IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 101
ASCII text
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 103
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 104
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 105
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 109
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 111
JSON data
downloaded
Chrome Cache Entry: 112
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 113
JSON data
downloaded
Chrome Cache Entry: 114
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 115
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 116
ASCII text
dropped
Chrome Cache Entry: 117
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 118
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 119
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 120
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 121
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 122
JSON data
dropped
Chrome Cache Entry: 123
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 124
JSON data
downloaded
Chrome Cache Entry: 125
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 89
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 90
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 91
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 92
JSON data
dropped
Chrome Cache Entry: 93
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 94
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 95
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 96
JSON data
dropped
Chrome Cache Entry: 97
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 98
JSON data
downloaded
Chrome Cache Entry: 99
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2000,i,5454548092775656080,16599925680545359581,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1980,i,3811379757786440935,1444168497897757390,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
104.21.33.116
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://property-imper.sbs/apix
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
http://go.mi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
http://31.41.244.11/files/rnd.exe
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://github.com/adegeo
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16/off/def.exe9
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://property-imper.sbs/api1
unknown
https://github.com/js-cookie/js-cookie
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116
www.google.com
172.217.21.36
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
104.21.33.116
property-imper.sbs
United States
172.217.21.36
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
5549000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
5F23000
trusted library allocation
page read and write
44F1000
heap
page read and write
336F000
stack
page read and write
5414000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
3EAF000
stack
page read and write
54FD000
trusted library allocation
page read and write
7D1F000
stack
page read and write
54B8000
trusted library allocation
page read and write
4AAF000
stack
page read and write
6A9E000
stack
page read and write
44F1000
heap
page read and write
54FD000
trusted library allocation
page read and write
5905000
trusted library allocation
page read and write
721E000
stack
page read and write
548D000
trusted library allocation
page read and write
582A000
trusted library allocation
page read and write
4AC0000
remote allocation
page read and write
E20000
heap
page read and write
54FD000
trusted library allocation
page read and write
E25000
heap
page read and write
53E0000
heap
page read and write
75DE000
stack
page read and write
593F000
trusted library allocation
page read and write
5569000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
58E7000
trusted library allocation
page read and write
5A71000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
54F9000
trusted library allocation
page read and write
E48000
heap
page read and write
5437000
trusted library allocation
page read and write
7BDF000
stack
page read and write
5468000
trusted library allocation
page read and write
E38000
heap
page read and write
54C1000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5964000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
609C000
stack
page read and write
54FD000
trusted library allocation
page read and write
59F2000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
D50000
heap
page read and write
E40000
heap
page read and write
5827000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
769000
unkown
page execute and read and write
A27000
unkown
page execute and read and write
44EF000
stack
page read and write
5966000
trusted library allocation
page read and write
E2D000
heap
page read and write
54C1000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
3EEE000
stack
page read and write
54C1000
trusted library allocation
page read and write
E40000
heap
page read and write
5825000
trusted library allocation
page read and write
799E000
stack
page read and write
54AD000
trusted library allocation
page read and write
416E000
stack
page read and write
CDE000
stack
page read and write
52CE000
stack
page read and write
58F4000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
58E9000
trusted library allocation
page read and write
5F2E000
trusted library allocation
page execute and read and write
54FD000
trusted library allocation
page read and write
546A000
trusted library allocation
page read and write
A28000
unkown
page execute and write copy
54C1000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
5A07000
trusted library allocation
page read and write
4E8E000
stack
page read and write
582D000
trusted library allocation
page read and write
6CE000
stack
page read and write
54FD000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
E36000
heap
page read and write
54B0000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
5512000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
44F1000
heap
page read and write
5906000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
E14000
heap
page read and write
29EF000
stack
page read and write
5940000
trusted library allocation
page read and write
6E5E000
stack
page read and write
5422000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
710000
unkown
page readonly
711000
unkown
page execute and write copy
3FEF000
stack
page read and write
54B1000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
700000
direct allocation
page read and write
5497000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
546A000
trusted library allocation
page read and write
5A09000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
795F000
stack
page read and write
58BE000
trusted library allocation
page read and write
2FAF000
stack
page read and write
731F000
stack
page read and write
82AC000
stack
page read and write
4FCF000
stack
page read and write
631E000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
43AF000
stack
page read and write
54FD000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
700000
direct allocation
page read and write
83EE000
stack
page read and write
4970000
direct allocation
page read and write
5822000
trusted library allocation
page read and write
7D90000
direct allocation
page read and write
44F1000
heap
page read and write
595C000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
58E2000
trusted library allocation
page read and write
58E3000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
E36000
heap
page read and write
54FD000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
700000
direct allocation
page read and write
544B000
trusted library allocation
page read and write
700000
direct allocation
page read and write
59E1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
5412000
trusted library allocation
page read and write
D5E000
heap
page read and write
54C1000
trusted library allocation
page read and write
272B000
stack
page read and write
27AE000
stack
page read and write
BD3000
unkown
page execute and read and write
7F20000
direct allocation
page execute and read and write
549D000
trusted library allocation
page read and write
49AC000
stack
page read and write
548C000
trusted library allocation
page read and write
3B2E000
stack
page read and write
5D86000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
4D8E000
stack
page read and write
E38000
heap
page read and write
44F0000
heap
page read and write
7D30000
direct allocation
page read and write
E2D000
heap
page read and write
7D30000
direct allocation
page read and write
70DE000
stack
page read and write
54D6000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
27D0000
direct allocation
page execute and read and write
5979000
trusted library allocation
page read and write
E1B000
heap
page read and write
276E000
stack
page read and write
58F8000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
DBB000
heap
page read and write
7D30000
direct allocation
page read and write
5966000
trusted library allocation
page read and write
E38000
heap
page read and write
E3D000
heap
page read and write
54FD000
trusted library allocation
page read and write
E40000
heap
page read and write
593C000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
595E000
trusted library allocation
page read and write
5A19000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
54FD000
trusted library allocation
page read and write
6040000
trusted library allocation
page execute and read and write
5962000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
511F000
stack
page read and write
5AED000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
D5A000
heap
page read and write
5825000
trusted library allocation
page read and write
E4B000
heap
page read and write
54C1000
trusted library allocation
page read and write
592D000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
2BEF000
stack
page read and write
E45000
heap
page read and write
548C000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
58DA000
trusted library allocation
page read and write
54A5000
trusted library allocation
page read and write
376E000
stack
page read and write
592C000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
582F000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
84EE000
stack
page read and write
54B1000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
67DF000
stack
page read and write
595E000
trusted library allocation
page read and write
5952000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
645E000
stack
page read and write
5A66000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
2EAE000
stack
page read and write
54C1000
trusted library allocation
page read and write
44F1000
heap
page read and write
54C1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
E24000
heap
page read and write
54B8000
trusted library allocation
page read and write
700000
direct allocation
page read and write
54B1000
trusted library allocation
page read and write
F4E000
stack
page read and write
5489000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
54C1000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
5D93000
trusted library allocation
page read and write
58F6000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
58C3000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
546A000
trusted library allocation
page read and write
745F000
stack
page read and write
543A000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
54FA000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
326E000
stack
page read and write
700000
direct allocation
page read and write
2D6E000
stack
page read and write
54C1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
55E9000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
6CDF000
stack
page read and write
6F9E000
stack
page read and write
54FD000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
E30000
heap
page read and write
7D30000
direct allocation
page read and write
582E000
trusted library allocation
page read and write
5C74000
trusted library allocation
page read and write
E14000
heap
page read and write
59B8000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
D91000
heap
page read and write
590E000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
E30000
heap
page read and write
7D30000
trusted library allocation
page read and write
3D6F000
stack
page read and write
5422000
trusted library allocation
page read and write
44F1000
heap
page read and write
5939000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
4AC0000
direct allocation
page execute and read and write
54AD000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
5959000
stack
page read and write
54C1000
trusted library allocation
page read and write
8030000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
5904000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
44F1000
heap
page read and write
6A5F000
stack
page read and write
7D30000
direct allocation
page read and write
5826000
trusted library allocation
page read and write
E36000
heap
page read and write
544A000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
54AD000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
700000
direct allocation
page read and write
58F6000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
34AF000
stack
page read and write
54FD000
trusted library allocation
page read and write
54FC000
trusted library allocation
page read and write
546A000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
5ABF000
stack
page read and write
548B000
trusted library allocation
page read and write
781F000
stack
page read and write
54B1000
trusted library allocation
page read and write
5494000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
592E000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54AD000
trusted library allocation
page read and write
7C1E000
stack
page read and write
54C1000
trusted library allocation
page read and write
7A9F000
stack
page read and write
58D8000
trusted library allocation
page read and write
54AD000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
5830000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
44F1000
heap
page read and write
54AA000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
525D000
stack
page read and write
54FD000
trusted library allocation
page read and write
372F000
stack
page read and write
5828000
trusted library allocation
page read and write
44F1000
heap
page read and write
5493000
trusted library allocation
page read and write
E4D000
heap
page read and write
5493000
trusted library allocation
page read and write
D20000
heap
page read and write
54A1000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
700000
direct allocation
page read and write
4AD0000
direct allocation
page execute and read and write
681E000
stack
page read and write
1CB000
stack
page read and write
594D000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
3C2E000
stack
page read and write
544C000
trusted library allocation
page read and write
E44000
heap
page read and write
44F1000
heap
page read and write
54C1000
trusted library allocation
page read and write
7EF0000
direct allocation
page execute and read and write
5437000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
8032000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
5917000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
735E000
stack
page read and write
9810000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5909000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
6E1F000
stack
page read and write
59F4000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
D88000
heap
page read and write
58C7000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
548D000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
E40000
heap
page read and write
44F1000
heap
page read and write
5422000
trusted library allocation
page read and write
E2D000
heap
page read and write
54F9000
trusted library allocation
page read and write
709F000
stack
page read and write
5A68000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
E30000
heap
page read and write
5A3F000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
3C6E000
stack
page read and write
59B0000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
E30000
heap
page read and write
53E3000
heap
page read and write
33AE000
stack
page read and write
54B1000
trusted library allocation
page read and write
E36000
heap
page read and write
5822000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
592D000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
A0F000
unkown
page execute and read and write
54C1000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
44F1000
heap
page read and write
541B000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
9790000
trusted library allocation
page read and write
582A000
trusted library allocation
page read and write
594D000
trusted library allocation
page read and write
759F000
stack
page read and write
DB7000
heap
page read and write
54FD000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
7D90000
direct allocation
page read and write
E30000
heap
page read and write
5489000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
E1B000
heap
page read and write
DA2000
heap
page read and write
5468000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
66DE000
stack
page read and write
27E7000
heap
page read and write
54B8000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
6050000
trusted library allocation
page execute and read and write
E42000
heap
page read and write
54C1000
trusted library allocation
page read and write
362E000
stack
page read and write
5489000
trusted library allocation
page read and write
582F000
trusted library allocation
page read and write
58BF000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
700000
direct allocation
page read and write
7DCB000
stack
page read and write
767000
unkown
page write copy
5941000
trusted library allocation
page read and write
596E000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
4D4D000
stack
page read and write
61DE000
stack
page read and write
54FB000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
4C0C000
stack
page read and write
700000
direct allocation
page read and write
54FD000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
426F000
stack
page read and write
771E000
stack
page read and write
549B000
trusted library allocation
page read and write
44F1000
heap
page read and write
54FD000
trusted library allocation
page read and write
E38000
heap
page read and write
54C3000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
695E000
stack
page read and write
582A000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
58C9000
trusted library allocation
page read and write
BD4000
unkown
page execute and write copy
54AD000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
4500000
heap
page read and write
54C1000
trusted library allocation
page read and write
28EF000
stack
page read and write
59CA000
trusted library allocation
page read and write
641F000
stack
page read and write
54AF000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page execute and read and write
54F0000
trusted library allocation
page read and write
27B0000
direct allocation
page read and write
5436000
trusted library allocation
page read and write
D1E000
stack
page read and write
8039000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
597F000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
30EF000
stack
page read and write
44F1000
heap
page read and write
54B8000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
5A3D000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
4B1E000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
755000
unkown
page execute and read and write
5823000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
4AC0000
remote allocation
page read and write
A27000
unkown
page execute and write copy
2FEE000
stack
page read and write
54F9000
trusted library allocation
page read and write
62DF000
stack
page read and write
39AF000
stack
page read and write
58C5000
trusted library allocation
page read and write
322F000
stack
page read and write
44F1000
heap
page read and write
5494000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
E4B000
heap
page read and write
5948000
trusted library allocation
page read and write
548C000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
DFF000
heap
page read and write
54D0000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
55B9000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
5427000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
E40000
heap
page read and write
54F9000
trusted library allocation
page read and write
E1B000
heap
page read and write
54FD000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
749E000
stack
page read and write
544C000
trusted library allocation
page read and write
496D000
stack
page read and write
5489000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
76DF000
stack
page read and write
6F5F000
stack
page read and write
548B000
trusted library allocation
page read and write
44F1000
heap
page read and write
58C5000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
8FB000
unkown
page execute and read and write
402E000
stack
page read and write
412F000
stack
page read and write
54C1000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
E30000
heap
page read and write
548C000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
5968000
trusted library allocation
page read and write
5A5E000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
83AC000
stack
page read and write
5422000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
54C4000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
44F1000
heap
page read and write
5518000
trusted library allocation
page read and write
42AE000
stack
page read and write
691F000
stack
page read and write
535000
heap
page read and write
E4D000
heap
page read and write
54DD000
trusted library allocation
page read and write
4AD0000
direct allocation
page execute and read and write
54FD000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
604E000
trusted library allocation
page execute and read and write
582A000
trusted library allocation
page read and write
53CF000
stack
page read and write
54C1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
700000
direct allocation
page read and write
549B000
trusted library allocation
page read and write
582A000
trusted library allocation
page read and write
44F1000
heap
page read and write
5827000
trusted library allocation
page read and write
590C000
trusted library allocation
page read and write
5915000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
71DF000
stack
page read and write
5513000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
E1A000
heap
page read and write
5826000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
7ECE000
stack
page read and write
54FD000
trusted library allocation
page read and write
68E000
stack
page read and write
5485000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
54DB000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
58CE000
trusted library allocation
page read and write
6F0000
heap
page read and write
5411000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
4AC0000
remote allocation
page read and write
548C000
trusted library allocation
page read and write
5531000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
44F1000
heap
page read and write
54DB000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
35EF000
stack
page read and write
5433000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
44F1000
heap
page read and write
501E000
stack
page read and write
596C000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
E1B000
heap
page read and write
2C2E000
stack
page read and write
54B0000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5827000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
58D6000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
5A73000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
582D000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
E4B000
heap
page read and write
59B6000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
58E4000
trusted library allocation
page read and write
A19000
unkown
page execute and read and write
5825000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
E29000
heap
page read and write
54B1000
trusted library allocation
page read and write
4C4D000
stack
page read and write
54C1000
trusted library allocation
page read and write
E47000
heap
page read and write
594B000
trusted library allocation
page read and write
E3B000
heap
page read and write
5A9C000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
6B9F000
stack
page read and write
582D000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
54C3000
trusted library allocation
page read and write
59CE000
trusted library allocation
page read and write
4FB000
stack
page read and write
54B1000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
669F000
stack
page read and write
49B4000
direct allocation
page read and write
548B000
trusted library allocation
page read and write
27B0000
direct allocation
page read and write
6D1E000
stack
page read and write
54C1000
trusted library allocation
page read and write
5AD0000
direct allocation
page read and write
5827000
trusted library allocation
page read and write
619F000
stack
page read and write
58E5000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
59BE000
stack
page read and write
5822000
trusted library allocation
page read and write
598E000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
54A4000
trusted library allocation
page read and write
44F1000
heap
page read and write
27B0000
direct allocation
page read and write
54FD000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
700000
direct allocation
page read and write
548B000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
582F000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
7EE0000
heap
page read and write
E4B000
heap
page read and write
582B000
trusted library allocation
page read and write
43EE000
stack
page read and write
54FD000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
5943000
trusted library allocation
page read and write
312E000
stack
page read and write
54FD000
trusted library allocation
page read and write
7D90000
direct allocation
page read and write
54A1000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
6BDE000
stack
page read and write
5620000
trusted library allocation
page read and write
3AEF000
stack
page read and write
DD9000
heap
page read and write
5824000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
54BA000
trusted library allocation
page read and write
597B000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
593B000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
55F1000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
655F000
stack
page read and write
543A000
trusted library allocation
page read and write
582F000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
515D000
stack
page read and write
5622000
trusted library allocation
page read and write
E1D000
heap
page read and write
582B000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
582B000
trusted library allocation
page read and write
59CC000
trusted library allocation
page read and write
785E000
stack
page read and write
2D2F000
stack
page read and write
39EE000
stack
page read and write
9E5000
unkown
page execute and read and write
7ADE000
stack
page read and write
3DAE000
stack
page read and write
58FB000
trusted library allocation
page read and write
5512000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
27E0000
heap
page read and write
54B0000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
E0C000
heap
page read and write
711000
unkown
page execute and read and write
54D5000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
767000
unkown
page read and write
530000
heap
page read and write
54F0000
trusted library allocation
page read and write
54D8000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page execute and read and write
5485000
trusted library allocation
page read and write
4ECE000
stack
page read and write
34EE000
stack
page read and write
54A1000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
710000
unkown
page read and write
54FD000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
700000
direct allocation
page read and write
54D5000
trusted library allocation
page read and write
58D8000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
54AD000
trusted library allocation
page read and write
44F1000
heap
page read and write
54B8000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5822000
trusted library allocation
page read and write
5DA6000
trusted library allocation
page read and write
7D30000
direct allocation
page read and write
541B000
trusted library allocation
page read and write
620000
heap
page read and write
54C1000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
2E6F000
stack
page read and write
54B4000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
8020000
heap
page read and write
5499000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
585A000
stack
page read and write
E38000
heap
page read and write
582D000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
54E4000
trusted library allocation
page read and write
2AEF000
stack
page read and write
54F9000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
548B000
trusted library allocation
page read and write
700000
direct allocation
page read and write
540000
heap
page read and write
38AE000
stack
page read and write
54AF000
trusted library allocation
page read and write
E38000
heap
page read and write
58C1000
trusted library allocation
page read and write
386F000
stack
page read and write
54FD000
trusted library allocation
page read and write
5494000
trusted library allocation
page read and write
5828000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
54C1000
trusted library allocation
page read and write
44F1000
heap
page read and write
54FD000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5494000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
659E000
stack
page read and write
58C3000
trusted library allocation
page read and write
59DF000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5A14000
trusted library allocation
page read and write
There are 928 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0