IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 101
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 102
JSON data
dropped
Chrome Cache Entry: 103
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 104
JSON data
downloaded
Chrome Cache Entry: 105
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 69
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 71
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 72
JSON data
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 75
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 76
JSON data
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 78
JSON data
downloaded
Chrome Cache Entry: 79
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 81
ASCII text
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 83
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 87
JSON data
dropped
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 89
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 91
JSON data
downloaded
Chrome Cache Entry: 92
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
JSON data
downloaded
Chrome Cache Entry: 94
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 95
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 96
ASCII text
dropped
Chrome Cache Entry: 97
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 98
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (33148), with no line terminators
downloaded
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1916,i,1287654970835858718,17769345937840610954,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1900,i,13827317004684261514,15801404464628299724,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
172.67.162.84
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://property-imper.sbs/&
unknown
http://185.215.113.16/off/def.exe~
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.microsof
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 62 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
172.67.162.84
property-imper.sbs
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
43F1000
heap
page read and write
538A000
trusted library allocation
page read and write
580F000
trusted library allocation
page read and write
7E1000
heap
page read and write
53DC000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
594000
heap
page read and write
53AC000
trusted library allocation
page read and write
7FC000
heap
page read and write
5385000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
5413000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
594000
heap
page read and write
5384000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
580C000
trusted library allocation
page read and write
58E9000
trusted library allocation
page read and write
580F000
trusted library allocation
page read and write
59DC000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
580C000
trusted library allocation
page read and write
48B4000
direct allocation
page read and write
59AF000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
598E000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
7FF000
heap
page read and write
5808000
trusted library allocation
page read and write
7E3000
heap
page read and write
5ACD000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
590A000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
43F1000
heap
page read and write
4EF0000
remote allocation
page read and write
43F1000
heap
page read and write
5393000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
58A3000
trusted library allocation
page read and write
43F1000
heap
page read and write
7F2000
heap
page read and write
53E1000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
58CA000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
B60000
direct allocation
page read and write
537B000
trusted library allocation
page read and write
589A000
trusted library allocation
page read and write
5383000
trusted library allocation
page read and write
594E000
trusted library allocation
page read and write
58B3000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
806000
heap
page read and write
5365000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
594D000
trusted library allocation
page read and write
7E9000
heap
page read and write
538A000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
43F1000
heap
page read and write
580F000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
594000
heap
page read and write
5922000
trusted library allocation
page read and write
43F1000
heap
page read and write
580A000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
43F1000
heap
page read and write
58CD000
trusted library allocation
page read and write
5902000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
594000
heap
page read and write
5A2E000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
53BC000
trusted library allocation
page read and write
560D000
trusted library allocation
page read and write
594000
heap
page read and write
53AD000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
580C000
trusted library allocation
page read and write
BC7000
unkown
page write copy
594000
heap
page read and write
53FA000
trusted library allocation
page read and write
53FA000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
58AE000
trusted library allocation
page read and write
5602000
trusted library allocation
page read and write
43F1000
heap
page read and write
43F1000
heap
page read and write
58C3000
trusted library allocation
page read and write
7F2000
heap
page read and write
58CF000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
594000
heap
page read and write
5806000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
537C000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
5898000
trusted library allocation
page read and write
53F7000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
43F1000
heap
page read and write
597C000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
7F1000
heap
page read and write
53A1000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
7FF000
heap
page read and write
580D000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
5807000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
B70000
unkown
page readonly
58C5000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
700000
direct allocation
page read and write
5537000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
594000
heap
page read and write
5395000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
5959000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
58D3000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
7F1000
heap
page read and write
700000
direct allocation
page read and write
7E9000
heap
page read and write
5803000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
7E9000
heap
page read and write
5362000
trusted library allocation
page read and write
7FC000
heap
page read and write
5959000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
4EF0000
remote allocation
page read and write
5386000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
7F1000
heap
page read and write
5375000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
7DF000
heap
page read and write
53AA000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
595B000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
594000
heap
page read and write
593C000
trusted library allocation
page read and write
43F1000
heap
page read and write
5969000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
594000
heap
page read and write
594000
heap
page read and write
5497000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
7F3000
heap
page read and write
58EB000
trusted library allocation
page read and write
7E7000
heap
page read and write
538B000
trusted library allocation
page read and write
7F1000
heap
page read and write
5413000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
49F0000
direct allocation
page execute and read and write
595A000
trusted library allocation
page read and write
7E7000
heap
page read and write
537B000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
53A1000
trusted library allocation
page read and write
536C000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
5969000
trusted library allocation
page read and write
43F1000
heap
page read and write
537A000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
595C000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
58C5000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
7F1000
heap
page read and write
53C7000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
7F1000
heap
page read and write
5804000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
5A5C000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
552F000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
806000
heap
page read and write
58A7000
trusted library allocation
page read and write
58AC000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
43F1000
heap
page read and write
53B3000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
805000
heap
page read and write
594000
heap
page read and write
5962000
trusted library allocation
page read and write
58EC000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
49D0000
direct allocation
page execute and read and write
5923000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
7E3000
heap
page read and write
53C1000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
5383000
trusted library allocation
page read and write
53D8000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
7DF000
heap
page read and write
5393000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
5A1E000
trusted library allocation
page read and write
7F8000
heap
page read and write
5370000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
43F1000
heap
page read and write
53AA000
trusted library allocation
page read and write
580C000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5902000
trusted library allocation
page read and write
58A5000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
700000
direct allocation
page read and write
43F1000
heap
page read and write
7F1000
heap
page read and write
538A000
trusted library allocation
page read and write
700000
direct allocation
page read and write
5393000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
7DF000
heap
page read and write
5383000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
58F3000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
700000
direct allocation
page read and write
592D000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
7FB000
heap
page read and write
5905000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
58C3000
trusted library allocation
page read and write
7FE000
heap
page read and write
B71000
unkown
page execute and write copy
53BA000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
594000
heap
page read and write
58A9000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
596B000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
5800000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
5ACF000
trusted library allocation
page read and write
59CD000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
7FB000
heap
page read and write
5943000
trusted library allocation
page read and write
700000
direct allocation
page read and write
58D4000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5393000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
B60000
direct allocation
page read and write
700000
direct allocation
page read and write
58B3000
trusted library allocation
page read and write
58EA000
trusted library allocation
page read and write
58D1000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
5E75000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
594000
heap
page read and write
594000
heap
page read and write
599B000
trusted library allocation
page read and write
5975000
trusted library allocation
page read and write
4EF0000
remote allocation
page read and write
700000
direct allocation
page read and write
5362000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
5379000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
7F1000
heap
page read and write
43F1000
heap
page read and write
59EC000
trusted library allocation
page read and write
539E000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
7F5000
heap
page read and write
5394000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
7E0000
heap
page read and write
5802000
trusted library allocation
page read and write
7F7000
heap
page read and write
58F1000
trusted library allocation
page read and write
594000
heap
page read and write
5802000
trusted library allocation
page read and write
595B000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
580C000
trusted library allocation
page read and write
5361000
trusted library allocation
page read and write
537C000
trusted library allocation
page read and write
598C000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
538E000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
7E9000
heap
page read and write
5399000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
58D2000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
43F1000
heap
page read and write
5929000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
594000
heap
page read and write
546E000
trusted library allocation
page read and write
E6D000
unkown
page execute and write copy
53A1000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
5807000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
800000
heap
page read and write
4830000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
7C4000
heap
page read and write
5927000
trusted library allocation
page read and write
700000
direct allocation
page read and write
546C000
trusted library allocation
page read and write
5924000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
58C3000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
590A000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
7F1000
heap
page read and write
5399000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
590C000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
5807000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
700000
direct allocation
page read and write
5384000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
58EF000
trusted library allocation
page read and write
5897000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
700000
direct allocation
page read and write
7FF000
heap
page read and write
7E6000
heap
page read and write
5800000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
539B000
trusted library allocation
page read and write
700000
direct allocation
page read and write
5383000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
597C000
trusted library allocation
page read and write
553F000
trusted library allocation
page read and write
7F4000
heap
page read and write
5398000
trusted library allocation
page read and write
5A13000
trusted library allocation
page read and write
538A000
trusted library allocation
page read and write
58C5000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
7FF000
heap
page read and write
5917000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
700000
direct allocation
page read and write
580B000
trusted library allocation
page read and write
7D0000
heap
page read and write
58F1000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
594000
heap
page read and write
547F000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
58E4000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5967000
trusted library allocation
page read and write
7DF000
heap
page read and write
53FA000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
59B1000
trusted library allocation
page read and write
594000
heap
page read and write
5A7A000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
5807000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
5507000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
5977000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
580C000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
43F1000
heap
page read and write
53C2000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
5361000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
43F1000
heap
page read and write
5392000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
5804000
trusted library allocation
page read and write
5919000
trusted library allocation
page read and write
593C000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
7F2000
heap
page read and write
594000
heap
page read and write
5804000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
700000
direct allocation
page read and write
5964000
trusted library allocation
page read and write
There are 596 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0