IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JSON data
downloaded
Chrome Cache Entry: 101
JSON data
dropped
Chrome Cache Entry: 102
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 103
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 104
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 105
ASCII text
dropped
Chrome Cache Entry: 106
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 107
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 109
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 110
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 111
JSON data
dropped
Chrome Cache Entry: 112
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 113
JSON data
downloaded
Chrome Cache Entry: 114
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 75
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 76
JSON data
dropped
Chrome Cache Entry: 77
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 78
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 80
JSON data
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 82
JSON data
downloaded
Chrome Cache Entry: 83
JSON data
dropped
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 85
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 86
ASCII text
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 88
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 89
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 90
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 92
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 93
JSON data
dropped
Chrome Cache Entry: 94
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 95
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 97
JSON data
downloaded
Chrome Cache Entry: 98
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 99
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 --field-trial-handle=1908,i,3407012707208329137,12783355728101438977,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1164 --field-trial-handle=1932,i,12659663742680586460,29782516825973807,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.16/off/def.exeb
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
104.21.33.116
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://property-imper.sbs/apiU
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://property-imper.sbs/apiYRs78O
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://property-imper.sbs:443/api&t
unknown
https://property-imper.sbs/apiYRs78Oc
unknown
http://185.215.113.16/off/def.exes
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
http://www.microsoft.
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
http://185.215.113.16/D
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
https://property-imper.sbs:443/apig
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
104.21.33.116
property-imper.sbs
United States
172.217.21.36
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
533C000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
5C3000
heap
page read and write
51BF000
stack
page read and write
748F000
stack
page read and write
5394000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
59B000
heap
page read and write
588D000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5A9000
heap
page read and write
7FA0000
heap
page read and write
533B000
trusted library allocation
page read and write
3D6E000
stack
page read and write
5406000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
422F000
stack
page read and write
5305000
trusted library allocation
page read and write
5891000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
58EC000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
3BEF000
stack
page read and write
625000
unkown
page execute and read and write
57A6000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
7C10000
direct allocation
page read and write
5368000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
2AAE000
stack
page read and write
55A4000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
658F000
stack
page read and write
531D000
trusted library allocation
page read and write
5A6000
heap
page read and write
58C6000
trusted library allocation
page read and write
5868000
trusted library allocation
page read and write
536000
heap
page read and write
5368000
trusted library allocation
page read and write
31EF000
stack
page read and write
549A000
trusted library allocation
page read and write
47C0000
heap
page read and write
57A3000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
5355000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
454000
heap
page read and write
58C4000
trusted library allocation
page read and write
536D000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
6A8F000
stack
page read and write
834E000
stack
page read and write
5403000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
5385000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
5A0000
heap
page read and write
5374000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
7C10000
direct allocation
page read and write
533B000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
588C000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
5324000
trusted library allocation
page read and write
59A000
heap
page read and write
35EE000
stack
page read and write
533F000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
5A30000
direct allocation
page read and write
5A0000
heap
page read and write
4370000
heap
page read and write
7C10000
direct allocation
page read and write
57AA000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
4470000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
4380000
heap
page read and write
3AEE000
stack
page read and write
4960000
direct allocation
page execute and read and write
534E000
trusted library allocation
page read and write
7C10000
direct allocation
page read and write
57A5000
trusted library allocation
page read and write
5EA8000
trusted library allocation
page execute and read and write
57B0000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
7C10000
direct allocation
page read and write
4371000
heap
page read and write
D8F000
stack
page read and write
533F000
trusted library allocation
page read and write
5A4000
heap
page read and write
5C7000
heap
page read and write
533B000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
844F000
stack
page read and write
530E000
trusted library allocation
page read and write
59B2000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
58EE000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
4C0D000
stack
page read and write
4970000
direct allocation
page execute and read and write
536B000
trusted library allocation
page read and write
639000
unkown
page execute and read and write
4ACC000
stack
page read and write
57A6000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
454000
heap
page read and write
5C3000
heap
page read and write
5E1000
unkown
page execute and write copy
580000
heap
page read and write
57A6000
trusted library allocation
page read and write
5B3000
heap
page read and write
5316000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
5AD000
heap
page read and write
5346000
trusted library allocation
page read and write
C8D000
stack
page read and write
54E2000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
58D9000
trusted library allocation
page read and write
634E000
stack
page read and write
5316000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
454000
heap
page read and write
2710000
direct allocation
page read and write
8D8000
unkown
page execute and read and write
5BE000
heap
page read and write
7C10000
direct allocation
page read and write
534C000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
4DE000
heap
page read and write
770F000
stack
page read and write
4D8E000
stack
page read and write
5324000
trusted library allocation
page read and write
5A54000
trusted library allocation
page read and write
4D0000
heap
page read and write
57A7000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
58E9000
trusted library allocation
page read and write
70461000
unkown
page execute read
534A000
trusted library allocation
page read and write
2E6E000
stack
page read and write
7C10000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
2CEF000
stack
page read and write
532B000
trusted library allocation
page read and write
532F000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
70476000
unkown
page execute and read and write
454000
heap
page read and write
534D000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
599E000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
2FAE000
stack
page read and write
589E000
trusted library allocation
page read and write
382F000
stack
page read and write
53B3000
trusted library allocation
page read and write
53A7000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
2E2F000
stack
page read and write
2710000
direct allocation
page read and write
532A000
trusted library allocation
page read and write
521000
heap
page read and write
5852000
trusted library allocation
page read and write
7FBA000
trusted library allocation
page read and write
5C7000
heap
page read and write
598000
heap
page read and write
494F000
stack
page read and write
5C3000
heap
page read and write
58AC000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
5B4000
heap
page read and write
536F000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
4371000
heap
page read and write
57A0000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
5AF000
heap
page read and write
5316000
trusted library allocation
page read and write
5AB000
heap
page read and write
5CD000
heap
page read and write
5A4000
heap
page read and write
57A3000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
51FD000
stack
page read and write
534F000
trusted library allocation
page read and write
39AE000
stack
page read and write
5CD000
heap
page read and write
5572000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
4E90000
remote allocation
page read and write
4371000
heap
page read and write
5BC000
heap
page read and write
588E000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
5AD000
heap
page read and write
4DA000
heap
page read and write
50B3000
heap
page read and write
5A1E000
trusted library allocation
page read and write
454000
heap
page read and write
59D000
heap
page read and write
5AB000
heap
page read and write
5366000
trusted library allocation
page read and write
7BB000
unkown
page execute and read and write
5AD000
heap
page read and write
57B1000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
5409000
trusted library allocation
page read and write
51B000
heap
page read and write
7C10000
direct allocation
page read and write
5BC000
heap
page read and write
589D000
trusted library allocation
page read and write
585D000
trusted library allocation
page read and write
587A000
trusted library allocation
page read and write
5C6000
heap
page read and write
57A2000
trusted library allocation
page read and write
5A4000
heap
page read and write
6F8F000
stack
page read and write
34AE000
stack
page read and write
5AB000
heap
page read and write
5D12000
trusted library allocation
page execute and read and write
5329000
trusted library allocation
page read and write
4371000
heap
page read and write
57AB000
trusted library allocation
page read and write
720F000
stack
page read and write
57AD000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
49C0000
direct allocation
page execute and read and write
5422000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
2F6F000
stack
page read and write
5856000
trusted library allocation
page read and write
644F000
stack
page read and write
5A8000
heap
page read and write
57AC000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
4B0E000
stack
page read and write
530F000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
5331000
trusted library allocation
page read and write
436F000
stack
page read and write
7CAC000
stack
page read and write
5331000
trusted library allocation
page read and write
5305000
trusted library allocation
page read and write
5A4000
heap
page read and write
724E000
stack
page read and write
5AA000
heap
page read and write
5861000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
5A1000
heap
page read and write
5899000
stack
page read and write
5359000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
8C9000
unkown
page execute and read and write
535A000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
5A17000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
4371000
heap
page read and write
5336000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
535A000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
257E000
stack
page read and write
536F000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
2727000
heap
page read and write
58E3000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
58A7000
trusted library allocation
page read and write
7C10000
direct allocation
page read and write
454000
heap
page read and write
66CF000
stack
page read and write
58D7000
trusted library allocation
page read and write
6E4F000
stack
page read and write
454000
heap
page read and write
533B000
trusted library allocation
page read and write
58DC000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
4371000
heap
page read and write
536F000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
412E000
stack
page read and write
5317000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
521000
heap
page read and write
6D4E000
stack
page read and write
6E8E000
stack
page read and write
539C000
trusted library allocation
page read and write
5328000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
5AC000
heap
page read and write
7C10000
direct allocation
page read and write
620E000
stack
page read and write
2BEE000
stack
page read and write
57A0000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
710E000
stack
page read and write
57AB000
trusted library allocation
page read and write
7047F000
unkown
page readonly
533B000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
336E000
stack
page read and write
57A4000
trusted library allocation
page read and write
36EF000
stack
page read and write
454000
heap
page read and write
591000
heap
page read and write
5309000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
2710000
direct allocation
page read and write
4E90000
remote allocation
page read and write
58EB000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
7B0E000
stack
page read and write
5A8000
heap
page read and write
531F000
trusted library allocation
page read and write
454000
heap
page read and write
5B4000
heap
page read and write
499D000
stack
page read and write
4E90000
remote allocation
page read and write
53B2000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
532E000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
597F000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
680F000
stack
page read and write
5316000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
584F000
trusted library allocation
page read and write
454000
heap
page read and write
52FE000
stack
page read and write
5317000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
7F10000
trusted library allocation
page read and write
58F3000
trusted library allocation
page read and write
684E000
stack
page read and write
5A4000
heap
page read and write
57A3000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
593D000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
58AB000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
454000
heap
page read and write
5377000
trusted library allocation
page read and write
5FC0000
trusted library allocation
page execute and read and write
5357000
trusted library allocation
page read and write
61CF000
stack
page read and write
531A000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
895000
unkown
page execute and read and write
440000
heap
page read and write
55A2000
trusted library allocation
page read and write
26BC000
stack
page read and write
4371000
heap
page read and write
57AC000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
5A3A000
trusted library allocation
page read and write
58D000
heap
page read and write
5334000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
5A0000
heap
page read and write
5336000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
5310000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
3FAF000
stack
page read and write
531A000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
5BC000
heap
page read and write
532D000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
5C6000
heap
page read and write
5868000
trusted library allocation
page read and write
6FCE000
stack
page read and write
648E000
stack
page read and write
57A1000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
7FB8000
trusted library allocation
page read and write
788E000
stack
page read and write
386E000
stack
page read and write
5843000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
2710000
direct allocation
page read and write
5BF000
heap
page read and write
531D000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
396F000
stack
page read and write
774E000
stack
page read and write
30AF000
stack
page read and write
5D10000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
536F000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
536000
heap
page read and write
57A1000
trusted library allocation
page read and write
59C000
heap
page read and write
4371000
heap
page read and write
5CD000
heap
page read and write
5349000
trusted library allocation
page read and write
5C3000
heap
page read and write
57A2000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
454000
heap
page read and write
5848000
trusted library allocation
page read and write
5C3000
heap
page read and write
74CE000
stack
page read and write
57AC000
trusted library allocation
page read and write
292F000
stack
page read and write
7C10000
direct allocation
page read and write
332F000
stack
page read and write
5319000
trusted library allocation
page read and write
6ACE000
stack
page read and write
57A1000
trusted library allocation
page read and write
57AD000
trusted library allocation
page read and write
5A0000
heap
page read and write
5394000
trusted library allocation
page read and write
5BC000
heap
page read and write
57AE000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
3C2E000
stack
page read and write
535B000
trusted library allocation
page read and write
3FEE000
stack
page read and write
26FE000
stack
page read and write
1DA000
stack
page read and write
49A0000
direct allocation
page execute and read and write
57A4000
trusted library allocation
page read and write
4FFF000
stack
page read and write
282F000
stack
page read and write
57A3000
trusted library allocation
page read and write
5AA000
heap
page read and write
5C3000
heap
page read and write
57AF000
trusted library allocation
page read and write
60CF000
stack
page read and write
530F000
trusted library allocation
page read and write
5A8000
heap
page read and write
5300000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
5A19000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
5343000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
5CD000
heap
page read and write
2700000
heap
page read and write
5324000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
5A4000
heap
page read and write
533B000
trusted library allocation
page read and write
5C3000
heap
page read and write
58B8000
trusted library allocation
page read and write
5C3000
heap
page read and write
784F000
stack
page read and write
30EE000
stack
page read and write
4371000
heap
page read and write
58DD000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5C3000
heap
page read and write
530A000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
4C4E000
stack
page read and write
5338000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
70477000
unkown
page readonly
533B000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page execute and read and write
454000
heap
page read and write
5356000
trusted library allocation
page read and write
58C000
heap
page read and write
532B000
trusted library allocation
page read and write
5CD000
heap
page read and write
5A7000
heap
page read and write
2BAF000
stack
page read and write
5319000
trusted library allocation
page read and write
584A000
trusted library allocation
page read and write
698E000
stack
page read and write
5C3000
heap
page read and write
5C3000
heap
page read and write
536D000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
7D10000
heap
page read and write
57A8000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
4EFE000
stack
page read and write
585A000
trusted library allocation
page read and write
5C3000
heap
page read and write
450000
heap
page read and write
5304000
trusted library allocation
page read and write
454000
heap
page read and write
5AB000
heap
page read and write
5A9000
heap
page read and write
454000
heap
page read and write
58A0000
trusted library allocation
page read and write
9710000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
70460000
unkown
page readonly
5332000
trusted library allocation
page read and write
5A4000
heap
page read and write
5323000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
531A000
trusted library allocation
page read and write
322E000
stack
page read and write
58DB000
trusted library allocation
page read and write
426E000
stack
page read and write
4800000
direct allocation
page read and write
5355000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
589F000
trusted library allocation
page read and write
5B1000
heap
page read and write
4E8F000
stack
page read and write
58AE000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
5A9000
heap
page read and write
5408000
trusted library allocation
page read and write
5AB000
heap
page read and write
5A1C000
trusted library allocation
page read and write
534D000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
5335000
trusted library allocation
page read and write
5A1E000
stack
page read and write
6BCF000
stack
page read and write
2720000
heap
page read and write
5367000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
7C70000
direct allocation
page read and write
5892000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5E0000
unkown
page readonly
5308000
trusted library allocation
page read and write
58DB000
trusted library allocation
page read and write
5FB1000
trusted library allocation
page execute and read and write
506E000
stack
page read and write
49B0000
direct allocation
page execute and read and write
5CEF000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
7047D000
unkown
page read and write
8D9000
unkown
page execute and write copy
59C000
heap
page read and write
A70000
unkown
page execute and read and write
588B000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
5312000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
C4F000
stack
page read and write
532D000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
484C000
stack
page read and write
4854000
direct allocation
page read and write
820B000
stack
page read and write
582000
heap
page read and write
5376000
trusted library allocation
page read and write
5878000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
4371000
heap
page read and write
533B000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
507000
heap
page read and write
5B4000
heap
page read and write
532D000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
5A0000
heap
page read and write
5C6000
heap
page read and write
5324000
trusted library allocation
page read and write
5A2D000
trusted library allocation
page read and write
5CD000
heap
page read and write
7E1E000
stack
page read and write
57A2000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
7C10000
direct allocation
page read and write
5329000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
5317000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
5CFD000
trusted library allocation
page read and write
548E000
stack
page read and write
59A0000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
372E000
stack
page read and write
2710000
direct allocation
page read and write
57A6000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
536F000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
5359000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
5867000
trusted library allocation
page read and write
589D000
trusted library allocation
page read and write
630F000
stack
page read and write
531A000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
58DE000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
4371000
heap
page read and write
5CD000
heap
page read and write
346F000
stack
page read and write
536D000
trusted library allocation
page read and write
694F000
stack
page read and write
5845000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
670E000
stack
page read and write
5A8000
heap
page read and write
4371000
heap
page read and write
584D000
trusted library allocation
page read and write
5E0000
unkown
page read and write
5405000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
5BC000
heap
page read and write
738E000
stack
page read and write
50B0000
heap
page read and write
798F000
stack
page read and write
532B000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
57AD000
trusted library allocation
page read and write
4371000
heap
page read and write
5339000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
5326000
trusted library allocation
page read and write
59F8000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
58DF000
trusted library allocation
page read and write
57A6000
trusted library allocation
page read and write
5377000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
4371000
heap
page read and write
59BB000
trusted library allocation
page read and write
5C6000
heap
page read and write
4371000
heap
page read and write
49DC000
trusted library allocation
page read and write
590E000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
5C6000
heap
page read and write
59DB000
stack
page read and write
53F000
heap
page read and write
532B000
trusted library allocation
page read and write
5A8000
heap
page read and write
5BE6000
trusted library allocation
page read and write
5A4000
heap
page read and write
40EF000
stack
page read and write
532B000
trusted library allocation
page read and write
4371000
heap
page read and write
5909000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
2A6F000
stack
page read and write
5339000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
532A000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
DB000
stack
page read and write
593F000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
3AAF000
stack
page read and write
79CE000
stack
page read and write
3E6F000
stack
page read and write
5A7000
heap
page read and write
5AD000
heap
page read and write
5329000
trusted library allocation
page read and write
5BC000
heap
page read and write
53DB000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
59A000
heap
page read and write
7C10000
direct allocation
page read and write
454000
heap
page read and write
454000
heap
page read and write
535A000
trusted library allocation
page read and write
5332000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
7C10000
direct allocation
page read and write
531F000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
58AE000
trusted library allocation
page read and write
5AA000
heap
page read and write
5319000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
2D2E000
stack
page read and write
532B000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
5342000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
5403000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
830C000
stack
page read and write
532A000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
35AF000
stack
page read and write
595B000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
4371000
heap
page read and write
5890000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
70CF000
stack
page read and write
586F000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
599F000
stack
page read and write
7C10000
direct allocation
page read and write
4371000
heap
page read and write
296E000
stack
page read and write
760E000
stack
page read and write
531F000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
59F6000
trusted library allocation
page read and write
5AC000
heap
page read and write
2710000
direct allocation
page read and write
5A4000
heap
page read and write
5CA000
heap
page read and write
57AD000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
3D2F000
stack
page read and write
532E000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
57A6000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
4371000
heap
page read and write
530A000
trusted library allocation
page read and write
7CF0000
direct allocation
page execute and read and write
5C7000
heap
page read and write
5394000
trusted library allocation
page read and write
57A2000
trusted library allocation
page read and write
5A0000
heap
page read and write
7C70000
direct allocation
page read and write
6C0E000
stack
page read and write
59C000
heap
page read and write
5394000
trusted library allocation
page read and write
5A0000
heap
page read and write
7CC0000
direct allocation
page execute and read and write
533B000
trusted library allocation
page read and write
5882000
trusted library allocation
page read and write
534F000
trusted library allocation
page read and write
536C000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
454000
heap
page read and write
532A000
trusted library allocation
page read and write
58C8000
trusted library allocation
page read and write
5865000
trusted library allocation
page read and write
581000
heap
page read and write
531C000
trusted library allocation
page read and write
637000
unkown
page read and write
4D4F000
stack
page read and write
637000
unkown
page write copy
535F000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
58BB000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
8D8000
unkown
page execute and write copy
57AA000
trusted library allocation
page read and write
8C0000
unkown
page execute and read and write
531F000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
7C0F000
stack
page read and write
531A000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
460000
heap
page read and write
5C0000
heap
page read and write
532E000
trusted library allocation
page read and write
57AD000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
267F000
stack
page read and write
3EAE000
stack
page read and write
7ACF000
stack
page read and write
589B000
trusted library allocation
page read and write
65CE000
stack
page read and write
59BD000
trusted library allocation
page read and write
59EE000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
4CE000
stack
page read and write
58E1000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
5377000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
58D9000
trusted library allocation
page read and write
5A3C000
trusted library allocation
page read and write
5A7000
heap
page read and write
58A5000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
7FB2000
trusted library allocation
page read and write
4371000
heap
page read and write
5312000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
734F000
stack
page read and write
539C000
trusted library allocation
page read and write
5356000
trusted library allocation
page read and write
5999000
trusted library allocation
page read and write
534C000
trusted library allocation
page read and write
454000
heap
page read and write
59B4000
trusted library allocation
page read and write
5C6000
heap
page read and write
5310000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
588F000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
5A56000
trusted library allocation
page read and write
591000
heap
page read and write
5E1000
unkown
page execute and read and write
53DB000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
5439000
stack
page read and write
6D0F000
stack
page read and write
530D000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
2710000
direct allocation
page read and write
5CD000
heap
page read and write
5959000
trusted library allocation
page read and write
57A6000
trusted library allocation
page read and write
5374000
trusted library allocation
page read and write
454000
heap
page read and write
75CF000
stack
page read and write
533F000
trusted library allocation
page read and write
There are 906 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0