IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
ASCII text
dropped
Chrome Cache Entry: 101
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 102
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 104
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 105
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 106
JSON data
dropped
Chrome Cache Entry: 107
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 108
JSON data
downloaded
Chrome Cache Entry: 109
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 71
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 72
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 73
JSON data
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 76
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 80
JSON data
downloaded
Chrome Cache Entry: 81
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 83
ASCII text
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 85
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 86
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 87
JSON data
dropped
Chrome Cache Entry: 88
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 92
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 99
ASCII text, with very long lines (46884)
dropped
There are 31 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1992,i,4390689463259841264,4189081711849451839,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2016,i,11718227575472931439,6391638913668732061,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
172.67.162.84
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
http://185.215.113.16/O
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://property-imper.sbs/::
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://crl.microH
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://property-imper.sbs/7
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
http://31.41.244.11/files/rnd.exe
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.16/off/def.exesO?yI
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://185.215.113.16/D
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://property-imper.sbs/-int;
unknown
https://support.microsof
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://property-imper.sbs/r:UI1
unknown
There are 70 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
172.67.162.84
property-imper.sbs
United States
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
27D0000
direct allocation
page read and write
521C000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
51FA000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
E41000
heap
page read and write
57B6000
trusted library allocation
page read and write
E4F000
heap
page read and write
5225000
trusted library allocation
page read and write
43D1000
heap
page read and write
58CC000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
58FE000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
43D1000
heap
page read and write
58CF000
trusted library allocation
page read and write
51D9000
trusted library allocation
page read and write
730000
direct allocation
page read and write
4F4000
heap
page read and write
58B3000
trusted library allocation
page read and write
593D000
trusted library allocation
page read and write
730000
direct allocation
page read and write
57C0000
trusted library allocation
page read and write
5249000
trusted library allocation
page read and write
588E000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
DD1000
heap
page read and write
51EF000
trusted library allocation
page read and write
4F4000
heap
page read and write
43D1000
heap
page read and write
520C000
trusted library allocation
page read and write
55BC000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
58EA000
trusted library allocation
page read and write
58FF000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
5913000
trusted library allocation
page read and write
51D4000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
4F4000
heap
page read and write
5225000
trusted library allocation
page read and write
5218000
trusted library allocation
page read and write
5266000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
E3C000
heap
page read and write
E52000
heap
page read and write
4F4000
heap
page read and write
4F4000
heap
page read and write
54E5000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
E41000
heap
page read and write
5880000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
57B1000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
58BA000
trusted library allocation
page read and write
58CB000
trusted library allocation
page read and write
51DF000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
4F4000
heap
page read and write
51E0000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
5218000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
58E9000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
730000
direct allocation
page read and write
5207000
trusted library allocation
page read and write
4850000
direct allocation
page read and write
58AE000
trusted library allocation
page read and write
5874000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
58E7000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
5222000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
4F4000
heap
page read and write
E4B000
heap
page read and write
5204000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
E52000
heap
page read and write
5A36000
trusted library allocation
page read and write
524E000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
A4E000
unkown
page execute and write copy
51E9000
trusted library allocation
page read and write
5218000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
51EA000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
43D1000
heap
page read and write
51DC000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
730000
direct allocation
page read and write
57B2000
trusted library allocation
page read and write
730000
direct allocation
page read and write
51F8000
trusted library allocation
page read and write
5207000
trusted library allocation
page read and write
4F4000
heap
page read and write
57B5000
trusted library allocation
page read and write
5218000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
E60000
heap
page read and write
E3E000
heap
page read and write
594B000
trusted library allocation
page read and write
51DF000
trusted library allocation
page read and write
57BB000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
526A000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
51F9000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
730000
direct allocation
page read and write
51F8000
trusted library allocation
page read and write
5227000
trusted library allocation
page read and write
730000
direct allocation
page read and write
51E5000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
5882000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
E3C000
heap
page read and write
58A1000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
E3C000
heap
page read and write
5419000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
586F000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
584D000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
5229000
trusted library allocation
page read and write
730000
direct allocation
page read and write
57C0000
trusted library allocation
page read and write
58AC000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
E45000
heap
page read and write
5207000
trusted library allocation
page read and write
5272000
trusted library allocation
page read and write
58F3000
trusted library allocation
page read and write
587C000
trusted library allocation
page read and write
730000
direct allocation
page read and write
51D8000
trusted library allocation
page read and write
5211000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
4F4000
heap
page read and write
E2F000
heap
page read and write
57BE000
trusted library allocation
page read and write
51EA000
trusted library allocation
page read and write
51D6000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
4840000
remote allocation
page read and write
5277000
trusted library allocation
page read and write
5235000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
DD1000
heap
page read and write
5861000
trusted library allocation
page read and write
58D1000
trusted library allocation
page read and write
591E000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
E4A000
heap
page read and write
51F8000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
E52000
heap
page read and write
5A6A000
trusted library allocation
page read and write
51FA000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5279000
trusted library allocation
page read and write
5257000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
51F8000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
51E7000
trusted library allocation
page read and write
5233000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
5872000
trusted library allocation
page read and write
7A7000
unkown
page write copy
585E000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
E3E000
heap
page read and write
57B6000
trusted library allocation
page read and write
4F4000
heap
page read and write
E3E000
heap
page read and write
5240000
trusted library allocation
page read and write
4F4000
heap
page read and write
E5B000
heap
page read and write
51D1000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
596D000
trusted library allocation
page read and write
59ED000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
57B7000
trusted library allocation
page read and write
E4B000
heap
page read and write
5205000
trusted library allocation
page read and write
5207000
trusted library allocation
page read and write
43D1000
heap
page read and write
5230000
trusted library allocation
page read and write
5943000
trusted library allocation
page read and write
5A4E000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
51DF000
trusted library allocation
page read and write
58D3000
trusted library allocation
page read and write
5A4A000
trusted library allocation
page read and write
43D1000
heap
page read and write
587E000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
43D1000
heap
page read and write
E4D000
heap
page read and write
43D1000
heap
page read and write
5911000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
58F1000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
4840000
remote allocation
page read and write
5273000
trusted library allocation
page read and write
E40000
heap
page read and write
E46000
heap
page read and write
521D000
trusted library allocation
page read and write
588C000
trusted library allocation
page read and write
E1F000
heap
page read and write
5BF5000
trusted library allocation
page read and write
E4F000
heap
page read and write
57B0000
trusted library allocation
page read and write
57BB000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
E40000
heap
page read and write
5CEC000
trusted library allocation
page read and write
5A4C000
trusted library allocation
page read and write
57B7000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
59EB000
trusted library allocation
page read and write
5861000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
5249000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
43D1000
heap
page read and write
E52000
heap
page read and write
5A4E000
trusted library allocation
page read and write
43D1000
heap
page read and write
57B6000
trusted library allocation
page read and write
58D3000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
43D1000
heap
page read and write
58B4000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
51D2000
trusted library allocation
page read and write
4894000
direct allocation
page read and write
54F5000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
E54000
heap
page read and write
5209000
trusted library allocation
page read and write
58D1000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
E53000
heap
page read and write
57BB000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
51E8000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
58D5000
trusted library allocation
page read and write
5220000
trusted library allocation
page read and write
5282000
trusted library allocation
page read and write
4F4000
heap
page read and write
57BD000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
4F4000
heap
page read and write
51E7000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
E52000
heap
page read and write
51F0000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
58C8000
trusted library allocation
page read and write
E4A000
heap
page read and write
57B1000
trusted library allocation
page read and write
730000
direct allocation
page read and write
51F8000
trusted library allocation
page read and write
27F0000
direct allocation
page execute and read and write
57B6000
trusted library allocation
page read and write
595E000
trusted library allocation
page read and write
DD8000
heap
page read and write
58CE000
trusted library allocation
page read and write
57BC000
trusted library allocation
page read and write
43D1000
heap
page read and write
522C000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
5BD5000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
59CB000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
58CD000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
43D1000
heap
page read and write
5225000
trusted library allocation
page read and write
43D1000
heap
page read and write
5201000
trusted library allocation
page read and write
58AB000
trusted library allocation
page read and write
51D4000
trusted library allocation
page read and write
E3C000
heap
page read and write
5220000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
E3F000
heap
page read and write
5A68000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
4F4000
heap
page read and write
58EA000
trusted library allocation
page read and write
5206000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
5233000
trusted library allocation
page read and write
E41000
heap
page read and write
58A9000
trusted library allocation
page read and write
4F4000
heap
page read and write
51EB000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
5207000
trusted library allocation
page read and write
57BB000
trusted library allocation
page read and write
51E2000
trusted library allocation
page read and write
43D1000
heap
page read and write
51E9000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
E2F000
heap
page read and write
5200000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
E4F000
heap
page read and write
43D1000
heap
page read and write
51D1000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
5231000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
E53000
heap
page read and write
E3E000
heap
page read and write
51DC000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
5892000
trusted library allocation
page read and write
E4B000
heap
page read and write
E3E000
heap
page read and write
E64000
heap
page read and write
51E1000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
43D1000
heap
page read and write
51E7000
trusted library allocation
page read and write
597F000
trusted library allocation
page read and write
5259000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
E38000
heap
page read and write
57B4000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
750000
unkown
page readonly
51EF000
trusted library allocation
page read and write
522D000
trusted library allocation
page read and write
51E5000
trusted library allocation
page read and write
5204000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
E49000
heap
page read and write
5CEA000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
58AA000
trusted library allocation
page read and write
51DB000
trusted library allocation
page read and write
4F4000
heap
page read and write
58FD000
trusted library allocation
page read and write
E49000
heap
page read and write
59FB000
trusted library allocation
page read and write
593F000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
54BD000
trusted library allocation
page read and write
E60000
heap
page read and write
51DC000
trusted library allocation
page read and write
58D3000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5235000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
E52000
heap
page read and write
5202000
trusted library allocation
page read and write
521F000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
E3E000
heap
page read and write
5211000
trusted library allocation
page read and write
E4B000
heap
page read and write
51E2000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
5218000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
E5B000
heap
page read and write
5216000
trusted library allocation
page read and write
E53000
heap
page read and write
5947000
trusted library allocation
page read and write
43D1000
heap
page read and write
59C9000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
57B5000
trusted library allocation
page read and write
587C000
trusted library allocation
page read and write
51F5000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
751000
unkown
page execute and write copy
51D6000
trusted library allocation
page read and write
54ED000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
584F000
trusted library allocation
page read and write
58FC000
trusted library allocation
page read and write
51FF000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
51DF000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
51EE000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
E40000
heap
page read and write
4F4000
heap
page read and write
59FF000
trusted library allocation
page read and write
43D1000
heap
page read and write
E65000
heap
page read and write
596B000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
E41000
heap
page read and write
546D000
trusted library allocation
page read and write
E4A000
heap
page read and write
58C6000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
58EC000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
522E000
trusted library allocation
page read and write
51D6000
trusted library allocation
page read and write
5585000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
5958000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
43D1000
heap
page read and write
E5B000
heap
page read and write
51EB000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
51D8000
trusted library allocation
page read and write
4840000
remote allocation
page read and write
57B3000
trusted library allocation
page read and write
57B5000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
E40000
heap
page read and write
E5B000
heap
page read and write
51D4000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
DD8000
heap
page read and write
730000
direct allocation
page read and write
57B4000
trusted library allocation
page read and write
51F9000
trusted library allocation
page read and write
730000
direct allocation
page read and write
51D1000
trusted library allocation
page read and write
5E77000
trusted library allocation
page read and write
57BC000
trusted library allocation
page read and write
E45000
heap
page read and write
E4C000
heap
page read and write
541B000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
51F9000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
5207000
trusted library allocation
page read and write
5204000
trusted library allocation
page read and write
5238000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
58D1000
trusted library allocation
page read and write
5249000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
51D4000
trusted library allocation
page read and write
730000
direct allocation
page read and write
49B0000
direct allocation
page execute and read and write
E41000
heap
page read and write
57B4000
trusted library allocation
page read and write
49F4000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
57B7000
trusted library allocation
page read and write
59AD000
trusted library allocation
page read and write
5203000
trusted library allocation
page read and write
5273000
trusted library allocation
page read and write
520F000
trusted library allocation
page read and write
51EE000
trusted library allocation
page read and write
524E000
trusted library allocation
page read and write
E3C000
heap
page read and write
589F000
trusted library allocation
page read and write
4F4000
heap
page read and write
5202000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
730000
direct allocation
page read and write
57B1000
trusted library allocation
page read and write
587A000
trusted library allocation
page read and write
51D5000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
521D000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
5246000
trusted library allocation
page read and write
5A4C000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
4F4000
heap
page read and write
57B8000
trusted library allocation
page read and write
4F4000
heap
page read and write
523F000
trusted library allocation
page read and write
522D000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
E4C000
heap
page read and write
57B8000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
51D6000
trusted library allocation
page read and write
51E7000
trusted library allocation
page read and write
There are 576 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0