IOC Report
https://workdrive.zohoexternal.com/external/e6b6caa7935dc26506daa69f1bbc974bb9ff94fe4fb64dfb0de1a223c630f65a/download

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\Tax Forms.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\ICACHE-108D0472.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ICACHE-26455F5C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ICACHE-27DAA93D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ICACHE-30467910.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ICACHE-53B5DC58.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ICACHE-6B4D3983.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ICACHE-6FD7303A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ICACHE-72D82FC5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-12F331BD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-1585BCAB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-18552155.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-39AD33B0.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-3E51AEB3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-3F8582D8.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-40794635.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-44A4623E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-650B06DD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\ILIST-7DEA5D26.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:47:11 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:47:11 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:47:11 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:47:11 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Apr 23 18:47:11 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\Tax Forms.zip.crdownload
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
Chrome Cache Entry: 124
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 125
Zip archive data, at least v2.0 to extract, compression method=deflate
downloaded
Chrome Cache Entry: 126
JSON data
downloaded
Chrome Cache Entry: 127
JSON data
dropped
Chrome Cache Entry: 128
JSON data
downloaded
Chrome Cache Entry: 129
ASCII text, with very long lines (2274), with no line terminators
downloaded
Chrome Cache Entry: 130
ASCII text, with very long lines (33668), with no line terminators
downloaded
Chrome Cache Entry: 131
Web Open Font Format (Version 2), TrueType, length 67552, version 2.8978
downloaded
Chrome Cache Entry: 132
JSON data
dropped
Chrome Cache Entry: 133
JSON data
downloaded
Chrome Cache Entry: 134
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 135
Web Open Font Format (Version 2), CFF, length 55176, version 4.0
downloaded
Chrome Cache Entry: 136
HTML document, ASCII text, with very long lines (11472)
downloaded
Chrome Cache Entry: 137
ASCII text, with very long lines (65451)
downloaded
Chrome Cache Entry: 138
ASCII text, with very long lines (560), with no line terminators
downloaded
Chrome Cache Entry: 139
Unicode text, UTF-8 text, with very long lines (65534), with no line terminators
downloaded
Chrome Cache Entry: 140
Web Open Font Format (Version 2), TrueType, length 67468, version 2.8978
downloaded
Chrome Cache Entry: 141
JSON data
dropped
Chrome Cache Entry: 142
JSON data
downloaded
Chrome Cache Entry: 143
ASCII text, with very long lines (546)
downloaded
Chrome Cache Entry: 144
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 145
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 146
Web Open Font Format (Version 2), TrueType, length 68152, version 2.8978
downloaded
Chrome Cache Entry: 147
ASCII text
downloaded
Chrome Cache Entry: 148
Web Open Font Format (Version 2), CFF, length 54808, version 4.0
downloaded
Chrome Cache Entry: 149
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 150
ASCII text, with very long lines (65374)
downloaded
Chrome Cache Entry: 151
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 152
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 153
Web Open Font Format (Version 2), CFF, length 59724, version 4.0
downloaded
Chrome Cache Entry: 154
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 155
ASCII text, with very long lines (65536), with no line terminators
downloaded
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://workdrive.zohoexternal.com/external/e6b6caa7935dc26506daa69f1bbc974bb9ff94fe4fb64dfb0de1a223c630f65a/download
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1936,i,2894464684335535053,7787294115027878273,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\user\Downloads\Tax Forms\Tax Forms.exe
"C:\Users\user\Downloads\Tax Forms\Tax Forms.exe"
C:\Users\user\Downloads\Tax Forms\Tax Forms.exe
"C:\Users\user\Downloads\Tax Forms\Tax Forms.exe"

URLs

Name
IP
Malicious
https://workdrive.zohoexternal.com/external/e6b6caa7935dc26506daa69f1bbc974bb9ff94fe4fb64dfb0de1a223c630f65a/download
https://static.zohocdn.com/zohofonts/zohopuvi/4.0/Zoho_Puvi_Regular.woff2
204.141.33.48
https://storage.citrixonline.com/storage/files/product/g2m/path/AIR//Upload/AIR/UploadFolder
unknown
https://static.zohocdn.com/webfonts/robotomedium/font.woff2
204.141.33.48
https://audio-usability.cdn.citrixonline.com/https://i22.gotomeeting.com/island/ash/ash.tmpl/approve
unknown
https://www.zoho.com/workdrive
unknown
https://static.zohocdn.com/personal/stable/jsapps/files/dist/engines-dist/wd-chooser-components/assets/engine-ea5829e90f6248fb04814ea6c5ba0f67.js
204.141.33.48
https://js.zohostatic.com/personal/stable
unknown
https://workdrive.zohoexternal.com/sheet
unknown
https://workdrive.zohoexternal.com/zwd_sw.js
136.143.191.16
https://www.handyviewer.com/donate.htmlopenS
unknown
https://static.zohocdn.com/personal/stable/jsapps/files/dist/engines-dist/wd-docs-menu/assets/engine-b5e083f490a369d30240b6020dc7105f.js
204.141.33.48
https://p5.osdimg.com/g2mupdater/live/config.jsonDownloading
unknown
https://static.zohocdn.com/zohofonts/zohopuvi/4.0/Zoho_Puvi_Bold.woff2
204.141.33.48
https://www.handyviewer.com/openSV
unknown
https://css.zohostatic.com/personal/stable
unknown
https://workdrive.zohoexternal.com/show
unknown
http://www.openssl.org/support/faq.html
unknown
https://workdrive.zohoexternal.com/writer
unknown
https://logging.citrixonline.com/report..
unknown
https://workdrive.zohoexternal.com/external/e6b6caa7935dc26506daa69f1bbc974bb9ff94fe4fb64dfb0de1a223c630f65a/download
http://www.citrix.com/about/legal/citrix-online-privacy-policy-
unknown
https://static.zohocdn.com/personal/stable/jsapps/files/dist/assets/vendor-c443ff360647f7450d97230139bcc018.js
204.141.33.48
https://cdn.gotomeet.at/images/whatsnew/..
unknown
https://workdrive.zohoexternal.com/services/oembed?type=json&url=https%3A%2F%2Fworkdrive.zohoexterna
unknown
https://files.zohoexternal.com/WD-Chunk-Public/v2/stream/publicupload
unknown
https://www.handyviewer.com/contact.htmlopenSV
unknown
http://s.gotomeeting.com/forgotpwd?email=
unknown
https://workdrive.zohoexternal.com/public/api/v1/license/4431844000081981116
unknown
https://www.handyviewer.com/donate.htmlopen
unknown
https://citrix.co1.qualtrics.com/SE/?SID=SV_3pHgu7AoUzFSGJD&sid=getBaseFeedbackURL()%s-Audio
unknown
https://cdn.gotomeet.at/images/whatsnew/
unknown
https://static.zohocdn.com/personal/stable/jsapps/files/dist/assets/files-7b7c1ab31ede3c1dba4fe27ac610609d.js
204.141.33.48
https://static.zohocdn.com/personal/stable/jsapps/files/dist/
unknown
http://support.citrixonline.com/en_US/Meeting/help_files/G2M040012?Title=Use
unknown
https://static.zohocdn.com/personal/stable/jsapps/files/dist/assets/assetMap.json
204.141.33.48
http://support.citrixonline.com/s/G2M/Help/VoIPInitializationErrorhttp://s.gotomeeting.com/g2mscreen
unknown
https://static.zohocdn.com/webfonts/robotobold/font.woff2
204.141.33.48
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/svg-icons/icon-list-8d90da9709bd1da0c5e81d54042dd26f.js
204.141.33.48
https://p5.osdimg.com/g2m/live/services.jsonhttps://s5.osdstageimg.com/g2m/stage/services.jsonhttps:
unknown
https://www.gotowebinar.comG2MPreferences::setWebUrlWebinar()WebsiteUrlTraininghttps://www.gototrain
unknown
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/assetMap.json
204.141.33.48
https://www.gotomeeting.comAudioHelpUrlG2MPreferences::setWebUrl()%s-theWebUrl
unknown
https://files-accl.zohoexternal.com/public/workdrive-external/download/inx6y681f89af8e8540ce9baba2db
unknown
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/default_theme-d91bac1ca5e39da5e0d9d244ef35ccaa.css
204.141.33.48
https://static.zohocdn.com/murphysdk/2.2.2/murphy.min.js
204.141.33.48
https://www.handyviewer.com/open
unknown
https://files-accl.zohoexternal.com/publicupload
unknown
https://files.zohoexternal.com/publicupload
unknown
https://secure.citrixonline.com/buy?execution=e1s1https://secure.citrixonline.com/commerce/forgotPas
unknown
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/
unknown
https://logined1.citrixonline.com/rest/autoLoginUrlMatchMakingCycleFinishedG2MLauncherThread::~G2MLa
unknown
http://accounts.zoho.com
unknown
https://workdrive.zohoexternal.com/public/api/v1/downloadauth/inx6y681f89af8e8540ce9baba2db2bf7801f?linkId=487UVgNglIf-VCSHr
136.143.191.16
https://static.zohocdn.com/webfonts/robotoregular/font.woff2
204.141.33.48
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/worker/xhr_worker.min.js
204.141.33.48
https://static.zohocdn.com/personal/stable/jsapps/enterprise/dist/assets/assetMap.json
204.141.33.48
https://www.zoho.com/workdrive/signup.html
unknown
https://static.zohocdn.com/zohofonts/zohopuvi/4.0/Zoho_Puvi_Medium.woff2
204.141.33.48
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/wd_images/favicons/defaults
unknown
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/wd_images/favicons/defaults/favicon.ico
204.141.33.48
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/jquery/jquery.min-dc5e7f18c8d36ac1d3d4753a87c98d0a.js
204.141.33.48
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/wd_images/favicons/defaults/network-connection.ico?_=1713901636177
204.141.33.48
https://logging.citrixonline.comlogginged1.citrixonline.com/loghttps://%s%sBIConsumerX-TopicmachineI
unknown
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/intl/js/team/team-e945b0e38524b2e11a70a256d4418a2f.js
204.141.33.48
https://static.zohocdn.com/quartz/feedback/v2/zquartz-tracker.js
204.141.33.48
https://static.zohocdn.com/personal/stable
unknown
http://s.gotomeeting.com/install-outlook-pluginhttp://support.citrixonline.com/s/G2M/Help/MPEGLAC:
unknown
https://www.handyviewer.com/manual/openU
unknown
https://www.handyviewer.com/openS
unknown
https://www.handyviewer.com/check-version.php?version=openS
unknown
https://files-accl.zohoexternal.com/public/workdrive-external/download/inx6y681f89af8e8540ce9baba2db2bf7801f?x-cli-msg=%7B%22linkId%22%3A%22487UVgNglIf-VCSHr%22%2C%22isFileOwner%22%3Afalse%2C%22version%22%3A%221.0%22%7D
169.148.154.31
http://support.gotomeeting.com/ics/support/default.asp?deptID=5641&task=knowledge&questionID=3725Des
unknown
https://workdrive.zohoexternal.com
unknown
https://www.handyviewer.com
unknown
https://files-accl.zohoexternal.com/WD-Chunk-Public/v2/stream/publicupload
unknown
http://support.citrixonline.com/s/G2M/Help/WhatsNewu~
unknown
http://support.citrixonline.com/s/G2TG2W/Help/findDefaultURL()%s-Failed
unknown
https://files-accl.zohoexternal.com
unknown
https://static.zohocdn.com/personal/stable/jsapps/ui-lab/dist/assets/dev/murphy/murphyInitializer.min-80a2ee059eb0699247fe0ca7a0b7a380.js
204.141.33.48
There are 69 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
zpublic-h2.zohopublic.com
136.143.191.16
h2-stratus.zohocdn.com
204.141.33.48
www.google.com
172.253.124.104
useast.zohoaccl.com
169.148.154.31
workdrive.zohoexternal.com
unknown
static.zohocdn.com
unknown
files-accl.zohoexternal.com
unknown

IPs

IP
Domain
Country
Malicious
204.141.33.48
h2-stratus.zohocdn.com
United States
239.255.255.250
unknown
Reserved
136.143.191.16
zpublic-h2.zohopublic.com
United States
192.168.2.17
unknown
unknown
172.253.124.104
www.google.com
United States
169.148.154.31
useast.zohoaccl.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@C:\Program Files (x86)\Common Files\system\wab32res.dll,-10100

Memdumps

Base Address
Regiontype
Protect
Malicious
867000
heap
page read and write
10000000
unkown
page readonly
3AF0000
heap
page read and write
86A000
heap
page read and write
34B0000
heap
page read and write
549E000
stack
page read and write
11534000
unkown
page readonly
33F0000
direct allocation
page read and write
832447C000
stack
page read and write
19C8000
heap
page read and write
561A000
direct allocation
page read and write
1574000
direct allocation
page read and write
118B6000
unkown
page write copy
1545000
direct allocation
page read and write
195D000
heap
page read and write
98F000
stack
page read and write
862000
heap
page read and write
14C8000
direct allocation
page read and write
19B0000
heap
page read and write
881000
heap
page read and write
34A4000
direct allocation
page read and write
860000
heap
page read and write
11F3000
unkown
page read and write
34B0000
heap
page read and write
A60000
heap
page read and write
857000
heap
page read and write
86E000
heap
page read and write
3AF0000
heap
page read and write
876000
heap
page read and write
86E000
heap
page read and write
64E000
stack
page read and write
1940000
heap
page read and write
19E0000
heap
page read and write
199A000
heap
page read and write
34C8000
direct allocation
page read and write
5627000
direct allocation
page read and write
1770000
direct allocation
page execute and read and write
3AF0000
heap
page read and write
4EEA000
direct allocation
page read and write
753000
heap
page read and write
1944000
heap
page read and write
5668000
direct allocation
page read and write
8F7000
stack
page read and write
1BBB33A0000
heap
page read and write
1192000
unkown
page read and write
1BEE000
stack
page read and write
34BA000
direct allocation
page read and write
1991000
heap
page read and write
11991000
unkown
page readonly
5610000
direct allocation
page read and write
59F4000
heap
page read and write
867000
heap
page read and write
3890000
heap
page read and write
4CCE000
stack
page read and write
19DD000
heap
page read and write
843000
heap
page read and write
AAE000
stack
page read and write
7DF000
heap
page read and write
1527000
direct allocation
page read and write
34B3000
direct allocation
page read and write
15D3000
direct allocation
page read and write
34C1000
direct allocation
page read and write
4FBE000
stack
page read and write
7FD000
heap
page read and write
11AD000
unkown
page read and write
867000
heap
page read and write
11D6000
unkown
page read and write
19B2000
heap
page read and write
573E000
stack
page read and write
19E0000
heap
page read and write
848000
heap
page read and write
1190000
unkown
page read and write
87B000
heap
page read and write
4EDC000
direct allocation
page read and write
4EE8000
direct allocation
page read and write
4F00000
direct allocation
page read and write
6070000
heap
page read and write
876000
heap
page read and write
86F000
heap
page read and write
19C6000
heap
page read and write
19C8000
heap
page read and write
33B9000
direct allocation
page read and write
3425000
direct allocation
page read and write
6B0000
heap
page read and write
153E000
direct allocation
page read and write
188E000
stack
page read and write
1989000
heap
page read and write
11CD000
unkown
page read and write
4F9000
stack
page read and write
860000
heap
page read and write
1785000
heap
page read and write
86E000
heap
page read and write
58EE000
stack
page read and write
19CD000
heap
page read and write
867000
heap
page read and write
3AEA000
heap
page read and write
118AD000
unkown
page read and write
15E8000
direct allocation
page read and write
1556000
direct allocation
page read and write
1190000
unkown
page read and write
11A27000
unkown
page readonly
3AE0000
heap
page read and write
19B6000
heap
page read and write
876000
heap
page read and write
59EF000
stack
page read and write
194E000
heap
page read and write
876000
heap
page read and write
851000
heap
page read and write
10001000
unkown
page execute read
15E1000
direct allocation
page read and write
7E3000
heap
page read and write
15C4000
direct allocation
page read and write
19D1000
heap
page read and write
19C7000
heap
page read and write
14B9000
direct allocation
page read and write
86A000
heap
page read and write
320D000
stack
page read and write
57CC000
stack
page read and write
823000
heap
page read and write
34A1000
heap
page read and write
710000
direct allocation
page execute and read and write
33B0000
heap
page read and write
19D6000
heap
page read and write
83245FE000
stack
page read and write
882000
heap
page read and write
790000
heap
page read and write
3AF0000
heap
page read and write
1190000
unkown
page write copy
3AF0000
heap
page read and write
3A6E000
stack
page read and write
118AD000
unkown
page read and write
876000
heap
page read and write
3436000
direct allocation
page read and write
342C000
direct allocation
page read and write
3AE4000
heap
page read and write
4EE3000
direct allocation
page read and write
19B6000
heap
page read and write
14AE000
stack
page read and write
4E90000
direct allocation
page read and write
5608000
direct allocation
page read and write
386E000
stack
page read and write
15F5000
heap
page read and write
867000
heap
page read and write
19C1000
heap
page read and write
192C000
heap
page read and write
34B0000
heap
page read and write
156D000
direct allocation
page read and write
19C1000
heap
page read and write
11A1F000
unkown
page execute and write copy
19CE000
heap
page read and write
1537000
direct allocation
page read and write
11EE000
unkown
page read and write
58CD000
stack
page read and write
3407000
direct allocation
page read and write
AD0000
unkown
page readonly
14D9000
direct allocation
page read and write
700000
heap
page read and write
197F000
heap
page read and write
5625000
direct allocation
page read and write
11401000
unkown
page execute read
19CC000
heap
page read and write
559F000
stack
page read and write
86B000
heap
page read and write
1510000
direct allocation
page read and write
1592000
direct allocation
page read and write
19A0000
heap
page read and write
878000
heap
page read and write
19B2000
heap
page read and write
19C5000
heap
page read and write
605F000
trusted library allocation
page read and write
170E000
stack
page read and write
9F9000
stack
page read and write
5F4C000
stack
page read and write
863000
heap
page read and write
876000
heap
page read and write
5680000
direct allocation
page read and write
5679000
direct allocation
page read and write
86B000
heap
page read and write
86B000
heap
page read and write
83244FF000
stack
page read and write
7EC000
heap
page read and write
154C000
direct allocation
page read and write
851000
heap
page read and write
1998000
heap
page read and write
1564000
direct allocation
page read and write
86A000
heap
page read and write
1520000
direct allocation
page read and write
341E000
direct allocation
page read and write
15CC000
direct allocation
page read and write
1973000
heap
page read and write
860000
heap
page read and write
19C7000
heap
page read and write
197A000
heap
page read and write
14B0000
direct allocation
page read and write
860000
heap
page read and write
19C1000
heap
page read and write
15DA000
direct allocation
page read and write
11F6000
unkown
page readonly
60E000
stack
page read and write
1198000
unkown
page read and write
11AF000
unkown
page read and write
59F0000
heap
page read and write
3AF0000
heap
page read and write
11C6000
unkown
page read and write
119C000
unkown
page read and write
841000
heap
page read and write
335E000
stack
page read and write
10A01000
unkown
page execute read
569C000
stack
page read and write
1E0000
heap
page read and write
82E000
heap
page read and write
5629000
direct allocation
page read and write
19C5000
heap
page read and write
1192000
unkown
page read and write
860000
heap
page read and write
330E000
stack
page read and write
5623000
direct allocation
page read and write
3380000
trusted library allocation
page read and write
1780000
heap
page read and write
86E000
heap
page read and write
19CB000
heap
page read and write
4E9A000
direct allocation
page read and write
86A000
heap
page read and write
816000
heap
page read and write
19CE000
heap
page read and write
867000
heap
page read and write
33A0000
heap
page read and write
11D6000
unkown
page read and write
868000
heap
page read and write
5639000
direct allocation
page read and write
832457F000
stack
page read and write
19D5000
heap
page read and write
1890000
heap
page read and write
860000
heap
page read and write
856000
heap
page read and write
5654000
direct allocation
page read and write
1953000
heap
page read and write
86E000
heap
page read and write
730000
heap
page read and write
1BBB33A5000
heap
page read and write
750000
heap
page read and write
1BBB3370000
heap
page read and write
34AD000
heap
page read and write
18F8000
heap
page read and write
1960000
heap
page read and write
33E0000
direct allocation
page read and write
6080000
heap
page read and write
34A1000
heap
page read and write
860000
heap
page read and write
19B2000
heap
page read and write
1AEF000
stack
page read and write
5C1E000
stack
page read and write
4EF9000
direct allocation
page read and write
33F9000
direct allocation
page read and write
14C1000
direct allocation
page read and write
19CC000
heap
page read and write
13ED000
stack
page read and write
86B000
heap
page read and write
4DCF000
stack
page read and write
1BBB33DE000
heap
page read and write
19E1000
heap
page read and write
3399000
direct allocation
page read and write
34A0000
heap
page read and write
19CC000
heap
page read and write
4E88000
direct allocation
page read and write
867000
heap
page read and write
34AC000
direct allocation
page read and write
1199000
unkown
page read and write
15F0000
heap
page read and write
11C6000
unkown
page read and write
1BBB4F70000
heap
page read and write
1BBB33D0000
heap
page read and write
860000
heap
page read and write
4EF1000
direct allocation
page read and write
AB0000
heap
page read and write
19CE000
heap
page read and write
81F000
heap
page read and write
1189F000
unkown
page write copy
199A000
heap
page read and write
19CB000
heap
page read and write
5D1F000
stack
page read and write
516E000
stack
page read and write
867000
heap
page read and write
34AE000
heap
page read and write
19B1000
heap
page read and write
566A000
direct allocation
page read and write
3AF0000
heap
page read and write
7F2000
heap
page read and write
155D000
direct allocation
page read and write
158B000
direct allocation
page read and write
19DF000
heap
page read and write
19CB000
heap
page read and write
561F000
direct allocation
page read and write
343D000
direct allocation
page read and write
19CB000
heap
page read and write
11A22000
unkown
page execute and read and write
86E000
heap
page read and write
1987000
heap
page read and write
1BBB33B0000
heap
page read and write
177000
stack
page read and write
18F0000
heap
page read and write
19D5000
heap
page read and write
119D000
unkown
page read and write
3488000
direct allocation
page read and write
544E000
stack
page read and write
861000
heap
page read and write
86E000
heap
page read and write
827000
heap
page read and write
86E000
heap
page read and write
3893000
heap
page read and write
86F000
heap
page read and write
5671000
direct allocation
page read and write
876000
heap
page read and write
50BF000
stack
page read and write
876000
heap
page read and write
1F0000
heap
page read and write
33A9000
direct allocation
page read and write
876000
heap
page read and write
346B000
direct allocation
page read and write
867000
heap
page read and write
857000
heap
page read and write
338F000
trusted library allocation
page read and write
19E0000
heap
page read and write
86B000
heap
page read and write
19C8000
heap
page read and write
1518000
direct allocation
page read and write
86A000
heap
page read and write
11AD000
unkown
page read and write
564C000
direct allocation
page read and write
19C6000
heap
page read and write
19CC000
heap
page read and write
33D9000
direct allocation
page read and write
5250000
heap
page read and write
5E1D000
stack
page read and write
7EC000
heap
page read and write
19C6000
heap
page read and write
3AF0000
heap
page read and write
4E9E000
direct allocation
page read and write
554F000
stack
page read and write
1760000
heap
page read and write
1BBB33D7000
heap
page read and write
867000
heap
page read and write
68E000
stack
page read and write
1745000
heap
page read and write
860000
heap
page read and write
3ABD000
stack
page read and write
19C5000
heap
page read and write
118AE000
unkown
page write copy
5270000
heap
page read and write
11CA000
unkown
page read and write
3AF0000
heap
page read and write
5621000
direct allocation
page read and write
834000
heap
page read and write
583F000
stack
page read and write
565C000
direct allocation
page read and write
19C6000
heap
page read and write
3454000
direct allocation
page read and write
19A4000
heap
page read and write
86A000
heap
page read and write
19C1000
heap
page read and write
4ECB000
direct allocation
page read and write
19D5000
heap
page read and write
813000
heap
page read and write
526F000
stack
page read and write
19E0000
heap
page read and write
87D000
heap
page read and write
11534000
unkown
page readonly
33C9000
direct allocation
page read and write
5640000
direct allocation
page read and write
4ED3000
direct allocation
page read and write
857000
heap
page read and write
19CB000
heap
page read and write
817000
heap
page read and write
19B2000
heap
page read and write
345B000
direct allocation
page read and write
3472000
direct allocation
page read and write
83F000
heap
page read and write
86E000
heap
page read and write
1948000
heap
page read and write
11F4000
unkown
page readonly
34B0000
heap
page read and write
33A1000
direct allocation
page read and write
3444000
direct allocation
page read and write
349D000
direct allocation
page read and write
1995000
heap
page read and write
3AF0000
heap
page read and write
6B5000
heap
page read and write
11CD000
unkown
page read and write
1740000
heap
page read and write
798000
heap
page read and write
818000
heap
page read and write
4E98000
direct allocation
page read and write
11EE000
unkown
page write copy
194E000
heap
page read and write
344D000
direct allocation
page read and write
867000
heap
page read and write
3390000
direct allocation
page read and write
1BBB3360000
heap
page read and write
1321000
unkown
page readonly
15BD000
direct allocation
page read and write
1940000
heap
page read and write
19C6000
heap
page read and write
15A8000
direct allocation
page read and write
1500000
direct allocation
page read and write
860000
heap
page read and write
3400000
direct allocation
page read and write
5663000
direct allocation
page read and write
19D6000
heap
page read and write
83D000
heap
page read and write
86B000
heap
page read and write
14F7000
direct allocation
page read and write
11AF000
unkown
page read and write
19C0000
heap
page read and write
34B0000
heap
page read and write
720000
heap
page read and write
80F000
heap
page read and write
6050000
trusted library allocation
page read and write
AD1000
unkown
page execute read
7CB000
heap
page read and write
11892000
unkown
page write copy
4E9C000
direct allocation
page read and write
604D000
stack
page read and write
11C8000
unkown
page read and write
7FB000
heap
page read and write
34A7000
heap
page read and write
14E9000
direct allocation
page read and write
157B000
direct allocation
page read and write
7DF000
heap
page read and write
A8E000
stack
page read and write
3417000
direct allocation
page read and write
19CC000
heap
page read and write
There are 421 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://workdrive.zohoexternal.com/external/e6b6caa7935dc26506daa69f1bbc974bb9ff94fe4fb64dfb0de1a223c630f65a/download
https://workdrive.zohoexternal.com/external/e6b6caa7935dc26506daa69f1bbc974bb9ff94fe4fb64dfb0de1a223c630f65a/download
https://workdrive.zohoexternal.com/external/e6b6caa7935dc26506daa69f1bbc974bb9ff94fe4fb64dfb0de1a223c630f65a/download