IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 10:07:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 10:07:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 10:07:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 10:07:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Nov 25 10:07:35 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 101
ASCII text
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 103
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 104
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 105
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 109
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 111
JSON data
downloaded
Chrome Cache Entry: 112
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 113
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 114
JSON data
downloaded
Chrome Cache Entry: 115
JSON data
dropped
Chrome Cache Entry: 116
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 117
JSON data
dropped
Chrome Cache Entry: 118
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 119
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 120
ASCII text
dropped
Chrome Cache Entry: 121
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 122
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 123
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 124
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 125
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 126
JSON data
dropped
Chrome Cache Entry: 127
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 128
JSON data
downloaded
Chrome Cache Entry: 129
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 88
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 89
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 90
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 91
JSON data
dropped
Chrome Cache Entry: 92
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 96
JSON data
dropped
Chrome Cache Entry: 97
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 98
JSON data
downloaded
Chrome Cache Entry: 99
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 --field-trial-handle=2184,i,11451357721040655892,3136664989347756057,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=2000,i,4349229689837919820,14898632998453722938,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://frogs-severz.sbs/Z
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
http://185.215.113.16/H
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
https://frogs-severz.sbs/api
172.67.155.47
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://frogs-severz.sbs/apil
unknown
https://frogs-severz.sbs/apin
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://frogs-severz.sbs/apit
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9
unknown
https://frogs-severz.sbs/apib
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://frogs-severz.sbs/pj
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://github.com/adegeo
unknown
https://frogs-severz.sbs/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://frogs-severz.sbs/apiue
unknown
https://frogs-severz.sbs/r
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://frogs-severz.sbs/z
unknown
https://github.com/js-cookie/js-cookie
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 65 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
frogs-severz.sbs
172.67.155.47
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
property-imper.sbs
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
172.67.155.47
frogs-severz.sbs
United States
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
192.168.2.8
unknown
unknown
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
5CE0000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
EE9000
heap
page read and write
5B93000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
EEC000
heap
page read and write
ECB000
heap
page read and write
5B95000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
EED000
heap
page read and write
47D0000
trusted library allocation
page read and write
D14000
heap
page read and write
D14000
heap
page read and write
EB3000
heap
page read and write
5756000
trusted library allocation
page read and write
46D1000
heap
page read and write
5B9F000
trusted library allocation
page read and write
5C4E000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5C9C000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
5748000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
EDB000
heap
page read and write
46D1000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
5756000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5731000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
5762000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
5C65000
trusted library allocation
page read and write
4D39000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
EC9000
heap
page read and write
5791000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
EC9000
heap
page read and write
5546000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
EC9000
heap
page read and write
5DCB000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
427000
unkown
page write copy
5794000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
D14000
heap
page read and write
5D67000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
5771000
trusted library allocation
page read and write
5DD6000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
5D2F000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
5C73000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
5E0F000
trusted library allocation
page read and write
5C7A000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
EC9000
heap
page read and write
46D1000
heap
page read and write
56F5000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5789000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
56F5000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
EBD000
heap
page read and write
5B97000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5CC6000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
46D1000
heap
page read and write
5771000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
56FF000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
EE4000
heap
page read and write
5717000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
5B9F000
trusted library allocation
page read and write
6D6000
unkown
page execute and write copy
5716000
trusted library allocation
page read and write
5747000
trusted library allocation
page read and write
3D1000
unkown
page execute and write copy
5B94000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5C7C000
trusted library allocation
page read and write
EEE000
heap
page read and write
5791000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
576F000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
46D1000
heap
page read and write
5703000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5716000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
D14000
heap
page read and write
5B91000
trusted library allocation
page read and write
EEB000
heap
page read and write
5DD8000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
ED8000
heap
page read and write
5C4B000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
56EF000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5D9C000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
5544000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5B98000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
EE9000
heap
page read and write
5756000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
ED2000
heap
page read and write
57B1000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5B98000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
ECB000
heap
page read and write
D14000
heap
page read and write
5B93000
trusted library allocation
page read and write
5F68000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5756000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
D14000
heap
page read and write
EDF000
heap
page read and write
5716000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
5D39000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
D14000
heap
page read and write
5731000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
4CC0000
direct allocation
page execute and read and write
5CB3000
trusted library allocation
page read and write
61B5000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
5701000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
5D9E000
trusted library allocation
page read and write
EBD000
heap
page read and write
5C63000
trusted library allocation
page read and write
5D95000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
46D1000
heap
page read and write
5706000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
46D1000
heap
page read and write
5B98000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
5CD3000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
EC7000
heap
page read and write
5B97000
trusted library allocation
page read and write
ECF000
heap
page read and write
56F6000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
602B000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
5B9F000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
EBD000
heap
page read and write
5760000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
5C81000
trusted library allocation
page read and write
5CDA000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
D14000
heap
page read and write
5756000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
46D1000
heap
page read and write
5B9B000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
56E2000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
5B9C000
trusted library allocation
page read and write
5548000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
ECB000
heap
page read and write
5CD8000
trusted library allocation
page read and write
5B98000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
56E3000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
574C000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
ECD000
heap
page read and write
46C0000
direct allocation
page read and write
5723000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
EDB000
heap
page read and write
5785000
trusted library allocation
page read and write
574C000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
58C5000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
D14000
heap
page read and write
5CA9000
trusted library allocation
page read and write
554A000
trusted library allocation
page read and write
EE9000
heap
page read and write
56F1000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5D09000
trusted library allocation
page read and write
EE9000
heap
page read and write
5CEF000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
D14000
heap
page read and write
5756000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5CDC000
trusted library allocation
page read and write
46D1000
heap
page read and write
EEC000
heap
page read and write
5C9F000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
58F4000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5D1F000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
5C71000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
5C9D000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
56E3000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
58F3000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
ECF000
heap
page read and write
574E000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
46C0000
direct allocation
page read and write
5C4E000
trusted library allocation
page read and write
576E000
trusted library allocation
page read and write
ED5000
heap
page read and write
5C5D000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5D3F000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
56F5000
trusted library allocation
page read and write
EEB000
heap
page read and write
570A000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
5D7D000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
4BB4000
direct allocation
page read and write
4B70000
direct allocation
page read and write
5B9C000
trusted library allocation
page read and write
D14000
heap
page read and write
5706000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
5775000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
4B60000
direct allocation
page read and write
5A76000
trusted library allocation
page read and write
4B60000
direct allocation
page read and write
5543000
trusted library allocation
page read and write
46D1000
heap
page read and write
46C0000
direct allocation
page read and write
3D0000
unkown
page readonly
5707000
trusted library allocation
page read and write
56E3000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
EDC000
heap
page read and write
56F5000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5739000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
EEB000
heap
page read and write
5742000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
56E2000
trusted library allocation
page read and write
576A000
trusted library allocation
page read and write
D14000
heap
page read and write
5707000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
5796000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
EED000
heap
page read and write
5768000
trusted library allocation
page read and write
EE4000
heap
page read and write
577E000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
EBE000
heap
page read and write
56E1000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
5F62000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5706000
trusted library allocation
page read and write
61F2000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
EE7000
heap
page read and write
5758000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
5727000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
56F9000
trusted library allocation
page read and write
574F000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
5747000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
46D1000
heap
page read and write
5B92000
trusted library allocation
page read and write
EE4000
heap
page read and write
5BA0000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5715000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
56E4000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
EBC000
heap
page read and write
46D1000
heap
page read and write
D14000
heap
page read and write
EE9000
heap
page read and write
5771000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5CC4000
trusted library allocation
page read and write
46D1000
heap
page read and write
58F2000
trusted library allocation
page read and write
D14000
heap
page read and write
5CC8000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
576C000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
56E5000
trusted library allocation
page read and write
5B96000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
46D1000
heap
page read and write
574E000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
EDC000
heap
page read and write
5B98000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
EE9000
heap
page read and write
EEE000
heap
page read and write
5C8A000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
46D1000
heap
page read and write
5758000
trusted library allocation
page read and write
5742000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
EA5000
heap
page read and write
5C7C000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
5CB3000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
EED000
heap
page read and write
5B9E000
trusted library allocation
page read and write
EB3000
heap
page read and write
ECB000
heap
page read and write
D14000
heap
page read and write
5B95000
trusted library allocation
page read and write
5955000
trusted library allocation
page read and write
572F000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
5768000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5B93000
trusted library allocation
page read and write
EEC000
heap
page read and write
ED3000
heap
page read and write
574E000
trusted library allocation
page read and write
D14000
heap
page read and write
56F6000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
5B93000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
57A6000
trusted library allocation
page read and write
EB4000
heap
page read and write
5756000
trusted library allocation
page read and write
575D000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
51F0000
remote allocation
page read and write
576F000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5772000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
ECD000
heap
page read and write
5C83000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
ECB000
heap
page read and write
5BA0000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
574C000
trusted library allocation
page read and write
5C3F000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
EDF000
heap
page read and write
46D1000
heap
page read and write
46C0000
direct allocation
page read and write
EED000
heap
page read and write
5761000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5C7E000
trusted library allocation
page read and write
5CCA000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
EC4000
heap
page read and write
5543000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
EBD000
heap
page read and write
58F6000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
5759000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
5773000
trusted library allocation
page read and write
46D1000
heap
page read and write
5F66000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
51F0000
remote allocation
page read and write
5B9D000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
5DDB000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
D14000
heap
page read and write
5D07000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
EDD000
heap
page read and write
5B93000
trusted library allocation
page read and write
D14000
heap
page read and write
574E000
trusted library allocation
page read and write
572E000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
51F0000
remote allocation
page read and write
EEB000
heap
page read and write
575E000
trusted library allocation
page read and write
5545000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
56EB000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
46D1000
heap
page read and write
EEB000
heap
page read and write
EED000
heap
page read and write
5721000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
5C4A000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
D14000
heap
page read and write
56FB000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
5A25000
trusted library allocation
page read and write
5CB5000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
574C000
trusted library allocation
page read and write
EDA000
heap
page read and write
D14000
heap
page read and write
ED3000
heap
page read and write
58F4000
trusted library allocation
page read and write
5B9C000
trusted library allocation
page read and write
5706000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5758000
trusted library allocation
page read and write
5775000
trusted library allocation
page read and write
59D4000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
EEB000
heap
page read and write
EE9000
heap
page read and write
5C9E000
trusted library allocation
page read and write
57E9000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
5D93000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5CD5000
trusted library allocation
page read and write
46D1000
heap
page read and write
58F6000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
46C0000
direct allocation
page read and write
5DDC000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
574E000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
5B9E000
trusted library allocation
page read and write
EE4000
heap
page read and write
5E2C000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
46D1000
heap
page read and write
5B9C000
trusted library allocation
page read and write
575C000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
EC9000
heap
page read and write
5717000
trusted library allocation
page read and write
There are 674 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0