IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 101
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 103
JSON data
dropped
Chrome Cache Entry: 104
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 105
JSON data
downloaded
Chrome Cache Entry: 106
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 108
ASCII text
downloaded
Chrome Cache Entry: 109
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 110
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 111
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 112
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 113
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 114
JSON data
dropped
Chrome Cache Entry: 115
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 116
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 117
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 118
JSON data
downloaded
Chrome Cache Entry: 119
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 120
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 121
JSON data
downloaded
Chrome Cache Entry: 122
JSON data
dropped
Chrome Cache Entry: 123
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 124
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 125
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 126
ASCII text
dropped
Chrome Cache Entry: 127
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 128
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 129
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 130
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 131
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 132
JSON data
dropped
Chrome Cache Entry: 133
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 134
JSON data
downloaded
Chrome Cache Entry: 135
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 94
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 95
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 97
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 98
JSON data
dropped
Chrome Cache Entry: 99
JSON data
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 --field-trial-handle=1924,i,5708739163240515119,9735538660646773485,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=2008,i,13480779338358767381,12639924099947820658,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
172.67.162.84
https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://property-imper.sbs/apiiw
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://property-imper.sbs/J/z
unknown
http://185.215.113.16/off/def.exes
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://crl.micro8
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://property-imper.sbs//
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://property-imper.sbs/apiBo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 62 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.10
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
172.67.162.84
property-imper.sbs
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4E60000
direct allocation
page execute and read and write
57D4000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
8130000
direct allocation
page read and write
57C5000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
56AE000
stack
page read and write
DF0000
direct allocation
page read and write
5821000
trusted library allocation
page read and write
57B7000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
B99000
heap
page read and write
5350000
remote allocation
page read and write
B82000
heap
page read and write
581C000
trusted library allocation
page read and write
58E9000
stack
page read and write
5818000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
B54000
heap
page read and write
5835000
trusted library allocation
page read and write
4831000
heap
page read and write
3E2F000
stack
page read and write
57B5000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
8190000
trusted library allocation
page read and write
630E000
stack
page read and write
57DC000
trusted library allocation
page read and write
B5F000
heap
page read and write
57CF000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
770E000
stack
page read and write
5D88000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
B8C000
heap
page read and write
57CF000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
5CEC000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
4E80000
direct allocation
page execute and read and write
57BD000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
835F000
stack
page read and write
DE0000
heap
page read and write
57CB000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
7ACE000
stack
page read and write
5814000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
4CC0000
direct allocation
page read and write
8FA000
stack
page read and write
694E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
748E000
stack
page read and write
57C4000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
AA0000
heap
page read and write
4831000
heap
page read and write
5C51000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
B99000
heap
page read and write
5CF9000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
5D75000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
B95000
heap
page read and write
7C0E000
stack
page read and write
581D000
trusted library allocation
page read and write
4831000
heap
page read and write
57FC000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
45AF000
stack
page read and write
5C59000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
AAE000
heap
page read and write
58B8000
trusted library allocation
page read and write
57CD000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
654F000
stack
page read and write
46EF000
stack
page read and write
6A8E000
stack
page read and write
964000
heap
page read and write
5D0C000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
70CE000
stack
page read and write
5D3E000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
964000
heap
page read and write
B95000
heap
page read and write
57F5000
trusted library allocation
page read and write
396E000
stack
page read and write
5350000
remote allocation
page read and write
5E8E000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
510E000
stack
page read and write
57E4000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
964000
heap
page read and write
B81000
heap
page read and write
66CE000
stack
page read and write
80D0000
direct allocation
page read and write
5C59000
trusted library allocation
page read and write
4831000
heap
page read and write
5DCF000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
4F8D000
stack
page read and write
5C56000
trusted library allocation
page read and write
1111000
unkown
page execute and write copy
57C4000
trusted library allocation
page read and write
B79000
heap
page read and write
57BF000
trusted library allocation
page read and write
960000
heap
page read and write
B8C000
heap
page read and write
5D1B000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
57C8000
trusted library allocation
page read and write
B89000
heap
page read and write
5C5D000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
5350000
remote allocation
page read and write
5D95000
trusted library allocation
page read and write
80D0000
direct allocation
page read and write
5C5B000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
A7E000
stack
page read and write
DF0000
direct allocation
page read and write
DF0000
direct allocation
page read and write
5843000
trusted library allocation
page read and write
57F5000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
B71000
heap
page read and write
5D05000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
7A8F000
stack
page read and write
57FA000
trusted library allocation
page read and write
3A6F000
stack
page read and write
6CCF000
stack
page read and write
5C61000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
62B4000
trusted library allocation
page execute and read and write
80D0000
direct allocation
page read and write
B97000
heap
page read and write
57FA000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
E45000
unkown
page execute and read and write
5C52000
trusted library allocation
page read and write
964000
heap
page read and write
57E5000
trusted library allocation
page read and write
5D16000
trusted library allocation
page read and write
57E8000
trusted library allocation
page read and write
58C1000
trusted library allocation
page read and write
5E51000
trusted library allocation
page read and write
964000
heap
page read and write
5807000
trusted library allocation
page read and write
524E000
stack
page read and write
582E000
trusted library allocation
page read and write
5D90000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
6F4F000
stack
page read and write
964000
heap
page read and write
6012000
trusted library allocation
page execute and read and write
B89000
heap
page read and write
5CF5000
trusted library allocation
page read and write
580C000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
7D0F000
stack
page read and write
4831000
heap
page read and write
57C9000
trusted library allocation
page read and write
5861000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
5E2B000
trusted library allocation
page read and write
B79000
heap
page read and write
80D0000
trusted library allocation
page read and write
57DE000
trusted library allocation
page read and write
B98000
heap
page read and write
57CF000
trusted library allocation
page read and write
690F000
stack
page read and write
B90000
heap
page read and write
B86000
heap
page read and write
57C4000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5847000
trusted library allocation
page read and write
B95000
heap
page read and write
57D6000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
B97000
heap
page read and write
B95000
heap
page read and write
5C55000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
5807000
trusted library allocation
page read and write
870C000
stack
page read and write
5C5B000
trusted library allocation
page read and write
8130000
direct allocation
page read and write
57DC000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
884E000
stack
page read and write
894E000
stack
page read and write
5D08000
trusted library allocation
page read and write
B87000
heap
page read and write
5E0000
heap
page read and write
5D42000
trusted library allocation
page read and write
AAA000
heap
page read and write
582D000
trusted library allocation
page read and write
80D0000
direct allocation
page read and write
332E000
stack
page read and write
5D61000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
5EDD000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
6F8E000
stack
page read and write
B8F000
heap
page read and write
5C5A000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
B86000
heap
page read and write
B99000
heap
page read and write
6E0F000
stack
page read and write
57F5000
trusted library allocation
page read and write
50CC000
stack
page read and write
5DEC000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
95E000
stack
page read and write
5C58000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
658E000
stack
page read and write
5DDB000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
5920000
direct allocation
page read and write
57BB000
trusted library allocation
page read and write
2A9C000
stack
page read and write
5825000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
57F3000
trusted library allocation
page read and write
AF1000
heap
page read and write
58B6000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
5EF8000
trusted library allocation
page read and write
B6E000
heap
page read and write
57F2000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
845A000
trusted library allocation
page read and write
598A000
trusted library allocation
page read and write
B97000
heap
page read and write
3BEE000
stack
page read and write
80D0000
direct allocation
page read and write
57EC000
trusted library allocation
page read and write
DDE000
stack
page read and write
5C5E000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
520E000
stack
page read and write
67CF000
stack
page read and write
4831000
heap
page read and write
4831000
heap
page read and write
B97000
heap
page read and write
4E0F000
stack
page read and write
57DC000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
57D4000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
5D7E000
trusted library allocation
page read and write
730F000
stack
page read and write
5895000
trusted library allocation
page read and write
B7F000
heap
page read and write
5802000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
31EE000
stack
page read and write
1110000
unkown
page execute and read and write
57E7000
trusted library allocation
page read and write
2AE0000
heap
page read and write
1110000
unkown
page execute and write copy
582E000
trusted library allocation
page read and write
780F000
stack
page read and write
B7F000
heap
page read and write
57CD000
trusted library allocation
page read and write
6B8F000
stack
page read and write
B97000
heap
page read and write
5C60000
trusted library allocation
page read and write
B7C000
heap
page read and write
57E5000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
964000
heap
page read and write
5C53000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
680E000
stack
page read and write
B7C000
heap
page read and write
5D7C000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
4831000
heap
page read and write
DF0000
direct allocation
page read and write
5802000
trusted library allocation
page read and write
B6E000
heap
page read and write
581B000
trusted library allocation
page read and write
5868000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
5CF6000
trusted library allocation
page read and write
432F000
stack
page read and write
57EC000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
32EE000
stack
page read and write
E57000
unkown
page read and write
5D50000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
5D97000
trusted library allocation
page read and write
2BEF000
stack
page read and write
4842000
heap
page read and write
57C4000
trusted library allocation
page read and write
76CF000
stack
page read and write
4831000
heap
page read and write
12B8000
unkown
page execute and read and write
5C55000
trusted library allocation
page read and write
B97000
heap
page read and write
392F000
stack
page read and write
57F2000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
B15000
heap
page read and write
5D16000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
5865000
trusted library allocation
page read and write
5D86000
trusted library allocation
page read and write
B71000
heap
page read and write
5DAE000
trusted library allocation
page read and write
482F000
stack
page read and write
57BF000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
57E4000
trusted library allocation
page read and write
57DF000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
3BAF000
stack
page read and write
5C55000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5CF6000
trusted library allocation
page read and write
B8C000
heap
page read and write
12B9000
unkown
page execute and write copy
5D8E000
trusted library allocation
page read and write
57DB000
trusted library allocation
page read and write
644C000
stack
page read and write
5D1D000
trusted library allocation
page read and write
E01000
unkown
page execute and write copy
582D000
trusted library allocation
page read and write
B99000
heap
page read and write
5ECB000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
B7C000
heap
page read and write
E00000
unkown
page read and write
57E7000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
B77000
heap
page read and write
57BF000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
B97000
heap
page read and write
B99000
heap
page read and write
4D0C000
stack
page read and write
E57000
unkown
page write copy
5C50000
trusted library allocation
page read and write
3F6E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
4C70000
trusted library allocation
page read and write
356F000
stack
page read and write
5C5D000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
342F000
stack
page read and write
57D4000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5D3A000
trusted library allocation
page read and write
B99000
heap
page read and write
5C56000
trusted library allocation
page read and write
2F6E000
stack
page read and write
472E000
stack
page read and write
5801000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
5D06000
trusted library allocation
page read and write
8452000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
B7F000
heap
page read and write
5822000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
57F5000
trusted library allocation
page read and write
798E000
stack
page read and write
964000
heap
page read and write
3AAE000
stack
page read and write
5807000
trusted library allocation
page read and write
7BCF000
stack
page read and write
5811000
trusted library allocation
page read and write
4E5E000
stack
page read and write
964000
heap
page read and write
584D000
trusted library allocation
page read and write
601A000
trusted library allocation
page execute and read and write
B7D000
heap
page read and write
5C5A000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
DF0000
direct allocation
page read and write
5D84000
trusted library allocation
page read and write
FEA000
unkown
page execute and read and write
758F000
stack
page read and write
57C2000
trusted library allocation
page read and write
B97000
heap
page read and write
80D0000
direct allocation
page read and write
57C4000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
B62000
heap
page read and write
964000
heap
page read and write
80D0000
direct allocation
page read and write
57D2000
trusted library allocation
page read and write
5838000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
80CF000
stack
page read and write
57E4000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
B07000
heap
page read and write
5A52000
trusted library allocation
page read and write
57CD000
trusted library allocation
page read and write
734E000
stack
page read and write
5DB6000
trusted library allocation
page read and write
5E8D000
trusted library allocation
page read and write
57FE000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
57D4000
trusted library allocation
page read and write
57FA000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
708F000
stack
page read and write
6BCE000
stack
page read and write
B97000
heap
page read and write
5C54000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
57BC000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
57D0000
trusted library allocation
page read and write
422E000
stack
page read and write
4CD0000
direct allocation
page read and write
4831000
heap
page read and write
5C5D000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
5EDF000
trusted library allocation
page read and write
57F5000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5E5A000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
7D4E000
stack
page read and write
880C000
stack
page read and write
5C5A000
trusted library allocation
page read and write
54C0000
heap
page read and write
58DA000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
964000
heap
page read and write
AE0000
heap
page read and write
8250000
heap
page read and write
4FCD000
stack
page read and write
10CF000
unkown
page execute and read and write
E01000
unkown
page execute and read and write
57DC000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
4CC0000
direct allocation
page read and write
B7C000
heap
page read and write
57D4000
trusted library allocation
page read and write
B97000
heap
page read and write
B89000
heap
page read and write
40EE000
stack
page read and write
AE7000
heap
page read and write
4830000
heap
page read and write
5D3C000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
4D14000
direct allocation
page read and write
B77000
heap
page read and write
57D4000
trusted library allocation
page read and write
5E58000
trusted library allocation
page read and write
58B9000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
40AF000
stack
page read and write
80D0000
direct allocation
page read and write
6A4F000
stack
page read and write
80D0000
direct allocation
page read and write
57E7000
trusted library allocation
page read and write
57B000
stack
page read and write
57C4000
trusted library allocation
page read and write
4831000
heap
page read and write
3D2E000
stack
page read and write
57ED000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
B99000
heap
page read and write
57C2000
trusted library allocation
page read and write
B95000
heap
page read and write
5D7F000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
964000
heap
page read and write
54BF000
stack
page read and write
5D3B000
trusted library allocation
page read and write
4831000
heap
page read and write
57CB000
trusted library allocation
page read and write
45EE000
stack
page read and write
57F5000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
B6E000
heap
page read and write
E00000
unkown
page readonly
57E5000
trusted library allocation
page read and write
80D0000
direct allocation
page read and write
5D81000
trusted library allocation
page read and write
57CD000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
5DAE000
trusted library allocation
page read and write
2F2F000
stack
page read and write
5843000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
4831000
heap
page read and write
1101000
unkown
page execute and read and write
7E8E000
stack
page read and write
964000
heap
page read and write
B97000
heap
page read and write
553E000
stack
page read and write
5F0000
heap
page read and write
5D73000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
640F000
stack
page read and write
57B4000
trusted library allocation
page read and write
5D35000
trusted library allocation
page read and write
5EAB000
trusted library allocation
page read and write
57FE000
trusted library allocation
page read and write
5D6F000
trusted library allocation
page read and write
B54000
heap
page read and write
8100000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
5912000
trusted library allocation
page read and write
62C9000
trusted library allocation
page read and write
6D0E000
stack
page read and write
B9A000
heap
page read and write
6E4E000
stack
page read and write
B7C000
heap
page read and write
5DAB000
trusted library allocation
page read and write
2DEF000
stack
page read and write
5A5B000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
816C000
stack
page read and write
2AE7000
heap
page read and write
599A000
trusted library allocation
page read and write
B89000
heap
page read and write
B99000
heap
page read and write
B7D000
heap
page read and write
B6F000
heap
page read and write
4831000
heap
page read and write
784E000
stack
page read and write
57E2000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
57F9000
trusted library allocation
page read and write
B9C000
heap
page read and write
5E8F000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
57CC000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
B80000
heap
page read and write
8120000
heap
page read and write
5805000
trusted library allocation
page read and write
4831000
heap
page read and write
306F000
stack
page read and write
5814000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5895000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
B97000
heap
page read and write
58BA000
trusted library allocation
page read and write
30AE000
stack
page read and write
6009000
stack
page read and write
668F000
stack
page read and write
6016000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
57C4000
trusted library allocation
page read and write
C9E000
stack
page read and write
5C58000
trusted library allocation
page read and write
10F9000
unkown
page execute and read and write
57E5000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
7FCE000
stack
page read and write
720E000
stack
page read and write
4C80000
heap
page read and write
58B4000
trusted library allocation
page read and write
81B0000
direct allocation
page execute and read and write
75CE000
stack
page read and write
57E3000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
35AE000
stack
page read and write
346E000
stack
page read and write
5834000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
5843000
trusted library allocation
page read and write
B99000
heap
page read and write
57E6000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
5C60000
trusted library allocation
page read and write
436E000
stack
page read and write
2CEF000
stack
page read and write
5C50000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
4831000
heap
page read and write
3FAE000
stack
page read and write
8130000
direct allocation
page read and write
5C55000
trusted library allocation
page read and write
5DAB000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
B87000
heap
page read and write
964000
heap
page read and write
57C4000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
5F08000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
80D0000
direct allocation
page read and write
5D5F000
trusted library allocation
page read and write
5D18000
trusted library allocation
page read and write
5D82000
trusted library allocation
page read and write
744F000
stack
page read and write
57CB000
trusted library allocation
page read and write
B7D000
heap
page read and write
44AE000
stack
page read and write
5D7B000
trusted library allocation
page read and write
B77000
heap
page read and write
9CAE000
stack
page read and write
B97000
heap
page read and write
D9F000
stack
page read and write
3CEF000
stack
page read and write
964000
heap
page read and write
59FB000
trusted library allocation
page read and write
5CF3000
trusted library allocation
page read and write
5D3D000
trusted library allocation
page read and write
4831000
heap
page read and write
5808000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
5849000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
31AF000
stack
page read and write
5D07000
trusted library allocation
page read and write
36EE000
stack
page read and write
7E4F000
stack
page read and write
5E3C000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
57BA000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
2E2E000
stack
page read and write
53BE000
stack
page read and write
57C6000
trusted library allocation
page read and write
71CF000
stack
page read and write
DF0000
direct allocation
page read and write
61A9000
trusted library allocation
page execute and read and write
B7B000
heap
page read and write
57F7000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
B84000
heap
page read and write
57C4000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
563F000
stack
page read and write
5ECD000
trusted library allocation
page read and write
54C3000
heap
page read and write
B6E000
heap
page read and write
37EF000
stack
page read and write
5838000
trusted library allocation
page read and write
B6E000
heap
page read and write
4E50000
direct allocation
page execute and read and write
5D50000
trusted library allocation
page read and write
5D35000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
DF0000
direct allocation
page read and write
5962000
trusted library allocation
page read and write
964000
heap
page read and write
5C57000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
AD7000
heap
page read and write
446F000
stack
page read and write
36AF000
stack
page read and write
57EE000
trusted library allocation
page read and write
B6E000
heap
page read and write
B7C000
heap
page read and write
5C58000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
7F8F000
stack
page read and write
5DDD000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
57AE000
stack
page read and write
80D0000
direct allocation
page read and write
5D6C000
trusted library allocation
page read and write
824D000
stack
page read and write
5C54000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
5F06000
trusted library allocation
page read and write
3E6E000
stack
page read and write
964000
heap
page read and write
E59000
unkown
page execute and read and write
5C56000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
964000
heap
page read and write
4831000
heap
page read and write
57B9000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
57F2000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
58BB000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
2ADE000
stack
page read and write
57E3000
trusted library allocation
page read and write
382E000
stack
page read and write
57D7000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
9CF0000
trusted library allocation
page read and write
5E4F000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
5A2A000
trusted library allocation
page read and write
4CC0000
direct allocation
page read and write
57D4000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
62C4000
trusted library allocation
page execute and read and write
5C52000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
80D0000
direct allocation
page read and write
581C000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
534F000
stack
page read and write
41EF000
stack
page read and write
5C56000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
794F000
stack
page read and write
8180000
direct allocation
page execute and read and write
57CF000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
80D0000
direct allocation
page read and write
5823000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
B95000
heap
page read and write
62C6000
trusted library allocation
page execute and read and write
5D82000
trusted library allocation
page read and write
964000
heap
page read and write
57C4000
trusted library allocation
page read and write
B8C000
heap
page read and write
964000
heap
page read and write
5C58000
trusted library allocation
page read and write
5E6E000
trusted library allocation
page read and write
There are 827 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0