
page read and write
8160000
heap
page read and write
56F9000
trusted library allocation
page read and write
9CA000
stack
page read and write
5C48000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
6DBF000
stack
page read and write
F97000
heap
page read and write
7CFE000
stack
page read and write
56EA000
trusted library allocation
page read and write
F43000
heap
page read and write
56CC000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
56C1000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
5F0D000
trusted library allocation
page read and write
394E000
stack
page read and write
5C40000
trusted library allocation
page read and write
37CF000
stack
page read and write
573E000
trusted library allocation
page read and write
FB5000
heap
page read and write
5706000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
8452000
trusted library allocation
page read and write
56D4000
trusted library allocation
page read and write
703F000
stack
page read and write
46D0000
direct allocation
page read and write
5733000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
56BB000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
7A7E000
stack
page read and write
56CB000
trusted library allocation
page read and write
51C0000
remote allocation
page read and write
56CF000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
569F000
stack
page read and write
FB9000
heap
page read and write
69FF000
stack
page read and write
ECE000
heap
page read and write
41CF000
stack
page read and write
FB5000
heap
page read and write
F99000
heap
page read and write
56CC000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
56B8000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
380E000
stack
page read and write
5C46000
trusted library allocation
page read and write
F37000
heap
page read and write
46E1000
heap
page read and write
56D0000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
5D13000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
3F8E000
stack
page read and write
78FF000
stack
page read and write
56DC000
trusted library allocation
page read and write
F8B000
heap
page read and write
5E87000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
3D0E000
stack
page read and write
56CB000
trusted library allocation
page read and write
7B7F000
stack
page read and write
5C47000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
FA1000
heap
page read and write
56CC000
trusted library allocation
page read and write
10FE000
stack
page read and write
5719000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
EC0000
heap
page read and write
56C9000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
D30000
heap
page read and write
56B1000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
68FE000
stack
page read and write
5D02000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
56EA000
trusted library allocation
page read and write
36CE000
stack
page read and write
56C4000
trusted library allocation
page read and write
87CC000
stack
page read and write
5C47000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
7A3F000
stack
page read and write
56E5000
trusted library allocation
page read and write
46CF000
stack
page read and write
F9F000
heap
page read and write
56CC000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
344E000
stack
page read and write
5820000
direct allocation
page read and write
56BC000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
7CBF000
stack
page read and write
57A9000
trusted library allocation
page read and write
5D39000
stack
page read and write
880E000
stack
page read and write
5719000
trusted library allocation
page read and write
368F000
stack
page read and write
56CF000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
3A4F000
stack
page read and write
56E7000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
46E1000
heap
page read and write
46E1000
heap
page read and write
4D20000
direct allocation
page execute and read and write
5C49000
trusted library allocation
page read and write
5CD9000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
61C6000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
EF7000
heap
page read and write
5D3B000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
6B3F000
stack
page read and write
6474000
trusted library allocation
page execute and read and write
56CC000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
677F000
stack
page read and write
67BE000
stack
page read and write
5C46000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
F92000
heap
page read and write
56C1000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
FA4000
heap
page read and write
3F4F000
stack
page read and write
6F3E000
stack
page read and write
46E1000
heap
page read and write
56CB000
trusted library allocation
page read and write
46F0000
heap
page read and write
5D33000
trusted library allocation
page read and write
FB6000
heap
page read and write
56A8000
trusted library allocation
page read and write
56A6000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
61CA000
trusted library allocation
page execute and read and write
56CC000
trusted library allocation
page read and write
46E1000
heap
page read and write
5D4B000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
46E1000
heap
page read and write
D10000
heap
page read and write
5EAD000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
F2E000
heap
page read and write
5D31000
trusted library allocation
page read and write
841E000
stack
page read and write
56E1000
trusted library allocation
page read and write
61BD000
trusted library allocation
page read and write
FA2000
heap
page read and write
F92000
heap
page read and write
56ED000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
FBA000
heap
page read and write
56ED000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
80F0000
direct allocation
page read and write
46E1000
heap
page read and write
5EB1000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
6A3E000
stack
page read and write
56CB000
trusted library allocation
page read and write
4D32000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
5D0F000
trusted library allocation
page read and write
FA4000
heap
page read and write
420E000
stack
page read and write
5D35000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
2CCE000
stack
page read and write
570D000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
2E0E000
stack
page read and write
46E1000
heap
page read and write
2B4F000
stack
page read and write
5C43000
trusted library allocation
page read and write
46E1000
heap
page read and write
571E000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
677000
unkown
page execute and read and write
56DC000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
5CDB000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
6464000
trusted library allocation
page execute and read and write
56D8000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
32CF000
stack
page read and write
56BA000
trusted library allocation
page read and write
7F3F000
stack
page read and write
8090000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
573E000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
573E000
trusted library allocation
page read and write
56AF000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
FBA000
heap
page read and write
56AE000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
FB9000
heap
page read and write
73FF000
stack
page read and write
56ED000
trusted library allocation
page read and write
31CE000
stack
page read and write
FA0000
heap
page read and write
5C41000
trusted library allocation
page read and write
4F2D000
stack
page read and write
56AE000
trusted library allocation
page read and write
4B5D000
stack
page read and write
56DE000
trusted library allocation
page read and write
46E1000
heap
page read and write
4B70000
direct allocation
page read and write
594D000
trusted library allocation
page read and write
4BAB000
stack
page read and write
5C44000
trusted library allocation
page read and write
FA4000
heap
page read and write
56F6000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
5D11000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
F92000
heap
page read and write
46E1000
heap
page read and write
5D0A000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
86CC000
stack
page read and write
5C44000
trusted library allocation
page read and write
FAE000
heap
page read and write
56B2000
trusted library allocation
page read and write
3E3000
unkown
page write copy
5D33000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
FBC000
heap
page read and write
68BF000
stack
page read and write
56B5000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
56BA000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
2B8E000
stack
page read and write
5D72000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
7F7E000
stack
page read and write
571A000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
5D49000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
753F000
stack
page read and write
390F000
stack
page read and write
F0E000
heap
page read and write
80F0000
direct allocation
page read and write
57FE000
stack
page read and write
56D8000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
536E000
stack
page read and write
5D0A000
trusted library allocation
page read and write
50AE000
stack
page read and write
D8D000
stack
page read and write
5714000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
67E000
unkown
page execute and read and write
56ED000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
61AB000
trusted library allocation
page read and write
28A0000
heap
page read and write
56DC000
trusted library allocation
page read and write
FA1000
heap
page read and write
28C0000
heap
page read and write
5C4E000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
812C000
stack
page read and write
56C1000
trusted library allocation
page read and write
8280000
direct allocation
page execute and read and write
5C43000
trusted library allocation
page read and write
308E000
stack
page read and write
8140000
direct allocation
page execute and read and write
5C4B000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
56E000
unkown
page execute and read and write
5D14000
trusted library allocation
page read and write
767F000
stack
page read and write
56D2000
trusted library allocation
page read and write
578B000
trusted library allocation
page read and write
2A4C000
stack
page read and write
82F000
unkown
page execute and write copy
56CB000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
8090000
direct allocation
page read and write
56C1000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
522E000
stack
page read and write
56A5000
trusted library allocation
page read and write
28C7000
heap
page read and write
56FC000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
56EE000
trusted library allocation
page read and write
5EBE000
stack
page read and write
56BC000
trusted library allocation
page read and write
46E1000
heap
page read and write
68D000
unkown
page execute and read and write
572D000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
506E000
stack
page read and write
5A40000
trusted library allocation
page read and write
F76000
heap
page read and write
46D0000
direct allocation
page read and write
657F000
stack
page read and write
5D64000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
FB5000
heap
page read and write
56E5000
trusted library allocation
page read and write
6C7F000
stack
page read and write
304F000
stack
page read and write
5590000
heap
page read and write
57AB000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
51AF000
stack
page read and write
71BE000
stack
page read and write
5F0F000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
5DBE000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
FA9000
heap
page read and write
5730000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
56FF000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
46E1000
heap
page read and write
56ED000
trusted library allocation
page read and write
F43000
heap
page read and write
8090000
direct allocation
page read and write
5D7A000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
757E000
stack
page read and write
5E76000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
FBB000
heap
page read and write
72BF000
stack
page read and write
FA1000
heap
page read and write
5D39000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
56A2000
trusted library allocation
page read and write
554E000
stack
page read and write
5719000
trusted library allocation
page read and write
793E000
stack
page read and write
845A000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
46E1000
heap
page read and write
573E000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
F76000
heap
page read and write
57A3000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
4CFE000
stack
page read and write
8090000
direct allocation
page read and write
4F6E000
stack
page read and write
2DCF000
stack
page read and write
56A6000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
FBC000
heap
page read and write
707E000
stack
page read and write
56D3000
trusted library allocation
page read and write
5D86000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5835000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
5E7C000
stack
page read and write
56BB000
trusted library allocation
page read and write
5EC1000
trusted library allocation
page read and write
46E0000
heap
page read and write
56E6000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
F95000
heap
page read and write
61C0000
trusted library allocation
page read and write
4B20000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
5C45000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
FA5000
heap
page read and write
5589000
stack
page read and write
F92000
heap
page read and write
F9A000
heap
page read and write
5719000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
56A8000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
5D77000
trusted library allocation
page read and write
3E0F000
stack
page read and write
8090000
direct allocation
page read and write
573E000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
56D3000
trusted library allocation
page read and write
72FE000
stack
page read and write
5916000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
717F000
stack
page read and write
56D1000
trusted library allocation
page read and write
C30000
heap
page read and write
56ED000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
56C2000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
51C0000
remote allocation
page read and write
5705000
trusted library allocation
page read and write
56D3000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
4BB1000
direct allocation
page read and write
F25000
heap
page read and write
8458000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
D35000
heap
page read and write
5DEF000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
5EBF000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
56FA000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
5EFE000
stack
page read and write
5EAF000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
5D2D000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
7BBE000
stack
page read and write
5D5A000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
8440000
heap
page read and write
F76000
heap
page read and write
56A9000
trusted library allocation
page read and write
46E1000
heap
page read and write
5704000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
6CBE000
stack
page read and write
448E000
stack
page read and write
56A5000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
FBD000
heap
page read and write
5C4A000
trusted library allocation
page read and write
FFE000
stack
page read and write
56B2000
trusted library allocation
page read and write
FB9000
heap
page read and write
5CF7000
trusted library allocation
page read and write
667F000
stack
page read and write
46E1000
heap
page read and write
5D49000
trusted library allocation
page read and write
F2E000
heap
page read and write
56BA000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
FBC000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
F92000
heap
page read and write
5DEC000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
FBB000
heap
page read and write
354F000
stack
page read and write
56FB000
trusted library allocation
page read and write
FA6000
heap
page read and write
56A1000
trusted library allocation
page read and write
46E1000
heap
page read and write
5704000
trusted library allocation
page read and write
5726000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
5DEE000
trusted library allocation
page read and write
8CB000
stack
page read and write
5D2B000
trusted library allocation
page read and write
FBB000
heap
page read and write
56A9000
trusted library allocation
page read and write
6476000
trusted library allocation
page execute and read and write
5C4F000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
3A8E000
stack
page read and write
6096000
trusted library allocation
page read and write
5E38000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
532F000
stack
page read and write
57AE000
trusted library allocation
page read and write
652000
unkown
page execute and read and write
572D000
trusted library allocation
page read and write
430F000
stack
page read and write
56AE000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
FBB000
heap
page read and write
5D4E000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
358E000
stack
page read and write
5D16000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
56DE000
trusted library allocation
page read and write
330E000
stack
page read and write
3CCF000
stack
page read and write
F76000
heap
page read and write
6EFF000
stack
page read and write
FBA000
heap
page read and write
F81000
heap
page read and write
5E41000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
56F4000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
8090000
direct allocation
page read and write
56ED000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
573E000
trusted library allocation
page read and write
FA7000
heap
page read and write
56ED000
trusted library allocation
page read and write
3E5000
unkown
page execute and read and write
5C46000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
56A8000
trusted library allocation
page read and write
FA9000
heap
page read and write
5D36000
trusted library allocation
page read and write
5E3F000
stack
page read and write
61C2000
trusted library allocation
page execute and read and write
5733000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
FBA000
heap
page read and write
56C1000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
FA9000
heap
page read and write
56B5000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
5CFF000
trusted library allocation
page read and write
57AD000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
7E3E000
stack
page read and write
F99000
heap
page read and write
5D72000
trusted library allocation
page read and write
77FE000
stack
page read and write
F22000
heap
page read and write
56CF000
trusted library allocation
page read and write
890E000
stack
page read and write
5C46000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
56CB000
trusted library allocation
page read and write
5CE3000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
51C0000
remote allocation
page read and write
56ED000
trusted library allocation
page read and write
5593000
heap
page read and write
F99000
heap
page read and write
56B4000
trusted library allocation
page read and write
5D0F000
trusted library allocation
page read and write
4E2C000
stack
page read and write
3E3000
unkown
page write copy
572D000
trusted library allocation
page read and write
FBB000
heap
page read and write
5D0C000
trusted library allocation
page read and write
2A0F000
stack
page read and write
61B9000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
F96000
heap
page read and write
FB9000
heap
page read and write
56B8000
trusted library allocation
page read and write
9CAF000
stack
page read and write
FA9000
heap
page read and write
56B2000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
56AA000
trusted library allocation
page read and write
EB0000
heap
page read and write
575D000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
F92000
heap
page read and write
318F000
stack
page read and write
3BCE000
stack
page read and write
5719000
trusted library allocation
page read and write
F95000
heap
page read and write
FA1000
heap
page read and write
56AF000
trusted library allocation
page read and write
5757000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
2F4E000
stack
page read and write
56A0000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
54DE000
stack
page read and write
FA4000
heap
page read and write
390000
unkown
page readonly
77BF000
stack
page read and write
F9A000
heap
page read and write
56AC000
trusted library allocation
page read and write
408F000
stack
page read and write
5706000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
6B7E000
stack
page read and write
5E36000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
45CE000
stack
page read and write
F99000
heap
page read and write
2C8F000
stack
page read and write
8090000
direct allocation
page read and write
56F6000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
56B4000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
68E000
unkown
page execute and write copy
46D0000
direct allocation
page read and write
2F0F000
stack
page read and write
5C43000
trusted library allocation
page read and write
5E89000
trusted library allocation
page read and write
546E000
stack
page read and write
4B70000
direct allocation
page read and write
56F9000
trusted library allocation
page read and write
FBB000
heap
page read and write
56B7000
trusted library allocation
page read and write
444F000
stack
page read and write
5D08000
trusted library allocation
page read and write
56ED000
trusted library allocation
page read and write
57C6000
trusted library allocation
page read and write
FA1000
heap
page read and write
826F000
stack
page read and write
5C47000
trusted library allocation
page read and write
82E000
unkown
page execute and read and write
56B7000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
FBC000
heap
page read and write
56BA000
trusted library allocation
page read and write
458F000
stack
page read and write
46E1000
heap
page read and write
57A2000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
5D2F000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
5A3F000
stack
page read and write
5D11000
trusted library allocation
page read and write
46D0000
direct allocation
page read and write
5D58000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
5E1B000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
FA7000
heap
page read and write
5C40000
trusted library allocation
page read and write
290E000
stack
page read and write
FB6000
heap
page read and write
80F0000
direct allocation
page read and write
There are 836 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0