IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 101
gzip compressed data, from TOPS/20, original size modulo 2^32 25441
downloaded
Chrome Cache Entry: 102
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 104
ASCII text
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 106
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1173007
downloaded
Chrome Cache Entry: 107
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 108
JSON data
dropped
Chrome Cache Entry: 109
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 111
gzip compressed data, from TOPS/20, original size modulo 2^32 5644
dropped
Chrome Cache Entry: 112
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 113
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 114
gzip compressed data, from TOPS/20, original size modulo 2^32 33148
dropped
Chrome Cache Entry: 115
JSON data
downloaded
Chrome Cache Entry: 116
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 117
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 118
JSON data
downloaded
Chrome Cache Entry: 119
JSON data
dropped
Chrome Cache Entry: 120
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 121
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1173007
dropped
Chrome Cache Entry: 122
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 123
ASCII text
dropped
Chrome Cache Entry: 124
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1154
downloaded
Chrome Cache Entry: 125
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 126
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 127
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 128
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 129
JSON data
dropped
Chrome Cache Entry: 130
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 131
JSON data
downloaded
Chrome Cache Entry: 132
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 91
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 92
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1154
dropped
Chrome Cache Entry: 94
gzip compressed data, from TOPS/20, original size modulo 2^32 3130
dropped
Chrome Cache Entry: 95
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 96
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 97
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 99
gzip compressed data, from TOPS/20, original size modulo 2^32 25441
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1712,i,16499392452807308267,17586683353551675273,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=2012,i,16342311137299287003,18054011809701615545,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
104.21.33.116
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://property-imper.sbs/api9-
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://property-imper.sbs:443/apiicrosoft
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://github.com/js-cookie/js-cookie
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
104.21.33.116
property-imper.sbs
United States
172.217.21.36
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
13C4000
heap
page read and write
5C7B000
trusted library allocation
page read and write
1311000
heap
page read and write
5CC6000
trusted library allocation
page read and write
457E000
stack
page read and write
5C45000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
61DB000
trusted library allocation
page read and write
61AF000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
5CFC000
trusted library allocation
page read and write
3CBE000
stack
page read and write
532B000
trusted library allocation
page read and write
132C000
heap
page read and write
625B000
trusted library allocation
page read and write
13C4000
heap
page read and write
5D59000
trusted library allocation
page read and write
5E57000
trusted library allocation
page read and write
60EC000
trusted library allocation
page read and write
739000
unkown
page execute and read and write
4CC1000
heap
page read and write
5D49000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
130F000
heap
page read and write
5D62000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5E47000
trusted library allocation
page read and write
61F7000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
633F000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
61BA000
trusted library allocation
page read and write
131C000
heap
page read and write
60E6000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
621D000
trusted library allocation
page read and write
61DC000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
5CBB000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
5F79000
stack
page read and write
5D05000
trusted library allocation
page read and write
61A6000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
5CB2000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5CAC000
trusted library allocation
page read and write
1230000
heap
page read and write
1311000
heap
page read and write
1328000
heap
page read and write
57E0000
remote allocation
page read and write
1311000
heap
page read and write
37BE000
stack
page read and write
61F1000
trusted library allocation
page read and write
5CD4000
trusted library allocation
page read and write
131E000
heap
page read and write
417F000
stack
page read and write
5E3C000
trusted library allocation
page read and write
5A5000
unkown
page execute and read and write
6229000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
545D000
stack
page read and write
60E7000
trusted library allocation
page read and write
47BF000
stack
page read and write
1327000
heap
page read and write
601E000
trusted library allocation
page read and write
4CC1000
heap
page read and write
5D48000
trusted library allocation
page read and write
61BC000
trusted library allocation
page read and write
13C4000
heap
page read and write
4CD0000
heap
page read and write
5CDD000
trusted library allocation
page read and write
6223000
trusted library allocation
page read and write
60E7000
trusted library allocation
page read and write
85A000
unkown
page execute and write copy
5D60000
trusted library allocation
page read and write
594F000
stack
page read and write
1318000
heap
page read and write
131C000
heap
page read and write
4CC1000
heap
page read and write
6259000
trusted library allocation
page read and write
61F3000
trusted library allocation
page read and write
9F1000
unkown
page execute and read and write
60E4000
trusted library allocation
page read and write
5CCD000
trusted library allocation
page read and write
5CD4000
trusted library allocation
page read and write
3C7F000
stack
page read and write
5CF3000
trusted library allocation
page read and write
60E3000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
4A3F000
stack
page read and write
5CDE000
trusted library allocation
page read and write
618F000
trusted library allocation
page read and write
57E0000
remote allocation
page read and write
5E49000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
317E000
stack
page read and write
5CF4000
trusted library allocation
page read and write
1340000
heap
page read and write
622B000
trusted library allocation
page read and write
3F3E000
stack
page read and write
5E2E000
trusted library allocation
page read and write
6240000
trusted library allocation
page read and write
8560000
direct allocation
page read and write
5CE6000
trusted library allocation
page read and write
61AF000
trusted library allocation
page read and write
6202000
trusted library allocation
page read and write
1327000
heap
page read and write
131B000
heap
page read and write
617A000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
327F000
stack
page read and write
5D15000
trusted library allocation
page read and write
1326000
heap
page read and write
8560000
direct allocation
page read and write
5F47000
trusted library allocation
page read and write
1327000
heap
page read and write
2EE0000
direct allocation
page read and write
5CDA000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
622E000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
1327000
heap
page read and write
5C67000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
8560000
direct allocation
page read and write
1327000
heap
page read and write
5CF5000
trusted library allocation
page read and write
5F4B000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
60E3000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
1327000
heap
page read and write
13C4000
heap
page read and write
5CC6000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
622F000
trusted library allocation
page read and write
6205000
trusted library allocation
page read and write
57E0000
remote allocation
page read and write
8560000
direct allocation
page read and write
5CF4000
trusted library allocation
page read and write
5CAC000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
6313000
trusted library allocation
page read and write
85C0000
direct allocation
page read and write
5F9E000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
1327000
heap
page read and write
5C95000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
620E000
trusted library allocation
page read and write
6341000
trusted library allocation
page read and write
620A000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
FCA000
stack
page read and write
8560000
direct allocation
page read and write
1311000
heap
page read and write
61DD000
trusted library allocation
page read and write
5CDD000
trusted library allocation
page read and write
629A000
trusted library allocation
page read and write
42BF000
stack
page read and write
4CC1000
heap
page read and write
5CF4000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
4CC1000
heap
page read and write
1325000
heap
page read and write
13C4000
heap
page read and write
5CB6000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
12AA000
heap
page read and write
52E0000
direct allocation
page execute and read and write
5CF4000
trusted library allocation
page read and write
560000
unkown
page read and write
5C60000
trusted library allocation
page read and write
5150000
direct allocation
page read and write
5DD4000
trusted library allocation
page read and write
5C64000
trusted library allocation
page read and write
60EC000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
2FFF000
stack
page read and write
5C81000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
5C7A000
trusted library allocation
page read and write
5C91000
trusted library allocation
page read and write
52F0000
direct allocation
page execute and read and write
42FE000
stack
page read and write
5F4A000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
1325000
heap
page read and write
5CF8000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
13C4000
heap
page read and write
62E1000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
130F000
heap
page read and write
634F000
trusted library allocation
page read and write
1325000
heap
page read and write
2EF7000
heap
page read and write
5CE4000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
61F5000
trusted library allocation
page read and write
13C4000
heap
page read and write
61D0000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
61F3000
trusted library allocation
page read and write
ECB000
stack
page read and write
6210000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
60E9000
trusted library allocation
page read and write
443E000
stack
page read and write
5CDF000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
555D000
stack
page read and write
60EC000
trusted library allocation
page read and write
620C000
trusted library allocation
page read and write
85B000
unkown
page execute and write copy
5CE9000
trusted library allocation
page read and write
60B6000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
622D000
trusted library allocation
page read and write
62B1000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
60E7000
trusted library allocation
page read and write
41BE000
stack
page read and write
60E8000
trusted library allocation
page read and write
5B20000
heap
page read and write
1278000
heap
page read and write
81C000
unkown
page execute and read and write
8560000
direct allocation
page read and write
5CDA000
trusted library allocation
page read and write
60EF000
trusted library allocation
page read and write
33FE000
stack
page read and write
6184000
trusted library allocation
page read and write
60EF000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
6182000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
60E3000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
1325000
heap
page read and write
5CF5000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
1325000
heap
page read and write
60E9000
trusted library allocation
page read and write
60F1000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
12F0000
heap
page read and write
61DE000
trusted library allocation
page read and write
5CFA000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
5CFC000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5CBF000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
4CD1000
heap
page read and write
5AFE000
stack
page read and write
61E9000
trusted library allocation
page read and write
5CBA000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
6204000
trusted library allocation
page read and write
13C4000
heap
page read and write
5D15000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
367E000
stack
page read and write
1327000
heap
page read and write
3DFE000
stack
page read and write
624D000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
130F000
heap
page read and write
52B0000
direct allocation
page execute and read and write
569E000
stack
page read and write
5CB6000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
60E7000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
644D000
trusted library allocation
page read and write
61D1000
trusted library allocation
page read and write
4CC1000
heap
page read and write
6230000
trusted library allocation
page read and write
130F000
heap
page read and write
5D15000
trusted library allocation
page read and write
844000
unkown
page execute and read and write
5194000
direct allocation
page read and write
5CD0000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
4CC0000
heap
page read and write
621B000
trusted library allocation
page read and write
5D14000
trusted library allocation
page read and write
5F43000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
1327000
heap
page read and write
2EE0000
direct allocation
page read and write
5D41000
trusted library allocation
page read and write
6357000
trusted library allocation
page read and write
5DE8000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
13C4000
heap
page read and write
5CF5000
trusted library allocation
page read and write
5C77000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5F49000
trusted library allocation
page read and write
13C4000
heap
page read and write
313F000
stack
page read and write
6225000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
3B7E000
stack
page read and write
5CE4000
trusted library allocation
page read and write
2E7E000
stack
page read and write
5EAB000
trusted library allocation
page read and write
62EF000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
1291000
heap
page read and write
5C77000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5F45000
trusted library allocation
page read and write
5C71000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
61F5000
trusted library allocation
page read and write
1328000
heap
page read and write
5C45000
trusted library allocation
page read and write
13C4000
heap
page read and write
5CF5000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
4CC1000
heap
page read and write
5D41000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
8560000
direct allocation
page read and write
5D1C000
trusted library allocation
page read and write
598D000
stack
page read and write
5D59000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
637F000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
6193000
trusted library allocation
page read and write
4CC1000
heap
page read and write
5CC6000
trusted library allocation
page read and write
5F66000
trusted library allocation
page read and write
4A7E000
stack
page read and write
39FF000
stack
page read and write
13C4000
heap
page read and write
131B000
heap
page read and write
5CD0000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5CD4000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
1327000
heap
page read and write
8560000
direct allocation
page read and write
60E6000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
13C4000
heap
page read and write
61AD000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
467F000
stack
page read and write
2EF0000
heap
page read and write
6195000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
85C0000
direct allocation
page read and write
5CDE000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
4CC1000
heap
page read and write
6231000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
1327000
heap
page read and write
61F5000
trusted library allocation
page read and write
1318000
heap
page read and write
60E2000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
61AF000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
13C0000
heap
page read and write
5C71000
trusted library allocation
page read and write
5E76000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
34FF000
stack
page read and write
5C66000
trusted library allocation
page read and write
5C76000
trusted library allocation
page read and write
6016000
trusted library allocation
page read and write
5150000
direct allocation
page read and write
5D05000
trusted library allocation
page read and write
60ED000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
57DF000
stack
page read and write
5C40000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5B7000
unkown
page write copy
5CD0000
trusted library allocation
page read and write
6182000
trusted library allocation
page read and write
2ED0000
heap
page read and write
5CD7000
trusted library allocation
page read and write
1282000
heap
page read and write
3A3E000
stack
page read and write
5D05000
trusted library allocation
page read and write
6217000
trusted library allocation
page read and write
60EB000
trusted library allocation
page read and write
634D000
trusted library allocation
page read and write
60ED000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5FEE000
trusted library allocation
page read and write
6233000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
61D2000
trusted library allocation
page read and write
6376000
trusted library allocation
page read and write
5E3C000
trusted library allocation
page read and write
5110000
heap
page read and write
1327000
heap
page read and write
5CBA000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
8560000
direct allocation
page read and write
493E000
stack
page read and write
5D2A000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
1327000
heap
page read and write
5CF4000
trusted library allocation
page read and write
61CE000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
6197000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
8640000
direct allocation
page execute and read and write
62ED000
trusted library allocation
page read and write
5CC7000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
131C000
heap
page read and write
560000
unkown
page readonly
5CFA000
trusted library allocation
page read and write
403F000
stack
page read and write
5310000
direct allocation
page execute and read and write
60EA000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
5CBC000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
3B3F000
stack
page read and write
33BF000
stack
page read and write
5C82000
trusted library allocation
page read and write
303B000
stack
page read and write
13C4000
heap
page read and write
60E0000
trusted library allocation
page read and write
13C4000
heap
page read and write
6955000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
61E1000
trusted library allocation
page read and write
84B000
unkown
page execute and read and write
5DC7000
trusted library allocation
page read and write
5D20000
trusted library allocation
page read and write
60EB000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
619F000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
6272000
trusted library allocation
page read and write
48FF000
stack
page read and write
5E59000
trusted library allocation
page read and write
1327000
heap
page read and write
60E2000
trusted library allocation
page read and write
1327000
heap
page read and write
6378000
trusted library allocation
page read and write
1320000
heap
page read and write
12A7000
heap
page read and write
5C48000
trusted library allocation
page read and write
6315000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
1311000
heap
page read and write
5E3A000
trusted library allocation
page read and write
60EF000
trusted library allocation
page read and write
1240000
heap
page read and write
2EE0000
direct allocation
page read and write
5B9000
unkown
page execute and read and write
5D59000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
5CBA000
trusted library allocation
page read and write
4BBE000
stack
page read and write
5CF5000
trusted library allocation
page read and write
5CB2000
trusted library allocation
page read and write
629C000
trusted library allocation
page read and write
4CC1000
heap
page read and write
124A000
heap
page read and write
56DE000
stack
page read and write
5DCE000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
131C000
heap
page read and write
5D05000
trusted library allocation
page read and write
5C6A000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
627A000
trusted library allocation
page read and write
5CD5000
trusted library allocation
page read and write
60EE000
trusted library allocation
page read and write
1289000
heap
page read and write
5C43000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
5CC8000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
5CDF000
trusted library allocation
page read and write
1327000
heap
page read and write
2EE0000
direct allocation
page read and write
61E0000
trusted library allocation
page read and write
5C2F000
stack
page read and write
5CF4000
trusted library allocation
page read and write
6219000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
12FC000
heap
page read and write
4CC1000
heap
page read and write
62FF000
trusted library allocation
page read and write
130E000
heap
page read and write
8560000
direct allocation
page read and write
52EE000
stack
page read and write
5FB0000
direct allocation
page read and write
1327000
heap
page read and write
5CE9000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
124E000
heap
page read and write
159E000
stack
page read and write
529F000
stack
page read and write
5CF4000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
6301000
trusted library allocation
page read and write
4CC1000
heap
page read and write
377F000
stack
page read and write
60E3000
trusted library allocation
page read and write
60F1000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
60ED000
trusted library allocation
page read and write
619D000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
559E000
stack
page read and write
5F43000
trusted library allocation
page read and write
60E7000
trusted library allocation
page read and write
5CBA000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5EC0000
trusted library allocation
page read and write
618A000
trusted library allocation
page read and write
60EE000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5D0C000
trusted library allocation
page read and write
5CB9000
trusted library allocation
page read and write
60E2000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
38BF000
stack
page read and write
5C4F000
trusted library allocation
page read and write
1327000
heap
page read and write
8610000
direct allocation
page execute and read and write
622D000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
1328000
heap
page read and write
624B000
trusted library allocation
page read and write
62DF000
trusted library allocation
page read and write
12AA000
heap
page read and write
5C4A000
trusted library allocation
page read and write
8560000
direct allocation
page read and write
1328000
heap
page read and write
5CD0000
trusted library allocation
page read and write
60E4000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
131B000
heap
page read and write
60E6000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
60E9000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
62AF000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
61CB000
trusted library allocation
page read and write
1325000
heap
page read and write
5C64000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
3EFF000
stack
page read and write
519C000
stack
page read and write
46BE000
stack
page read and write
60E8000
trusted library allocation
page read and write
60EB000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
407E000
stack
page read and write
4CC1000
heap
page read and write
1313000
heap
page read and write
5CDD000
trusted library allocation
page read and write
130E000
heap
page read and write
5CC6000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
43FF000
stack
page read and write
6242000
trusted library allocation
page read and write
61B2000
trusted library allocation
page read and write
3DBF000
stack
page read and write
5CCD000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
561000
unkown
page execute and read and write
4CC1000
heap
page read and write
8560000
direct allocation
page read and write
61A4000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
1311000
heap
page read and write
60EF000
trusted library allocation
page read and write
561000
unkown
page execute and write copy
5C6E000
trusted library allocation
page read and write
5C76000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
6278000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
13C4000
heap
page read and write
5CE4000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
6219000
trusted library allocation
page read and write
5CD7000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
5A8E000
stack
page read and write
5CF4000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
363F000
stack
page read and write
5CCE000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
60E8000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5CE6000
trusted library allocation
page read and write
453F000
stack
page read and write
6026000
trusted library allocation
page read and write
13AE000
stack
page read and write
60E5000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
5B7000
unkown
page read and write
2ECE000
stack
page read and write
61DE000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5150000
direct allocation
page read and write
622F000
trusted library allocation
page read and write
5CF3000
trusted library allocation
page read and write
5CBA000
trusted library allocation
page read and write
1327000
heap
page read and write
13C4000
heap
page read and write
4CBF000
stack
page read and write
5CE6000
trusted library allocation
page read and write
60ED000
trusted library allocation
page read and write
2D7E000
stack
page read and write
5CF6000
trusted library allocation
page read and write
6355000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
38FE000
stack
page read and write
5D79000
trusted library allocation
page read and write
61CC000
trusted library allocation
page read and write
60E0000
trusted library allocation
page read and write
8560000
direct allocation
page read and write
1327000
heap
page read and write
60E2000
trusted library allocation
page read and write
6195000
trusted library allocation
page read and write
2EE0000
direct allocation
page read and write
5C49000
trusted library allocation
page read and write
637D000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
5CBA000
trusted library allocation
page read and write
61D3000
trusted library allocation
page read and write
5CE9000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
1311000
heap
page read and write
61F3000
trusted library allocation
page read and write
4CC1000
heap
page read and write
5CFC000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
584E000
stack
page read and write
85A000
unkown
page execute and read and write
5C95000
trusted library allocation
page read and write
13C4000
heap
page read and write
4B7F000
stack
page read and write
621F000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5C74000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
6178000
trusted library allocation
page read and write
60E3000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5300000
direct allocation
page execute and read and write
5CD7000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5E2C000
trusted library allocation
page read and write
4CC1000
heap
page read and write
8560000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
32BE000
stack
page read and write
1316000
heap
page read and write
5D15000
trusted library allocation
page read and write
8560000
direct allocation
page read and write
60E7000
trusted library allocation
page read and write
85C0000
direct allocation
page read and write
60E0000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
353E000
stack
page read and write
541D000
stack
page read and write
5CE6000
trusted library allocation
page read and write
60E7000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
47FE000
stack
page read and write
9F2000
unkown
page execute and write copy
5B23000
heap
page read and write
5CE4000
trusted library allocation
page read and write
61DF000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
61CD000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
6207000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
5C79000
trusted library allocation
page read and write
618C000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5CAC000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
60EC000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
5CF3000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
4CC1000
heap
page read and write
61E5000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5CC2000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
5CF6000
trusted library allocation
page read and write
5150000
direct allocation
page read and write
There are 787 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0