IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 101
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 102
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 103
ASCII text
dropped
Chrome Cache Entry: 104
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 105
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 107
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 108
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 109
JSON data
dropped
Chrome Cache Entry: 110
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 111
JSON data
downloaded
Chrome Cache Entry: 112
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 74
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 76
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 77
JSON data
dropped
Chrome Cache Entry: 78
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 79
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 80
JSON data
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 82
JSON data
downloaded
Chrome Cache Entry: 83
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 85
ASCII text
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 87
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 88
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 89
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 90
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 92
JSON data
dropped
Chrome Cache Entry: 93
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 94
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 96
JSON data
downloaded
Chrome Cache Entry: 97
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 98
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 99
JSON data
downloaded
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2000,i,1216754078146385774,10229493209722040529,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1912,i,604844754400546149,4570885901595365949,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
dare-curbys.biz
impend-differ.biz
https://duckduckgo.com/ac/?q=
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://atten-supporse.biz/S
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.16/off/def.exeM
unknown
https://atten-supporse.biz
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
dwell-exclaim.biz
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
zinc-sneark.biz
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
formy-spill.biz
https://atten-supporse.biz/apiu
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
se-blurry.biz
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://atten-supporse.biz/;
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://atten-supporse.biz/apiG
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
covery-mover.biz
http://polymer.github.io/PATENTS.txt
unknown
https://atten-supporse.biz/api9
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://atten-supporse.biz/api
104.21.32.1
https://github.com/mairaw
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://atten-supporse.biz/apiS
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://atten-supporse.biz/apiI
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
atten-supporse.biz
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://atten-supporse.biz/
unknown
print-vexer.biz
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
atten-supporse.biz
104.21.32.1
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
104.21.32.1
atten-supporse.biz
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
5B1000
unkown
page execute and read and write
malicious
6788000
trusted library allocation
page execute and read and write
6174000
trusted library allocation
page read and write
14FC000
heap
page read and write
8550000
trusted library allocation
page read and write
6239000
trusted library allocation
page read and write
5CA6000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
624B000
trusted library allocation
page read and write
85C0000
heap
page read and write
5C8C000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
5C25000
trusted library allocation
page read and write
61A7000
trusted library allocation
page read and write
713F000
stack
page read and write
5C6F000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
14EE000
heap
page read and write
61C9000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
6341000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
61C1000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
515C000
stack
page read and write
5C14000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
7EFF000
stack
page read and write
5D07000
trusted library allocation
page read and write
618A000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
87D2000
trusted library allocation
page read and write
38CE000
stack
page read and write
6183000
trusted library allocation
page read and write
490E000
stack
page read and write
5CC6000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
52C0000
direct allocation
page execute and read and write
6196000
trusted library allocation
page read and write
5A4E000
stack
page read and write
6176000
trusted library allocation
page read and write
5120000
direct allocation
page read and write
62C0000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
621D000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
899000
unkown
page execute and read and write
5C20000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
5C8E000
trusted library allocation
page read and write
5C0B000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
8540000
trusted library allocation
page read and write
152D000
heap
page read and write
3F0E000
stack
page read and write
1523000
heap
page read and write
525F000
stack
page read and write
5110000
remote allocation
page read and write
620F000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
150B000
heap
page read and write
5C88000
trusted library allocation
page read and write
60A3000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
12C4000
heap
page read and write
5CC4000
trusted library allocation
page read and write
418E000
stack
page read and write
60A2000
trusted library allocation
page read and write
4CA0000
heap
page read and write
5CBB000
trusted library allocation
page read and write
150B000
heap
page read and write
60AF000
trusted library allocation
page read and write
5D06000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
151A000
heap
page read and write
5C8C000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C48000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
82FE000
stack
page read and write
69BF000
stack
page read and write
33CE000
stack
page read and write
5C93000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C4A000
trusted library allocation
page read and write
3B0F000
stack
page read and write
52F1000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
152D000
heap
page read and write
1508000
heap
page read and write
338F000
stack
page read and write
8B2000
unkown
page execute and write copy
6359000
trusted library allocation
page read and write
60AF000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
14F2000
heap
page read and write
5C0C000
trusted library allocation
page read and write
552D000
stack
page read and write
151A000
heap
page read and write
5C40000
trusted library allocation
page read and write
4C91000
heap
page read and write
6602000
trusted library allocation
page execute and read and write
5BD0000
heap
page read and write
60A9000
trusted library allocation
page read and write
1521000
heap
page read and write
1520000
heap
page read and write
703E000
stack
page read and write
60A4000
trusted library allocation
page read and write
400F000
stack
page read and write
6211000
trusted library allocation
page read and write
6172000
trusted library allocation
page read and write
1508000
heap
page read and write
5C88000
trusted library allocation
page read and write
6FFF000
stack
page read and write
853F000
stack
page read and write
5C8C000
trusted library allocation
page read and write
6199000
stack
page read and write
5C01000
trusted library allocation
page read and write
47CE000
stack
page read and write
672E000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
4C91000
heap
page read and write
8580000
direct allocation
page read and write
3DCE000
stack
page read and write
7B7E000
stack
page read and write
5C51000
trusted library allocation
page read and write
3B4E000
stack
page read and write
53EC000
stack
page read and write
5C59000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
12C4000
heap
page read and write
60A6000
trusted library allocation
page read and write
803F000
stack
page read and write
5C48000
trusted library allocation
page read and write
5C4D000
trusted library allocation
page read and write
14EB000
heap
page read and write
5C45000
trusted library allocation
page read and write
616E000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5C99000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
14A0000
heap
page read and write
817F000
stack
page read and write
5C88000
trusted library allocation
page read and write
1521000
heap
page read and write
60A4000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
6271000
trusted library allocation
page read and write
162F000
stack
page read and write
6330000
direct allocation
page read and write
61B7000
trusted library allocation
page read and write
14E7000
heap
page read and write
61A9000
trusted library allocation
page read and write
14FE000
heap
page read and write
5C88000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
68AC000
trusted library allocation
page execute and read and write
5C1F000
trusted library allocation
page read and write
5D0A000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C8E000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
633A000
trusted library allocation
page read and write
1501000
heap
page read and write
5C0C000
trusted library allocation
page read and write
62E7000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
12C4000
heap
page read and write
1520000
heap
page read and write
152D000
heap
page read and write
1420000
direct allocation
page read and write
152D000
heap
page read and write
5C53000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
151A000
heap
page read and write
5CE2000
trusted library allocation
page read and write
1430000
heap
page read and write
871000
unkown
page execute and read and write
60A4000
trusted library allocation
page read and write
127E000
stack
page read and write
5C2F000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
4A0F000
stack
page read and write
5120000
direct allocation
page read and write
F9B000
stack
page read and write
5DA7000
trusted library allocation
page read and write
1518000
heap
page read and write
73D01000
unkown
page execute read
5C50000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C87000
trusted library allocation
page read and write
61DE000
stack
page read and write
5CC2000
trusted library allocation
page read and write
150B000
heap
page read and write
60A7000
trusted library allocation
page read and write
83FF000
stack
page read and write
615B000
trusted library allocation
page read and write
60A8000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
152D000
heap
page read and write
61AA000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
14EB000
heap
page read and write
5C40000
trusted library allocation
page read and write
5CCE000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
4C91000
heap
page read and write
5E6F000
trusted library allocation
page read and write
1508000
heap
page read and write
5DD7000
trusted library allocation
page read and write
5CC2000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
61B3000
trusted library allocation
page read and write
1500000
heap
page read and write
7B3F000
stack
page read and write
12C4000
heap
page read and write
150B000
heap
page read and write
60B0000
trusted library allocation
page read and write
5F2000
unkown
page execute and read and write
5CC2000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
61F1000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
6EBF000
stack
page read and write
5C65000
trusted library allocation
page read and write
6155000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
61AC000
trusted library allocation
page read and write
5C85000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
152D000
heap
page read and write
5C87000
trusted library allocation
page read and write
300C000
stack
page read and write
5D0B000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C5B000
trusted library allocation
page read and write
404E000
stack
page read and write
3D8F000
stack
page read and write
12C4000
heap
page read and write
60A2000
trusted library allocation
page read and write
61CC000
trusted library allocation
page read and write
556E000
stack
page read and write
149D000
heap
page read and write
69FE000
stack
page read and write
6B3E000
stack
page read and write
5C88000
trusted library allocation
page read and write
1508000
heap
page read and write
1521000
heap
page read and write
5C2F000
trusted library allocation
page read and write
A000000
trusted library allocation
page read and write
14F5000
heap
page read and write
5C8A000
trusted library allocation
page read and write
1520000
heap
page read and write
60A5000
trusted library allocation
page read and write
5C62000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C96000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
6357000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
1521000
heap
page read and write
60AC000
trusted library allocation
page read and write
5C93000
trusted library allocation
page read and write
73D17000
unkown
page readonly
14FC000
heap
page read and write
14EE000
heap
page read and write
5CA8000
trusted library allocation
page read and write
60A3000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
7C7F000
stack
page read and write
61C5000
trusted library allocation
page read and write
8BCE000
stack
page read and write
6330000
direct allocation
page read and write
6251000
trusted library allocation
page read and write
5CAE000
trusted library allocation
page read and write
61AE000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
5C01000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
450F000
stack
page read and write
57AF000
stack
page read and write
6330000
direct allocation
page read and write
1468000
heap
page read and write
5C8C000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5C93000
trusted library allocation
page read and write
6146000
trusted library allocation
page read and write
12C4000
heap
page read and write
5D1F000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
374F000
stack
page read and write
60A5000
trusted library allocation
page read and write
73D1D000
unkown
page read and write
73D00000
unkown
page readonly
5C01000
trusted library allocation
page read and write
605000
unkown
page execute and read and write
5C2F000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
4C91000
heap
page read and write
4C91000
heap
page read and write
5C88000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
5C78000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
8A8B000
stack
page read and write
61A1000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
48CF000
stack
page read and write
5C8C000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
615A000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
633F000
trusted library allocation
page read and write
603000
unkown
page write copy
60AA000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
1507000
heap
page read and write
1512000
heap
page read and write
8710000
direct allocation
page execute and read and write
5C88000
trusted library allocation
page read and write
60AC000
trusted library allocation
page read and write
14F9000
heap
page read and write
6D7F000
stack
page read and write
1420000
direct allocation
page read and write
5C2F000
trusted library allocation
page read and write
5270000
direct allocation
page execute and read and write
5C2B000
trusted library allocation
page read and write
5C4C000
trusted library allocation
page read and write
8580000
direct allocation
page read and write
5DDF000
trusted library allocation
page read and write
590F000
stack
page read and write
619C000
trusted library allocation
page read and write
152D000
heap
page read and write
143E000
heap
page read and write
39CE000
stack
page read and write
5C3B000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
60AE000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
310F000
stack
page read and write
5C53000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
3C8E000
stack
page read and write
5C47000
trusted library allocation
page read and write
12C4000
heap
page read and write
6144000
trusted library allocation
page read and write
620F000
trusted library allocation
page read and write
5C85000
trusted library allocation
page read and write
52E0000
direct allocation
page execute and read and write
5C15000
trusted library allocation
page read and write
7DFE000
stack
page read and write
6147000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
60A8000
trusted library allocation
page read and write
60A8000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
8580000
direct allocation
page read and write
12C4000
heap
page read and write
72BE000
stack
page read and write
6317000
trusted library allocation
page read and write
151A000
heap
page read and write
5C3D000
trusted library allocation
page read and write
152D000
heap
page read and write
5C2F000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
6158000
trusted library allocation
page read and write
61C3000
trusted library allocation
page read and write
6159000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
5C4F000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
428F000
stack
page read and write
6178000
trusted library allocation
page read and write
5161000
direct allocation
page read and write
328E000
stack
page read and write
5C0B000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
152D000
heap
page read and write
5C20000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
633C000
trusted library allocation
page read and write
6290000
trusted library allocation
page read and write
5C58000
trusted library allocation
page read and write
5C32000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
2FCF000
stack
page read and write
60AA000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
324F000
stack
page read and write
5C9A000
trusted library allocation
page read and write
619A000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C67000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
6291000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
12C4000
heap
page read and write
60AC000
trusted library allocation
page read and write
1508000
heap
page read and write
62AE000
trusted library allocation
page read and write
14EE000
heap
page read and write
5C15000
trusted library allocation
page read and write
5CC7000
trusted library allocation
page read and write
566F000
stack
page read and write
5C40000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
5C20000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
151B000
heap
page read and write
7A3E000
stack
page read and write
5C60000
trusted library allocation
page read and write
8CCF000
stack
page read and write
5C96000
trusted library allocation
page read and write
4C91000
heap
page read and write
52A0000
direct allocation
page execute and read and write
61EF000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
616E000
trusted library allocation
page read and write
4C91000
heap
page read and write
60B1000
trusted library allocation
page read and write
580E000
stack
page read and write
60A3000
trusted library allocation
page read and write
1504000
heap
page read and write
12C4000
heap
page read and write
5C96000
trusted library allocation
page read and write
1524000
heap
page read and write
14EB000
heap
page read and write
5C41000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
618C000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
172F000
stack
page read and write
1507000
heap
page read and write
5C8C000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
8B8C000
stack
page read and write
1520000
heap
page read and write
5C2A000
trusted library allocation
page read and write
61D4000
trusted library allocation
page read and write
807E000
stack
page read and write
152D000
heap
page read and write
5C26000
trusted library allocation
page read and write
61AC000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
1507000
heap
page read and write
60A6000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
5C06000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5110000
remote allocation
page read and write
626F000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
52AE000
stack
page read and write
5C93000
trusted library allocation
page read and write
60AD000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
5BD3000
heap
page read and write
60AA000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
152D000
heap
page read and write
61CE000
trusted library allocation
page read and write
843E000
stack
page read and write
364E000
stack
page read and write
630C000
trusted library allocation
page read and write
50D0000
heap
page read and write
6195000
trusted library allocation
page read and write
1520000
heap
page read and write
5C5B000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
140E000
stack
page read and write
5C40000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
152D000
heap
page read and write
6193000
trusted library allocation
page read and write
60AE000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
5C15000
trusted library allocation
page read and write
6315000
trusted library allocation
page read and write
60B1000
trusted library allocation
page read and write
73D16000
unkown
page execute and read and write
5C9C000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
14F2000
heap
page read and write
1504000
heap
page read and write
3ECF000
stack
page read and write
5D80000
direct allocation
page read and write
5C38000
trusted library allocation
page read and write
1504000
heap
page read and write
14F2000
heap
page read and write
6150000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
14F2000
heap
page read and write
87D0000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
52D0000
direct allocation
page execute and read and write
42CE000
stack
page read and write
60AA000
trusted library allocation
page read and write
5EA2000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
152D000
heap
page read and write
5C57000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
150B000
heap
page read and write
468E000
stack
page read and write
660A000
trusted library allocation
page execute and read and write
5C6F000
trusted library allocation
page read and write
143A000
heap
page read and write
5C4A000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
414F000
stack
page read and write
65ED000
trusted library allocation
page read and write
5C9A000
trusted library allocation
page read and write
4C91000
heap
page read and write
5C4D000
trusted library allocation
page read and write
13B0000
heap
page read and write
14FC000
heap
page read and write
5C4B000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
151E000
heap
page read and write
5C8C000
trusted library allocation
page read and write
1520000
heap
page read and write
5C8C000
trusted library allocation
page read and write
5C41000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
14FD000
heap
page read and write
5C88000
trusted library allocation
page read and write
60AC000
trusted library allocation
page read and write
61CB000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
151A000
heap
page read and write
7F3E000
stack
page read and write
6EFE000
stack
page read and write
14FC000
heap
page read and write
6330000
direct allocation
page read and write
6160000
trusted library allocation
page read and write
60A2000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
793000
unkown
page execute and read and write
5C05000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
62CF000
trusted library allocation
page read and write
5C1C000
trusted library allocation
page read and write
5ABE000
stack
page read and write
628F000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5BBF000
stack
page read and write
62D1000
trusted library allocation
page read and write
5C9D000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
12C4000
heap
page read and write
61B9000
trusted library allocation
page read and write
152D000
heap
page read and write
4B4F000
stack
page read and write
60A3000
trusted library allocation
page read and write
8560000
heap
page read and write
360F000
stack
page read and write
5C90000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
61BE000
trusted library allocation
page read and write
5B0000
unkown
page read and write
61A3000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
5C37000
trusted library allocation
page read and write
6C7E000
stack
page read and write
1523000
heap
page read and write
12C4000
heap
page read and write
5C14000
trusted library allocation
page read and write
60A8000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
689C000
trusted library allocation
page execute and read and write
60AF000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
151A000
heap
page read and write
86E0000
direct allocation
page execute and read and write
6141000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
624F000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
621F000
trusted library allocation
page read and write
150A000
heap
page read and write
5C14000
trusted library allocation
page read and write
4CDA000
heap
page read and write
60A4000
trusted library allocation
page read and write
350E000
stack
page read and write
82BF000
stack
page read and write
5C25000
trusted library allocation
page read and write
5C05000
trusted library allocation
page read and write
464F000
stack
page read and write
151A000
heap
page read and write
60A5000
trusted library allocation
page read and write
5C93000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
6600000
trusted library allocation
page read and write
E9B000
stack
page read and write
79FF000
stack
page read and write
78FE000
stack
page read and write
5C8C000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
150A000
heap
page read and write
5C48000
trusted library allocation
page read and write
5C61000
trusted library allocation
page read and write
1523000
heap
page read and write
1420000
direct allocation
page read and write
147E000
heap
page read and write
5C77000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
5C40000
trusted library allocation
page read and write
151C000
heap
page read and write
6174000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
727F000
stack
page read and write
60A6000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
87DA000
trusted library allocation
page read and write
151E000
heap
page read and write
4C90000
heap
page read and write
1521000
heap
page read and write
5C40000
trusted library allocation
page read and write
5C0C000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
A57000
unkown
page execute and read and write
5C15000
trusted library allocation
page read and write
14FF000
heap
page read and write
1512000
heap
page read and write
5C15000
trusted library allocation
page read and write
14F6000
heap
page read and write
12C4000
heap
page read and write
5C43000
trusted library allocation
page read and write
5C1F000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
4B8E000
stack
page read and write
61E9000
trusted library allocation
page read and write
5B0000
unkown
page readonly
5C4A000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
5C77000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
617E000
trusted library allocation
page read and write
1513000
heap
page read and write
5C87000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
767E000
stack
page read and write
12C0000
heap
page read and write
52A0000
direct allocation
page execute and read and write
68AE000
trusted library allocation
page execute and read and write
60A6000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
8B3000
unkown
page execute and write copy
378E000
stack
page read and write
5C15000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
13B7000
heap
page read and write
314E000
stack
page read and write
5C1C000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
717E000
stack
page read and write
5C19000
trusted library allocation
page read and write
1473000
heap
page read and write
5C0B000
trusted library allocation
page read and write
440E000
stack
page read and write
454E000
stack
page read and write
61BE000
trusted library allocation
page read and write
3A0E000
stack
page read and write
5C88000
trusted library allocation
page read and write
1507000
heap
page read and write
5C88000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
151C000
heap
page read and write
478F000
stack
page read and write
1523000
heap
page read and write
5C6B000
trusted library allocation
page read and write
777F000
stack
page read and write
614E000
trusted library allocation
page read and write
624D000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
74FF000
stack
page read and write
60A7000
trusted library allocation
page read and write
6AFF000
stack
page read and write
14ED000
heap
page read and write
594D000
stack
page read and write
1210000
heap
page read and write
5C72000
trusted library allocation
page read and write
14E7000
heap
page read and write
150A000
heap
page read and write
5C34000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
60AD000
trusted library allocation
page read and write
5C84000
trusted library allocation
page read and write
1521000
heap
page read and write
1508000
heap
page read and write
5D05000
trusted library allocation
page read and write
61DD000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
603000
unkown
page write copy
152D000
heap
page read and write
5C23000
trusted library allocation
page read and write
60A1000
trusted library allocation
page read and write
5D37000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
60A9000
trusted library allocation
page read and write
5C87000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
150A000
heap
page read and write
5C3E000
trusted library allocation
page read and write
5C9A000
trusted library allocation
page read and write
85BB000
stack
page read and write
5110000
remote allocation
page read and write
4C91000
heap
page read and write
152D000
heap
page read and write
12BE000
stack
page read and write
5C03000
trusted library allocation
page read and write
6C3F000
stack
page read and write
5C59000
trusted library allocation
page read and write
56AE000
stack
page read and write
5C0C000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
5B1000
unkown
page execute and write copy
152D000
heap
page read and write
1200000
heap
page read and write
5C8C000
trusted library allocation
page read and write
8A3000
unkown
page execute and read and write
5C0A000
trusted library allocation
page read and write
151A000
heap
page read and write
5C5B000
trusted library allocation
page read and write
5C49000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
4C8F000
stack
page read and write
61DB000
trusted library allocation
page read and write
151A000
heap
page read and write
12C4000
heap
page read and write
5C9A000
trusted library allocation
page read and write
4A4E000
stack
page read and write
624D000
trusted library allocation
page read and write
5C01000
trusted library allocation
page read and write
5C2E000
trusted library allocation
page read and write
61B1000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
1521000
heap
page read and write
5C35000
trusted library allocation
page read and write
5C1E000
trusted library allocation
page read and write
5C8E000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
753E000
stack
page read and write
5CE2000
trusted library allocation
page read and write
1524000
heap
page read and write
388F000
stack
page read and write
5C3D000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
5C97000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
60AB000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
61D2000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
5D39000
stack
page read and write
14FF000
heap
page read and write
4C91000
heap
page read and write
60A8000
trusted library allocation
page read and write
5D57000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
60A9000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
5C69000
trusted library allocation
page read and write
62E9000
trusted library allocation
page read and write
5C0B000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
542D000
stack
page read and write
5EA7000
trusted library allocation
page read and write
5C93000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
763F000
stack
page read and write
1505000
heap
page read and write
5C40000
trusted library allocation
page read and write
5C14000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
64D8000
trusted library allocation
page read and write
149C000
heap
page read and write
14EE000
heap
page read and write
60AB000
trusted library allocation
page read and write
5C8E000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
5C89000
trusted library allocation
page read and write
149F000
heap
page read and write
60AC000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
631B000
stack
page read and write
5C3A000
trusted library allocation
page read and write
60A1000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
617A000
trusted library allocation
page read and write
61C3000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
5C1B000
trusted library allocation
page read and write
73FE000
stack
page read and write
14FA000
heap
page read and write
616C000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
14F9000
heap
page read and write
1512000
heap
page read and write
52A0000
direct allocation
page execute and read and write
1521000
heap
page read and write
60A8000
trusted library allocation
page read and write
613F000
trusted library allocation
page read and write
5C63000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
A58000
unkown
page execute and write copy
5CE2000
trusted library allocation
page read and write
77BE000
stack
page read and write
5CB0000
trusted library allocation
page read and write
73D1F000
unkown
page readonly
5C92000
trusted library allocation
page read and write
4C91000
heap
page read and write
6606000
trusted library allocation
page read and write
34CF000
stack
page read and write
60A8000
trusted library allocation
page read and write
14EB000
heap
page read and write
152D000
heap
page read and write
65FB000
trusted library allocation
page read and write
61EE000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
43CF000
stack
page read and write
1410000
heap
page read and write
1523000
heap
page read and write
62B0000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
5C5D000
trusted library allocation
page read and write
5C8E000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
5C40000
trusted library allocation
page read and write
5C6E000
trusted library allocation
page read and write
152D000
heap
page read and write
5C59000
trusted library allocation
page read and write
5C57000
trusted library allocation
page read and write
5120000
direct allocation
page read and write
5C69000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
6DBE000
stack
page read and write
5C53000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
4CA1000
heap
page read and write
151E000
heap
page read and write
61EE000
trusted library allocation
page read and write
1420000
direct allocation
page read and write
60A7000
trusted library allocation
page read and write
86CE000
stack
page read and write
60A8000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
1521000
heap
page read and write
62DF000
stack
page read and write
1491000
heap
page read and write
5C00000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
6330000
direct allocation
page read and write
5C33000
trusted library allocation
page read and write
7DBF000
stack
page read and write
1420000
direct allocation
page read and write
4C91000
heap
page read and write
5C37000
trusted library allocation
page read and write
60AA000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
615E000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
8B2000
unkown
page execute and read and write
6181000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
1523000
heap
page read and write
1520000
heap
page read and write
4C91000
heap
page read and write
12C4000
heap
page read and write
5C38000
trusted library allocation
page read and write
6237000
trusted library allocation
page read and write
3C4F000
stack
page read and write
5C15000
trusted library allocation
page read and write
61F0000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
1521000
heap
page read and write
5CBF000
trusted library allocation
page read and write
81BE000
stack
page read and write
14F9000
heap
page read and write
5C40000
trusted library allocation
page read and write
14ED000
heap
page read and write
5C02000
trusted library allocation
page read and write
78BF000
stack
page read and write
73BF000
stack
page read and write
5C2F000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
7CBE000
stack
page read and write
5C2B000
trusted library allocation
page read and write
There are 946 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0