IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 101
JSON data
dropped
Chrome Cache Entry: 102
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 103
JSON data
downloaded
Chrome Cache Entry: 104
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 66
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 67
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 68
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 69
JSON data
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 71
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 72
JSON data
dropped
Chrome Cache Entry: 73
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 74
JSON data
downloaded
Chrome Cache Entry: 75
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 77
ASCII text
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 79
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 80
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 81
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 82
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 84
JSON data
dropped
Chrome Cache Entry: 85
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 86
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 88
JSON data
downloaded
Chrome Cache Entry: 89
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 90
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
JSON data
downloaded
Chrome Cache Entry: 92
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 93
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 94
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 95
ASCII text
dropped
Chrome Cache Entry: 96
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 97
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 99
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2680 --field-trial-handle=2436,i,13883662097603284509,5735806010481988831,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1992,i,3177487743473689388,10012693031284183777,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/apil
unknown
https://property-imper.sbs/api
104.21.33.116
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/off/def.exes
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.mozilla.or
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://crl.microP5
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://property-imper.sbs/apida
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://property-imper.sbs/Q
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 57 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5FA0000
trusted library allocation
page read and write
80CF000
stack
page read and write
57DE000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
1054000
heap
page read and write
5FD3000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
5F42000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
347E000
stack
page read and write
1207000
heap
page read and write
5F95000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
5E91000
trusted library allocation
page read and write
4F80000
direct allocation
page execute and read and write
4981000
heap
page read and write
5F38000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
5E98000
trusted library allocation
page read and write
1242000
heap
page read and write
57E5000
trusted library allocation
page read and write
5FBC000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
5FF1000
trusted library allocation
page read and write
5E9D000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
5FB7000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
5690000
heap
page read and write
6F8E000
stack
page read and write
86F0000
trusted library allocation
page read and write
66B5000
trusted library allocation
page execute and read and write
57F4000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
5F9F000
trusted library allocation
page read and write
4981000
heap
page read and write
5E92000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
75CE000
stack
page read and write
5854000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
6093000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
5F25000
trusted library allocation
page read and write
5806000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
1227000
heap
page read and write
1054000
heap
page read and write
4981000
heap
page read and write
8500000
direct allocation
page execute and read and write
57CE000
trusted library allocation
page read and write
5FD9000
trusted library allocation
page read and write
36FE000
stack
page read and write
5F81000
trusted library allocation
page read and write
5E91000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
3E3F000
stack
page read and write
566E000
stack
page read and write
5844000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
4FA0000
direct allocation
page execute and read and write
A74E000
stack
page read and write
71CF000
stack
page read and write
57BB000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
1223000
heap
page read and write
57CF000
trusted library allocation
page read and write
57E4000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
1196000
heap
page read and write
3F6000
unkown
page execute and read and write
1239000
heap
page read and write
65AB000
trusted library allocation
page execute and read and write
5854000
trusted library allocation
page read and write
4981000
heap
page read and write
1242000
heap
page read and write
6412000
trusted library allocation
page execute and read and write
57CA000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5F93000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
343F000
stack
page read and write
7C0E000
stack
page read and write
784E000
stack
page read and write
57E9000
trusted library allocation
page read and write
5A1000
unkown
page execute and write copy
57DF000
trusted library allocation
page read and write
121B000
heap
page read and write
57E5000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
5E93000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
57DF000
trusted library allocation
page read and write
1054000
heap
page read and write
6130000
direct allocation
page read and write
580E000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
6402000
trusted library allocation
page read and write
57B5000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
5FB9000
trusted library allocation
page read and write
7F8F000
stack
page read and write
11C2000
heap
page read and write
1225000
heap
page read and write
57CF000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
5F99000
trusted library allocation
page read and write
86FA000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
5ACD000
trusted library allocation
page read and write
708F000
stack
page read and write
5E9C000
trusted library allocation
page read and write
5FC6000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
433F000
stack
page read and write
447F000
stack
page read and write
5FD1000
trusted library allocation
page read and write
6D0E000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
5E9E000
trusted library allocation
page read and write
2D6E000
stack
page read and write
798E000
stack
page read and write
1223000
heap
page read and write
57ED000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
2E7F000
stack
page read and write
5863000
trusted library allocation
page read and write
1054000
heap
page read and write
57DA000
trusted library allocation
page read and write
5E9E000
trusted library allocation
page read and write
5490000
remote allocation
page read and write
602F000
trusted library allocation
page read and write
4981000
heap
page read and write
5E9E000
trusted library allocation
page read and write
589F000
trusted library allocation
page read and write
60C8000
trusted library allocation
page read and write
57DF000
trusted library allocation
page read and write
603F000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
1242000
heap
page read and write
1237000
heap
page read and write
57D5000
trusted library allocation
page read and write
7A8F000
stack
page read and write
5E9C000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
1242000
heap
page read and write
5F75000
trusted library allocation
page read and write
2D2E000
stack
page read and write
5F23000
trusted library allocation
page read and write
3FBD000
stack
page read and write
5F44000
trusted library allocation
page read and write
5F7F000
trusted library allocation
page read and write
579F000
stack
page read and write
57B2000
trusted library allocation
page read and write
1227000
heap
page read and write
581F000
trusted library allocation
page read and write
5E9E000
trusted library allocation
page read and write
4F90000
direct allocation
page execute and read and write
8350000
direct allocation
page read and write
5E9E000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
5F82000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
583F000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
5876000
trusted library allocation
page read and write
605F000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
57B5000
trusted library allocation
page read and write
59F6000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
57DD000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
333E000
stack
page read and write
690F000
stack
page read and write
11FA000
heap
page read and write
76CF000
stack
page read and write
4E00000
direct allocation
page read and write
6E0F000
stack
page read and write
4E4C000
stack
page read and write
3F7F000
stack
page read and write
5E9E000
trusted library allocation
page read and write
8BCE000
stack
page read and write
54FE000
stack
page read and write
5FAB000
trusted library allocation
page read and write
1226000
heap
page read and write
102E000
stack
page read and write
57C2000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
123F000
heap
page read and write
57C1000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
57DF000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
1233000
heap
page read and write
57B6000
trusted library allocation
page read and write
538E000
stack
page read and write
6021000
trusted library allocation
page read and write
4FB0000
direct allocation
page execute and read and write
580D000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
6410000
trusted library allocation
page read and write
67CF000
stack
page read and write
40BF000
stack
page read and write
8350000
direct allocation
page read and write
780F000
stack
page read and write
393F000
stack
page read and write
57F2000
trusted library allocation
page read and write
641A000
trusted library allocation
page execute and read and write
4981000
heap
page read and write
57F8000
trusted library allocation
page read and write
1236000
heap
page read and write
5856000
trusted library allocation
page read and write
70CE000
stack
page read and write
83B0000
direct allocation
page read and write
5C90000
trusted library allocation
page read and write
4981000
heap
page read and write
57F4000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
5A15000
trusted library allocation
page read and write
46FF000
stack
page read and write
5E9D000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
40FE000
stack
page read and write
6121000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
5EFD000
trusted library allocation
page read and write
5F24000
trusted library allocation
page read and write
45FE000
stack
page read and write
5F68000
trusted library allocation
page read and write
57E4000
trusted library allocation
page read and write
35BE000
stack
page read and write
307F000
stack
page read and write
4981000
heap
page read and write
5FB3000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5FEF000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
2CEF000
stack
page read and write
5F67000
trusted library allocation
page read and write
770E000
stack
page read and write
6BCE000
stack
page read and write
57DE000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
1054000
heap
page read and write
5F37000
trusted library allocation
page read and write
5E97000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
4FC0000
direct allocation
page execute and read and write
5F91000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
4990000
heap
page read and write
45BF000
stack
page read and write
57FD000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
5818000
trusted library allocation
page read and write
357F000
stack
page read and write
1130000
direct allocation
page read and write
5E9E000
trusted library allocation
page read and write
30BE000
stack
page read and write
57FD000
trusted library allocation
page read and write
5FB9000
trusted library allocation
page read and write
5E9A000
trusted library allocation
page read and write
7BCF000
stack
page read and write
1234000
heap
page read and write
57C2000
trusted library allocation
page read and write
5E9A000
trusted library allocation
page read and write
1224000
heap
page read and write
57CA000
trusted library allocation
page read and write
84EE000
stack
page read and write
57EE000
trusted library allocation
page read and write
5C8E000
stack
page read and write
60CA000
trusted library allocation
page read and write
1225000
heap
page read and write
4981000
heap
page read and write
60DB000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
6A8E000
stack
page read and write
5FAE000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
1054000
heap
page read and write
57ED000
trusted library allocation
page read and write
4991000
heap
page read and write
3A7F000
stack
page read and write
1237000
heap
page read and write
4FDF000
trusted library allocation
page read and write
1224000
heap
page read and write
5E9A000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
5832000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
582C000
trusted library allocation
page read and write
122D000
heap
page read and write
3CFF000
stack
page read and write
5F95000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
123C000
heap
page read and write
611C000
trusted library allocation
page read and write
1231000
heap
page read and write
57EA000
trusted library allocation
page read and write
59FC000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
1050000
heap
page read and write
57EE000
trusted library allocation
page read and write
5FDE000
stack
page read and write
1241000
heap
page read and write
8B8C000
stack
page read and write
5E9F000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
611C000
stack
page read and write
60C0000
trusted library allocation
page read and write
115A000
heap
page read and write
57D7000
trusted library allocation
page read and write
548F000
stack
page read and write
57FD000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
5F7E000
trusted library allocation
page read and write
57F2000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
60BE000
trusted library allocation
page read and write
6156000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
2D70000
heap
page read and write
60B1000
trusted library allocation
page read and write
1223000
heap
page read and write
5E95000
trusted library allocation
page read and write
5F6C000
trusted library allocation
page read and write
404000
unkown
page execute and read and write
4F4F000
stack
page read and write
122E000
heap
page read and write
57C5000
trusted library allocation
page read and write
5F8A000
trusted library allocation
page read and write
5FF3000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
5F5A000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
124B000
heap
page read and write
100000
unkown
page read and write
5F93000
trusted library allocation
page read and write
7E4F000
stack
page read and write
1242000
heap
page read and write
2EF000
unkown
page execute and read and write
57D8000
trusted library allocation
page read and write
31BF000
stack
page read and write
520D000
stack
page read and write
57C3000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
86F2000
trusted library allocation
page read and write
1236000
heap
page read and write
57E0000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
5FD6000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
5F4E000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
122B000
heap
page read and write
4981000
heap
page read and write
60DD000
trusted library allocation
page read and write
1227000
heap
page read and write
8350000
trusted library allocation
page read and write
36BF000
stack
page read and write
4F90000
direct allocation
page execute and read and write
8380000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
6405000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
748E000
stack
page read and write
57D3000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
57BD000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
59EE000
stack
page read and write
57D7000
trusted library allocation
page read and write
EFB000
stack
page read and write
57D5000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
611F000
trusted library allocation
page read and write
5B65000
trusted library allocation
page read and write
4981000
heap
page read and write
5F8D000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
423E000
stack
page read and write
8350000
direct allocation
page read and write
581D000
trusted library allocation
page read and write
6CCF000
stack
page read and write
5E9E000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
4981000
heap
page read and write
5825000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
5FD7000
trusted library allocation
page read and write
1248000
heap
page read and write
607F000
trusted library allocation
page read and write
1236000
heap
page read and write
5E95000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
57CA000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
4F60000
direct allocation
page execute and read and write
3BFE000
stack
page read and write
57C5000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
5693000
heap
page read and write
5854000
trusted library allocation
page read and write
3EE000
unkown
page execute and read and write
5E97000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
1225000
heap
page read and write
57D3000
trusted library allocation
page read and write
57DC000
trusted library allocation
page read and write
60EC000
trusted library allocation
page read and write
824E000
stack
page read and write
57DD000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
5833000
trusted library allocation
page read and write
1054000
heap
page read and write
57C8000
trusted library allocation
page read and write
5F89000
stack
page read and write
5FAC000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
100000
unkown
page readonly
734E000
stack
page read and write
5F5A000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
123C000
heap
page read and write
3C7000
unkown
page execute and read and write
57D3000
trusted library allocation
page read and write
63F4000
trusted library allocation
page read and write
4E54000
direct allocation
page read and write
57BB000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
1150000
heap
page read and write
601F000
trusted library allocation
page read and write
5FB5000
trusted library allocation
page read and write
60EE000
trusted library allocation
page read and write
1054000
heap
page read and write
145000
unkown
page execute and read and write
57F6000
trusted library allocation
page read and write
83EC000
stack
page read and write
57B1000
trusted library allocation
page read and write
5E99000
trusted library allocation
page read and write
1054000
heap
page read and write
5F3A000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
58ED000
stack
page read and write
57ED000
trusted library allocation
page read and write
5FBB000
trusted library allocation
page read and write
121B000
heap
page read and write
5E9D000
trusted library allocation
page read and write
4981000
heap
page read and write
1242000
heap
page read and write
134E000
stack
page read and write
5E96000
trusted library allocation
page read and write
534F000
stack
page read and write
57E5000
trusted library allocation
page read and write
1120000
heap
page read and write
57E0000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
123D000
heap
page read and write
BE0000
heap
page read and write
1187000
heap
page read and write
5E96000
trusted library allocation
page read and write
85F0000
heap
page read and write
57FD000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
1054000
heap
page read and write
1224000
heap
page read and write
5F3B000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
7ACE000
stack
page read and write
5F8B000
trusted library allocation
page read and write
4981000
heap
page read and write
8350000
direct allocation
page read and write
3BBF000
stack
page read and write
57EE000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
7D4E000
stack
page read and write
5F9E000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
1054000
heap
page read and write
5C92000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
5E9A000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
31FE000
stack
page read and write
57ED000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
405000
unkown
page execute and write copy
57DD000
trusted library allocation
page read and write
60FC000
trusted library allocation
page read and write
6061000
trusted library allocation
page read and write
5815000
trusted library allocation
page read and write
1223000
heap
page read and write
1224000
heap
page read and write
57D5000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
5FA9000
trusted library allocation
page read and write
730F000
stack
page read and write
583E000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
57E0000
trusted library allocation
page read and write
57CF000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
109E000
stack
page read and write
5490000
remote allocation
page read and write
6B8F000
stack
page read and write
5F4E000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
680E000
stack
page read and write
5E91000
trusted library allocation
page read and write
758F000
stack
page read and write
B7B000
stack
page read and write
5F88000
trusted library allocation
page read and write
4DC0000
heap
page read and write
57E4000
trusted library allocation
page read and write
5E98000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
5F7C000
trusted library allocation
page read and write
5A1000
unkown
page execute and read and write
510E000
stack
page read and write
5F77000
trusted library allocation
page read and write
1207000
heap
page read and write
5831000
trusted library allocation
page read and write
892E000
stack
page read and write
5490000
remote allocation
page read and write
5E95000
trusted library allocation
page read and write
122D000
heap
page read and write
57D3000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
5F4F000
trusted library allocation
page read and write
4E00000
direct allocation
page read and write
5F4D000
trusted library allocation
page read and write
5F9B000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
5E9A000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
1054000
heap
page read and write
4E00000
direct allocation
page read and write
5805000
trusted library allocation
page read and write
5E9D000
trusted library allocation
page read and write
122B000
heap
page read and write
5810000
trusted library allocation
page read and write
1237000
heap
page read and write
5832000
trusted library allocation
page read and write
1236000
heap
page read and write
5E9C000
trusted library allocation
page read and write
1233000
heap
page read and write
720E000
stack
page read and write
11B7000
heap
page read and write
5FBB000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
5E93000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
4981000
heap
page read and write
57DD000
trusted library allocation
page read and write
5F6A000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
60DF000
stack
page read and write
57DA000
trusted library allocation
page read and write
524E000
stack
page read and write
57FD000
trusted library allocation
page read and write
157000
unkown
page write copy
7D0F000
stack
page read and write
5832000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
4F9D000
stack
page read and write
5FB5000
trusted library allocation
page read and write
5E97000
trusted library allocation
page read and write
397E000
stack
page read and write
57EC000
trusted library allocation
page read and write
8A2F000
stack
page read and write
1054000
heap
page read and write
1248000
heap
page read and write
1239000
heap
page read and write
101000
unkown
page execute and read and write
5FF5000
trusted library allocation
page read and write
6E4E000
stack
page read and write
5FB7000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
1242000
heap
page read and write
57C2000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
57CF000
trusted library allocation
page read and write
57F2000
trusted library allocation
page read and write
5863000
trusted library allocation
page read and write
122E000
heap
page read and write
6F4F000
stack
page read and write
111B000
stack
page read and write
820F000
stack
page read and write
5E99000
trusted library allocation
page read and write
1234000
heap
page read and write
57E9000
trusted library allocation
page read and write
604F000
trusted library allocation
page read and write
101000
unkown
page execute and write copy
585E000
trusted library allocation
page read and write
157000
unkown
page read and write
57D7000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
487E000
stack
page read and write
383E000
stack
page read and write
57B2000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
57D3000
trusted library allocation
page read and write
2F7F000
stack
page read and write
4981000
heap
page read and write
4F90000
direct allocation
page execute and read and write
57E7000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
5FB9000
trusted library allocation
page read and write
5F3A000
trusted library allocation
page read and write
66C4000
trusted library allocation
page execute and read and write
5F26000
trusted library allocation
page read and write
497F000
stack
page read and write
1130000
direct allocation
page read and write
83B0000
direct allocation
page read and write
1054000
heap
page read and write
57E4000
trusted library allocation
page read and write
122B000
heap
page read and write
4980000
heap
page read and write
5F97000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
810E000
stack
page read and write
8350000
direct allocation
page read and write
5E90000
trusted library allocation
page read and write
1226000
heap
page read and write
5854000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
5E9C000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
1211000
heap
page read and write
1054000
heap
page read and write
159000
unkown
page execute and read and write
1227000
heap
page read and write
57D4000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
5E95000
trusted library allocation
page read and write
83B0000
direct allocation
page read and write
57B4000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
32FF000
stack
page read and write
5F4B000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
5F38000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
483F000
stack
page read and write
5854000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
57D8000
trusted library allocation
page read and write
57FD000
trusted library allocation
page read and write
7FCE000
stack
page read and write
5F65000
trusted library allocation
page read and write
1054000
heap
page read and write
5A2E000
stack
page read and write
50CC000
stack
page read and write
1234000
heap
page read and write
57C0000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
5E9D000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5E9A000
trusted library allocation
page read and write
5AD5000
trusted library allocation
page read and write
3ABE000
stack
page read and write
57DD000
trusted library allocation
page read and write
794F000
stack
page read and write
57CF000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
8540000
direct allocation
page execute and read and write
8350000
direct allocation
page read and write
57FA000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
44BE000
stack
page read and write
5F51000
trusted library allocation
page read and write
5F26000
trusted library allocation
page read and write
57ED000
trusted library allocation
page read and write
2D77000
heap
page read and write
57B1000
trusted library allocation
page read and write
57DB000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
4F70000
direct allocation
page execute and read and write
124B000
heap
page read and write
57D7000
trusted library allocation
page read and write
6051000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
60AF000
trusted library allocation
page read and write
57DF000
trusted library allocation
page read and write
57B2000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
611A000
trusted library allocation
page read and write
57D5000
trusted library allocation
page read and write
5F28000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
5A2000
unkown
page execute and write copy
57CA000
trusted library allocation
page read and write
1054000
heap
page read and write
57C2000
trusted library allocation
page read and write
404000
unkown
page execute and write copy
57ED000
trusted library allocation
page read and write
8510000
heap
page read and write
57E2000
trusted library allocation
page read and write
5E9F000
trusted library allocation
page read and write
834F000
stack
page read and write
1212000
heap
page read and write
BF0000
heap
page read and write
5A2D000
trusted library allocation
page read and write
37FF000
stack
page read and write
5AC5000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
5E9E000
trusted library allocation
page read and write
55FF000
stack
page read and write
57D8000
trusted library allocation
page read and write
5E9E000
trusted library allocation
page read and write
11A1000
heap
page read and write
1130000
direct allocation
page read and write
5EA0000
trusted library allocation
page read and write
5E9B000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
5A69000
stack
page read and write
41FF000
stack
page read and write
5816000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
4E10000
direct allocation
page read and write
1227000
heap
page read and write
5F4C000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
473E000
stack
page read and write
4981000
heap
page read and write
5F9D000
trusted library allocation
page read and write
1227000
heap
page read and write
10DE000
stack
page read and write
5E96000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
437E000
stack
page read and write
57ED000
trusted library allocation
page read and write
62EA000
trusted library allocation
page read and write
5FD4000
trusted library allocation
page read and write
583A000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
5FC4000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
694E000
stack
page read and write
5815000
trusted library allocation
page read and write
5E9A000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
1130000
direct allocation
page read and write
57EC000
trusted library allocation
page read and write
744F000
stack
page read and write
1054000
heap
page read and write
5F80000
trusted library allocation
page read and write
5E96000
trusted library allocation
page read and write
122F000
heap
page read and write
59FA000
trusted library allocation
page read and write
1054000
heap
page read and write
3E7E000
stack
page read and write
9E50000
trusted library allocation
page read and write
581E000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
3D3E000
stack
page read and write
144E000
stack
page read and write
57F7000
trusted library allocation
page read and write
57FE000
trusted library allocation
page read and write
7E8E000
stack
page read and write
6041000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
6416000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
5874000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
8A8B000
stack
page read and write
115E000
heap
page read and write
123D000
heap
page read and write
6A4F000
stack
page read and write
6095000
trusted library allocation
page read and write
1054000
heap
page read and write
4981000
heap
page read and write
60FA000
trusted library allocation
page read and write
57BB000
trusted library allocation
page read and write
66C6000
trusted library allocation
page execute and read and write
5E98000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
57E7000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
5FBA000
trusted library allocation
page read and write
8350000
direct allocation
page read and write
There are 861 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0