IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 101
ASCII text
dropped
Chrome Cache Entry: 102
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 103
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 104
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 105
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 106
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 109
JSON data
downloaded
Chrome Cache Entry: 110
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 70
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 71
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 72
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 73
JSON data
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 76
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 80
JSON data
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 82
ASCII text
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 84
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 88
JSON data
dropped
Chrome Cache Entry: 89
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 90
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 92
JSON data
downloaded
Chrome Cache Entry: 93
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 94
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
JSON data
dropped
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 99
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
There are 32 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1936,i,6285013393734485110,13074657082886557463,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2004,i,5650072745666498097,8566792970818888660,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://marshal-zhukov.com/jX
unknown
https://steamcommunity.com/(S
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
http://185.215.113.16/off/def.exeO
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://marshal-zhukov.com/apite
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.16/off/def.exemP
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://185.215.113.16/off/def.exep
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://marshal-zhukov.com/s
unknown
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://steamcommunity.com/profiles/76561199724331900
23.55.153.106
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://github.com/Thraka
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=OgygW_VD
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://marshal-zhukov.com/r:
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://www.ecosia.org/newtab/
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://github.com/adegeo
unknown
https://support.microsof
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=nT6RHKdfWgaJ&l=e
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=jIFn
unknown
https://github.com/dotnet/try
unknown
https://store.steampowered.com/about/
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=4Vb3xc8UazdB&a
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://marshal-zhukov.com/apiq3
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://marshal-zhukov.com/apiq
unknown
https://steamcommunity.com/profiles/76561199724331900PS
unknown
https://marshal-zhukov.com/ZYa
unknown
https://steamcommunity.com/discussions/
unknown
https://marshal-zhukov.com:443/apiyq
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
23.55.153.106
marshal-zhukov.com
104.21.82.174
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown
savvy-steereo.sbs
unknown
plastic-mitten.sbs
unknown
record-envyp.sbs
unknown
hallowed-noisy.sbs
unknown
copper-replace.sbs
unknown
wrench-creter.sbs
unknown
slam-whipp.sbs
unknown
looky-marked.sbs
unknown
preside-comforter.sbs
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
104.21.82.174
marshal-zhukov.com
United States
23.55.153.106
steamcommunity.com
United States
142.250.181.68
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
1300000
heap
page read and write
153E000
stack
page read and write
5A75000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
5A44000
trusted library allocation
page read and write
5A6D000
trusted library allocation
page read and write
1025000
unkown
page execute and read and write
1326000
heap
page read and write
1343000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
80F0000
direct allocation
page read and write
75EE000
stack
page read and write
C94000
heap
page read and write
6CEF000
stack
page read and write
5A86000
trusted library allocation
page read and write
142C000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
64DB000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
5AA4000
trusted library allocation
page read and write
F47000
unkown
page execute and read and write
5C5C000
trusted library allocation
page read and write
132B000
heap
page read and write
5B77000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1349000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page read and write
879C000
stack
page read and write
6020000
direct allocation
page read and write
5A65000
trusted library allocation
page read and write
142D000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
83DE000
stack
page read and write
1350000
trusted library allocation
page read and write
134A000
trusted library allocation
page read and write
132B000
heap
page read and write
5C5E000
trusted library allocation
page read and write
1324000
heap
page read and write
5C5D000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
50AF000
stack
page read and write
133D000
heap
page read and write
5A85000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
1320000
heap
page read and write
5A85000
trusted library allocation
page read and write
49AF000
stack
page read and write
5A48000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
1425000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page execute and read and write
5A85000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
DB3000
unkown
page execute and read and write
5A62000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
35EE000
stack
page read and write
134F000
trusted library allocation
page read and write
6020000
direct allocation
page read and write
5C53000
trusted library allocation
page read and write
13D2000
trusted library allocation
page read and write
1439000
trusted library allocation
page read and write
A3B000
stack
page read and write
132D000
heap
page read and write
5A85000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
5A5F000
trusted library allocation
page read and write
1439000
stack
page read and write
1302000
heap
page read and write
4AF1000
heap
page read and write
1347000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
1206000
unkown
page execute and write copy
5A75000
trusted library allocation
page read and write
6244000
trusted library allocation
page read and write
6020000
direct allocation
page read and write
5AA3000
trusted library allocation
page read and write
3D2F000
stack
page read and write
5B97000
trusted library allocation
page read and write
521E000
stack
page read and write
5C59000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
1349000
trusted library allocation
page read and write
148F000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
133B000
heap
page read and write
D60000
direct allocation
page read and write
6020000
direct allocation
page read and write
C94000
heap
page read and write
1294000
heap
page read and write
1431000
trusted library allocation
page read and write
6020000
direct allocation
page read and write
5A4F000
trusted library allocation
page read and write
1344000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
1344000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
12C7000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
772E000
stack
page read and write
5A59000
trusted library allocation
page read and write
C70000
heap
page read and write
5A7C000
trusted library allocation
page read and write
1318000
heap
page read and write
55DF000
stack
page read and write
1435000
trusted library allocation
page read and write
1334000
heap
page read and write
5ABD000
trusted library allocation
page read and write
4AF1000
heap
page read and write
5A7E000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
67EF000
stack
page read and write
6020000
direct allocation
page read and write
5A7B000
trusted library allocation
page read and write
4AF1000
heap
page read and write
5A56000
trusted library allocation
page read and write
5A63000
trusted library allocation
page read and write
8410000
heap
page read and write
134C000
trusted library allocation
page read and write
140E000
trusted library allocation
page read and write
124E000
heap
page read and write
5AAD000
trusted library allocation
page read and write
13EC000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
133E000
heap
page read and write
35AF000
stack
page read and write
5C50000
trusted library allocation
page read and write
5AD2000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
796F000
stack
page read and write
5A8F000
trusted library allocation
page read and write
1205000
unkown
page execute and read and write
132B000
heap
page read and write
1321000
heap
page read and write
1343000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
1304000
heap
page read and write
1340000
trusted library allocation
page read and write
5A5E000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
134C000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
3E6F000
stack
page read and write
5A48000
trusted library allocation
page read and write
6042000
trusted library allocation
page read and write
C94000
heap
page read and write
5A85000
trusted library allocation
page read and write
5A6D000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
4AF1000
heap
page read and write
5A96000
trusted library allocation
page read and write
1341000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
134D000
trusted library allocation
page read and write
13E9000
trusted library allocation
page read and write
5A74000
trusted library allocation
page read and write
58FE000
stack
page read and write
5AD6000
trusted library allocation
page read and write
1341000
trusted library allocation
page read and write
4FB2000
direct allocation
page read and write
5AAD000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
66EF000
stack
page read and write
1318000
heap
page read and write
5AB3000
trusted library allocation
page read and write
1052000
unkown
page execute and read and write
5BE7000
trusted library allocation
page read and write
9E80000
trusted library allocation
page read and write
1343000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
48AE000
stack
page read and write
1448000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
5ADD000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
732F000
stack
page read and write
5A9C000
trusted library allocation
page read and write
1308000
heap
page read and write
59FF000
stack
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
1303000
heap
page read and write
8120000
heap
page read and write
D60000
direct allocation
page read and write
5A49000
trusted library allocation
page read and write
44EE000
stack
page read and write
148D000
trusted library allocation
page read and write
600F000
stack
page read and write
476E000
stack
page read and write
5A57000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
396F000
stack
page read and write
142F000
trusted library allocation
page read and write
134D000
trusted library allocation
page read and write
C94000
heap
page read and write
133E000
heap
page read and write
8420000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
3BEF000
stack
page read and write
4AF1000
heap
page read and write
80EF000
stack
page read and write
5A65000
trusted library allocation
page read and write
3D6E000
stack
page read and write
C94000
heap
page read and write
8110000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
124A000
heap
page read and write
5C60000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
134B000
trusted library allocation
page read and write
1345000
trusted library allocation
page read and write
4FAC000
stack
page read and write
55E0000
remote allocation
page read and write
5C5C000
trusted library allocation
page read and write
5121000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page execute and read and write
1318000
heap
page read and write
332F000
stack
page read and write
134F000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
134A000
trusted library allocation
page read and write
133B000
heap
page read and write
5A48000
trusted library allocation
page read and write
C94000
heap
page read and write
12B2000
heap
page read and write
579E000
stack
page read and write
5A75000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
129C000
heap
page read and write
5A65000
trusted library allocation
page read and write
7FEE000
stack
page read and write
5A73000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
6020000
direct allocation
page read and write
1346000
trusted library allocation
page read and write
147E000
stack
page read and write
5A62000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
12A9000
heap
page read and write
1350000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
412D000
stack
page read and write
4AF1000
heap
page read and write
6A6F000
stack
page read and write
64E8000
trusted library allocation
page read and write
2D9E000
stack
page read and write
5A7A000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
13D9000
trusted library allocation
page read and write
133B000
heap
page read and write
80F0000
direct allocation
page read and write
5A56000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
146C000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
12C6000
heap
page read and write
140A000
trusted library allocation
page read and write
1285000
heap
page read and write
5C5B000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
7BEF000
stack
page read and write
5A85000
trusted library allocation
page read and write
5A7C000
trusted library allocation
page read and write
147C000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
131B000
heap
page read and write
5A51000
trusted library allocation
page read and write
133E000
heap
page read and write
12B5000
heap
page read and write
12A7000
heap
page read and write
5A65000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
B90000
heap
page read and write
5A85000
trusted library allocation
page read and write
535D000
stack
page read and write
132D000
heap
page read and write
1304000
heap
page read and write
C94000
heap
page read and write
12B5000
heap
page read and write
4AF1000
heap
page read and write
5C5C000
trusted library allocation
page read and write
4AF1000
heap
page read and write
5A6D000
trusted library allocation
page read and write
70EE000
stack
page read and write
5A5D000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
786E000
stack
page read and write
5A6D000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
2DE0000
heap
page read and write
8422000
trusted library allocation
page read and write
4B01000
heap
page read and write
5C52000
trusted library allocation
page read and write
5A7D000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
C94000
heap
page read and write
5A85000
trusted library allocation
page read and write
1318000
heap
page read and write
6D2E000
stack
page read and write
13FC000
trusted library allocation
page read and write
5B5F000
trusted library allocation
page read and write
134D000
trusted library allocation
page read and write
549F000
stack
page read and write
6020000
direct allocation
page read and write
5A85000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
1328000
heap
page read and write
131B000
heap
page read and write
9E3E000
stack
page read and write
1419000
trusted library allocation
page read and write
1293000
heap
page read and write
5A85000
trusted library allocation
page read and write
5A52000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
5A51000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
1343000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
2EEF000
stack
page read and write
5AA5000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
4AF1000
heap
page read and write
134C000
trusted library allocation
page read and write
1407000
trusted library allocation
page read and write
696E000
stack
page read and write
5C52000
trusted library allocation
page read and write
5C1F000
trusted library allocation
page read and write
4AF1000
heap
page read and write
5A85000
trusted library allocation
page read and write
4F70000
direct allocation
page read and write
5A51000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
134B000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
C94000
heap
page read and write
5EED000
trusted library allocation
page execute and read and write
C94000
heap
page read and write
5C5F000
trusted library allocation
page read and write
782F000
stack
page read and write
D71000
unkown
page execute and write copy
4AEF000
stack
page read and write
1311000
heap
page read and write
12C4000
heap
page read and write
49EE000
stack
page read and write
C94000
heap
page read and write
3FAF000
stack
page read and write
1349000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
45EF000
stack
page read and write
D70000
unkown
page readonly
13DE000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
B3B000
stack
page read and write
5A8D000
trusted library allocation
page read and write
1300000
heap
page read and write
5A84000
trusted library allocation
page read and write
1348000
trusted library allocation
page read and write
4F30000
heap
page read and write
1349000
trusted library allocation
page read and write
5100000
direct allocation
page execute and read and write
2FEF000
stack
page read and write
134A000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5AC5000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
132C000
heap
page read and write
6020000
direct allocation
page read and write
1437000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
134C000
trusted library allocation
page read and write
5A56000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
12F7000
heap
page read and write
50E0000
direct allocation
page execute and read and write
14FE000
stack
page read and write
336E000
stack
page read and write
1350000
trusted library allocation
page read and write
8429000
trusted library allocation
page read and write
9C80000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
5A86000
trusted library allocation
page read and write
1423000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
88DE000
stack
page read and write
7E6F000
stack
page read and write
58A0000
direct allocation
page read and write
5CAF000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page read and write
13DB000
trusted library allocation
page read and write
12D8000
heap
page read and write
5B2B000
trusted library allocation
page read and write
C94000
heap
page read and write
5A85000
trusted library allocation
page read and write
1425000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
1220000
direct allocation
page read and write
5A53000
trusted library allocation
page read and write
134A000
trusted library allocation
page read and write
1305000
heap
page read and write
5A76000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
DC7000
unkown
page execute and read and write
1427000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
105B000
unkown
page execute and read and write
50E0000
direct allocation
page execute and read and write
5AA2000
trusted library allocation
page read and write
D60000
direct allocation
page read and write
5A48000
trusted library allocation
page read and write
4AF1000
heap
page read and write
1301000
heap
page read and write
141D000
trusted library allocation
page read and write
DC5000
unkown
page read and write
5A68000
trusted library allocation
page read and write
1328000
heap
page read and write
1331000
heap
page read and write
5A76000
trusted library allocation
page read and write
1311000
heap
page read and write
5A66000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
133E000
heap
page read and write
5AA5000
trusted library allocation
page read and write
43AE000
stack
page read and write
3C2E000
stack
page read and write
572E000
stack
page read and write
141F000
trusted library allocation
page read and write
5C5E000
trusted library allocation
page read and write
39AE000
stack
page read and write
D60000
direct allocation
page read and write
5AC6000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
12CF000
heap
page read and write
1343000
trusted library allocation
page read and write
34AE000
stack
page read and write
5A75000
trusted library allocation
page read and write
5A6F000
trusted library allocation
page read and write
133E000
heap
page read and write
1344000
trusted library allocation
page read and write
1300000
heap
page read and write
1324000
heap
page read and write
141B000
trusted library allocation
page read and write
50ED000
stack
page read and write
5C52000
trusted library allocation
page execute and read and write
D60000
direct allocation
page read and write
1343000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
5A82000
trusted library allocation
page read and write
82C0000
direct allocation
page execute and read and write
5B2B000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
562D000
stack
page read and write
5A76000
trusted library allocation
page read and write
1429000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A69000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
130D000
heap
page read and write
134F000
trusted library allocation
page read and write
134A000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
1349000
trusted library allocation
page read and write
13FB000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
63CF000
trusted library allocation
page read and write
382F000
stack
page read and write
5A77000
trusted library allocation
page read and write
1446000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
422F000
stack
page read and write
131B000
heap
page read and write
5AD2000
trusted library allocation
page read and write
132E000
heap
page read and write
6020000
direct allocation
page read and write
5A74000
trusted library allocation
page read and write
1220000
direct allocation
page read and write
1348000
trusted library allocation
page read and write
6020000
direct allocation
page read and write
386E000
stack
page read and write
5A85000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
D71000
unkown
page execute and read and write
6047000
trusted library allocation
page read and write
5A4B000
trusted library allocation
page read and write
6020000
direct allocation
page read and write
5ADD000
trusted library allocation
page read and write
C94000
heap
page read and write
346F000
stack
page read and write
539E000
stack
page read and write
1349000
trusted library allocation
page read and write
5C55000
trusted library allocation
page read and write
40EF000
stack
page read and write
9D3D000
stack
page read and write
5A4F000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
4B3A000
heap
page read and write
5A48000
trusted library allocation
page read and write
82AF000
stack
page read and write
1311000
heap
page read and write
5A66000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
1405000
trusted library allocation
page read and write
5C17000
trusted library allocation
page read and write
5C51000
trusted library allocation
page read and write
1348000
trusted library allocation
page read and write
322E000
stack
page read and write
5A56000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
5A98000
trusted library allocation
page read and write
1300000
heap
page read and write
12B5000
heap
page read and write
1349000
trusted library allocation
page read and write
3AAF000
stack
page read and write
134E000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A44000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
1341000
trusted library allocation
page read and write
736E000
stack
page read and write
5A65000
trusted library allocation
page read and write
682E000
stack
page read and write
4F30000
trusted library allocation
page read and write
134B000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
142E000
trusted library allocation
page read and write
13FE000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
6246000
trusted library allocation
page read and write
1347000
trusted library allocation
page read and write
1336000
heap
page read and write
1332000
heap
page read and write
5A85000
trusted library allocation
page read and write
DC5000
unkown
page write copy
6AAE000
stack
page read and write
5AA4000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
1304000
heap
page read and write
6047000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
2D5C000
stack
page read and write
372E000
stack
page read and write
4AF0000
heap
page read and write
4AF1000
heap
page read and write
1342000
trusted library allocation
page read and write
134A000
trusted library allocation
page read and write
5A8D000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
133B000
heap
page read and write
4AF1000
heap
page read and write
5C5E000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
3EAE000
stack
page read and write
5AA0000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
54DE000
stack
page read and write
50F0000
direct allocation
page execute and read and write
5A74000
trusted library allocation
page read and write
147A000
trusted library allocation
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
7AEE000
stack
page read and write
5A84000
trusted library allocation
page read and write
106A000
unkown
page execute and write copy
1318000
heap
page read and write
4AF1000
heap
page read and write
5C5E000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5EFE000
trusted library allocation
page execute and read and write
55E0000
remote allocation
page read and write
5ADF000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
1335000
heap
page read and write
1344000
trusted library allocation
page read and write
1443000
trusted library allocation
page read and write
1408000
trusted library allocation
page read and write
30EF000
stack
page read and write
5C5D000
trusted library allocation
page read and write
6559000
trusted library allocation
page read and write
7C2E000
stack
page read and write
55E0000
remote allocation
page read and write
5A51000
trusted library allocation
page read and write
4AF1000
heap
page read and write
5C5C000
trusted library allocation
page read and write
1348000
trusted library allocation
page read and write
486F000
stack
page read and write
31EF000
stack
page read and write
1340000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
1351000
trusted library allocation
page read and write
76EF000
stack
page read and write
133C000
heap
page read and write
44AF000
stack
page read and write
14BB000
stack
page read and write
50E0000
direct allocation
page execute and read and write
5C56000
trusted library allocation
page read and write
722E000
stack
page read and write
5B2B000
trusted library allocation
page read and write
6061000
trusted library allocation
page read and write
6020000
direct allocation
page read and write
5A69000
trusted library allocation
page read and write
4AF1000
heap
page read and write
12CC000
heap
page read and write
5A92000
trusted library allocation
page read and write
1279000
heap
page read and write
5AAC000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
70AF000
stack
page read and write
1311000
heap
page read and write
1220000
direct allocation
page read and write
5A44000
trusted library allocation
page read and write
CE9000
stack
page read and write
1240000
heap
page read and write
6020000
direct allocation
page read and write
5A9F000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
589F000
stack
page read and write
1340000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
5A77000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
1318000
heap
page read and write
5A65000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
4B00000
heap
page read and write
5A66000
trusted library allocation
page read and write
142F000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
71EF000
stack
page read and write
134F000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
13FC000
trusted library allocation
page read and write
C90000
heap
page read and write
134C000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5A95000
trusted library allocation
page read and write
1311000
heap
page read and write
5C50000
trusted library allocation
page read and write
134F000
trusted library allocation
page read and write
1320000
heap
page read and write
131E000
heap
page read and write
134D000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
1345000
trusted library allocation
page read and write
74AE000
stack
page read and write
6E6E000
stack
page read and write
5A85000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
12C6000
heap
page read and write
50B0000
direct allocation
page execute and read and write
426E000
stack
page read and write
3AEE000
stack
page read and write
5A85000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
5A95000
trusted library allocation
page read and write
5A33000
heap
page read and write
12B2000
heap
page read and write
1347000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
5A5B000
trusted library allocation
page read and write
1437000
trusted library allocation
page read and write
5A7E000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
D50000
heap
page read and write
134C000
trusted library allocation
page read and write
746F000
stack
page read and write
5A30000
heap
page read and write
5A62000
trusted library allocation
page read and write
13EA000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
5A84000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
80F0000
direct allocation
page read and write
131F000
heap
page read and write
142B000
trusted library allocation
page read and write
1345000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
12EE000
heap
page read and write
80F0000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
1325000
heap
page read and write
2DDE000
stack
page read and write
5A65000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
6241000
trusted library allocation
page read and write
5AD2000
trusted library allocation
page read and write
6FAE000
stack
page read and write
5A6F000
trusted library allocation
page read and write
1311000
heap
page read and write
5A85000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
13EF000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
1313000
heap
page read and write
106B000
unkown
page execute and write copy
1326000
heap
page read and write
525D000
stack
page read and write
1441000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
D70000
unkown
page read and write
1318000
heap
page read and write
3FEE000
stack
page read and write
5A66000
trusted library allocation
page read and write
1318000
heap
page read and write
131E000
heap
page read and write
692F000
stack
page read and write
D60000
direct allocation
page read and write
1421000
trusted library allocation
page read and write
7EAE000
stack
page read and write
5A66000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
13FE000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
1303000
heap
page read and write
5ADD000
trusted library allocation
page read and write
141B000
trusted library allocation
page read and write
1348000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
7D2F000
stack
page read and write
5AA5000
trusted library allocation
page read and write
462E000
stack
page read and write
5A48000
trusted library allocation
page read and write
13FC000
trusted library allocation
page read and write
75AF000
stack
page read and write
6BAF000
stack
page read and write
5A7B000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
1346000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5A7B000
trusted library allocation
page read and write
87DE000
stack
page read and write
13FE000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
1345000
trusted library allocation
page read and write
5AB6000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
2DE7000
heap
page read and write
436F000
stack
page read and write
D60000
direct allocation
page read and write
6E2F000
stack
page read and write
81AC000
stack
page read and write
5AE7000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
12B8000
heap
page read and write
6F6F000
stack
page read and write
133A000
heap
page read and write
79AE000
stack
page read and write
5C5E000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5A94000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page execute and read and write
5C5C000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A5F000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
134A000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
5A85000
trusted library allocation
page read and write
2D1E000
stack
page read and write
5C5F000
trusted library allocation
page read and write
6BEE000
stack
page read and write
5AAA000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
1331000
heap
page read and write
13ED000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
13FD000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
146A000
trusted library allocation
page read and write
1296000
heap
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
1318000
heap
page read and write
5A62000
trusted library allocation
page read and write
131B000
heap
page read and write
131B000
heap
page read and write
134C000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
134E000
trusted library allocation
page read and write
1321000
heap
page read and write
106A000
unkown
page execute and read and write
5A84000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
131F000
heap
page read and write
8100000
direct allocation
page execute and read and write
7AAF000
stack
page read and write
5A85000
trusted library allocation
page read and write
7FAF000
stack
page read and write
8A1F000
stack
page read and write
5A69000
trusted library allocation
page read and write
5A85000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
65EF000
stack
page read and write
5A77000
trusted library allocation
page read and write
5A5A000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
36EF000
stack
page read and write
5C56000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
13E7000
trusted library allocation
page read and write
5A53000
trusted library allocation
page read and write
7D6E000
stack
page read and write
5A84000
trusted library allocation
page read and write
1336000
heap
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
5C54000
trusted library allocation
page read and write
869B000
stack
page read and write
131F000
heap
page read and write
129C000
heap
page read and write
5A6D000
trusted library allocation
page read and write
C94000
heap
page read and write
472F000
stack
page read and write
1348000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
5C5A000
trusted library allocation
page read and write
1344000
trusted library allocation
page read and write
There are 871 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0