IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 102
ASCII text
downloaded
Chrome Cache Entry: 103
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 104
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 105
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
dropped
Chrome Cache Entry: 106
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 107
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 108
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 109
JSON data
dropped
Chrome Cache Entry: 110
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 111
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 112
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 113
JSON data
downloaded
Chrome Cache Entry: 114
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 115
JSON data
downloaded
Chrome Cache Entry: 116
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 117
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components 3
downloaded
Chrome Cache Entry: 118
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 119
ASCII text
dropped
Chrome Cache Entry: 120
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 121
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 122
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 123
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 124
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 125
JSON data
dropped
Chrome Cache Entry: 126
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 127
JSON data
downloaded
Chrome Cache Entry: 128
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 90
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 91
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 92
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 93
JSON data
dropped
Chrome Cache Entry: 94
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 95
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 99
JSON data
downloaded
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1728 --field-trial-handle=1988,i,17902174310795812285,10958693031429815383,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1976,i,8889273046663356673,18172762526831080646,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
http://185.215.113.16/off/def.exeAppleWebKit/537.36
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://185.215.113.16/steam/random.exe$0
unknown
https://cook-rain.sbs/C
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://cook-rain.sbs/api8eGNei1kuTiEQW4l
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
peepburry828.sbs
http://polymer.github.io/AUTHORS.txt
unknown
https://cook-rain.sbs/apiA
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://cook-rain.sbs/g
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
p10tgrace.sbs
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
processhol.sbs
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://cook-rain.sbs/om.
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://cook-rain.sbs/api
188.114.96.3
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://cook-rain.sbs/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.45
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
p3ar11fter.sbs
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://github.com/adegeo
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://cook-rain.sbs/apibK0a6
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://cook-rain.sbs/3SozW
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://github.com/js-cookie/js-cookie
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 70 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0016.t-0009.t-msedge.net
13.107.246.44
cook-rain.sbs
188.114.96.3
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
216.58.206.68
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
13.107.246.44
s-part-0016.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
216.58.206.68
www.google.com
United States
239.255.255.250
unknown
Reserved
188.114.96.3
cook-rain.sbs
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
F7C000
unkown
page execute and read and write
C40000
heap
page read and write
5D54000
trusted library allocation
page read and write
65EA000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
625D000
trusted library allocation
page read and write
2FEB000
stack
page read and write
65EB000
trusted library allocation
page read and write
5FB2000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
5DB6000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
682D000
trusted library allocation
page read and write
7C9E000
stack
page read and write
65E0000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
65ED000
trusted library allocation
page read and write
1674000
heap
page read and write
5E11000
trusted library allocation
page read and write
7A1E000
stack
page read and write
66DE000
trusted library allocation
page read and write
5DEB000
trusted library allocation
page read and write
5DE9000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
8C30000
direct allocation
page execute and read and write
5DD9000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5F4D000
trusted library allocation
page read and write
165F000
heap
page read and write
5D48000
trusted library allocation
page read and write
67C5000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
15EB000
heap
page read and write
5DC5000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
5DB6000
trusted library allocation
page read and write
6811000
trusted library allocation
page read and write
48DE000
stack
page read and write
C80000
heap
page read and write
5DCA000
trusted library allocation
page read and write
66A6000
trusted library allocation
page read and write
686F000
trusted library allocation
page read and write
751E000
stack
page read and write
5E2A000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
475F000
stack
page read and write
5DCC000
trusted library allocation
page read and write
6733000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
8C00000
direct allocation
page execute and read and write
3D5F000
stack
page read and write
C44000
heap
page read and write
5E41000
trusted library allocation
page read and write
65E2000
trusted library allocation
page read and write
6699000
trusted library allocation
page read and write
5D7E000
trusted library allocation
page read and write
6098000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
5E20000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
429E000
stack
page read and write
5E2A000
trusted library allocation
page read and write
5DB3000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
6694000
trusted library allocation
page read and write
65E2000
trusted library allocation
page read and write
4DA1000
heap
page read and write
65ED000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5ED3000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
851F000
stack
page read and write
701F000
stack
page read and write
5380000
direct allocation
page execute and read and write
5E11000
trusted library allocation
page read and write
65EF000
trusted library allocation
page read and write
6770000
trusted library allocation
page read and write
5DC4000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
489F000
stack
page read and write
6041000
trusted library allocation
page read and write
4DA1000
heap
page read and write
C44000
heap
page read and write
65E4000
trusted library allocation
page read and write
6E07000
trusted library allocation
page execute and read and write
67B8000
trusted library allocation
page read and write
66EE000
trusted library allocation
page read and write
6698000
trusted library allocation
page read and write
6731000
trusted library allocation
page read and write
5DDB000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
65E7000
trusted library allocation
page read and write
54FD000
stack
page read and write
F75000
unkown
page execute and read and write
5DD3000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
801F000
stack
page read and write
165F000
heap
page read and write
66CF000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
65EC000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
C44000
heap
page read and write
5E01000
trusted library allocation
page read and write
805E000
stack
page read and write
66B1000
trusted library allocation
page read and write
6799000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5D40000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
5ECD000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
165E000
heap
page read and write
5DBB000
trusted library allocation
page read and write
5DBD000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
6A51000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
79DF000
stack
page read and write
8AA0000
direct allocation
page read and write
4DA1000
heap
page read and write
5DCF000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
C44000
heap
page read and write
1664000
heap
page read and write
4DA1000
heap
page read and write
51E0000
heap
page read and write
66D9000
stack
page read and write
5DF0000
trusted library allocation
page read and write
685E000
stack
page read and write
65E3000
trusted library allocation
page read and write
15E2000
heap
page read and write
6697000
trusted library allocation
page read and write
789F000
stack
page read and write
5D83000
trusted library allocation
page read and write
66A4000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
6047000
trusted library allocation
page read and write
3D9E000
stack
page read and write
65E9000
trusted library allocation
page read and write
66ED000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5D95000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
439F000
stack
page read and write
5E11000
trusted library allocation
page read and write
675F000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
5D4F000
trusted library allocation
page read and write
6B62000
trusted library allocation
page execute and read and write
4DA1000
heap
page read and write
66B3000
trusted library allocation
page read and write
5E15000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5E2A000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
5E2A000
trusted library allocation
page read and write
3FDF000
stack
page read and write
1670000
heap
page read and write
C44000
heap
page read and write
58C0000
remote allocation
page read and write
5E48000
trusted library allocation
page read and write
166C000
heap
page read and write
1674000
heap
page read and write
5E11000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
5DC1000
trusted library allocation
page read and write
3B1E000
stack
page read and write
5E01000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
6728000
trusted library allocation
page read and write
58C0000
remote allocation
page read and write
669F000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
669E000
trusted library allocation
page read and write
65E4000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
65E7000
trusted library allocation
page read and write
567E000
stack
page read and write
CE7000
unkown
page write copy
3050000
heap
page read and write
5DCD000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
779E000
stack
page read and write
66EB000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
166A000
heap
page read and write
C44000
heap
page read and write
159A000
heap
page read and write
BFA000
stack
page read and write
5D91000
trusted library allocation
page read and write
3C1F000
stack
page read and write
7B1F000
stack
page read and write
5DC1000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
829F000
stack
page read and write
5DDD000
trusted library allocation
page read and write
5220000
direct allocation
page read and write
8A40000
direct allocation
page read and write
5A6E000
stack
page read and write
1663000
heap
page read and write
5E2A000
trusted library allocation
page read and write
668E000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5D33000
heap
page read and write
5E01000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
82DE000
stack
page read and write
5DDD000
trusted library allocation
page read and write
53E0000
direct allocation
page execute and read and write
5DC0000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
465E000
stack
page read and write
6729000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
668C000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
5E2A000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
65E4000
trusted library allocation
page read and write
5220000
direct allocation
page read and write
58C0000
remote allocation
page read and write
1661000
heap
page read and write
5E2A000
trusted library allocation
page read and write
66F2000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5DD1000
trusted library allocation
page read and write
6B4B000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
53A0000
direct allocation
page execute and read and write
3030000
direct allocation
page read and write
5E01000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
729E000
stack
page read and write
5D64000
trusted library allocation
page read and write
667B000
trusted library allocation
page read and write
65E3000
trusted library allocation
page read and write
1677000
heap
page read and write
675B000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
7B5E000
stack
page read and write
689E000
stack
page read and write
166C000
heap
page read and write
671D000
trusted library allocation
page read and write
5F42000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
CE9000
unkown
page execute and read and write
67FC000
trusted library allocation
page read and write
67B6000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
5D46000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
65E6000
trusted library allocation
page read and write
3C5E000
stack
page read and write
5E41000
trusted library allocation
page read and write
6692000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
671F000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
1674000
heap
page read and write
5E2A000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
6042000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
461F000
stack
page read and write
5E01000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
66F1000
trusted library allocation
page read and write
5F34000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
5D30000
heap
page read and write
1665000
heap
page read and write
5DB2000
trusted library allocation
page read and write
5ED9000
trusted library allocation
page read and write
6707000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
6727000
trusted library allocation
page read and write
165E000
heap
page read and write
166D000
heap
page read and write
65E2000
trusted library allocation
page read and write
5DD4000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
66F3000
trusted library allocation
page read and write
349F000
stack
page read and write
C44000
heap
page read and write
5E2A000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
78DE000
stack
page read and write
5DBD000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
1670000
heap
page read and write
8A40000
direct allocation
page read and write
53F0000
direct allocation
page execute and read and write
1666000
heap
page read and write
53B0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
577F000
stack
page read and write
5DD9000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
60D5000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
1124000
unkown
page execute and read and write
6B66000
trusted library allocation
page read and write
680F000
trusted library allocation
page read and write
3EDE000
stack
page read and write
5D60000
trusted library allocation
page read and write
67FE000
trusted library allocation
page read and write
67B4000
trusted library allocation
page read and write
6044000
trusted library allocation
page read and write
66DC000
trusted library allocation
page read and write
6722000
trusted library allocation
page read and write
6871000
trusted library allocation
page read and write
4DA1000
heap
page read and write
66EC000
trusted library allocation
page read and write
166C000
heap
page read and write
5E0B000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5DDD000
trusted library allocation
page read and write
682B000
trusted library allocation
page read and write
66C9000
trusted library allocation
page read and write
5F4F000
trusted library allocation
page read and write
677B000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
325F000
stack
page read and write
5D71000
trusted library allocation
page read and write
CD6000
unkown
page execute and read and write
C44000
heap
page read and write
5E2A000
trusted library allocation
page read and write
1125000
unkown
page execute and write copy
5E2A000
trusted library allocation
page read and write
65E2000
trusted library allocation
page read and write
1663000
heap
page read and write
5DDD000
trusted library allocation
page read and write
58BF000
stack
page read and write
60E8000
trusted library allocation
page read and write
1643000
heap
page read and write
5E2A000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
66BA000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
526B000
stack
page read and write
5E11000
trusted library allocation
page read and write
7F1E000
stack
page read and write
166C000
heap
page read and write
53D0000
direct allocation
page execute and read and write
5E20000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
6118000
trusted library allocation
page read and write
1665000
heap
page read and write
C90000
unkown
page read and write
68AC000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
C44000
heap
page read and write
1666000
heap
page read and write
5DCB000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5E2A000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
66B5000
trusted library allocation
page read and write
5DF3000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
676E000
trusted library allocation
page read and write
819E000
stack
page read and write
5DC4000
trusted library allocation
page read and write
65EF000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
166E000
heap
page read and write
5E63000
trusted library allocation
page read and write
765E000
stack
page read and write
5E05000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
6045000
trusted library allocation
page read and write
1667000
heap
page read and write
5D4F000
trusted library allocation
page read and write
4DA1000
heap
page read and write
39DE000
stack
page read and write
6704000
trusted library allocation
page read and write
6836000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
66B3000
trusted library allocation
page read and write
4B5E000
stack
page read and write
5DE6000
trusted library allocation
page read and write
6685000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
165F000
heap
page read and write
6683000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
4D9F000
stack
page read and write
AFB000
stack
page read and write
5E2A000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
553D000
stack
page read and write
1653000
heap
page read and write
4DA0000
heap
page read and write
5E11000
trusted library allocation
page read and write
669A000
trusted library allocation
page read and write
67DF000
stack
page read and write
5E11000
trusted library allocation
page read and write
66C3000
trusted library allocation
page read and write
5D7E000
trusted library allocation
page read and write
671F000
trusted library allocation
page read and write
739F000
stack
page read and write
5E79000
trusted library allocation
page read and write
6709000
trusted library allocation
page read and write
671D000
trusted library allocation
page read and write
6838000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
65E3000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
C91000
unkown
page execute and read and write
5F4F000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
761F000
stack
page read and write
66CE000
trusted library allocation
page read and write
6687000
trusted library allocation
page read and write
675A000
trusted library allocation
page read and write
425F000
stack
page read and write
5E2A000
trusted library allocation
page read and write
165F000
heap
page read and write
5D46000
trusted library allocation
page read and write
5E48000
trusted library allocation
page read and write
5B6E000
stack
page read and write
5D43000
trusted library allocation
page read and write
C44000
heap
page read and write
536F000
stack
page read and write
65EB000
trusted library allocation
page read and write
1668000
heap
page read and write
65E2000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
5275000
direct allocation
page read and write
5F42000
trusted library allocation
page read and write
16CE000
stack
page read and write
682A000
trusted library allocation
page read and write
65EE000
trusted library allocation
page read and write
66D1000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
65E2000
trusted library allocation
page read and write
715E000
stack
page read and write
5E65000
trusted library allocation
page read and write
302E000
stack
page read and write
65E2000
trusted library allocation
page read and write
5DE7000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
1663000
heap
page read and write
672B000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5230000
direct allocation
page read and write
C44000
heap
page read and write
5E11000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
401E000
stack
page read and write
6E16000
trusted library allocation
page execute and read and write
5DBB000
trusted library allocation
page read and write
66F2000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
66F0000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
15D1000
heap
page read and write
53B0000
direct allocation
page execute and read and write
5E2A000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
592E000
stack
page read and write
66CD000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
C90000
unkown
page readonly
5DD9000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
67FA000
trusted library allocation
page read and write
F4B000
unkown
page execute and read and write
5E01000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
6702000
trusted library allocation
page read and write
65F1000
trusted library allocation
page read and write
335F000
stack
page read and write
66DE000
trusted library allocation
page read and write
1590000
heap
page read and write
6758000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
815F000
stack
page read and write
5E11000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5DBD000
trusted library allocation
page read and write
5E08000
trusted library allocation
page read and write
C70000
heap
page read and write
667D000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
725F000
stack
page read and write
1677000
heap
page read and write
65E0000
trusted library allocation
page read and write
73DE000
stack
page read and write
1666000
heap
page read and write
159E000
heap
page read and write
5390000
direct allocation
page execute and read and write
5DE6000
trusted library allocation
page read and write
65E1000
trusted library allocation
page read and write
3E9F000
stack
page read and write
5DAC000
trusted library allocation
page read and write
67C7000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
6CFB000
trusted library allocation
page execute and read and write
5E00000
trusted library allocation
page read and write
5D5E000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
17CE000
stack
page read and write
6078000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
5D67000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
65E7000
trusted library allocation
page read and write
6828000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
83DF000
stack
page read and write
5E11000
trusted library allocation
page read and write
65E8000
trusted library allocation
page read and write
669F000
trusted library allocation
page read and write
F8C000
unkown
page execute and read and write
8AA0000
direct allocation
page read and write
5E11000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
C44000
heap
page read and write
361E000
stack
page read and write
65ED000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5E00000
trusted library allocation
page read and write
855E000
stack
page read and write
65E0000
trusted library allocation
page read and write
5E10000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
5D5B000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
6043000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
15D3000
heap
page read and write
67B6000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5A2F000
stack
page read and write
5403000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
5DC4000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
4C9E000
stack
page read and write
1654000
heap
page read and write
375E000
stack
page read and write
65ED000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
6047000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
145E000
stack
page read and write
5D67000
trusted library allocation
page read and write
8AA0000
direct allocation
page read and write
5DD3000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
CE7000
unkown
page read and write
479E000
stack
page read and write
5E65000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
4DA1000
heap
page read and write
3030000
direct allocation
page read and write
65E3000
trusted library allocation
page read and write
67FC000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
1668000
heap
page read and write
165F000
heap
page read and write
5D6A000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
C44000
heap
page read and write
5DF0000
trusted library allocation
page read and write
166E000
heap
page read and write
4DA1000
heap
page read and write
1670000
heap
page read and write
669D000
trusted library allocation
page read and write
6046000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
7C5F000
stack
page read and write
1671000
heap
page read and write
5E2A000
trusted library allocation
page read and write
389E000
stack
page read and write
6726000
trusted library allocation
page read and write
66F5000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
66D2000
trusted library allocation
page read and write
685C000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
C91000
unkown
page execute and write copy
5E59000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
3057000
heap
page read and write
6779000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
6761000
trusted library allocation
page read and write
43DE000
stack
page read and write
165D000
heap
page read and write
5E2A000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
5E71000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
399F000
stack
page read and write
7EDF000
stack
page read and write
5D95000
trusted library allocation
page read and write
C44000
heap
page read and write
5E01000
trusted library allocation
page read and write
44DF000
stack
page read and write
3030000
direct allocation
page read and write
66CC000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
1580000
heap
page read and write
6B60000
trusted library allocation
page read and write
6F1F000
stack
page read and write
74DF000
stack
page read and write
5DC0000
trusted library allocation
page read and write
5220000
direct allocation
page read and write
5DF5000
trusted library allocation
page read and write
385F000
stack
page read and write
65E4000
trusted library allocation
page read and write
65E1000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
6724000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
35DF000
stack
page read and write
1678000
heap
page read and write
5E40000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
68AA000
trusted library allocation
page read and write
4DB0000
heap
page read and write
5DF0000
trusted library allocation
page read and write
5DC4000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
451E000
stack
page read and write
6E18000
trusted library allocation
page execute and read and write
155F000
stack
page read and write
5E01000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5DBB000
trusted library allocation
page read and write
4DA1000
heap
page read and write
5E2A000
trusted library allocation
page read and write
65E7000
trusted library allocation
page read and write
65E4000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
7D9F000
stack
page read and write
65EB000
trusted library allocation
page read and write
65EF000
trusted library allocation
page read and write
841E000
stack
page read and write
5DD4000
trusted library allocation
page read and write
5E79000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
6685000
trusted library allocation
page read and write
6729000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
6703000
trusted library allocation
page read and write
669D000
trusted library allocation
page read and write
4A1E000
stack
page read and write
53BD000
stack
page read and write
5DBE000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
65ED000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
6048000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
165E000
heap
page read and write
1670000
heap
page read and write
65E5000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
5E4A000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
C44000
heap
page read and write
3030000
direct allocation
page read and write
66AF000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
5DF8000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
5E79000
trusted library allocation
page read and write
65E5000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5F36000
trusted library allocation
page read and write
65EA000
trusted library allocation
page read and write
775F000
stack
page read and write
5DF1000
trusted library allocation
page read and write
685A000
trusted library allocation
page read and write
C44000
heap
page read and write
5E01000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
563D000
stack
page read and write
8A40000
direct allocation
page read and write
5E11000
trusted library allocation
page read and write
5D43000
trusted library allocation
page read and write
5EE6000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
34DE000
stack
page read and write
5CDF000
stack
page read and write
5D81000
trusted library allocation
page read and write
5DF4000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5D77000
trusted library allocation
page read and write
65ED000
trusted library allocation
page read and write
49DF000
stack
page read and write
5DBD000
trusted library allocation
page read and write
6A3E000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
6110000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
166A000
heap
page read and write
6759000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
65EA000
trusted library allocation
page read and write
5F36000
trusted library allocation
page read and write
65E2000
trusted library allocation
page read and write
5D4F000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
66CB000
trusted library allocation
page read and write
5BDE000
stack
page read and write
411F000
stack
page read and write
66B1000
trusted library allocation
page read and write
5DC8000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
679B000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
164C000
heap
page read and write
8A40000
direct allocation
page read and write
15C8000
heap
page read and write
5DE6000
trusted library allocation
page read and write
5D86000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
3ADF000
stack
page read and write
65EE000
trusted library allocation
page read and write
6B57000
trusted library allocation
page read and write
315F000
stack
page read and write
5E6F000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
6B6A000
trusted library allocation
page execute and read and write
5DF1000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
165E000
heap
page read and write
5DD0000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
166E000
heap
page read and write
53B0000
direct allocation
page execute and read and write
66CB000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
65E2000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
66C1000
trusted library allocation
page read and write
66C7000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
5EDD000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
166C000
heap
page read and write
1663000
heap
page read and write
1670000
heap
page read and write
5DCB000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
F8D000
unkown
page execute and write copy
5DF0000
trusted library allocation
page read and write
339E000
stack
page read and write
5E11000
trusted library allocation
page read and write
5F7A000
trusted library allocation
page read and write
5D77000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
65E4000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
5E63000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
5DF2000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
C44000
heap
page read and write
5D97000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
57BE000
stack
page read and write
5DD9000
trusted library allocation
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
5DF9000
trusted library allocation
page read and write
65E7000
trusted library allocation
page read and write
66BC000
trusted library allocation
page read and write
654E000
trusted library allocation
page read and write
1661000
heap
page read and write
65E6000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
60BE000
stack
page read and write
166F000
heap
page read and write
711F000
stack
page read and write
166C000
heap
page read and write
15F6000
heap
page read and write
5E2A000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
C44000
heap
page read and write
5E2A000
trusted library allocation
page read and write
415E000
stack
page read and write
E75000
unkown
page execute and read and write
65E5000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
4DA1000
heap
page read and write
4B1F000
stack
page read and write
5DD4000
trusted library allocation
page read and write
166C000
heap
page read and write
5D64000
trusted library allocation
page read and write
1670000
heap
page read and write
5DD9000
trusted library allocation
page read and write
66F3000
trusted library allocation
page read and write
65EC000
trusted library allocation
page read and write
5DBB000
trusted library allocation
page read and write
5E01000
trusted library allocation
page read and write
681C000
stack
page read and write
5E01000
trusted library allocation
page read and write
2FAE000
stack
page read and write
5DC1000
trusted library allocation
page read and write
65E9000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
F8C000
unkown
page execute and write copy
7DDE000
stack
page read and write
C44000
heap
page read and write
5E01000
trusted library allocation
page read and write
66C5000
trusted library allocation
page read and write
65EB000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5DC8000
trusted library allocation
page read and write
5E59000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
607A000
stack
page read and write
5DBB000
trusted library allocation
page read and write
65E6000
trusted library allocation
page read and write
5E6A000
trusted library allocation
page read and write
3030000
direct allocation
page read and write
371F000
stack
page read and write
1664000
heap
page read and write
5DBD000
trusted library allocation
page read and write
4C5F000
stack
page read and write
5D43000
trusted library allocation
page read and write
65E4000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
C44000
heap
page read and write
65F1000
trusted library allocation
page read and write
5DCC000
trusted library allocation
page read and write
5DCB000
trusted library allocation
page read and write
5DEE000
trusted library allocation
page read and write
1644000
heap
page read and write
5E79000
trusted library allocation
page read and write
6705000
trusted library allocation
page read and write
There are 942 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0