IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JSON data
dropped
Chrome Cache Entry: 101
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 102
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 103
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 104
ASCII text
dropped
Chrome Cache Entry: 105
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 106
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 108
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 109
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 110
JSON data
dropped
Chrome Cache Entry: 111
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 112
JSON data
downloaded
Chrome Cache Entry: 113
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 72
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 73
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 74
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 75
JSON data
dropped
Chrome Cache Entry: 76
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 77
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 79
JSON data
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 81
JSON data
downloaded
Chrome Cache Entry: 82
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 84
ASCII text
downloaded
Chrome Cache Entry: 85
JSON data
dropped
Chrome Cache Entry: 86
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 87
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 88
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 89
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 90
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 92
JSON data
dropped
Chrome Cache Entry: 93
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 94
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 98
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
JSON data
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1996,i,2893088172898688717,8554445924697785723,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1768,i,17015382825324976768,322143472071585607,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://occupy-blushi.sbs/
unknown
malicious
https://occupy-blushi.sbs/api
104.21.7.169
malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://occupy-blushi.sbs/apil
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://occupy-blushi.sbs/apis
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://occupy-blushi.sbs/#
unknown
https://occupy-blushi.sbs/db
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://www.mozilla.or
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://occupy-blushi.sbs/O
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://occupy-blushi.sbs/_
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://occupy-blushi.sbs/pis
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://occupy-blushi.sbs/api#
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://occupy-blushi.sbs/ule
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://github.com/dotnet/try
unknown
There are 67 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
occupy-blushi.sbs
104.21.7.169
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
property-imper.sbs
unknown
frogs-severz.sbs
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
104.21.7.169
occupy-blushi.sbs
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
5D5D000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
5C03000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
5903000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
5F2D000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
589E000
trusted library allocation
page read and write
5D96000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
F8D000
heap
page read and write
8512000
trusted library allocation
page read and write
4E4F000
stack
page read and write
5CA4000
trusted library allocation
page read and write
435F000
stack
page read and write
5CA4000
trusted library allocation
page read and write
5E19000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
5908000
trusted library allocation
page read and write
531000
unkown
page execute and write copy
5846000
trusted library allocation
page read and write
708000
unkown
page execute and read and write
61F0000
direct allocation
page read and write
760E000
stack
page read and write
584E000
trusted library allocation
page read and write
5EFA000
trusted library allocation
page read and write
5EB6000
trusted library allocation
page read and write
FCC000
heap
page read and write
582F000
trusted library allocation
page read and write
583A000
trusted library allocation
page read and write
371E000
stack
page read and write
5817000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
562F000
stack
page read and write
568E000
stack
page read and write
5D6F000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
684E000
stack
page read and write
5820000
trusted library allocation
page read and write
5866000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
828000
unkown
page execute and write copy
587E000
trusted library allocation
page read and write
4880000
heap
page read and write
584E000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
FB6000
heap
page read and write
582E000
trusted library allocation
page read and write
9C2000
unkown
page execute and write copy
5861000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
2E1F000
stack
page read and write
5CA9000
trusted library allocation
page read and write
5DA7000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
589D000
trusted library allocation
page read and write
6FCE000
stack
page read and write
5ECC000
trusted library allocation
page read and write
748F000
stack
page read and write
5846000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
584F000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
61F0000
direct allocation
page read and write
2E5E000
stack
page read and write
5D4A000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
421F000
stack
page read and write
5853000
trusted library allocation
page read and write
588E000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
582D000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
5EB4000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
57FF000
stack
page read and write
5905000
trusted library allocation
page read and write
597E000
stack
page read and write
581E000
trusted library allocation
page read and write
6D0F000
stack
page read and write
5866000
trusted library allocation
page read and write
8250000
heap
page read and write
5834000
trusted library allocation
page read and write
4860000
heap
page read and write
580E000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page read and write
5F3B000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
5847000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
5CA5000
trusted library allocation
page read and write
7C4E000
stack
page read and write
5DAF000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
4881000
heap
page read and write
61F0000
direct allocation
page read and write
359F000
stack
page read and write
8110000
trusted library allocation
page read and write
485F000
stack
page read and write
582E000
trusted library allocation
page read and write
818C000
stack
page read and write
584E000
trusted library allocation
page read and write
5836000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
FB8000
heap
page read and write
584E000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
583B000
trusted library allocation
page read and write
5DA6000
trusted library allocation
page read and write
670E000
stack
page read and write
5D6C000
trusted library allocation
page read and write
35DE000
stack
page read and write
5CAF000
trusted library allocation
page read and write
449F000
stack
page read and write
784F000
stack
page read and write
81A0000
trusted library allocation
page read and write
5E8D000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
5AA2000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
4881000
heap
page read and write
FC9000
heap
page read and write
5820000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
EDE000
heap
page read and write
3C1E000
stack
page read and write
585B000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
6ACE000
stack
page read and write
4881000
heap
page read and write
580B000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
586F000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
7E8F000
stack
page read and write
58B0000
trusted library allocation
page read and write
50CD000
stack
page read and write
582E000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
587000
unkown
page write copy
582E000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
5836000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
4881000
heap
page read and write
580D000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
2B9F000
stack
page read and write
83EC000
stack
page read and write
4CFE000
stack
page read and write
588B000
trusted library allocation
page read and write
580F000
trusted library allocation
page read and write
79CE000
stack
page read and write
811000
unkown
page execute and read and write
5835000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
4FCE000
stack
page read and write
5DB6000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
C5B000
stack
page read and write
2BDB000
stack
page read and write
5CA4000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
FC0000
heap
page read and write
4881000
heap
page read and write
5831000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
F4B000
heap
page read and write
70CF000
stack
page read and write
81D0000
direct allocation
page execute and read and write
5825000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
5CAF000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
2A90000
heap
page read and write
5CA7000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
5DA1000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
734F000
stack
page read and write
5CA4000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
584E000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
8150000
direct allocation
page read and write
5820000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
5D55000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
800E000
stack
page read and write
584E000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
5E01000
trusted library allocation
page read and write
FC5000
heap
page read and write
5825000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
7E5000
unkown
page execute and read and write
2F5F000
stack
page read and write
584E000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
524E000
stack
page read and write
5800000
trusted library allocation
page read and write
6C0E000
stack
page read and write
5850000
trusted library allocation
page read and write
5F31000
trusted library allocation
page execute and read and write
6041000
trusted library allocation
page execute and read and write
5818000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
5868000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
7ECE000
stack
page read and write
575000
unkown
page execute and read and write
4ED4000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5DFF000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
58AB000
trusted library allocation
page read and write
81B000
unkown
page execute and read and write
5EED000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5CA8000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
FC2000
heap
page read and write
E90000
heap
page read and write
584E000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
5DBC000
trusted library allocation
page read and write
4D00000
direct allocation
page read and write
395F000
stack
page read and write
349E000
stack
page read and write
5CA0000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
5F0C000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
510E000
stack
page read and write
5823000
trusted library allocation
page read and write
588F000
trusted library allocation
page read and write
DC0000
heap
page read and write
584E000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
724E000
stack
page read and write
584E000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
589C000
trusted library allocation
page read and write
5370000
remote allocation
page read and write
583E000
trusted library allocation
page read and write
5DA8000
trusted library allocation
page read and write
FBE000
heap
page read and write
5846000
trusted library allocation
page read and write
5D9A000
trusted library allocation
page read and write
5EEF000
trusted library allocation
page read and write
335E000
stack
page read and write
5CAF000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5905000
trusted library allocation
page read and write
7D8E000
stack
page read and write
59AE000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
584E000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
589000
unkown
page execute and read and write
583E000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
589F000
trusted library allocation
page read and write
61DE000
stack
page read and write
5825000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
5809000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
FC5000
heap
page read and write
31DF000
stack
page read and write
4E90000
direct allocation
page execute and read and write
EC0000
direct allocation
page read and write
5857000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
530000
unkown
page read and write
774E000
stack
page read and write
3D1F000
stack
page read and write
54BC000
stack
page read and write
4E90000
direct allocation
page execute and read and write
5809000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
FC7000
heap
page read and write
4D4B000
stack
page read and write
534F000
stack
page read and write
580E000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
D5A000
stack
page read and write
4D00000
direct allocation
page read and write
5845000
trusted library allocation
page read and write
2A7E000
stack
page read and write
583E000
trusted library allocation
page read and write
63A8000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
381F000
stack
page read and write
5813000
trusted library allocation
page read and write
5DFA000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
4881000
heap
page read and write
5D4E000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
5CA6000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
53BD000
stack
page read and write
583E000
trusted library allocation
page read and write
5EAD000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
5817000
trusted library allocation
page read and write
4881000
heap
page read and write
5841000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
8410000
heap
page read and write
586C000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5846000
trusted library allocation
page read and write
F3A000
heap
page read and write
F07000
heap
page read and write
588C000
trusted library allocation
page read and write
880C000
stack
page read and write
584D000
trusted library allocation
page read and write
7B0E000
stack
page read and write
5825000
trusted library allocation
page read and write
3E5F000
stack
page read and write
5CA0000
trusted library allocation
page read and write
4881000
heap
page read and write
2A97000
heap
page read and write
5A76000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5939000
stack
page read and write
584E000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
531000
unkown
page execute and read and write
4D00000
direct allocation
page read and write
5823000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
F55000
heap
page read and write
411E000
stack
page read and write
5DBA000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
5DC3000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
5ECE000
trusted library allocation
page read and write
FBE000
heap
page read and write
5B99000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
F37000
heap
page read and write
FBB000
heap
page read and write
5866000
trusted library allocation
page read and write
720F000
stack
page read and write
698E000
stack
page read and write
FCC000
heap
page read and write
5813000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
4D44000
direct allocation
page read and write
580F000
trusted library allocation
page read and write
6052000
trusted library allocation
page execute and read and write
5D50000
trusted library allocation
page read and write
8150000
direct allocation
page read and write
5823000
trusted library allocation
page read and write
552E000
stack
page read and write
FCA000
heap
page read and write
5876000
trusted library allocation
page read and write
FAE000
heap
page read and write
8150000
direct allocation
page read and write
5D4C000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
65CF000
stack
page read and write
FC3000
heap
page read and write
584E000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
585D000
trusted library allocation
page read and write
6A8F000
stack
page read and write
5840000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
810F000
stack
page read and write
5D64000
trusted library allocation
page read and write
5370000
remote allocation
page read and write
5DC1000
trusted library allocation
page read and write
FC9000
heap
page read and write
4E9D000
stack
page read and write
5DEB000
trusted library allocation
page read and write
5B8A000
trusted library allocation
page read and write
FC1000
heap
page read and write
5E1B000
trusted library allocation
page read and write
4881000
heap
page read and write
5DA6000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
59D6000
trusted library allocation
page read and write
6E8E000
stack
page read and write
828000
unkown
page execute and read and write
3A9F000
stack
page read and write
582E000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
588F000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
5D8C000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
9C1000
unkown
page execute and read and write
40DF000
stack
page read and write
5802000
trusted library allocation
page read and write
59E6000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
7FCF000
stack
page read and write
584E000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
64C6000
trusted library allocation
page read and write
5DA9000
trusted library allocation
page read and write
DD0000
heap
page read and write
5812000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
FBC000
heap
page read and write
61F0000
direct allocation
page read and write
61F0000
direct allocation
page read and write
4881000
heap
page read and write
5827000
trusted library allocation
page read and write
6E4F000
stack
page read and write
5F2F000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
FAA000
heap
page read and write
5CA9000
trusted library allocation
page read and write
6F8F000
stack
page read and write
5905000
trusted library allocation
page read and write
5F0A000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
6D4E000
stack
page read and write
7ACF000
stack
page read and write
621D000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
631A000
trusted library allocation
page read and write
FC3000
heap
page read and write
5CA2000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
56F3000
heap
page read and write
F21000
heap
page read and write
583E000
trusted library allocation
page read and write
2D1E000
stack
page read and write
5832000
trusted library allocation
page read and write
615F000
stack
page read and write
602F000
trusted library allocation
page execute and read and write
710E000
stack
page read and write
3F9F000
stack
page read and write
58BD000
trusted library allocation
page read and write
3FDE000
stack
page read and write
ED0000
heap
page read and write
FB6000
heap
page read and write
5D8C000
trusted library allocation
page read and write
5845000
trusted library allocation
page read and write
588C000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
5D3F000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
5DA7000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
6BCF000
stack
page read and write
5CA8000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
4881000
heap
page read and write
5866000
trusted library allocation
page read and write
5D99000
stack
page read and write
770F000
stack
page read and write
585A000
trusted library allocation
page read and write
E3E000
stack
page read and write
FB8000
heap
page read and write
5980000
direct allocation
page read and write
FAC000
heap
page read and write
FB8000
heap
page read and write
5CAE000
trusted library allocation
page read and write
788E000
stack
page read and write
3BDF000
stack
page read and write
5E7D000
trusted library allocation
page read and write
5836000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
580F000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
4881000
heap
page read and write
5820000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
5848000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
5884000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
4881000
heap
page read and write
475E000
stack
page read and write
5CA3000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
7C0F000
stack
page read and write
2CDF000
stack
page read and write
5DFE000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
5862000
trusted library allocation
page read and write
4881000
heap
page read and write
5DCA000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
5818000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
5EDA000
trusted library allocation
page read and write
5DB1000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
4881000
heap
page read and write
583D000
trusted library allocation
page read and write
619C000
stack
page read and write
5857000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
5E7B000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
5370000
remote allocation
page read and write
5CA9000
trusted library allocation
page read and write
58B4000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
4881000
heap
page read and write
5D9D000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
5CA3000
trusted library allocation
page read and write
FCC000
heap
page read and write
589C000
trusted library allocation
page read and write
5CAB000
trusted library allocation
page read and write
5CA2000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
81A0000
direct allocation
page execute and read and write
5CA2000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
5CA5000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
8519000
trusted library allocation
page read and write
5835000
trusted library allocation
page read and write
584F000
trusted library allocation
page read and write
587000
unkown
page read and write
4881000
heap
page read and write
FC7000
heap
page read and write
58B4000
trusted library allocation
page read and write
FC5000
heap
page read and write
4E90000
direct allocation
page execute and read and write
5DEC000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page execute and read and write
5820000
trusted library allocation
page read and write
2F9E000
stack
page read and write
4881000
heap
page read and write
581C000
trusted library allocation
page read and write
5DBD000
trusted library allocation
page read and write
5869000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
894E000
stack
page read and write
584E000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
589C000
trusted library allocation
page read and write
309F000
stack
page read and write
321E000
stack
page read and write
3E9E000
stack
page read and write
5823000
trusted library allocation
page read and write
129E000
stack
page read and write
5CA8000
trusted library allocation
page read and write
580E000
trusted library allocation
page read and write
5CAD000
trusted library allocation
page read and write
56F0000
heap
page read and write
5D8F000
trusted library allocation
page read and write
583F000
trusted library allocation
page read and write
5847000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
5CA4000
trusted library allocation
page read and write
FAF000
heap
page read and write
F4F000
heap
page read and write
5895000
trusted library allocation
page read and write
4881000
heap
page read and write
F98000
heap
page read and write
7D4F000
stack
page read and write
5DD5000
trusted library allocation
page read and write
680F000
stack
page read and write
585E000
trusted library allocation
page read and write
F18000
heap
page read and write
30DE000
stack
page read and write
5D8D000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
EDA000
heap
page read and write
5F3D000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
399E000
stack
page read and write
3ADE000
stack
page read and write
580E000
trusted library allocation
page read and write
835E000
stack
page read and write
EB0000
heap
page read and write
5CAB000
trusted library allocation
page read and write
471F000
stack
page read and write
5CAA000
trusted library allocation
page read and write
584A000
trusted library allocation
page read and write
FAF000
heap
page read and write
584E000
trusted library allocation
page read and write
580D000
trusted library allocation
page read and write
FAF000
heap
page read and write
FC8000
heap
page read and write
5DC3000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
5EB1000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
583D000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
331F000
stack
page read and write
588B000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
66CF000
stack
page read and write
4881000
heap
page read and write
584E000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
5CAF000
trusted library allocation
page read and write
4891000
heap
page read and write
44DE000
stack
page read and write
829000
unkown
page execute and write copy
439E000
stack
page read and write
5CA6000
trusted library allocation
page read and write
5E8F000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
45DF000
stack
page read and write
5CA6000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
EC0000
direct allocation
page read and write
FC9000
heap
page read and write
E95000
heap
page read and write
583E000
trusted library allocation
page read and write
5CA9000
trusted library allocation
page read and write
884E000
stack
page read and write
5823000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
4881000
heap
page read and write
584E000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
5818000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
FBC000
heap
page read and write
4881000
heap
page read and write
520F000
stack
page read and write
58B4000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
798F000
stack
page read and write
586C000
trusted library allocation
page read and write
E7D000
stack
page read and write
58BF000
trusted library allocation
page read and write
75CF000
stack
page read and write
64B8000
trusted library allocation
page read and write
530000
unkown
page readonly
584E000
trusted library allocation
page read and write
5DDB000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
5EDC000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
61F0000
direct allocation
page read and write
694F000
stack
page read and write
EC0000
direct allocation
page read and write
385E000
stack
page read and write
345F000
stack
page read and write
425E000
stack
page read and write
621F000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
5877000
trusted library allocation
page read and write
5885000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
5823000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
FAF000
heap
page read and write
5CA2000
trusted library allocation
page read and write
5CAA000
trusted library allocation
page read and write
461E000
stack
page read and write
5DAA000
trusted library allocation
page execute and read and write
5842000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
5CAC000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
738E000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
5B97000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
587E000
trusted library allocation
page read and write
584E000
trusted library allocation
page read and write
FC9000
heap
page read and write
582E000
trusted library allocation
page read and write
74CE000
stack
page read and write
5D47000
trusted library allocation
page read and write
119E000
stack
page read and write
5DB8000
trusted library allocation
page read and write
5CA4000
trusted library allocation
page read and write
3D5E000
stack
page read and write
5DEC000
trusted library allocation
page read and write
5E38000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
36DF000
stack
page read and write
5CA0000
trusted library allocation
page read and write
583A000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
FC3000
heap
page read and write
There are 816 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0